Sprawling FBI, European operation takes down Leakbase cybercriminal forum

The FBI and European law enforcement agencies carried out a global crackdown on a cybercrime forum where criminals bought and sold stolen credentials and exploits of software vulnerabilities.

The operation targeted Leakbase, a subscription-based crime forum and marketplace that has operated since 2021 where compromised credentials, personally identifiable information and other sensitive information were sold.

The FBI and its partners conducted 100 law enforcement actions against 45 targets across more than a dozen countries, including shutting down hosting infrastructure from the Netherlands to Malaysia and seizing and redirecting the forum’s domains to bureau-controlled servers.

The effort, dubbed “Operation Leak,” also resulted in 13 arrests, 32 searches and interviews with 33 suspects, along with capturing the forum’s entire database, according to Brett Leatherman, assistant director of the FBI’s cyber division.

In an interview, he described the operation as “progressive” to the work the FBI has conducted in a  series of international law enforcement stings that increasingly involve coordinated arrests and raids on multiple continents against other criminal forums and online gangs, such as the notorious ransomware organization Lockbit.

Leakbase “continued to be an active location where users were increasingly sharing information that permits access to U.S.- based networks, potentially critical infrastructure,” he told Recorded Future News. “And so, to us, it’s remained a priority for years, and to see it come to a conclusion like it did today … to us, that’s very significant.”

He highlighted that the investigation had been going on for multiple years and was led by the bureau’s Salt Lake City field office.

The forum itself ran on a subscription model, with some users paying a one-time fee of a few hundred dollars for “premium” access. 

It had grown to over 142,000 registered members, with more than 33,000 forum threads and 215,000 messages discussing pilfered data, according to Leatherman. None of the arrests occurred in the U.S., he added.

The threat monitoring company Flare previously described Leakbase as one of the “more sophisticated forums on the dark web, both in terms of the amount of sensitive data available and the mature approach to discovery and commerce.”

Much of the data it offered was obtained through unauthorized access to government systems and U.S. businesses, frequently through SQL injection attacks against unpatched web applications.

Leatherman said law enforcement officials are still unraveling how much revenue Leakbase generated from its subscribers or how much was stolen from victims as a result of its various offerings.

“They’re victims of opportunity,” he said. “Many times it’s where actors were able to get in, get access to pure credentials, and that could represent small to medium businesses or large businesses. We’re going to learn a lot more about that victim space soon.”

Leatherman said the bureau’s latest operation is “squarely aligned” with the White House’s forthcoming national cyber strategy, which will prioritize shifting the burden of risk in cyberspace from Americans to adversaries by attempting to shape their behavior.

“We expect that these actors who’ve been arrested will potentially have information or evidence that would help us move upstream against other actors,” he said.

“But if these actors do go to another platform believing that they’re anonymous, they should recognize that we’re going to follow them and that we have tremendous capability, us and our partners, to de-anonymize them.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Martin Matishak

Martin Matishak

is the senior cybersecurity reporter for The Record. Prior to joining Recorded Future News in 2021, he spent more than five years at Politico, where he covered digital and national security developments across Capitol Hill, the Pentagon and the U.S. intelligence community. He previously was a reporter at The Hill, National Journal Group and Inside Washington Publishers.

 

Total
0
Shares
Previous Post

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Related Posts

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a "security incident" that led to the loss of approximately $7 million. The issue, the multi‑chain, non‑custodial cryptocurrency wallet service said, impacts version 2.68. The extension has about one million users, according to the Chrome Web Store listing. Users are advised to
Read More

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode SOC performance over time. The Paradox at the Gate:
Read More