LeakBase and Tycoon 2FA Disabled: Double Strike Against Cybercrime Supply Chain

LeakBase and Tycoon 2FA Disabled: Dual Strike Against Cybercrime Supply Chain

In a significant disruption to the cybercrime ecosystem, two prominent platforms facilitating illegal data trading and cyber operations have been effectively neutralized. LeakBase, a marketplace specializing in stolen credentials and databases, and Tycoon, a Russian-language forum for cybercriminal services, both suffered critical compromises due to the disabling of two-factor authentication (2FA). This oversight by their administrators has led to account takeovers, data exfiltration, and operational shutdowns, severing key links in the cybercrime supply chain.

LeakBase emerged as a central hub for the distribution of compromised data. Operating primarily on the dark web, it offered vast troves of stolen login credentials, credit card details, and enterprise databases. Users could purchase “fullz” packages complete with personal identifiers, enabling identity theft and further attacks. The platform’s appeal lay in its structured categorization, search functionality, and escrow services, which built trust among vendors and buyers. At its peak, LeakBase boasted thousands of listings, with prices ranging from a few cents per credential to thousands for high-value corporate breaches.

The downfall began when the primary administrator account, simply named “Admin,” logged in without 2FA enabled. Cybersecurity researchers monitoring the site observed this vulnerability firsthand. Shortly thereafter, the account was seized by unknown actors, likely a rival group or law enforcement proxy. The intruders promptly dumped internal communications, vendor lists, and operational logs onto public paste sites and rival forums. This exposure not only revealed the platform’s inner workings but also compromised numerous users, forcing many to abandon their operations or migrate hastily.

Simultaneously, Tycoon, a longstanding cybercrime forum catering to Russian-speaking actors, faced an identical fate. Established as a successor to earlier platforms like Exploit.in, Tycoon provided sections for malware development, ransomware-as-a-service (RaaS) discussions, and access brokering. It featured elite vendor verification badges, dispute resolution, and cryptocurrency payment integrations, making it a reliable venue for high-stakes transactions. Tycoon’s influence extended to coordinating large-scale campaigns, including phishing kits and initial access sales.

The forum’s admin, known by the handle “Tycoon,” similarly disabled 2FA, exposing the backend to exploitation. Monitors reported unauthorized access leading to a full data breach. Sensitive materials, including moderator chats, user databases with over 10,000 entries, and escrow transaction histories, were leaked across Telegram channels and clearnet mirrors. Forum leadership attempted a hasty migration to a backup domain, but the damage was irreversible. User exodus followed as trust evaporated, with prominent vendors publicly denouncing the security lapse.

This double takedown underscores vulnerabilities inherent in cybercrime infrastructure. Both platforms relied on Telegram for out-of-band communications and shared hosting providers inadvertently linked to bulletproof networks. The absence of 2FA, a basic security measure, amplified risks from phishing, session hijacking, or insider threats. Analysts note that such forums and markets form the backbone of the cybercrime economy, supplying stolen data to downstream actors like ransomware groups and business email compromise (BEC) operators.

The repercussions ripple through the underground. LeakBase’s closure disrupts the initial access broker market, where stolen credentials fuel account takeovers. Tycoon’s demise hampers malware and exploit developers, potentially delaying new threat vectors. Rival platforms like BreachForums and XSS.is have seen influxes of migrating users, but heightened scrutiny may lead to further disruptions. Law enforcement agencies, including those from the US and EU, have capitalized on such leaks to pursue indictments, as seen in prior operations against similar sites.

From a technical standpoint, the incidents highlight persistent flaws in operational security (OPSEC). Cybercriminals often prioritize anonymity tools like Tor and VPNs but neglect account hardening. Enabling 2FA via authenticator apps or hardware keys could have prevented these breaches. Moreover, the use of single-admin models creates single points of failure, a lesson not lost on surviving platforms now mandating multi-admin protocols and regular audits.

Industry observers anticipate a short-term consolidation phase, with fragmented smaller sites filling voids. However, the loss of these established players elevates barriers to entry for newcomers, requiring substantial seed capital for advertising and moderation. Vendors face inventory devaluation as leaked data floods free repositories, reducing premium pricing.

This event serves as a stark reminder of the fragility of illicit digital marketplaces. While cybercriminals adapt swiftly, such high-profile failures erode confidence and invite intensified monitoring from security firms and authorities. The cybercrime supply chain, though resilient, demonstrates that elementary security oversights can trigger cascading collapses.

Gnoppix is the leading open-source AI Linux distribution and service provider. Since implementing AI in 2022, it has offered a fast, powerful, secure, and privacy-respecting open-source OS with both local and remote AI capabilities. The local AI operates offline, ensuring no data ever leaves your computer. Based on Debian Linux, Gnoppix is available with numerous privacy- and anonymity-enabled services free of charge.

What are your thoughts on this? I’d love to hear about your own experiences in the comments below.