#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Wednesday, July 2, 2025
HomeTopics 2Data BreachFrench Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five French nationals accused of administering BreachForums, a notorious global data-theft marketplace. This operation marks a critical win in disrupting underground cybercrime networks tied to massive breaches.

According to LeParisien, a coordinated sweep carried out by the Brigade de lutte contre la cybercriminalité (BL2C) on 25 June 2025 resulted in the arrest of four high-profile individuals in metropolitan France and La Réunion, following an earlier arrest in February of one administrator known as “IntelBroker.” The accused-using the online aliases ShinyHunters, Hollow, Noct, and Depressed-allegedly operated BreachForums, one of the largest platforms for trading stolen personal data globally.

This arrest disrupts a thriving ecosystem: BreachForums facilitated the sale of massive data troves from companies such as Boulanger, SFR, France Travail, and the French Football Federation, affecting millions of individuals. Breaking this network sends a strong message to cybercriminals, including in the Middle East and Africa (MEA), about the expanding reach of European cyber enforcement.

Timeline of Key Events

From RaidForums to BreachForums

  • March 2022: BreachForums launched as a successor to the seized RaidForums.
  • March 2023: Founder Conor “Pompompurin” Fitzpatrick was arrested by the FBI. The site went offline briefly.
  • May 2024: Site relaunched under alias ShinyHunters and IntelBroker following an FBI seizure.

Recent Arrests

  • February 2025: IntelBroker was apprehended in France.
  • 25 June 2025: BL2C arrested four more suspects across Hauts-de-Seine, Seine-Maritime, and La Réunion.

Who Were the Suspects?

The French-linked operators-ShinyHunters, Hollow, Noct, and Depressed-were alleged to manage BreachForums v2, facilitating data dumps and forum administration. IntelBroker, previously arrested, had overseen the platform post relaunched.

Security expert Benoît Grunenwald (ESET) commented:

“They are technically sophisticated-it takes proven skill to administer a site like BreachForums in a community built on trust and anonymity.”

Grunenwald added French involvement should not surprise:

“Homegrown talent with cyber capabilities-think of the MBA hackers in MEA markets; here, you have a domestic threat acting globally.”

MEA and Global Implications

Regional Risk and Regulatory Signals

Although based in France, BreachForums’ stolen data reached victims worldwide, including MEA regions. Local organisations should be alert to breached credentials circulating via this network. Under UAE’s NESA, Kenya’s Data Protection Act, and other MEA frameworks, firms must strengthen awareness, breach response, and security services against third-party data leaks.

Global Law Enforcement Pressure

The arrests show an upswing in international cooperation—Europe, the US (FBI), and Africa-led forces have collectively pressured cybercriminal forums. This aligns with ENISA, CISA, and Interpol’s trend of coordinated takedowns.

Technical Profile: Dark Forum Operations

MITRE ATT&CK Technique Mapping
--------------------------------
Initial Access = T1190 (Web forum exploitation)
Privilege Escalation = T1068 (Misconfigured forum software)
Defense Evasion = T1027 (Encrypted/private comms)
Collection = T1411 (Forum database access)
Exfiltration = T1041 (Post and data distribution)
Impact = T1496 (Data manipulation/leakage)
  • The forum leveraged MyBB software; in April 2025, admins claimed a MyBB 0‑day had been patched after suspected infiltration.
  • BreachForums’ infrastructure facilitated massive data trades, offering APIs for searching breaches.

Law Enforcement & Community Response

The operation was led jointly by BL2C and FBI-supported investigations, reflecting a surge in enforcement intensity, particularly after previous disruptions in May 2024. This action comes as the forum has hosted leaks affecting millions e.g., the France Travail breach of 43 million records.

10 Defensive Steps for Organisations

  1. Monitor Dark Web Forums: Use OSINT tools to detect leaked MEA-based credentials.
  2. Rotate Leaked Credentials: Revoke and update any staff accounts exposed in known leaks.
  3. Enforce MFA & Strong Access Control: Protect business-critical accounts against password reuse.
  4. Secure Forum Software: Use tools like MyBB or phpBB; disable unused modules and patch zero-days.
  5. Third‑Party Risk Management: Require forensic due‑diligence for data brokers and partners.
  6. Threat Intelligence Subscriptions: Subscribe to cybercory.com/alerts for dark-web monitoring.
  7. Incident Response Playbooks: Include dark-web leak response in your IR plans.
  8. Employee Awareness Training: Regular awareness sessions on phishing and dark web exploitation.
  9. Collaboration with Law Enforcement: Report leaks to local CERTs or Interpol-supported units.
  10. Continuous Penetration Testing: Engage external pentesting firms via saintynet.com/security-services.

Conclusion

The arrest of these BreachForums admins is a landmark moment in the global fight against cybercrime. It shows that cybersecurity, in MEA or beyond, demands vigilance against clandestine platforms enabled by skilled but rogue actors. Cooperation between public and private sectors will remain essential to anticipate leaks, enforce best practices, and safeguard digital assets.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here