HomeBlog
Database of Hacking Forums Got Breached – Massive Data Leak!!

Database of Hacking Forums Got Breached – Massive Data Leak!!

From long we are coming across data leaks of large and well-known organisations, but this time Cyble’s researchers got hold of the database leaks of two hacking forums. It might sound strange, but it is true that hackers got hacked themselves.

The hacking forums whose databases got breached include Demon forums Hacking Forum and Verified. Cash Hacking Forum. All these hacking forums are based on general discussion and sharing of related resources. It is a place where users can find lots of great data leaks, hacking and cracking tools, software, tutorials, and much more. Along with that, over here the users can also take part in active discussions and make new friends also. Recently, the Cyble Research Team identified and verified the database leaks of these hacking forums. The Cyble’s researchers obtained-:

  • The database of the Demon Forums hacking forum that contains detailed information of over 50K users.
  • The database of Verified. Cash hacking forum that contains detailed information of multiple users such as User ID, Username, User’s Ip address, and much more.

Below are the snapshots of database leaks of the hacking forums which Cyble obtained-:

SQL Database Fields of Demon Forums Hacking forum
SQL Database Fields of Verified. Cash Hacking Forum
Sample of Database Leaked Records

About Cyble:

Cyble is a US-based cyber threat intelligence company with the express mission to provide organizations with real-time views of their supply chain cyber threats and risks.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading