DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

While questions about RaidForums remain unanswered, BreachForums opens

Posted on March 18, 2022 by Dissent

On February 25, popular hacking-related forum RaidForums.com (RF) appeared to have been seized. It was not the first time it had appeared to have problems, but in the past, the owner, “Omnipotent” had reappeared briefly to restore the site somewhat. Now it did not appear to be working at all and had been replaced by what appeared to be a phishing page.

Omnipotent made no public statements, and moderators “Jaw” and “Moot” posted notices on the forum’s Telegram channel stating that the forum had been seized, and that anyone who had attempted to login to the phishing page should change their passwords and clear their logs. Since then, there really have been no substantive updates and it’s not clear whether Omnipotent has continued to remain in contact with Jaw or if not, why not.

While law enforcement agencies contacted by DataBreaches.net declined to comment or just didn’t answer at all, one of RF’s most active users, “Pompompurin,” (Pom) took steps to try to protect users from accidentally exposing their credentials on the phishing page. He started DDoSing the RF site to save users from themselves if they hadn’t detected the phish, but his attempt failed after CloudFlare started rate-limiting.

Now Pom has opened up his own site to pretty much provide the equivalent of RF. Breached.co, also known as BreachForums, opened this week. Its theme, contents, and rules, are pretty much identical to RF, although not all sections or services are in place just yet.

Welcome message on BreachForums
Part of BreachForums welcome message on March 16, 2022.

Part of his motivation in creating the forum, he wrote, was to “stop all the stupid people are trying to take the empty spot that RaidForums once filled….”

In an interview with “Alex” of DataKnight blog, Alex cut to the chase, asking Pom how Breached could avoid the same fate as RF.

Alex: So, What is Breached doing to ensure that it doesn’t suffer the same fate as RaidForums? And what kind of security can users expect to receive when using your site

Pom: Passwords are configured to be in argon2id [Password Encryption Algorithm], I am pretty confident that we will be able to last a long time. There will be a person with full access to the servers, backups, and everything needed to relaunch unaffected within hours if I am arrested or if one of the domains//servers are seized..

Alex: I can see that you’ve put a lot of work into this… but don’t you think that there’s a reason that the FBI took down RaidForums? Why would you want to bring it back up knowing that you may face that same fate whatever it [may be]

Pom: [Redacted], it doesn’t really bother me. If I get arrested one day it also wouldn’t surprise me, but as I said I have a trusted person who will have full access to everything needed to relaunch it without me. This person will also never be made known to the public, so it wouldn’t be possible for the police to also target them in the event that they want to get the forum taken down for good.

Pom certainly has good reason to fear arrest given his history of involvement in certain activities such as misusing the FBI domain to blast out spam emails as a hoax and getting involved in the sale of Robin Hood data.  Despite what would seem to put a large target on his back, Pom has repeatedly shrugged off any questions about whether he has any fear of arrest, claiming that if it happens, it happens, but that his OPSEC is so good that he is not really concerned.

But in addition to what Pom told Alex in their interview, Pom has actually taken other steps to avoid the same fate as RF. In an exchange with DataBreaches.net, this blogger pursued the question Alex had raised:

DISSENT: If you don’t know for sure why RF got seized (assuming at this point that it was seized), isn’t your forum likely to run into the same problem?

POM: No, I doubt my forum will run into the same problem. From looking at previous seizures that LEA [Law Enforcement Agencies] have done, they almost always seize domains by going straight to the TLD // ccTLD holder. In the case of RaidForums and WeLeakInfo, both domains were likely seized by the Feds going straight to Verisign (current operator of .net and .com). Breached is currently using the .co ccTLD (Colombia) and we have also bought breached.to as a backup (ccTLD for Tonga).

Given that law enforcement is likely in possession of RF user data and private messages, is it smart to encourage Breached users to use their RF usernames and credentials?  Wouldn’t they be safer creating new identities even if it costs them their reputation or status? Are they now sitting ducks because law enforcement can still find them online? When asked, POM replied:

As long as they practiced proper OPSEC when using RaidForums (Always on a VPN, not using a personal email, not sending personal things via PM etc) then I personally think it’s fine to use the same alias. As for the passwords, I beleive most people are aware by now that RaidForums has turned into a honeypot. If someone decides to use the same password they entered into the phishing page I can’t really control that

In looking at Breached, this blogger noticed that “Jaw” and “Moot” were not moderators for the new forum. Pom was asked about their role in Breached:

DISSENT: Will Jaw and Moot be involved in this forum? And do you already have people designated/approved as middlemen for sales/escrow?

POM: That would be ultimately up to them. If they wish to be apart of it then I will let them. At this current point in time we don’t have any middlemen services. Still need more time to figure out the specifics.

DISSENT: It sounds like you are not motivated/particularly interested in having them continue as mods or anything. I thought you all got along, but it sounds like maybe not so much…?

POM: No we do, but it’s just I don’t wanna force them to join lol

There’s a difference between not forcing people and not even asking them. Were they even asked? When contacted, Moot informed this site that he had not been involved in setting up Breached and currently had no involvement in it.

I would signup but I don’t use hacking forums, maybe if they added a section for baking recipes.

Well okay, then…

As noted in his site’s welcome message and his statements to both DataKnight and this site, Pom has stated that he will give up Breached if RF comes back. In the meantime, Breached users are currently debating what happened to RF.

Breached currently has the same rules and policies as RF in terms of what can and cannot be posted.  And that means that politically motivated postings are not off-limit. Prior to the seizure (assuming for now that it was a seizure), one moderator had posted that anyone posting from a Russian IP address would be banned. That, Pom, says was just a joke. Will anti-Ukrainian posters like “FreeCivilian” begin listing Ukrainian leaks again now that the site is under new ownership? We’ll have to wait and see. There is already one posting claiming to be by Anonymous promoting #OpRedScare.

Breached already has 217 registered members in less than two days.

Category: Commentaries and Analyses

Post navigation

← TransUnion hackers demand R224-million ransom — threaten to leak Absa, FNB, Standard Bank data
Health insurance: Data of more than 500,000 people stolen in France →

1 thought on “While questions about RaidForums remain unanswered, BreachForums opens”

  1. Badhou3a says:
    March 19, 2022 at 3:27 am

    Wow very insightful thanks

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.