AbuseWith.Us Data Breach
AbuseWith.Us Email & Gaming Account Hacking Forum Breach (2016): 1.3 Million Member Accounts Exposed
Hacking forum offering account compromise services and illicit access discussion.
Risk Interpretation
Exposure enables law-enforcement targeting, blackmail, harassment, and identity linkage around illicit activity. Participant records may also reveal criminal trade relationships.
Impact & Downstream Threats
The institutional impact on AbuseWith.Us has been effectively terminal. The forum was shut down following the law enforcement action against the LeakedSource operator. Jordan Evan Bloom was prosecuted by Canadian authorities through Defiant Tech Inc., with the 2019 guilty plea resolving the criminal proceedings. The case has been broadly cited in international cybersecurity coverage and law enforcement commentary as illustrating both the trajectory of breach-data-as-a-service operations and the
- Credential stuffing against reused passwords across other platforms
- Targeted phishing campaigns using exposed email addresses
Threat Vectors
Breach Intelligence
Executive Summary
AbuseWith.Us, a hacking forum dedicated to email account and online gaming account compromise services, suffered multiple data breaches during 2016 with the breach data subsequently appearing in breach-trading communities and being indexed by Have I Been Pwned on October 9, 2017 with a breach-date of July 1, 2016. The breaches were not the subject of operator disclosure; the forum's data was itself compromised and traded by external parties, in a notable instance of threat actor infrastructure being subjected to the same breach dynamics as the legitimate websites that AbuseWith.Us members targeted.
The breach affected approximately 1,372,550 unique email addresses based on records indexed by Have I Been Pwned (with DataBreach.com listing approximately 1,283,526 records). Compromised fields included email addresses, usernames, IP addresses, and passwords stored in a mix of plaintext and various hash formats. The dataset reflected both AbuseWith.Us forum membership records and credentials sourced from various other breaches that had been collected by AbuseWith.Us members for use in account-compromise operations. The shared-administrator connection between AbuseWith.Us and the LeakedSource credential-search service means that the AbuseWith.Us breach data was likely directly accessible to or aggregated within LeakedSource's broader credential database.
For individuals whose email addresses appear in the AbuseWith.Us dataset, the practical risk profile is bifurcated. For individuals who were active AbuseWith.Us members (account-compromise practitioners or aspirants), the breach exposed their identification as participants in a hacking forum, with potential employment, professional, and legal consequences depending on jurisdiction and the user's actual activity on the forum. Such users should be aware that the breach data is now part of the public breach-notification infrastructure (via Have I Been Pwned) and may be referenced by future employment background checks, security clearance investigations, and similar inquiries. For individuals whose credentials were collected by AbuseWith.Us members from other breaches and stored within the AbuseWith.Us infrastructure (the larger population of affected individuals who never used AbuseWith.Us themselves), the breach represents an additional layer of credential exposure that may have already been addressed through the original source breach's remediation. Affected users should change any reused passwords on other accounts because the plaintext password exposure means any account where the same password was reused is fully compromised. The U.S. Computer Fraud and Abuse Act and equivalent statutes in other jurisdictions may apply to AbuseWith.Us members whose forum activity constituted unauthorized account access.
About AbuseWith.Us
AbuseWith.Us was a now-defunct hacking forum that operated from approximately September 2013 until shutdown following law enforcement action against its operator. The forum originated as a community for learning and teaching how to hack accounts at Runescape (a massively multiplayer online role-playing game set in a medieval fantasy realm) and subsequently expanded into a general-purpose hacking forum offering account-compromise discussion and services for email accounts, gaming accounts, and other online services. AbuseWith.Us was administered under the alias 'Xerx3s' by individuals subsequently identified through Brian Krebs (KrebsOnSecurity) investigative reporting as connected to Jordan Evan Bloom, a Thornhill, Ontario resident who simultaneously operated the LeakedSource credential-search service. The forum's membership consisted of individuals seeking to learn account-compromise techniques, individuals offering account-compromise services for sale, and individuals seeking to acquire compromised accounts. As threat actor infrastructure, AbuseWith.Us maintained user accounts and discussion records that documented members' participation in account-compromise activity.
Why They Hold Your Data
Account-hacking forums collect user accounts, messages, illicit service listings, and discussion history tied to account compromise and criminal access workflows.
Recent Developments
AbuseWith.Us is now defunct, and the operator Jordan Evan Bloom was arrested by the Royal Canadian Mounted Police on January 15, 2018 in connection with the LeakedSource service. Bloom's company Defiant Tech Inc. pleaded guilty in 2019 to operating LeakedSource, which had sold access to billions of stolen credentials including data from the Ashley Madison breach. The RCMP investigation indicated that Bloom made approximately $250,000 from selling hacked data through LeakedSource. Bloom's biographical timeline is notable because Bloom was hired as a developer at Ashley Madison in late 2014, resigned from Ashley Madison in June 2015 citing health reasons (less than one month before unidentified hackers stole data on 37 million Ashley Madison users), and launched LeakedSource three months after the Ashley Madison hack. The case has been formally cited as a leading example of the criminalization of breach-data-as-a-service operations.
Data Points Exposed
Canonical Fields
email_address, ip_address, password, username
Dark Web Verification
- Dataset containing ~1.3M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: abuse-with.us-2016;AbuseWith.Us Data Breach
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of AbuseWith.Us
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
