DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Thornhill man charged with selling 3 billion pieces of stolen digital info in LeakedSource.com case making court appearance Monday

Posted on January 15, 2018 by Dissent

Robert Cribb reports:

A Thornhill man is scheduled to appear in court Monday charged with selling three billion pieces of stolen digital information belonging to people around the world — including online user names and passwords — through the infamous website Leakedsource.com.

Jordan Evan Bloom, 27, is facing rare Canadian Criminal Code charges including trafficking in identity information, mischief to data, unauthorized use of computers and possession of property obtained by crime.

[…]

Bloom, police allege, administered the website for which he earned $247,000 for “trafficking identity information.”

Read more on The Toronto Star.  The following is the text of the Royal Canadian Mounted Police’s press release today:

 On December 22, as part of the criminal investigation Project “Adoration”, the RCMP’s National Division Cybercrime Investigative Team charged 27-year-old Jordan Evan Bloom of Thornhill, Ontario, for allegedly selling stolen personal identities online through the website Leakedsource.com. Today, Bloom will make his first court appearance in relation to the charges:

  • Trafficking In Identity Information
  • Unauthorized Use of Computer (s. 342.1 of the Criminal Code)
  • Mischief to Data
  • Possession of Property Obtained By Crime

Project “Adoration” began in 2016 when the RCMP learned that the website LeakedSource.com was being hosted by servers located in Quebec. LeakedSource.com had a database of approximately three billion personal identity records and associated passwords that could be purchased for a small fee. Jordan Evan Bloom is alleged to have been responsible for administering the LeakedSource.com website and is alleged to have earned approximately $247,000 from trafficking identity information.

“This investigation is related to claims about a website operator alleged to have made hundreds of thousands of dollars selling personal information. The RCMP will continue to work diligently with our domestic and international law enforcement partners to prosecute online criminality.”

– Inspector Rafael Alvarado, Officer in Charge of the RCMP Cybercrime Investigative Team at National Division

This case highlights the importance of international partnerships, which are key to solving crimes that are becoming increasingly transnational. The Dutch National Police’s and the FBI’s assistance on Project “Adoration” was essential to the investigation.

The National Division Cybercrime Investigative Team was created in 2016 and has successfully conducted several investigations in collaboration with international partners, local law enforcement and federal government agencies.

The RCMP is determined to fight cybercrime in all its forms, wherever it takes place. We are actively pursuing efforts to prevent, detect and deter any illegal activity that threatens Canada’sintegrity and reputation. The public is encouraged to remain vigilant when using the Internet and to report information on illegal activities to the RCMP.

SOURCE Royal Canadian Mounted Police

Category: Non-U.S.Of Note

Post navigation

← Medical records of almost 180,000 patients handed to US firms connected to tobacco industry by British health officials, Telegraph probe reveals
FL: Records from defunct finance firm exposed after company closes and leaves them behind →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.