Menu
LeakedSource's shutdown is a blow to amateur hackers

LeakedSource's shutdown is a blow to amateur hackers

LeakedSource had functioned as a giant repository holding more than 3 billion internet accounts from previous data breaches

Amateur hackers are alarmed with the apparent demise of LeakedSource, a controversial breach notification site that’s been accused of doing more harm than good.

U.S. law enforcement has allegedly confiscated its servers, and now some hackers are wondering if customers of LeakedSource might be next.  

“All the people who used PayPal, credit card, etc. to buy membership, the FBI now have your email, payment details and lookup history,” wrote one user on HackForums.net.

LeakedSource had functioned as a giant repository with more than 3 billion internet accounts -- all of which had been compiled from stolen databases, taken from the likes of LinkedIn, MySpace, and Dropbox. For as little as US$2 a day, anyone could use the site to look up password and other login information.

That made it particularly popular with users on HackForums.net, a site filled with discussion on hacking techniques often by amateurs known as “script kiddies.”

But whether the FBI really shut down LeakedSource is still unclear. The site itself has been offline and its operators have been mum on Twitter and through email.

In addition, the U.S. Department of Justice has declined to comment.

Nevertheless, experts in data breach notification said the situation with LeakedSource was inevitable.

“They weren’t handling the data ethically or responsibly,” said a data collector who goes by the name Keen. He runs a separate notification site at Vigilante.pw that tries to warn the public about the latest data breaches.

But unlike LeakedSource, he doesn’t make the data searchable or post any sensitive user information. Nor does he buy stolen records obtained by hackers.   

The same can’t be said of LeakedSource, he claimed.

“They would always say things like ‘the data is publicly available,’” Keen said.  “But most of the data was not publicly available. They were straight up buying it from hackers.”

He suspects this was the case with the December data breach at E-Sports Entertainment Association (ESEA) that involved a hacker seeking a $100,000 ransom. LeakedSource managed to receive the stolen database, which Keen found odd.

“They posted ... on Twitter that ESEA’s database got leaked online,” Keen said. “That’s not true, because nobody had it, apart from them and the hacker.”

Troy Hunt, an Australian software architect who runs a separate breach monitoring service, also approved of LeakedSource’s apparent shutdown.

In a Friday blog post, he wrote that LeakedSource even had searchable information on his internet accounts.

“I see a lot of data breaches in my travels but I was still shocked to see my own personal information sold in this way,” he wrote. “My birth date. My IP address. My password hashes.”

There was also “never any doubt” the service was being used for malicious purposes, Hunt said. He posted screenshots of Twitter users saying they had used LeakedSource for hacking activities.

Others online have wondered if LeakedSource’s apparent closure is a publicity stunt, but Keen disagrees.

“It’s not positive publicity,” he said. “Because it is leaving their customers scared and frustrated.”

Users on HackForums are already looking for alternatives. One alternative talked about has been LeakBase.pw, a site that offers similar services. 

However, the operators of LeakBase want to avoid any federal investigation.

"If the government genuinely considers our service a threat we will have to shut down as well," the service said in a Twitter message. "Our team has no intention of breaking the law."

The service is adding new features and policies to help reduce possible user abuse. "We want to keep offering a service where anyone can search their own data," it said. "After all, the data is already in the hands of many hackers."


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Veritas honours top performing trans-Tasman partners

Veritas honours top performing trans-Tasman partners

Veritas honoured its top performing partners across the channel in Australia and New Zealand, recognising innovation and excellence on both sides of the Tasman. Revealed under the Vivid lights in Sydney, Intalock claimed the coveted Partner of the Year 2017 (Pacific) award, with Data#3 acknowledged for 12 months of strong growth across the market. Meanwhile, Datacom took home the New Zealand honours, with Global Storage and Insentra winning service provider and consulting awards respectively. Dicker Data was recognised as the standout distributor of the year, while Hitachi Data Systems claimed the alliance partner award. Photos by Bob Seary.

Veritas honours top performing trans-Tasman partners
Show Comments