HIGH SEVERITYCybercrime: Threat Actor Infrastructure

BreachForums Data Breach

BreachForums Cybercrime Forum Breach & Law Enforcement Seizure (2025): 672K Member Accounts Including Private Messages Exposed

Cybercrime forum used for breach trading, data leaks, and illicit discussion.

Verified by ObscureIQ Intelligence

6.0Severity
672KRecords
5Fields
2025Year

ObscureIQ Breach Intelligence Scores
22.8
Breach Risk Index
25
Data Value
60
Market Recency
107
days
Since Breach

Risk Interpretation

Exposure enables criminal-network mapping, retaliation, blackmail, and law-enforcement targeting. Forum activity can also reveal who traded or discussed specific breach datasets.

🎯 Impact & Downstream Threats

The institutional impact on BreachForums has been effectively terminal in its current iteration, with the October 2025 seizure including the forum's domains, backend servers, and database backups extending back to 2023. The administrators have publicly stated that 'BreachForums is never coming back, if it comes back, it should immediately be considered a honeypot.' The case has been broadly cited in international cybersecurity coverage as a major law enforcement victory against cybercrime forum

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Blackmail, relationship fraud & business intelligence theft
Credential stuffing & account takeover
Doxing & reputation attack
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityBreachForums
Organization • Global
Breach Date2025-08-01
HIBP Added2026-01-10
Records~672K (672,200 records)
Attack VectorMisconfiguration
Threat Actor"James" (via shinyhunte[.]rs domain; possibly ShinyHunters-linked, disputed)
SourceHave I Been Pwned / ObscureIQ
SensitivityElevated
Breach ID223.0
StatusConfirmed

📝 Executive Summary

BreachForums, the most prominent English-language cybercrime forum, suffered a data breach in approximately August 2025 when the forum's user table and PGP key were temporarily stored in an unsecured folder during a recovery operation following the August 11, 2025 shutdown of the breachforums.hn domain. According to the forum's administrator 'N/A,' the unsecured folder was downloaded by an unauthorized party during the brief exposure window. The breach data was distributed publicly on January 9, 2026 through the shinyhunte[.]rs domain by an actor using the alias 'James' (with the BreachForums administrator suggesting that James may be linked to the ShinyHunters extortion collective, although ShinyHunters disputed the claim). Have I Been Pwned indexed the breach on January 10, 2026. The August 2025 underlying breach predated the October 10, 2025 law enforcement seizure of BreachForums.

The breach affected approximately 672,247 unique email addresses across all data tables based on records indexed by Have I Been Pwned, with the users table specifically containing 323,986 unique email addresses, usernames, and Argon2 password hashes. The total exposure includes email addresses extracted from forum posts, private messages, and other forum records in addition to the users table. Compromised fields included email addresses, usernames, passwords stored as Argon2 hashes (a substantially stronger algorithm than the salted MD5 hashes seen in earlier cybercrime forum breaches), forum posts, and private messages. The most recent registration date in the leaked database was August 11, 2025 — the same day that the breachforums.hn domain was shut down. Geographic IP analysis indicated heavy use from the United States and parts of Europe along with activity in the Middle East and North Africa including Morocco, Jordan, and Egypt. The private message exposure is particularly significant because such messages may contain direct evidence of cybercrime operations, victim targeting, payment arrangements, and operational coordination among forum members.

For individuals whose email addresses appear in the BreachForums dataset, the practical risk profile is exceptionally severe and varies depending on the depth of forum participation. For users who actively participated in cybercrime through BreachForums (selling breach data, purchasing breach data, coordinating ransomware operations, participating in extortion campaigns), the breach data combined with the law enforcement seizure of forum infrastructure creates substantial criminal-prosecution risk under federal computer fraud, wire fraud, and conspiracy statutes. The Argon2 password hashing means original passwords are not easily recoverable, but the metadata exposure (email, username, IP, registration date, and any private messages) provides law enforcement with substantial evidence independent of the password recovery. The U.S. Computer Fraud and Abuse Act, federal Wire Fraud statute, and equivalent statutes in other jurisdictions may apply directly. For users who participated in BreachForums only as observers or for security research purposes, the breach exposure may create employment or professional consequences depending on the jurisdiction and the user's actual activity. Affected users should change any reused passwords on other accounts because the password exposure means any account where the same password was reused is potentially compromised. Users whose private messages may contain evidence of criminal activity should consult with legal counsel regarding their specific exposure.

🏢 About BreachForums

BreachForums was the most prominent English-language cybercrime forum dedicated to the trading and discussion of stolen data, breach datasets, hacking tools, ransomware operations, and related illicit services. The forum operated as the successor to RaidForums (which was seized by U.S. authorities in 2022), with multiple successive iterations operated under different administrators after each law enforcement takedown. The 2025 incarnation operated at the breachforums.hn domain and was administered by individuals including Baphomet and members of the ShinyHunters extortion group. BreachForums' content directly facilitated federal felony-level cybercrime activity including the sale of breach datasets containing stolen personal information, payment card data, corporate credentials, and access to compromised networks. As cybercrime forum infrastructure, BreachForums maintained extensive user accounts, public forum posts, and private messages that documented members' direct participation in cybercrime operations.

Threat Actor Infrastructure | Cybercrime discussion and breach trading | Breach trading forum | Global
Global* threat actor

🗂 Why They Hold Your Data

Cybercrime forums collect user accounts, messages, trade histories, service listings, and discussion records tied to breach trading and illicit data exchange.

📰 Recent Developments

BreachForums was seized by U.S. and international law enforcement on October 10, 2025 in a coordinated operation involving the FBI, U.S. Department of Justice, France's BL2C cybercrime unit, the Paris Prosecutor's Office, and France's National Jurisdiction against Organised Crime (JUNALCO). The breachforums.hn domain was redirected to display a multi-agency seizure banner inviting victims and former forum members to provide information through the FBI's Internet Crime Complaint Center (IC3). The October 2025 seizure was the fourth major law enforcement disruption of BreachForums and its predecessors: RaidForums was seized in 2022, BreachForums v1 (operated by Conor Brian Fitzpatrick under the alias 'Pompompurin') was shut down in March 2023 after Fitzpatrick's arrest and subsequent three-year prison sentence, BreachForums v2 (operated by Baphomet and ShinyHunters) was seized in May 2024 with Baphomet reportedly arrested, and the 2025 reincarnation was seized in October 2025 with five additional individuals reported as taken into custody. The 2025 BreachForums had operated as both a discussion forum and as an extortion platform tied to the Scattered LAPSUS$ Hunters Salesforce extortion campaign targeting Adidas, Cartier, Chanel, Cisco, FedEx, IKEA, McDonald's, Qantas, Toyota, Walgreens, and other major corporations.

🔍 Data Points Exposed

5 verified field types:
Email
Forum posts
Passwords
Private messages
Usernames

Exposure Categories

CommunicationsPRIV MSGS

Canonical Fields

email_address, messages_and_chat:private_message, password, public_user_content:forum_post, username

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~672K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: BreachForums (2025) Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of BreachForums
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationHacking ForumEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom