Menu
LeakedSource's shutdown is a blow to amateur hackers

LeakedSource's shutdown is a blow to amateur hackers

LeakedSource had functioned as a giant repository holding more than 3 billion internet accounts from previous data breaches

Amateur hackers are alarmed with the apparent demise of LeakedSource, a controversial breach notification site that’s been accused of doing more harm than good.

U.S. law enforcement has allegedly confiscated its servers, and now some hackers are wondering if customers of LeakedSource might be next.  

“All the people who used PayPal, credit card, etc. to buy membership, the FBI now have your email, payment details and lookup history,” wrote one user on HackForums.net.

LeakedSource had functioned as a giant repository with more than 3 billion internet accounts -- all of which had been compiled from stolen databases, taken from the likes of LinkedIn, MySpace, and Dropbox. For as little as US$2 a day, anyone could use the site to look up password and other login information.

That made it particularly popular with users on HackForums.net, a site filled with discussion on hacking techniques often by amateurs known as “script kiddies.”

But whether the FBI really shut down LeakedSource is still unclear. The site itself has been offline and its operators have been mum on Twitter and through email.

In addition, the U.S. Department of Justice has declined to comment.

Nevertheless, experts in data breach notification said the situation with LeakedSource was inevitable.

“They weren’t handling the data ethically or responsibly,” said a data collector who goes by the name Keen. He runs a separate notification site at Vigilante.pw that tries to warn the public about the latest data breaches.

But unlike LeakedSource, he doesn’t make the data searchable or post any sensitive user information. Nor does he buy stolen records obtained by hackers.   

The same can’t be said of LeakedSource, he claimed.

“They would always say things like ‘the data is publicly available,’” Keen said.  “But most of the data was not publicly available. They were straight up buying it from hackers.”

He suspects this was the case with the December data breach at E-Sports Entertainment Association (ESEA) that involved a hacker seeking a $100,000 ransom. LeakedSource managed to receive the stolen database, which Keen found odd.

“They posted ... on Twitter that ESEA’s database got leaked online,” Keen said. “That’s not true, because nobody had it, apart from them and the hacker.”

Troy Hunt, an Australian software architect who runs a separate breach monitoring service, also approved of LeakedSource’s apparent shutdown.

In a Friday blog post, he wrote that LeakedSource even had searchable information on his internet accounts.

“I see a lot of data breaches in my travels but I was still shocked to see my own personal information sold in this way,” he wrote. “My birth date. My IP address. My password hashes.”

There was also “never any doubt” the service was being used for malicious purposes, Hunt said. He posted screenshots of Twitter users saying they had used LeakedSource for hacking activities.

Others online have wondered if LeakedSource’s apparent closure is a publicity stunt, but Keen disagrees.

“It’s not positive publicity,” he said. “Because it is leaving their customers scared and frustrated.”

Users on HackForums are already looking for alternatives. One alternative talked about has been LeakBase.pw, a site that offers similar services. 

However, the operators of LeakBase want to avoid any federal investigation.

"If the government genuinely considers our service a threat we will have to shut down as well," the service said in a Twitter message. "Our team has no intention of breaking the law."

The service is adding new features and policies to help reduce possible user abuse. "We want to keep offering a service where anyone can search their own data," it said. "After all, the data is already in the hands of many hackers."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments