HomeCII/OTFBI and Europol Shut Down LeakBase Cybercrime Forum

FBI and Europol Shut Down LeakBase Cybercrime Forum

Published on

spot_img

Major Cybercrime Forum LeakBase Dismantled in Global Law Enforcement Operation

In a significant crackdown on cybercrime, an international law enforcement operation has successfully dismantled LeakBase, an online marketplace notorious for trading stolen data. This platform had emerged as a crucial hub for cybercriminals, boasting over 142,000 registered users and a vast collection of posts containing leaked databases and stolen credentials, significantly affecting the cybercrime landscape.

The operation was spearheaded by Europol, with collaboration from law enforcement agencies across multiple countries. Law enforcement’s attention was drawn towards LeakBase’s infrastructure and a number of its most active users. Coordinated enforcement actions unfolded from March 3 to 4, exemplifying a united global effort intended to disrupt the lucrative underground economy reliant on stolen personal and corporate data.

Authorities indicated that the dismantling of the cybercrime forum marks a critical blow against a platform heavily trafficked by offenders to exchange compromised information and orchestrate further cyberattacks. The ramifications of this intervention reach wide, as it aims to disrupt the ongoing threat posed by such illicit trading platforms.

LeakBase: A Growing Marketplace for Stolen Credentials

Established in 2021, LeakBase operated transparently on the web and predominantly utilized the English language, thereby attracting a diverse global audience of cybercriminals. The forum specialized in the exchange of leaked databases and stealer logs—collections of credentials harvested through infostealer malware. This data typically includes vital information like email addresses and passwords, enabling criminals to hijack online accounts and perpetrate fraud schemes that can lead to more extensive cyber intrusions.

Over the years, LeakBase developed an organized system that allowed for its rapid growth. The platform operated on a credit-based economy reinforced by a reputation system, facilitating users in building credibility within the community and accessing more valuable data. This feature sustained a trust framework among the offenders, ensuring that the marketplace remained vibrant and active.

Remarkably, even within this sphere of data theft, LeakBase had implemented an internal policy that prohibited the sale or dissemination of data related to Russia, hinting at the peculiar dynamics that sometimes characterize cybercrime networks. By December 2025, LeakBase had registered over 142,000 users, amassed around 32,000 posts, and exchanged more than 215,000 private messages, solidifying its status as a prominent entity in the underground data trade ecosystem.

Coordinated Global Action Against the Cybercrime Forum

The enforcement operation against LeakBase was a collaborative effort that included law enforcement personnel from countries such as Australia, Belgium, Canada, Germany, Greece, and several others, including the U.S. The crackdown began on March 3, where authorities launched precise enforcement actions, encompassing arrests, house searches, and “knock-and-talk” visits aimed at individuals identified as significantly involved in the forum’s activities.

In total, around 100 enforcement actions were enacted globally, with investigators homing in on 37 of the forum’s most active users. By the following day, authorities transitioned into the technical disruption phase of the operation, seizing the forum’s domain and replacing its site with a law enforcement notice. This decisive action effectively shut down the platform, preventing any further criminal activity from occurring.

Authorities have indicated that the investigation is evolving into a prevention stage, aimed at discouraging further participation in similar cybercrime operations.

Europol’s Role in Tracking the Forum

Central to the investigation was Europol, whose analysts played a vital role in mapping out the infrastructure of the LeakBase forum and scrutinizing user activity. By cross-referencing the forum’s data with ongoing cases across Europe and further afield, law enforcement was able to identify potential suspects and connect digital evidence across diverse jurisdictions.

At Europol’s headquarters in The Hague, a dedicated group of professionals worked jointly to process the seized information, aiming to rapidly generate actionable leads for law enforcement. This operation fell under the framework of the Joint Cybercrime Action Taskforce (J-CAT), established to streamline and bolster international cybercrime investigations.

Anonymity in Cybercrime Is Often an Illusion

Investigators assert that the operation illuminated how tenuous anonymity within the cybercrime world can be. The seizure of the forum’s database revealed the identities of several users who had believed their activities were successfully masked. In some instances, investigators directly reached out to suspects via the very online channels previously utilized for their illicit dealings.

Edvardas Šileris, Europol’s Head of the European Cybercrime Centre, remarked on the operation’s implications, stating that it sends a loud and clear message to cybercriminals globally. He emphasized that no corner of the internet is impervious to international law enforcement, stating that those hiding behind digital anonymity will inevitably be identified and brought to justice.

Stolen Data Rarely Disappears

Despite the success of dismantling LeakBase, experts caution about the recurrent reality of cybercrime. Data breaches can re-emerge on underground forums, where stolen information is often repurposed in scams, phishing campaigns, or identity theft schemes. The closure of LeakBase is a pivotal development, but similar illicit trading platforms may quickly rise to take its place.

In light of these ongoing threats, authorities remind individuals of the importance of maintaining robust cybersecurity practices. Utilizing strong, unique passwords and enabling multi-factor authentication can significantly decrease the chances of account compromise, serving as essential layers of protection against the evolving landscape of cybercrime.

Source link

Latest articles

AI Agents Making Purchases Require Security Teams to Rethink Risk

In a recent interview featured on Help Net Security, Donald Kossmann, the Chief Technology...

AI Is Making Social Engineering Detection More Challenging—Yet Training Methods Remain Stuck in 2015

In a groundbreaking incident that has significant implications for cybersecurity, Hong Kong police revealed...

State-affiliated Hackers Prepare for Undetectable Critical OT Attacks

In a comprehensive analysis of tabletop exercises conducted by a cybersecurity firm in 2025,...

Multi-Stage BadPaw Malware Campaign Targets Ukraine

New Malware Campaign Exploits Ukrainian Email Service, Researchers Warn A recently identified malware campaign highlights...

More like this

AI Agents Making Purchases Require Security Teams to Rethink Risk

In a recent interview featured on Help Net Security, Donald Kossmann, the Chief Technology...

AI Is Making Social Engineering Detection More Challenging—Yet Training Methods Remain Stuck in 2015

In a groundbreaking incident that has significant implications for cybersecurity, Hong Kong police revealed...

State-affiliated Hackers Prepare for Undetectable Critical OT Attacks

In a comprehensive analysis of tabletop exercises conducted by a cybersecurity firm in 2025,...