HIGH SEVERITYCybercrime: Threat Actor Infrastructure

AbuseWith.Us Data Breach

AbuseWith.Us Email & Gaming Account Hacking Forum Breach (2016): 1.3 Million Member Accounts Exposed

Hacking forum offering account compromise services and illicit access discussion.

Verified by ObscureIQ Intelligence

7.0Severity
1.3MRecords
4Fields
2016Year

ObscureIQ Breach Intelligence Scores
6.4
Breach Risk Index
25
Data Value
25
Market Recency
439
days
Since Breach

Risk Interpretation

Exposure enables law-enforcement targeting, blackmail, harassment, and identity linkage around illicit activity. Participant records may also reveal criminal trade relationships.

🎯 Impact & Downstream Threats

The institutional impact on AbuseWith.Us has been effectively terminal. The forum was shut down following the law enforcement action against the LeakedSource operator. Jordan Evan Bloom was prosecuted by Canadian authorities through Defiant Tech Inc., with the 2019 guilty plea resolving the criminal proceedings. The case has been broadly cited in international cybersecurity coverage and law enforcement commentary as illustrating both the trajectory of breach-data-as-a-service operations and the

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Geolocation & account flagging
Credential stuffing & account takeover
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityAbuseWith.Us
Organization • Global
Breach Date2016-07-01
DBC Added2025-02-12
Added Date2025-02-12
Records~1.3M (1,283,526 records)
Attack VectorMisconfiguration
Threat ActorUnknown (forum infrastructure compromised by external party; operator was Jordan Evan Bloom / "Xerx3s")
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityElevated
Breach ID35;36
StatusConfirmed

📝 Executive Summary

AbuseWith.Us, a hacking forum dedicated to email account and online gaming account compromise services, suffered multiple data breaches during 2016 with the breach data subsequently appearing in breach-trading communities and being indexed by Have I Been Pwned on October 9, 2017 with a breach-date of July 1, 2016. The breaches were not the subject of operator disclosure; the forum's data was itself compromised and traded by external parties, in a notable instance of threat actor infrastructure being subjected to the same breach dynamics as the legitimate websites that AbuseWith.Us members targeted.

The breach affected approximately 1,372,550 unique email addresses based on records indexed by Have I Been Pwned (with DataBreach.com listing approximately 1,283,526 records). Compromised fields included email addresses, usernames, IP addresses, and passwords stored in a mix of plaintext and various hash formats. The dataset reflected both AbuseWith.Us forum membership records and credentials sourced from various other breaches that had been collected by AbuseWith.Us members for use in account-compromise operations. The shared-administrator connection between AbuseWith.Us and the LeakedSource credential-search service means that the AbuseWith.Us breach data was likely directly accessible to or aggregated within LeakedSource's broader credential database.

For individuals whose email addresses appear in the AbuseWith.Us dataset, the practical risk profile is bifurcated. For individuals who were active AbuseWith.Us members (account-compromise practitioners or aspirants), the breach exposed their identification as participants in a hacking forum, with potential employment, professional, and legal consequences depending on jurisdiction and the user's actual activity on the forum. Such users should be aware that the breach data is now part of the public breach-notification infrastructure (via Have I Been Pwned) and may be referenced by future employment background checks, security clearance investigations, and similar inquiries. For individuals whose credentials were collected by AbuseWith.Us members from other breaches and stored within the AbuseWith.Us infrastructure (the larger population of affected individuals who never used AbuseWith.Us themselves), the breach represents an additional layer of credential exposure that may have already been addressed through the original source breach's remediation. Affected users should change any reused passwords on other accounts because the plaintext password exposure means any account where the same password was reused is fully compromised. The U.S. Computer Fraud and Abuse Act and equivalent statutes in other jurisdictions may apply to AbuseWith.Us members whose forum activity constituted unauthorized account access.

🏢 About AbuseWith.Us

AbuseWith.Us was a now-defunct hacking forum that operated from approximately September 2013 until shutdown following law enforcement action against its operator. The forum originated as a community for learning and teaching how to hack accounts at Runescape (a massively multiplayer online role-playing game set in a medieval fantasy realm) and subsequently expanded into a general-purpose hacking forum offering account-compromise discussion and services for email accounts, gaming accounts, and other online services. AbuseWith.Us was administered under the alias 'Xerx3s' by individuals subsequently identified through Brian Krebs (KrebsOnSecurity) investigative reporting as connected to Jordan Evan Bloom, a Thornhill, Ontario resident who simultaneously operated the LeakedSource credential-search service. The forum's membership consisted of individuals seeking to learn account-compromise techniques, individuals offering account-compromise services for sale, and individuals seeking to acquire compromised accounts. As threat actor infrastructure, AbuseWith.Us maintained user accounts and discussion records that documented members' participation in account-compromise activity.

Threat Actor Infrastructure | Account hacking services and illicit access discussion | Account hacking forum | Global
Global* threat actor

🗂 Why They Hold Your Data

Account-hacking forums collect user accounts, messages, illicit service listings, and discussion history tied to account compromise and criminal access workflows.

📰 Recent Developments

AbuseWith.Us is now defunct, and the operator Jordan Evan Bloom was arrested by the Royal Canadian Mounted Police on January 15, 2018 in connection with the LeakedSource service. Bloom's company Defiant Tech Inc. pleaded guilty in 2019 to operating LeakedSource, which had sold access to billions of stolen credentials including data from the Ashley Madison breach. The RCMP investigation indicated that Bloom made approximately $250,000 from selling hacked data through LeakedSource. Bloom's biographical timeline is notable because Bloom was hired as a developer at Ashley Madison in late 2014, resigned from Ashley Madison in June 2015 citing health reasons (less than one month before unidentified hackers stole data on 37 million Ashley Madison users), and launched LeakedSource three months after the Ashley Madison hack. The case has been formally cited as a leading example of the criminalization of breach-data-as-a-service operations.

🔍 Data Points Exposed

4 verified field types:
Email;Email
IP addresses
Passwords
Usernames

Canonical Fields

email_address, ip_address, password, username

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of AbuseWith.Us
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom