Description

A massive data breach has exposed sensitive user information from Leakzone, a well-known dark web platform for dealing in stolen accounts and hacking tools. Security company UpGuard found an open Elasticsearch database on July 18 that contained approximately 22 million web request records created on June 25. The data uncovered detailed user information such as IP addresses, geographic coordinates, and internet service provider (ISP) information. Approximately 95% of the requests were directly associated with Leakzone.net, and the rest included similar illegal sites like accountbot.io. The database recorded approximately one million requests per day, which testified to the forum's huge and busy user population. The analysis of the leaked information indicated that users on the forum frequently used privacy utilities to mask their identities. Though the forum boasted 109,000 registered members, more than 185,000 different IP addresses were discovered—more evidence of VPN use, public proxies, and shared IP usage. The busiest IPs were tracked to legitimate VPN services, and some usage patterns even implied shared utilization of exit nodes. In addition to these privacy precautions, approximately 39% of IPs were seen only once, which means that there were some users accessing the site unguarded, opening themselves up to identification by authorities. This leak highlights the need for robust data protection measures—even within illicit networks. For all users of any internet platform, particularly those dealing with sensitive or illicit content, employing effective privacy tools is essential. Platform owners, on the other hand, need to implement internal data safeguards to prevent large-scale exposure. Law enforcement officials may use this type of metadata to track user activity, but mass adoption of anonymity tools continues to be a significant hinderance to prosecution.