Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
NEWS

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

Russian law enforcement has arrested the alleged administrator of LeakBase — a credential marketplace operating since 2021 with 142,000 members and...

Dylan H.

News Desk

March 25, 2026
4 min read

Russian federal law enforcement has detained the alleged administrator of LeakBase, one of the more prolific stolen data marketplaces of the past several years, according to statements from TASS and MVD Media — a news outlet affiliated with the Russian Interior Ministry. The arrest, confirmed on March 25, 2026, follows the operational dismantling of the LeakBase platform earlier in March and marks one of the more notable domestic cybercrime enforcement actions by Russian authorities in recent memory.

The Suspect: Aliases, Identity, and Location

The suspect, a 33-year-old resident of Taganrog in southern Russia, operated under the online handles Chucky, beakdaz, and Sqlrip — aliases that had been linked to the LeakBase operation by multiple Western threat intelligence firms prior to the arrest. Russian authorities did not publicly identify the suspect by name, consistent with standard Russian law enforcement practice in cybercrime cases.

During a search of the suspect's residence, investigators confiscated "technical equipment and other items of evidentiary value" — standard language in Russian cybercrime enforcement actions that typically encompasses computers, storage media, mobile devices, and any cryptocurrency hardware wallets.

What Was LeakBase?

LeakBase operated as a clearinghouse for stolen data, providing a marketplace where threat actors could buy, sell, and access credentials, personal records, and corporate documents obtained through hacking and data theft operations. The platform:

  • Operated continuously since 2021
  • Accumulated more than 142,000 registered members as of December 2025
  • Hosted hundreds of millions of user accounts, bank details, usernames, and passwords
  • Also traded corporate documents obtained through hacking — expanding beyond consumer credentials into enterprise intelligence

The forum's business model was straightforward: members could post stolen datasets for sale, browse available datasets by organisation or data type, and purchase access to credential dumps for use in credential stuffing attacks, account takeover campaigns, fraud operations, and further targeted intrusions.

Charges and Legal Proceedings

According to Russian Interior Ministry spokesperson Irina Volk, the suspect faces charges for "creating and managing a criminal site" under Russian federal law. The specific charges relate to facilitating the trade of stolen personal databases and enabling members to "buy and sell this data, as well as use it to commit fraudulent acts."

The case will be prosecuted through Russia's domestic criminal justice system. Unlike Western cybercrime cases involving Russian nationals — which typically require extradition proceedings that Russia does not honour — this prosecution is being handled entirely within Russian jurisdiction.

Context: Russian Domestic Cybercrime Enforcement

Russia's enforcement of its domestic cybercrime laws has historically been selective and often driven by political considerations rather than consistent rule-of-law application. However, the LeakBase takedown and arrest follow a pattern of increased Russian domestic enforcement actions in 2025 and early 2026, which security analysts attribute to several factors:

  • Reputational management: Russia has faced significant international criticism over its tolerance of cybercriminals operating from its territory. Domestic enforcement actions provide diplomatic cover, particularly in cases where the criminal activity lacks a clear geopolitical utility for the Russian state
  • Criminal enterprise competition: Some Russian cybercrime takedowns have been attributed to inter-group conflicts, where law enforcement is used to remove a competitor or rival group rather than as an expression of genuine enforcement intent
  • Intelligence value: Arrested cybercriminals with extensive knowledge of underground market operations represent significant intelligence assets for Russian security services

It is not publicly known which of these factors — if any — contributed to the LeakBase enforcement action.

Significance of the Takedown

LeakBase's longevity — operating for over four years — and its scale made it a significant infrastructure node in the underground economy. Platforms of this type serve not just as markets but as aggregators: by collecting stolen data from multiple breach sources in one place, they dramatically lower the search cost for threat actors seeking credentials for specific targets.

The timing of the arrest is noteworthy. LeakBase's dismantlement came amid a broader international push against credential marketplaces, following law enforcement actions against similar platforms in Europe and North America over the preceding 18 months. Whether the Russian action was coordinated with Western partners or independent is unknown.

For enterprise security teams, the LeakBase takedown serves as a reminder that credential data stolen in breaches circulates on underground markets for years after the original incident. Even if a stolen credential was never immediately exploited, its presence in a marketplace like LeakBase means it may be purchased and used months or years later. Continuous credential monitoring and proactive password rotation for accounts associated with known-breached data remain essential defensive controls regardless of the status of individual underground marketplaces.

#Data Breach#Russia#Law Enforcement#Cybercrime#LeakBase#Credential Theft#The Hacker News

Related Articles

Russia Detains Alleged Admin of LeakBase Cybercrime Forum Weeks After Global Crackdown

Russian authorities have detained a suspected administrator of LeakBase, a major stolen-data marketplace with over 147,000 subscribers, just weeks after...

5 min read

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, recently deploying a custom Windows ransomware strain called GenieLocker in targeted operations.

4 min read

Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

Evgenii Ptitsyn, 43, a Russian national who administered the Phobos ransomware-as-a-service operation, pleaded guilty to wire fraud conspiracy in the U.S....

7 min read
Back to all News