Credit: Michael Kan
Amateur hackers are alarmed with the apparent demise of LeakedSource, a controversial breach notification site that’s been accused of doing more harm than good.
U.S. law enforcement has allegedly confiscated its servers, and now some hackers are wondering if customers of LeakedSource might be next.
“All the people who used PayPal, credit card, etc. to buy membership, the FBI now have your email, payment details and lookup history,” wrote one user on HackForums.net.
LeakedSource had functioned as a giant repository with more than 3 billion internet accounts -- all of which had been compiled from stolen databases, taken from the likes of LinkedIn, MySpace, and Dropbox. For as little as US$2 a day, anyone could use the site to look up password and other login information.
That made it particularly popular with users on HackForums.net, a site filled with discussion on hacking techniques often by amateurs known as “script kiddies.”
But whether the FBI really shut down LeakedSource is still unclear. The site itself has been offline and its operators have been mum on Twitter and through email.
In addition, the U.S. Department of Justice has declined to comment.
Nevertheless, experts in data breach notification said the situation with LeakedSource was inevitable.
“They weren’t handling the data ethically or responsibly,” said a data collector who goes by the name Keen. He runs a separate notification site at Vigilante.pw that tries to warn the public about the latest data breaches.
But unlike LeakedSource, he doesn’t make the data searchable or post any sensitive user information. Nor does he buy stolen records obtained by hackers.
The same can’t be said of LeakedSource, he claimed.
“They would always say things like ‘the data is publicly available,’” Keen said. “But most of the data was not publicly available. They were straight up buying it from hackers.”
He suspects this was the case with the December data breach at E-Sports Entertainment Association (ESEA) that involved a hacker seeking a $100,000 ransom. LeakedSource managed to receive the stolen database, which Keen found odd.
“They posted ... on Twitter that ESEA’s database got leaked online,” Keen said. “That’s not true, because nobody had it, apart from them and the hacker.”
Troy Hunt, an Australian software architect who runs a separate breach monitoring service, also approved of LeakedSource’s apparent shutdown.
In a Friday blog post, he wrote that LeakedSource even had searchable information on his internet accounts.
“I see a lot of data breaches in my travels but I was still shocked to see my own personal information sold in this way,” he wrote. “My birth date. My IP address. My password hashes.”
Sign up for CIO Asia eNewsletters.