Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FBI and Europol Dismantle Cybercrime Forum LeakBase

FBI and Europol Dismantle Cybercrime Forum LeakBase

Posted on March 5, 2026 By CWS

In a significant victory for global cybersecurity efforts, the FBI and Europol have successfully shut down LeakBase, a notorious online forum facilitating the trade of stolen credentials and cybercrime tools. This operation marks a pivotal moment in the ongoing battle against cybercrime, as LeakBase was one of the largest platforms of its kind.

According to the U.S. Department of Justice, the forum boasted over 142,000 members and hosted more than 215,000 exchanges of illicit information. Visitors to the site, previously located at ‘leakbase[.]la’, are now met with a notice from the U.S. Federal Bureau of Investigation, indicating the site’s seizure as part of a coordinated international law enforcement initiative.

Seizure and Preservation of Data

The comprehensive operation involved securing all content within the forum, including user accounts, shared messages, and sensitive data like credit card details and IP logs. This action ensures that all evidence is preserved for future legal proceedings, highlighting the thoroughness of the law enforcement approach.

LeakBase was notorious for offering hacked databases containing millions of account credentials and financial information. The forum provided a marketplace for cybercriminals to exploit these data troves, facilitating numerous account takeovers and financial frauds.

Chucky and the LeakBase Network

LeakBase was operated by an individual known as Chucky, who is also identified by aliases such as Chuckies and Sqlrip. This individual has been linked to the distribution of extensive collections of compromised databases, often containing sensitive information from global organizations. SOCRadar and other cybersecurity entities have tracked Chucky’s activities extensively.

In early reports by SpyCloud, the forum experienced downtime, with Chucky seeking a new hosting provider. Other key figures involved in running LeakBase included administrators known as BloodyMery, OrderCheck, and TSR.

Operation Leak: A Coordinated Global Effort

The operation to dismantle LeakBase, codenamed Operation Leak, took place on March 3 and 4, 2026. Law enforcement agencies executed search warrants, conducted arrests, and interviewed suspects across multiple countries, including the U.S., Australia, and several European nations.

In a statement, Europol highlighted that LeakBase specialized in selling stealer logs, which are archives of credentials obtained through malware attacks. These logs were instrumental in conducting account takeovers and fraudulent activities globally. The operation resulted in approximately 100 enforcement actions, targeting 37 of the forum’s most active users.

Assistant Director Brett Leatherman of the FBI’s Cyber Division emphasized the significance of this global effort, noting that the takedown of LeakBase represents a critical step in reducing cybercrime activities worldwide. This operation underscores the importance of international collaboration in combating the ever-evolving landscape of cyber threats.

The Hacker News Tags:Cybercrime, Cybersecurity, dark web, data theft, Europol, FBI, law enforcement, LeakBase, Operation Leak, stolen credentials

Post navigation

Previous Post: Cisco Addresses Critical Security Flaws in Networking Gear
Next Post: Critical Cisco Firewall Vulnerability Requires Immediate Fix

Related Posts

Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More The Hacker News
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks The Hacker News
Enterprise Credentials at Risk – Same Old, Same Old? Enterprise Credentials at Risk – Same Old, Same Old? The Hacker News
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals The Hacker News
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper The Hacker News
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Cisco Firewall Vulnerability Requires Immediate Fix
  • FBI and Europol Dismantle Cybercrime Forum LeakBase
  • Cisco Addresses Critical Security Flaws in Networking Gear
  • Europol Dismantles Major Phishing Service Linked to 64,000 Attacks
  • Urgent Chrome Update Fixes Critical Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Cisco Firewall Vulnerability Requires Immediate Fix
  • FBI and Europol Dismantle Cybercrime Forum LeakBase
  • Cisco Addresses Critical Security Flaws in Networking Gear
  • Europol Dismantles Major Phishing Service Linked to 64,000 Attacks
  • Urgent Chrome Update Fixes Critical Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News