Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Admin Behind LeakBase Hacker Forum Arrested in Russia

Admin Behind LeakBase Hacker Forum Arrested in Russia

Posted on March 26, 2026 By CWS

Russian authorities have successfully apprehended the alleged administrator of the notorious LeakBase hacker forum, marking a pivotal moment in combating cybercrime. The operation, executed by the Russian Ministry of Internal Affairs (MVD) in collaboration with the Bureau of Special Technical Measures (BSTM), dismantled a platform known for facilitating the exchange of stolen data and unauthorized network access for nearly four years.

Key Details of the Arrest

The suspect was detained in Taganrog, a city located in Russia’s Rostov Oblast, delivering a significant setback to illicit data trading networks. According to Irina Volk, the MVD’s official spokesperson, LeakBase operated as an extensive underground marketplace boasting over 147,000 registered users. This forum played host to a staggering volume of stolen records, encompassing account details, financial information, and sensitive business documents.

Impact on Cybercrime Activities

The repository served as a crucial resource for threat actors, enabling activities such as credential stuffing, identity theft, and financial fraud. Furthermore, corporate documents available on the forum provided initial access brokers with the means to penetrate enterprise networks, posing severe risks to organizational security.

In a meticulously planned raid at the suspect’s residence, law enforcement seized essential technical equipment, including servers and external storage devices. This hardware is now subject to an exhaustive digital forensic analysis aimed at mapping the forum’s infrastructure and uncovering hidden operational insights.

Future Implications

The investigation could reveal access logs, private communications, and cryptocurrency wallets, aiding authorities in identifying prominent sellers on the platform. This intelligence might eventually lead to the capture of individuals responsible for initial data breaches. Following the raid, the Main Investigative Directorate of the MVD for Moscow initiated a criminal case against the detainee.

The suspect is currently facing charges under Article 272.1, Parts 3 and 6, of the Russian Criminal Code, which pertains to unauthorized access to computer information. The defendant remains in custody as the investigation continues, offering potential insights into global cybercrime networks.

Cyber Security News Tags:Arrest, cyber threats, Cybercrime, Cybersecurity, data breach, data trading, digital forensics, hacker forum, LeakBase, Russian law enforcement

Post navigation

Previous Post: GhostClaw Malware Targets macOS Users with AI Tools
Next Post: ClickFix Exploit Targets Windows and macOS for Malware Deployment

Related Posts

SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers Cyber Security News
Citrix NetScaler ADC and Gateway Vulnerability Enables Cross-Site Scripting Attacks Citrix NetScaler ADC and Gateway Vulnerability Enables Cross-Site Scripting Attacks Cyber Security News
How SOCs Triage Incidents in Seconds with Threat Intelligence How SOCs Triage Incidents in Seconds with Threat Intelligence Cyber Security News
Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits Cyber Security News
Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations Cyber Security News
First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ClickFix Exploit Targets Windows and macOS for Malware Deployment
  • Admin Behind LeakBase Hacker Forum Arrested in Russia
  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ClickFix Exploit Targets Windows and macOS for Malware Deployment
  • Admin Behind LeakBase Hacker Forum Arrested in Russia
  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark