Data leak site BreachForums is back, boasting Live Nation/Ticketmaster user data. But is it a trap?


Notorious data leak site BreachForums appears to be back online after it was seized by law enforcement a few weeks ago. At least one of BreachForums domains and its dark web site are live again.

However, questions have been raised over whether it is a genuine attempt to revive the forums once again or set up as a lure by law enforcement to entrap more data dealers and cybercriminals.

Read more…
Source: Malwarebytes labs


Sign up for our Newsletter


Related:

  • SonicWall blames state hackers for damaging data breach

    November 6, 2025

    SonicWall has blamed “state-sponsored threat actors” for the cloud backup security breach which hit its services in September 2025. In an update posted on the company’s website, SonicWall said it completed the investigation into the incident, and confirmed that the malicious activity was “carried out by a state-sponsored threat actor” and was “isolated to the unauthorized ...

  • Malware-pwned laptop gifts cybercriminals Nikkei’s Slack

    November 6, 2025

    Japanese media behemoth Nikkei has admitted to a data breach after miscreants slipped into its internal Slack workspace, exposing the personal details of more than 17,000 employees and business partners.… The company blamed the intrusion on malware that infected an employee’s device, letting attackers pinch Slack credentials and waltz into its chat system. Once the suspicious ...

  • Android malware steals your card details and PIN to make instant ATM withdrawals

    November 6, 2025

    The Polish Computer Emergency Response Team (CERT Polska) analyzed a new Android-based malware that uses NFC technology to perform unauthorized ATM cash withdrawals and drain victims’ bank accounts. Researchers found that the malware, called NGate, lets attackers withdraw cash from ATMs (Automated Teller Machines, or cash machines) using banking data exfiltrated from victims’ phones—without ever physically ...

  • When Your Calendar Becomes the Compromise

    November 6, 2025

    It starts innocently enough. A new meeting appears in your Google calendar and the subject seems ordinary, perhaps even urgent: “Security Update Briefing,” “Your Account Verification Meeting,” or “Important Notice Regarding Benefits.” You assume you missed this invitation in your overloaded email inbox, and click “Yes” to accept. Unfortunately, calendar invites have become an overlooked delivery ...

  • Operation South Star: 0-day Espionage Campaign Targeting Domestic Mobile Phones

    November 4, 2025

    In recent years, during high-intensity confrontations with Advanced Persistent Threat (APT) groups from the Northeast Asia region, the RedDrip team at QiAnXin Threat Intelligence Center has discovered nearly 20 0day vulnerabilities involving domestic software. Some details have been disclosed in our public reports such as Operation DevilTiger, Operation ShadowTiger, and XSS 0day+Clickonce. In reality, 0day activities ...

  • Hackers target UK drinking water suppliers

    November 4, 2025

    New reports have revealed five cyberattacks have targeted British drinking water facilities since January 2024 – a record number in any two year period. Reports of these incidents were obtained by The Record using Freedom of Information requests to the watchdog – the Drinking Water Inspectorate. The regulator is only required by NIS regulations to report ...