Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pricing Choices and Useful Scope

    January 25, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Database of 323,986 BreachForums Customers Leaked as Admin Disputes Scope – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra
    AI Ethics & Regulation

    Database of 323,986 BreachForums Customers Leaked as Admin Disputes Scope – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

    Declan MurphyBy Declan MurphyJanuary 11, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Database of 323,986 BreachForums Customers Leaked as Admin Disputes Scope – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    On January 9, 2026, a database belonging to BreachForums, a infamous cybercrime and hacker discussion board accessible on each clear and the “Darkish Internet,” was launched to the general public, placing over 320,000 customers within the highlight.

    BreachForums, as we all know it, is not any stranger to drama. The platform has a historical past of getting seized by legislation enforcement authorities or vanishing and reappearing. It had grow to be the go-to website for these actions after the police shut down its predecessor, RaidForums, again in 2022. In early April 2025, the discussion board immediately disappeared with out rationalization.

    Whereas many suspected a police raid, Hackread.com reported on the time that the location disappeared resulting from a safety difficulty quite than a seizure. By July 2025, the discussion board was again on-line.

    The Leaked Database

    Resecurity, which shared its analysis with Hackread.com, discovered that the leaked file comprises data on 323,986 customers, together with their “metadata extracted from MySQL DB,” which is principally a digital footprint that would assist determine the individuals behind the screens.

    The database was printed on shinyhunte.rs, a website that has beforehand hosted stolen datasets and isn’t beneficial for direct entry because of the danger of malicious content material. The identical platform has been used within the previous to leak knowledge linked to Fujifilm, GAP Inc., Vietnam Airways, Engie Sources, Qantas Airways Restricted, and Albertsons Firms, following incidents tied to a Salesforce-related compromise.

    The BreachForums database was accompanied by a sound PGP signature traditionally related to earlier discussion board operators, indicating the dataset is genuine and certain originated from inner discussion board programs.

    The leaked database (Picture credit score: Hackread.com)

    To your data, ShinyHunters is a part of a consistently shifting alliance. You may hear names like Scattered Lapsus$ Hunters or a neighborhood referred to as ‘The Com.’ These should not simply random names; they characterize a ‘supergroup’ of younger hackers who’ve joined forces to share instruments and targets.

    Researchers defined in one other report that they use ShinyHunters as a broad label to “illustrate the phenomenon of involving younger IT professionals in questionable acts.” By highlighting this, they hope to warn different proficient younger individuals to keep away from these felony circles.

    Hackread.com additionally independently reviewed the leaked dataset and located that, along with normal profile metadata, it comprises person show names, e-mail addresses, Argon2i password hashes, and hyperlinks to exterior accounts resembling Telegram. Whereas the passwords should not saved in plaintext, the mix of those knowledge factors should still carry identification and attribution dangers for affected customers.

    Response from BreachForums

    A BreachForums administrator utilizing the alias N/A responded to experiences of a database leak by claiming the uncovered knowledge originated from an outdated incident in August 2025, throughout a discussion board restoration course of following the .hn area takedown. In line with the administrator, the customers desk and the discussion board’s PGP key have been briefly saved in an unsecured listing and downloaded as soon as throughout that interval.

    The admin careworn that the incident didn’t contain server compromise, database entry, or exploitation, and described present claims of an lively breach as false. They added that passwords within the dataset have been saved as Argon2i hashes, IP addresses have been largely truncated, and remaining fields consisted of publicly seen data. The discussion board mentioned all classes have been revoked on the time, and restoration procedures have since been secured.

    Database of 323,986 BreachForums Users Leaked as Admin Disputes Scope
    Admin from BreachForums and their response (Picture credit score: Hackread.com)

    The “James” Message Circulating With the Leak

    Alongside the leaked database, a prolonged manifesto signed by a person calling himself “James” was additionally printed on shinyhunte.rs. The textual content contained dramatic claims, threats, and references to a number of cybercrime figures and teams, introduced in a extremely theatrical and ideological tone.

    There isn’t any unbiased verification of the claims made within the message, and such manifestos are generally used inside underground boards to impress consideration, unfold disinformation, or confuse attribution. The looks of the textual content doesn’t verify the id of the writer or the people named and must be handled as unverified rhetoric quite than factual disclosure.

    Database of 323,986 BreachForums Users Leaked as Admin Disputes Scope
    “James” together with his story (Picture credit score: Hackread.com)

    Why This Leak Issues

    As we all know it, it is extremely uncommon for felony organisations to be uncovered so totally. This incident exhibits that even probably the most malicious teams might be susceptible to the identical failures they exploit in others.

    Researchers famous that publicity of felony infrastructure can have a broader defensive influence than typical company breaches, as it could disrupt illicit networks and deter future recruitment. By sharing the database for unbiased evaluation, researchers hope to interrupt the cycle of cybercrime and discourage future involvement in such communities.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026

    Multi-Stage Phishing Marketing campaign Targets Russia with Amnesia RAT and Ransomware

    January 25, 2026
    Top Posts

    Pricing Choices and Useful Scope

    January 25, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Pricing Choices and Useful Scope

    By Amelia Harper JonesJanuary 25, 2026

    SweetAI is offered as a chatbot designed for customers in search of interplay that doesn’t…

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.