Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Breach Exposure Monitoring

A PRIVACY RISK MITIGATION TOOL

WE HELP BUSINESS MITIGATE PRIVACY RISK

BY PROVIDING RELEVANT INTEL OUR CLIENTS CAN ACT ON

PUBLIC SCAN CHECK ANY DOMAIN

Discoveries: Human Intelligence

Compromised Accounts Discovered per week

Discoveries: Artificial Intelligence

Compromised Accounts Discovered per day

Point of View

Our take on key events of the month
May 2024
By SUE DENIM
Breach Forums Resurrection, Government Breaches, and Shifting Motives
The saga of Breach Forums continues with twists and turns. Just when the FBI thought they'd scored another victory by seizing the infamous Breach Forums and arresting its co-administrator Baphomet, the remaining admin pulled a digital rabbit out of the hat. Despite the initial seizure of both the clear-net and Tor domains, as well as the Telegram channel, the FBI's victory was short-lived. Mere hours after the domain was seized and added to the FBI's account, the account was suspended, and the domain fell back into the hands of the elusive threat actor. Emails between the FBI and the domain registrar detailing this blunder have since surfaced online.

The apparent end of Breach Forums was, in fact, just the beginning of a new chapter. In less than two weeks, a new admin known as Shiny Hunters resurrected the forum from old backups, launching a new Tor domain and fresh Telegram group. Not only is the clear-net site back up and running, but Shiny Hunters has also made headlines by offering the entire Live Nation/Ticketmaster database—containing 560 million users—for a cool $500k USD. The identity of the buyer remains unknown, adding another layer of intrigue to this unfolding story.

In another development, a breach impacting several American government agencies, including the US armed forces, has surfaced on dark web platforms. The notorious threat actor IntelBroker, known for his swift and effective hacks, claimed to have accessed sensitive data from the breached site in just "10–15 minutes." The compromised company, established to address the evolving landscape of maritime domain awareness, now finds itself at the centre of a significant data leak.

Meanwhile, a well-known threat actor group has announced a dramatic shift in focus. Declaring their departure from financially motivated cybercrime, they have pledged to return to their roots in hacktivism and political hacking. Their latest leak, though unverified, promises to be substantial. The group claims to have exposed sensitive information affecting various Mexican cartels, including the Sinaloa and Jalisco cartels. This leak allegedly stems from a variety of sources, including government sites, cartel-supported centres, and shops. The data dump also includes an in-depth research writeup detailing cartel operations and locations. Our team is currently sifting through the data to verify the claims and assess the implications.

It's been an action-packed month for cybersecurity professionals, and as always, the landscape continues to evolve with each passing day.

Ready to level up your privacy game?

DIVE INTO THE BREACHAWARE UNIVERSE

Ever wondered how the big dogs and cool cats of the business world keep their privacy game on point? Well, say hello to BreachAware. Over 140 countries are already vibing with it, strengthening their privacy game and doing the time-and- money-saving cha-cha. Here is why…