BreachForums (2025) Breach: 672K Accounts Exposed
In October 2025, a reincarnation of the hacking forum BreachForums, which had previously been shut down multiple times, was taken offline by a coalition of law enforcement agencies . In the months leading up to the takedown, the site itself suffered a data breach that exposed a total of 672k unique ...
Overview
In October 2025, a major law enforcement operation successfully shut down a notorious hacking forum known as BreachForums. However, in a significant twist, the forum itself was breached in the months prior to its takedown. This incident exposed the personal data of over 672,000 individuals who had accounts on the platform. The breach is considered critical due to the sensitive nature of the exposed information and the high-risk profile of the website involved.
What Was Exposed
The breach exposed several key pieces of personal data linked to user accounts. The core user database contained approximately 324,000 records with email addresses, usernames, and hashed passwords. Importantly, the passwords were protected using a strong modern algorithm called Argon2. While this makes directly cracking them very difficult, it is not an absolute guarantee of safety. Furthermore, the total breach scope of 672,000 unique email addresses suggests this information was also scraped from public forum posts and private messages, potentially exposing even more individuals who may not have had a formal account but had their email visible on the site.
Potential Impact
The impact of this breach is severe for several reasons. First, the exposure of email addresses and usernames opens victims up to targeted phishing attacks, where criminals use the known association with a hacking forum to craft convincing scams. Second, if a password hash is cracked or was weakly constructed, attackers could gain access to the affected BreachForums account. The greatest danger, however, is credential stuffing. Criminals will take the exposed email and password pairs and test them on hundreds of other websites (like banking, social media, or email services). If you reused the same or a similar password elsewhere, your other accounts are immediately at risk.
Recommendations
If you had an account on BreachForums or believe your information was exposed, take these steps immediately:
- Change Passwords: Immediately change the password for your BreachForums account if it is still accessible. More critically, change the password for every other online account where you used the same or a similar password. This is the most important action you can take.
- Enable 2FA: Wherever possible, enable Two-Factor Authentication (2FA). This adds a critical second layer of security, like a code from an app, even if your password is compromised.
- Beware of Phishing: Be extremely cautious of any emails claiming to be from BreachForums, law enforcement, or security teams regarding this incident. Do not click on links or open attachments. Verify communications through official channels.
- Monitor Accounts: Closely monitor your email and other important accounts for unauthorized activity. Consider using a password manager to generate and store unique, strong passwords for every site.
How to Check If You’re Affected
This breach has been officially reported to and verified by the reputable service “Have I Been Pwned.” You can easily check if your email address was involved by visiting their dedicated breach page: https://haveibeenpwned.com/Breach/BreachForums2025. Simply enter your email address on that page to see if it appears in the leaked data. It is a safe and trusted resource for this purpose.
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, education company McGraw Hill confirmed a data breach following an extortion attempt . Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later pu...
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach . The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders contai...
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed . The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.