Leak Zone Dark Web Forum Database Exposes 22 Million Users' IP Addresses and Locations

On Friday, July 18, cybersecurity firm UpGuard discovered an unprotected Elasticsearch database containing approximately 22 million records of web requests, with 95% of traffic directed to leakzone[.]net, a prominent “leaking and cracking forum” that facilitates the distribution of hacking tools, exploits, and compromised accounts. Each database entry contained critical user information, including IP addresses, geographic locations, and internet service provider metadata, creating a comprehensive map of visitor activity to the underground cybercrime platform. The leaked data presents severe privacy implications for users of the illicit forum, as IP addresses are classified as Personally Identifiable Information (PII) under GDPR regulations due to their capability for cross-platform user identification. The database schema revealed that 185,000 unique IP addresses accessed the platform during this three-week period, significantly exceeding Leakzone’s registered user base of 109,000 accounts, according to the UpGuard report. Cloud service providers, including Amazon, Microsoft, and Google, appeared prominently in the traffic logs, indicating users leverage mainstream infrastructure for anonymization purposes. This discrepancy indicates sophisticated privacy protection measures employed by users, including the use of dynamic IP addresses and proxy servers. The traffic distribution pattern suggested these heavily-used IP addresses represented VPN exit nodes serving multiple users rather than individual connections. 22 million records from the dark web forum Leakzone exposed user IP addresses and locations.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 28 Jul 2025 10:55:18 +0000


Cyber News related to Leak Zone Dark Web Forum Database Exposes 22 Million Users' IP Addresses and Locations

CVE-2024-55642 - In the Linux kernel, the following vulnerability has been resolved: block: Prevent potential deadlocks in zone write plug error recovery Zone write plugging for handling writes to zones of a zoned block device always execute a zone report whenever a ...
6 months ago Tenable.com
Leak Zone Dark Web Forum Database Exposes 22 Million Users' IP Addresses and Locations - On Friday, July 18, cybersecurity firm UpGuard discovered an unprotected Elasticsearch database containing approximately 22 million records of web requests, with 95% of traffic directed to leakzone[.]net, a prominent “leaking and cracking ...
6 hours ago Cybersecuritynews.com
Monitoring Dark Web Threats - CISO’s Proactive Approach - By embedding these best practices into the organization’s security posture, CISOs can ensure that dark web monitoring delivers actionable insights and drives continuous improvement. As the dark web continues to evolve, CISOs must champion a culture ...
3 months ago Cybersecuritynews.com
15 PostgreSQL Monitoring Tools - 2025 - What is Good?What Could Be Better?Monitoring application performance, user experience, and errors.Some users find the pricing high, especially for larger environments.Continuous server, database, and infrastructure monitoring.The extensive feature ...
2 months ago Cybersecuritynews.com
Tracking Everything on the Dark Web Is Mission Critical - COMMENTARYOne of the standard cybersecurity tools today is to relentlessly check the Dark Web - the preferred workplace for bad guys globally - for any hints that your enterprise's secrets and other intellectual property have been exfiltrated. It ...
1 year ago Darkreading.com Equation
Hacker leaks account data of 12 million Zacks Investment users - In late January, a threat actor published data samples on a hacker forum, claiming a breach at Zacks in June 2024 that exposed data of millions of customers. Zacks Investment Research (Zacks) last year reportedly suffered another data breach that ...
5 months ago Bleepingcomputer.com
Trello API abused to link email addresses to 15 million accounts - An exposed Trello API allows linking private email addresses with Trello accounts, enabling the creation of millions of data profiles containing both public and private information. Trello is an online project management tool owned by Atlassian that ...
1 year ago Bleepingcomputer.com
CVE-2019-6475 - Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. A mirror zone is similar to a zone of type secondary, except that its data is subject to DNSSEC validation before being used in answers, as ...
4 years ago
Mozilla Firefox's Premium Dark Web Monitoring Solution - Mozilla, renowned for its commitment to an open and secure internet, has recently made a strategic foray into unexplored realms with the introduction of a subscription-based dark web monitoring service. This bold move signifies the organization's ...
1 year ago Cysecurity.news
Misconfigured Firebase Instances Expose 125 Million User Records - Hundreds of websites misconfigured Google Firebase, leaking more than 125 million user records, including plaintext passwords, security researchers warn. It all started with the hacking of Chattr, the AI hiring system that serves multiple ...
1 year ago Securityweek.com
Major Database Security Threats and How to Prevent Them | Tripwire - Cybercriminals can also attempt to seize control of the organization’s data management system, altering privileges so they can gain database access at any time. Data loss prevention (DLP) solutions can do a lot to prevent occurrences like ...
9 months ago Tripwire.com
Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies - As digital threats grow in sophistication, the cybersecurity sector has ignited a funding frenzy, with startups raising $1.7 billion in April 2025 alone ahead of the RSA Conference in San Francisco. As banks and fintechs face a 40% spike in ...
2 months ago Cybersecuritynews.com
Best of 2023: Combo Lists & the Dark Web: Understanding Leaked Credentials - In today's interconnected, cloud-based world, user credentials are the keys that grant entry to the house that stores an organization's digital treasure. Just as burglars pick the lock on a physical house, cybercriminals use stolen credentials to ...
1 year ago Securityboulevard.com
Leak Site BreachForums Springs Back to Life Weeks After FBI Takedown - Barely two weeks after the FBI and the US Department of Justice shut down BreachForums, the notorious data leak site appears to be back online, hawking personal and payment card data purportedly belonging to more than 500 million Live ...
1 year ago Darkreading.com Hunters
Ten Years Later, New Clues in the Target Breach - On Dec. 18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. Ten years later, KrebsOnSecurity has ...
1 year ago Krebsonsecurity.com
Database Security - In today's rapidly evolving digital landscape, marked by the ascendancy of Artificial Intelligence and the ubiquity of cloud computing, the importance of database security has never been more pronounced. Effective database security strategies not ...
1 year ago Feeds.dzone.com
Cybercrime Groups Offering Six-Figure Salaries for IT Talents - Increasingly, organized crime organizations are operating as businesses rather than criminal organizations, advertising jobs on the dark web with a number of advantages for members. A recent Kaspersky study found that 61% of job ads posted by hacking ...
2 years ago Cybersecuritynews.com
AT&T says leaked data of 70 million people is not from its systems - AT&T says a massive trove of data impacting 71 million people did not originate from its systems after a hacker leaked it on a cybercrime forum and claimed it was stolen in a 2021 breach of the company. While BleepingComputer has not been able to ...
1 year ago Bleepingcomputer.com Hunters
Target Says Data Sold on Dark Web Is Outdated, Likely Released by Third Party - In a recent incident, retail giant Target reported that a subset of customer credit card data sold on the 'dark web' appears to be outdated and likely to have been from a third-party data security breach. ...
2 years ago Therecord.media
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
WinRAR 7.10 boosts Windows privacy by stripping MoTW data - This allows the Mark-of-the-Web security feature to continue to work with extracted files, but the alternate data stream can no longer be used to learn where the file was downloaded. Modern file archives will propagate the MoTW found in archives to ...
5 months ago Bleepingcomputer.com
CVE-2024-36961 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Massive Data Breach at Gokumarket: Over a Million Users' Information Exposed - Several days before the leak, the GokuMarket team found an unprotected MongoDB instance, which was storing information about its users, namely those who bought and sold crypto on the exchange. In GokuMarket's case, it is the details of more than a ...
1 year ago Cysecurity.news
Tech CEO Sentenced to 5 Years in IP Address Scheme - Amir Golestan, the 40-year-old CEO of the Charleston, S.C. based technology company Micfo LLC, has been sentenced to five years in prison for wire fraud. Golestan's sentencing comes nearly two years after he pleaded guilty to using an elaborate ...
1 year ago Krebsonsecurity.com
FBI seize BreachForums hacking forum used to leak stolen data - The FBI has seized the notorious BreachForums hacking forum used to leak and sell stolen corporate data to other cybercriminals. The seizure occurred on Wednesday morning, soon after the site was used last week to leak data stolen from a Europol law ...
1 year ago Bleepingcomputer.com Hunters

Latest Cyber News


Cyber Trends (last 7 days)