Tuesday, March 4, 2025
HomeCyber Security NewsOGusers Hacked - A Hacking Forum Where Hackers Involved in Hijacking Online...

OGusers Hacked – A Hacking Forum Where Hackers Involved in Hijacking Online Accounts Itself Hacked

Published on

SIEM as a Service

Follow Us on Google News

OGusers, a popular forum where cyber criminals involved in various hacking activities, including hijacking online accounts, conducting SIM swapping attacks, trade stolen Instagram, and Twitter accounts hacked by other hackers.

The breach exposed nearly 113,000 forum users sensitive information including email addresses, hashed passwords, IP addresses, and private messages, Source code, Website data, and its activities.

On the 12th of May 2019, OGusers admin revealed that a hard drive failure had erased several months’ worth of private messages, forum posts, and prestige points.

Coincidently, another hacking community forum called RaidForums admin revealed that he had uploaded the OGUsers Forum Database to download for free and also said forum ogusers.com was breached On the 12th of May 2019.

Also he said, “I have uploaded the data from this database breach along with their website source files. Their hashing algorithm was the default salted MD5 which surprised me, anyway the website owner has acknowledged data corruption but not a breach so I guess I’m the first to tell you the truth view his statement here or if you don’t want to visit their website view it here. According to his statement he didn’t have any recent backups so I guess I will provide one on this thread lmfao.”

Obtained copy of the leaked database data was verified and confirmed that the database contains an original data belongs to OGusers, and it appears to hold the usernames, email addresses, hashed passwords, private messages, and IP address at the time of registration for approximately 113,000 users.

According to Krebs report, “the publication of the OGuser database has caused much consternation and drama for many in the community, which has become infamous for attracting people involved in hijacking phone numbers as a method of taking over the victim’s social media, email and financial accounts, and then reselling that access for hundreds or thousands of dollars to others on the forum.”

OGusers members are mainly involved with SIM Swapping attack to hijack the users phone number and use it to reset the Instagram password and sell the user name in underground forums.

In this case some users have already receiving phishing emails that target their Email accounts and email addresses. 

OGUsers has been online close to 3 years now and this the first time any breach has occurred. I do understand everyone’s frustration and I am deeply sorry this has all happened recently. “Again, I am deeply sorry this occurred and I will do my best to make sure it never happens again.” OGusers Admin said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

GlitchPOS – Hackers Selling a New POS Malware On Dark Web Forums

Massive Collection of 2.2 Billion Usernames and Passwords Circulated in Hacker Forums

New L0RDIX Multipurpose Hacking Tool Advertised in Dark Web Forums

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...