{"id":55132,"date":"2024-01-22T14:58:38","date_gmt":"2024-01-22T14:58:38","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35425\/BreachForums-Admin-Gets-20-Years-Of-Supervised-Release.html"},"modified":"2024-01-22T14:58:38","modified_gmt":"2024-01-22T14:58:38","slug":"breachforums-admin-gets-20-years-of-supervised-release","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/","title":{"rendered":"BreachForums Admin Gets 20 Years Of Supervised Release"},"content":{"rendered":"<p><span class=\"label\">in brief<\/span> Conor Brian Fitzpatrick \u2013 aka &#8220;Pompourin,&#8221; a former administrator of notorious leak site BreachForums \u2013 has been sentenced to 20 years of supervised release.<\/p>\n<p>Fitzpatrick was <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/03\/20\/in_brief_security\/\" rel=\"noopener\">arrested<\/a> and charged in March 2023. Authorities accused him of running the site, which allegedly facilitated sales of stolen data, hacking tools, and child sexual abuse material. He pled guilty but later <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/01\/05\/breachforums_admin_arrested_again\/\" rel=\"noopener\">breached<\/a> the terms of his pretrial release and was incarcerated ahead of sentencing.<\/p>\n<p>Last Friday the US District Court for the Eastern District of Virginia <a target=\"_blank\" href=\"https:\/\/regmedia.co.uk\/2024\/01\/22\/pacer_breachforms_sentence.pdf\" rel=\"noopener\">ruled<\/a> [PDF] that Fitzpatrick will spend the next 20 years of his life on supervised release. For the first two years he&#8217;ll be under home arrest and tracked by a GPS device, and for the first year he&#8217;s forbidden to use the internet.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Sentencing guidelines meant he could have faced ten years in prison.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p> <em>\u2013 Simon Sharwood<\/em>\n<\/p>\n<h3 class=\"crosshead\">New UEFI flaw found<\/h3>\n<p>Another week, another serious security flaw found in BIOS successor UEFI \u2013 this time one that should alarm enterprise admins, because it affects systems configured for network booting.&nbsp;<\/p>\n<p>The series of nine vulnerabilities are found in EDK II \u2013 an open source implementation of UEFI maintained by TianoCore, <a href=\"https:\/\/blog.quarkslab.com\/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html\" rel=\"nofollow\">according to<\/a> researchers from Quarkslab that discovered the issue. Dubbed PixieFail, the weaknesses can be exploited through the preboot execution environment (also known as PXE) specification used for network booting.&nbsp;<\/p>\n<p>According to the researchers, the vulnerabilities are specifically found in the NetworkPkg module included in EDK II, which is used by vendors including Arm, Insyde Software, American Megatrends, Phoenix Technologies and Microsoft. Machines using EDK II that boot from a network using PXE \u2013 and, most crucially, are configured to use IPv6 \u2013 are all vulnerable to exploitation from the vulnerabilities.&nbsp;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>IPv6 PXE booting, we note, isn&#8217;t usually enabled by default. But if you <em>could<\/em> be affected it&#8217;s best to check.&nbsp;<\/p>\n<p>As has been well established by previous UEFI exploits like <a href=\"https:\/\/www.theregister.com\/2023\/06\/22\/blacklotus_nsa_guide\/\">BlackLotus<\/a> and <a href=\"https:\/\/www.theregister.com\/2023\/12\/01\/uefi_image_parser_flaws\/\">LogoFail<\/a> \u2013 the latter only just discovered in December \u2013 such vulnerabilities can be serious, and there&#8217;s no exception in the case of PixieFail.&nbsp;&nbsp;<\/p>\n<p>The researchers claim unauthenticated remote attackers could use PixieFail to do all the usual things internet miscreants do \u2013 like trigger a denial of service, leak information, remotely execute code, poison DNS caches, hijack network sessions and the like.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Proofs of concept are available, but we&#8217;ve been told there&#8217;s no real-world exploit out there \u2026 yet.&nbsp;<\/p>\n<p>&#8220;In the event that an exploit is developed, it would certainly attract the attention of advanced attackers,&#8221; Boris Larin, principal security researcher at Kaspersky&#8217;s Global Research and Analysis Team, told us. &#8220;Vulnerabilities that allow arbitrary code execution over a network without any user interaction are particularly alarming, as they can lead to devastating consequences.&#8221;&nbsp;<\/p>\n<p>Fixes are <a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/132380\" rel=\"nofollow\">available<\/a> for affected distributions of EDK II \u2013 time to get deploying before someone decides to test this in the real world.<\/p>\n<div class=\"boxout\" readability=\"13.309048178613\">\n<h3 class=\"crosshead\">Critical vulnerabilities: Another Chrome zero-day to patch<\/h3>\n<p>We covered several critical vulnerabilities this week, like a <a href=\"https:\/\/www.theregister.com\/2024\/01\/18\/citrix_netscaler_bugs_attacked\/\">pair<\/a> of Citrix NetScaler bugs under active exploit and the resurgence of some years-old vulnerabilities being hit by <a href=\"https:\/\/www.theregister.com\/2024\/01\/17\/fbi_botnet_warning\/\">Androxgh0st<\/a> malware being used to build a botnet.&nbsp;<\/p>\n<p>Lucky for you that leaves little in the way of other critical vulnerabilities to report. Except these, which nonetheless demand some immediate patch attention:<\/p>\n<ul>\n<li>CVSS 9.8 \u2013 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-35082\" rel=\"nofollow\">CVE-2023-35078<\/a>: It&#8217;s not a new bug, but this authentication bypass vulnerability in Ivanti Endpoint Manager Mobile is under active exploitation, so be sure you&#8217;re on a version newer than 11.10.<\/li>\n<li>CVSS n\/a \u2013 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-0519\" rel=\"nofollow\">CVE-2024-0519<\/a>: This Chrome zero day OOB memory access vulnerability in the V8 JavaScript engine has yet to be given a score, but it&#8217;s being actively exploited, so patch up ASAP.&nbsp;<\/li>\n<\/ul>\n<p>&gt;<\/p><\/div>\n<h3 class=\"crosshead\">Who&#8217;da thunk: iOS log file an easy way to detect Pegasus infections<\/h3>\n<p>You&#8217;d have to be living under a digital rock to not have heard of <a href=\"https:\/\/www.theregister.com\/2022\/07\/27\/us_congress_spyware_debate\/\">Pegasus<\/a> or <a href=\"https:\/\/www.theregister.com\/2023\/05\/27\/predator_analysis_talos\/\">Predator<\/a>, the rather nasty spyware available for iOS and Android devices that&#8217;s been used by governments around the world to snoop on their perceived enemies.<\/p>\n<p>Those spyware kits are commonly assumed to be <a href=\"https:\/\/www.theregister.com\/2023\/04\/12\/quadream_spyware_microsoft_citizenlab\/\">nigh-undetectable<\/a>. But Kaspersky researchers have found a simple solution that \u2013 they claim \u2013 works consistently to detect Pegasus, Predator and <a href=\"https:\/\/www.theregister.com\/2023\/04\/12\/quadream_spyware_microsoft_citizenlab\/\">Reign<\/a>, another similar spyware tool: Log files.&nbsp;<\/p>\n<p>iOS devices&#8217; Shutdown.log files, to be precise.&nbsp;<\/p>\n<p><a href=\"https:\/\/securelist.com\/shutdown-log-lightweight-ios-malware-detection-method\/111734\/\" rel=\"nofollow\">According<\/a> to Kaspersky researchers, who tested Pegasus for their research but said Predator and Reign use similar filesystem paths, the Pegasus process doesn&#8217;t shut down cleanly when iOS devices are rebooted, leaving an entry in Shutdown.log with a PID and filesystem path. Given filepaths for the malware are common knowledge, determining whether an infection is present is as simple as rebooting a device and collecting the log, Kaspersky explained.<\/p>\n<p>Python scripts that automate log parsing are available.<\/p>\n<h3 class=\"crosshead\">Grant money stolen from US government in spearphishing attack<\/h3>\n<p>The US Department of Health and Human Services (HHS) was reportedly hit by a spearphishing attack last year that allowed cyber criminals to make off with $7.5 million in grant money.&nbsp;<\/p>\n<p>Reported by Bloomberg, <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2024-01-18\/us-health-department-cyber-attack-led-to-millions-in-grant-money-being-stolen\" rel=\"nofollow\">citing<\/a> unnamed sources within HHS, the thefts allegedly took place between March and November, 2023 and targeted a system for processing grant payments to civilians. According to Bloomberg&#8217;s sources, the stolen funds were withdrawn from accounts containing money already allocated to five grant recipients, leaving HHS without money to award to the parties.&nbsp;<\/p>\n<p>Particulars of the projects whose grant money was stolen weren&#8217;t shared, though Bloomberg said $1.5 million of the pot was intended for high-need communities in the US.&nbsp;<\/p>\n<p>The five projects have yet to be funded, Bloomberg&#8217;s sources claim, and the government has yet to identify the culprits.&nbsp;<\/p>\n<p><em>The Register<\/em> has reached out to HHS for confirmation and more details, and will update this story if we hear back.&nbsp;\u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35425\/BreachForums-Admin-Gets-20-Years-Of-Supervised-Release.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[6679],"class_list":["post-55132","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerpassword"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BreachForums Admin Gets 20 Years Of Supervised Release 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BreachForums Admin Gets 20 Years Of Supervised Release 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-22T14:58:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"BreachForums Admin Gets 20 Years Of Supervised Release\",\"datePublished\":\"2024-01-22T14:58:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/\"},\"wordCount\":972,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"keywords\":[\"headline,hacker,password\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/\",\"name\":\"BreachForums Admin Gets 20 Years Of Supervised Release 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2024-01-22T14:58:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breachforums-admin-gets-20-years-of-supervised-release\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,password\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerpassword\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BreachForums Admin Gets 20 Years Of Supervised Release\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BreachForums Admin Gets 20 Years Of Supervised Release 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/","og_locale":"en_US","og_type":"article","og_title":"BreachForums Admin Gets 20 Years Of Supervised Release 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-22T14:58:38+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"BreachForums Admin Gets 20 Years Of Supervised Release","datePublished":"2024-01-22T14:58:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/"},"wordCount":972,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","keywords":["headline,hacker,password"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/","url":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/","name":"BreachForums Admin Gets 20 Years Of Supervised Release 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2024-01-22T14:58:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Za6M54K3gUZ4JB4HbOiWkQAAANY&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/breachforums-admin-gets-20-years-of-supervised-release\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,password","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerpassword\/"},{"@type":"ListItem","position":3,"name":"BreachForums Admin Gets 20 Years Of Supervised Release"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55132"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55132\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}