Incident & Breach Response , Managed Detection & Response (MDR) , Security Operations

LeakedSource Operator Busted by Canadian Police

Canadian Charged With Selling Access to Stolen Logins, Earning $247,000
LeakedSource Operator Busted by Canadian Police
Result from a paid data search on (Source: Troy Hunt)

Canadian authorities have charged a 27-year-old man in connection with LeakedSource, a website that raised eyebrows by selling access to 3.1 billion login credentials stolen from dozens of online services, including LinkedIn, MySpace and Dropbox.

See Also: Secureworks Named a Major Player in the 2024 IDC MDR Marketscape

Jordan Evan Bloom of Thornhill, Ontario, appeared in court Monday to face charges of trafficking in identity information, unauthorized use of a computer, mischief to data and possession of property obtained by crime.

Jordan Evan Bloom. Source: Royal Canadian Mounted Police.

Bloom allegedly made $247,000 by administering LeakedSource and selling personal data, according to the Royal Canadian Mounted Police. The RCMP's investigation began in 2016, when it learned was being hosted by servers located in Quebec. The FBI and Dutch National Police both assisted the investigation, the police say.

LeakedSource has been offline since January 2017. Around that time, someone posted an anonymous note on Pastebin saying the site's owner had been raided by law enforcement, which seized solid-state hard drives (see LeakedSource's Demise: Lessons Learned).

Legal Gray Area

LeakedSource operated in somewhat of a legal gray area when it debuted in late 2015.

In an apparent attempt to try and stay on the right side of the law, the site positioned itself as a breach notification service, offering subscriptions. But the site also sold full access to dumped login credentials.

The site claimed that such data wasn't collected directly through hacking but instead via research. "We've accumulated hundreds of databases, not through a miraculously successful spate of hacking attempts, but by scouring the internet and dark web for data," LeakedSource wrote in a now-archived FAQ. "Some of what we find is very new, some is fairly old. We're scavengers, not hackers - we don't get to pick and choose."

But selling people's stolen personal data features on the list of charges against Bloom.

"Some of what we find is very new, some is fairly old. We're scavengers, not hackers - we don't get to pick and choose."

Security researchers and even journalists often come into contact with stolen data. Such troves are also available to download in corners of the internet. Under a strict interpretation of most countries' computer securities laws, possessing such data might be illegal. But it's impossible to do security-related research or reporting without encountering such data, at least occasionally.

Data Breach Abusers

Many experts, however, had a dim view of LeakedSource, doubting the paid service's motives.

Other breach notification services, such as Troy Hunt's Have I Been Pwned, do not offer full access to stolen data. Hunt's service notifies people if their email address appears in data dumps, but does not let them know what password was used. In fact, no passwords are retrievable from his service, which is free.

But with LeakedSource, users could search for credentials using a username, IP address, phone number, email address, name or other personally identifying information. That potentially cut down the time needed to compromise an account that an attacker might be targeting. If an attacker already possessed a bit of information about a potential victim, LeakedSource would, in theory, be one way to try and identify a password hash of the password commonly used by the victim.

LeakedSource's masthead.

Hunt, who has long been a vocal critic of LeakedSource, says the legal ramifications now facing the site's alleged operator are good news. "This may be the important precedent we need to start cleaning up the shady industry abusing data breaches," Hunt says via Twitter. "This group was selling extensive amounts of personal data, including mine, cracked passwords and other PII, often advertised on hacking forums."

Rapid Source of Leaked Data

LeakedSource obtained data from new breaches so quickly that some speculated that the site might be paying hackers for data troves, although that has never been confirmed.

For example, LeakedSource was the first website to claim to hold data from breaches at, Adult FriendFinder, LinkedIn, Dropbox, MySpace and the Russian web portal Rambler.

LeakedSource particularly irritated LinkedIn. The business social networking site suffered a breach in 2012 that initially appeared to have leaked 6.5 million credentials. But in 2016, LinkedIn found that the breach was far worse than that: Some 160 million usernames and hashed passwords had been exposed (see LinkedIn Breach: Worse Than Advertised).

Subsequently, LeakedSource added all of that breached user data to its service. In May 2016, LinkedIn responded with a cease-and-desist order. While LeakedSource censored the hashes, it charged that LinkedIn was "blowing steam out of their ass," saying its order had been meaningless, due to jurisdictional issues.

While the original is still offline, a purported clone apparently based in Russia lives on. That site offers the same number of records - 3.1 billion - and appears to be a working copy of the original LeakedSource.

Executive Editor Mathew Schwartz also contributed to this story.

About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.