Sunday, March 2, 2025
HomeSecurity NewsHacked Passwords Reselling Website Leakbase Goes Offline

Hacked Passwords Reselling Website Leakbase Goes Offline

Published on

SIEM as a Service

Follow Us on Google News

Leakbase a website that resells the hacked passwords exfiltrated from most significant data breach went offline.It contains more than two billion username and passwords.

Now their website Leakbase[dot]pw redirecting the traffic to a legitimate and trusted haveibeenpwned.com which alerts users to the data breach.haveibeenpwned owned by security expert Troy Hunt.

According to Kerbs On Security, the source was taken as a law enforcement by Dutch police as like the takedown of Hansa and Alphabay markets.

Also Read Dark Web Users Fear that Dream Market Also TakeOver by Police

Alphabay is one of the largest darkweb markets it has around 2lakh users and 40 thousand vendors. It deals with illegal drugs and taxonomic chemicals over 250000 listings and 100000 listings of stolen documentation, hacking tools, malware, and ransomware.

Hansa is the third largest marketplace as like Alphabay it has many listing of illegal drugs hacking tools, malware, and ransomware.

It seems the Leakbase come under new ownership after it hacks in April 2017, as one of its server administrators reuses the password for an account at x4bnet, a DDOS protection service that Leakbase depends on.x4bnet got hacked just a few days before Leakbase Instruction.

On Dec-2 Leakbase tweeted This project has been discontinued, thank you for your support over the past year and a half. For complete report click here.

We understand many of you may have lost some time, so to offer compensation please email, refund@leakbase.pw Send your LeakBase username and how much time you had left.We will have a high influx of emails so be patient; this could take a while.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...