{"id":29729,"date":"2019-10-16T20:28:32","date_gmt":"2019-10-16T20:28:32","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/"},"modified":"2019-10-16T20:28:32","modified_gmt":"2019-10-16T20:28:32","slug":"hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/","title":{"rendered":"Hundreds charged in internet&#8217;s biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op&#8217;s home"},"content":{"rendered":"<p>US prosecutors say a South Korean man was behind the largest child-abuse image-swapping operation yet found on the internet.<\/p>\n<p>Uncle Sam&#8217;s legal eagles <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.justice.gov\/opa\/pr\/south-korean-national-and-hundreds-others-charged-worldwide-takedown-largest-darknet-child\">today claimed<\/a> Jong Woo Son, 23, was the administrator of the now-defunct &#8220;Welcome to Video&#8221; dark-web-hosted website frequented by hundreds if not thousands of perverts in the US and internationally, and advertised itself as having served more than a million image and video downloads.<\/p>\n<p>Son, already serving a lengthy prison sentence in South Korea for masterminding the site, was indicted in the US on nine counts related to the creation and distribution of child sexual abuse images as well as money laundering.<\/p>\n<p>(Beware: <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1210441\/download?utm_medium=email&amp;utm_source=govdelivery\">the indictment<\/a>, filed last year and unsealed this week, is disturbing and graphic.)<\/p>\n<p>Son and 337 other defendants were charged with operating Welcome to Video, a massive underage-sex-abuse-image-sharing Tor-hidden site, which at its peak had roughly eight terabytes of media and 200,000 video files. Users either paid 0.03 Bitcoin for download rights or earned credits by uploading new child-abuse material.<\/p>\n<p>The site, designed from its creation in 2015 until its takedown in March 2018 to be dedicated to peddling sex abuse imagery \u2013 including instructions to fiends not to upload any legit adult pornography \u2013 was accessed through Tor, and instructed netizens to pay for files with Bitcoin through unique email addresses.<\/p>\n<h3 class=\"crosshead\"><span>Follow the money<\/span><\/h3>\n<p>It is estimated roughly one million Bitcoin wallets were affiliated with the site. Those accounts proved useful in helping government agents and police, with the help of blockchain analytics outfit Chainalysis, track down the individual users who were behind the spread of this horrific content by <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.chainalysis.com\/reports\/chainalysis-doj-welcome-to-video-shutdown\">tracing the flow of bitcoin<\/a> from the site to various exchanges and wallets.<\/p>\n<p>In addition, investigators got lucky when the Welcome to Video server was briefly misconfigured and revealed a couple of public IP addresses linked to the server. These were backtraced to a system hosted at Son&#8217;s own home by South Korean telcos.<\/p>\n<p>In addition to dismantling the site and charging alleged users, prosecutors said they were able to rescue 23 children in the US, UK, and Spain from abusers.<\/p>\n<p>&#8220;Through the sophisticated tracing of bitcoin transactions, IRS-Criminal Investigation special agents were able to determine the location of the dark-net server, identify the administrator of the website and ultimately track down the website server&#8217;s physical location in South Korea,&#8221; said IRS-Criminal Investigation Chief Don Fort. Yes, that&#8217;s IRS as in the US tax collection authority.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/06\/20\/onion_chop_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Pic: Shutterstock\"><\/p>\n<h2 title=\"Cofounder brings us up to date on network status\">Dark web doesn&#8217;t exist, says Tor&#8217;s Dingledine. And folks use network for privacy, not crime<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2017\/07\/29\/tor_dark_web\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;This large-scale criminal enterprise that endangered the safety of children around the world is no more. Regardless of the illicit scheme, and whether the proceeds are virtual or tangible, we will continue to work with our federal and international partners to track down these disgusting organizations and bring them to justice.&#8221;<\/p>\n<p>Along with the criminal charges, prosecutors are looking to recover any money Son and 23 other conspirators allegedly made through the operation. Between June 2015 and March last year, the site is thought to have earned over $370,000 in Bitcoin.<\/p>\n<p>In announcing the takedown, the US government made a point of going after not only the people who traded in the abuse images and videos, but also slamming the Tor and Bitcoin services that were used to support the site.<\/p>\n<p>&#8220;Operators of anonymization services like Tor must ask themselves whether they are doing their part to protect children and make their platform inhospitable to criminals,&#8221; said deputy US attorney general Richard Downing.<\/p>\n<p>&#8220;Society must decide whether it will accept these lawless online spaces, whether American taxpayers should fund them, or whether we will instead demand that providers act to prioritize protecting children from online predators.&#8221; \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7798\/how-to-process-wrangle-analyze-and-visualize-your-data-with-three-complementary-tools?td=wptl1858\">How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/10\/16\/korea_child_abuse_bust\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>23 kids saved, alleged scumbag-in-chief already in jail US prosecutors say a South Korean man was behind the largest child-abuse image-swapping operation yet found on the internet.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29730,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-29729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hundreds charged in internet&#039;s biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op&#039;s home 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hundreds charged in internet&#039;s biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op&#039;s home 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-16T20:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hundreds charged in internet&#8217;s biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op&#8217;s home\",\"datePublished\":\"2019-10-16T20:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/\"},\"wordCount\":646,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/\",\"name\":\"Hundreds charged in internet's biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op's home 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg\",\"datePublished\":\"2019-10-16T20:28:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hundreds charged in internet&#8217;s biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op&#8217;s home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hundreds charged in internet's biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op's home 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/","og_locale":"en_US","og_type":"article","og_title":"Hundreds charged in internet's biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op's home 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-16T20:28:32+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hundreds charged in internet&#8217;s biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op&#8217;s home","datePublished":"2019-10-16T20:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/"},"wordCount":646,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/","url":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/","name":"Hundreds charged in internet's biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op's home 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg","datePublished":"2019-10-16T20:28:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-charged-in-internets-biggest-child-abuse-swap-shop-site-bust-ip-addy-leak-led-cops-to-sys-ops-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hundreds charged in internet&#8217;s biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op&#8217;s home"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29729"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29729\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29730"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}