The BreachForums hacking forum became the victim of its own trade on January 9, 2026, when a former ShinyHunters member published the forum’s user database containing approximately 324,000 accounts. The leak includes usernames, email addresses, password hashes, and roughly 70,000 IP addresses that could help identify real-world users.

Leak overview

AttributeDetails
Records exposed323,986 user accounts
Leak dateJanuary 9, 2026
Data cutoffAugust 11, 2025
Leaker identity”James” / “James Mathis” (former ShinyHunters)
Database filedataboose.sql (MyBB users table)
Archive namebreachedforum.7z
Current ShinyHunters involvementDenied

What was leaked

Data typeDetailsRisk level
UsernamesDisplay names for all 323,986 accountsIdentity correlation
Email addressesRegistration emailsReal-world identification
Password hashesArgon2i formatCrackable with resources
IP addresses~70,000 public IPs (many loopback filtered)Geographic identification
Telegram handlesExternal account linksCross-platform correlation
Registration datesThrough August 2025Activity timeline
External linksOther social accountsIdentity mapping

The August 2025 cutoff corresponds to when the previous BreachForums instance was shut down. The leaked data represents the forum’s user base at that point.

Database technical details

AttributeValue
Database typeMyBB users table
File namedataboose.sql
Record count323,988 members
Hash algorithmArgon2i
IP count~70,000 (excluding loopback)
Forum PGP keyAlso leaked

How the breach occurred

The current BreachForums administrator (known as “N/A”) acknowledged the breach and provided technical details:

ElementExplanation
OriginOld users-table from August 2025 restoration
VulnerabilityUnsecured folder during forum migration
Exposure window”Very short period of time”
DownloadsFolder accessed only once
ContentUsers table + forum PGP key

During the forum’s restoration from the .hn domain, critical data was temporarily stored in an unsecured location. One download was enough to capture the database.

Administrator statement

“During the restoration process, the users table and the forum PGP key were temporarily stored in an unsecured folder for a very short period of time. Our investigation shows that the folder was downloaded only once during that window.”

Who is “James”?

The leak came from an individual identifying as “James” or “James Mathis,” who published the database on a website bearing the ShinyHunters name along with a lengthy 23-part manifesto.

Stated motivations

ClaimContext
Ideological disagreementOpposition to attacks on French organizations
DisillusionmentGrowing dissatisfaction with group members
Self-description”Ageless and legendary hacker” operating for decades
GoalShow former associates they can’t operate anonymously
Manifesto length23 parts

ShinyHunters response

The current ShinyHunters group denied any involvement with the leak or the website distributing the archive:

“We are not affiliated with the site that distributed this archive.”

The administrator characterized “James” as a former member who left the group.

Law enforcement implications

The exposed IP addresses represent the most significant element for investigators:

FactorImpact
Public IPs exposed~70,000 (excludes loopback addresses)
VPN/Tor usersLikely not directly identifiable
Poor OPSEC usersDirectly traceable to ISP/location
Extradition riskCountries with treaties may pursue prosecution
Email correlationCross-reference with other breaches

Authentication by researchers

Security firm Resecurity confirmed data authenticity:

“Some of the records identified in the database are definitely authentic and can be cross-checked with other sources regarding specific actors.”

Identification potential

User categoryRisk level
No VPN/Tor usageHigh (direct IP identification)
Home ISP IPHigh (subscriber records available)
Work network IPHigh (employer identification)
VPN with loggingMedium (legal process to VPN provider)
Tor or no-log VPNLow (but other data may identify)
Email correlationVaries (depends on email OPSEC)

June 2025 French arrests

AdministratorStatusAge
HollowArrestedTwenties
NoctArrestedTwenties
DepressedArrestedTwenties
ShinyHuntersArrestedTwenties

French police announced the arrest of four BreachForums administrators in June 2025.

Prior prosecutions

IndividualOutcome
Sebastien Raoult3 years prison (sentenced January 2024)
JurisdictionUS District Court, Seattle
ChargesShinyHunters group membership
ExtraditionSuccessfully extradited to US

Pompompurin case

IndividualOutcome
Conor Brian FitzpatrickSupervised release
AliasPompompurin
RoleOriginal BreachForums founder
ArrestMarch 2023

BreachForums’ troubled history

DateEvent
March 2022Original BreachForums launches after RaidForums seizure
March 2023FBI seizes BreachForums; founder “Pompompurin” arrested
June 2023Forum relaunches under ShinyHunters administration
May 2024FBI seizes forum again
June 2024Forum relaunches again
August 2025Forum shuts down and migrates to new infrastructure
January 2026User database leaked

The repeated seizures and relaunches have fueled speculation that BreachForums operates as a law enforcement honeypot, at least partially. This latest leak will further erode trust among users who depend on the forum’s anonymity.

Honeypot speculation

Evidence forEvidence against
Multiple relaunches after seizuresAdministrators arrested
Continued operation despite law enforcement interestActive criminal trading
User data repeatedly exposedShinyHunters denial
Convenient timing of leaksInternal disputes explain leak

Administrator dispute

The forum administrator disputed some claims about the leak’s scope:

ClaimAdministrator response
Fresh dataDenied—data is from August 2025 backup
Complete databaseAcknowledged users table was leaked
Ongoing accessDenied—single download during brief window
Forum compromiseDenied—only unsecured folder accessed

Checking exposure

Have I Been Pwned has added the BreachForums dataset to its database. Affected individuals can check their exposure at haveibeenpwned.com.

ResourceURL
Have I Been Pwnedhaveibeenpwned.com
Dataset nameBreachForums (2025)
Records indexed323,986

Intelligence value

For researchers and law enforcement, the leak provides:

ValueApplication
Identity correlationCross-reference with other breaches
Email addressesLink to real-world identities
IP addressesGeographic and ISP identification
Telegram handlesAdditional identity verification
Activity patternsRegistration and engagement timelines
Network mappingUnderstand criminal relationships
Prosecution supportEvidence for existing investigations

Implications

For BreachForums users

RiskMitigation
Identity exposureLikely too late if poor OPSEC was used
Law enforcement attentionMonitor for legal inquiries
Credential reuseChange passwords on any shared credentials
Extortion riskOther criminals may exploit the data
Phishing riskTargeted attacks using leaked data

For the cybercrime ecosystem

ImpactAssessment
Trust in forumsFurther eroded
Operational securityRenewed emphasis expected
Alternative platformsMigration to other forums likely
Internal conflictsShinyHunters fracturing continues
DecentralizationMove to private channels

Timeline of expected impacts

TimeframeExpected development
ImmediateIncreased OPSEC among forum users
1-3 monthsLaw enforcement cross-referencing
3-6 monthsInitial arrests in cooperative jurisdictions
6-12 monthsIndictments based on correlation analysis
12+ monthsProsecutions and sentencing

Context

The BreachForums leak represents a significant intelligence windfall for law enforcement agencies worldwide. The irony of a hacking forum being breached is obvious, but the real impact will unfold over months as investigators correlate the exposed data with other sources.

The leak also highlights the fragility of trust in criminal forums. When administrators can expose their entire user base through operational errors—or when disgruntled members can publish databases as revenge—the anonymity that forum users depend on becomes unreliable.

For the cybercriminals exposed in this leak, the consequences may take years to materialize as law enforcement agencies prioritize targets and build cases. The 70,000 users with exposed IP addresses face the most immediate identification risk, particularly those who accessed the forum from home or work networks without VPN protection.

The internal ShinyHunters conflict that triggered this leak demonstrates that criminal organizations face the same personnel challenges as legitimate enterprises—trust is fragile, and departing members may take valuable information with them.