Hacking several government agencies and corporations
IntelBroker is a Serbian black hat hacker active since October 2022, who has committed several high-profile cyber attacks. Their targets have included Europol, Pandabuy, and Apple, with over 80 sales and leaks of compromised data having been traced to them. They claim to be currently residing in Russia for security reasons.
Description
IntelBroker first began activities in October 2022, hacking minor organizations, but only gained notoriety in 2023 after an attack on the food delivery service "Weee!".[1][2] After their initial string of attacks, they were speculated to be a highly skilled team, possibly an Iranian Persistent Threat Group, however an interview with The Cyber Express revealed that they were a single person. In another exclusive interview with the German Podcast Inside Darknet[3]
, IntelBroker shared several personal details, including that they are Serbian and currently reside in Russia for safety reasons.[4] During the same interview, they expressed a desire to one day manage a cybercrime forum similar to BreachForums. This aspiration became reality in August 2024, when IntelBroker took ownership of BreachForums. IntelBroker often contributes to the racist hacking group CyberNiggers,[2] and in August 2024 became the owner of the cybercrime forum BreachForums.[5] As of June 2024, they had posted over 80 separate leaks and sales of compromised information on BreachForums, with IntelBroker claiming that they had sold the information of over 400 organizations.[4]
Modus operandi
IntelBroker has used a wide range of tactics to enter secured systems, such as exploiting leaked credentials and exploiting organizations public facing applications. Once inside, they remain for an extended period of time, escalating privileges and acquiring data. Finally, they ransom, sell, or leak the data, often on BreachForums.[6][4]
Endurance ransomware
IntelBroker created a unique ransomware strain written in C# known as Endurance, and published its source code publicly on their GitHub page. While labeled as ransomware, the software overwrites and then deletes all targeted files.[6] Endurance was confirmed by the Department of Defense Cyber Crime Center to have been used by IntelBroker to hack several U.S. government agencies.[7] They speculated that Endurance was related to the Shamoon wiping software sometimes used by Iranian Hackers, which IntelBroker has denied.[4]
Notable attacks
Acuity
In April 2024, IntelBroker announced that they and the black hat hacker Sanggiero had hacked Acuity, a technology contractor for the U.S. government, and subsequently obtained confidential information belonging to the Five Eyes intelligence organization and the United States military. A vast majority of the information had been stored in a GitHub repository by Acuity, which IntelBroker was able to access.[8][9] The information included confidential communications and documents between Five Eyes members, and the contact information for several U.S. government and military officials.[10] Sanggiero claimed that the breach had taken place on March 7, a month before the information was leaked.[11] After an investigation, Acuity determined that the leaked data was old and non-sensitive.[12]
Pandabuy
On March 31, 2024, IntelBroker assisted Sangierro in a hack of the Chinese e-commerce website Pandabuy, with user data sold the database on BreachForum for a small "symbolic" bitcoin payment.[13][14] The information had been initially ransomed to Pandabuy for an unknown amount of money, but after it was paid the leak was still released.[15][16] IntelBroker and Sangierro claimed that the leak contained the names, contact details, orders, and addresses of over 3 million Pandabuy customers, while an analysis by "Have I Been Pwned?" creator Troy Hunt found that only approximately 1.3 million user entries were real, while the rest contained fake email addresses.[14][17] Pandabuy attempted to censor posts on its Discord and Reddit pages to cover up the leak, before offering a "10% freight subsidy" to users as compensation. Both actions were received negatively by Pandabuy customers.[18][19]
On June 3, 2024, Sanggiero posted on BreachForums that they were going to sell all information from the databreach, containing over 17 million user entries, for $40,000. They had again ransomed the information to Pandabuy, who refused to pay as the two had violated the original ransom and sold the information.[15][16]
Europol
On May 10, 2024, IntelBroker announced on BreachForums that they had gained access to 9,128 confidential records from the European Union's law enforcement agency Europol, including employee information, source code, and guideline documents. Most of the records came from the Europol Platform for Experts, a discussion platform for law enforcement, and the electronic evidence program SIRIUS. Europol confirmed that the leak was real, but claimed that it only contained information from Europol Platform for Experts and SIRIUS, and did not contain any operational information.[20][21] IntelBroker announced that they would be accepting offers for the data in Monero,[22] which was sold on May 11.[23]
Apple
In June 2024, IntelBroker claimed on X that they had acquired source code for several internal Apple tools, before releasing the code on BreachForums. These tools were related to internal Apple processes, such as authenticating users and sharing information within Apple's network.[24] Later analysis revealed that leaked code was not source code, but instead plugins for internal tools. However, the code still was a security risk, and could potentially be used by malicious parties.[25][26]
AMD
On June 17, 2024, IntelBroker claimed on BreachForums that they had breached semi-conductor giant AMD, and was selling the compromised data. Samples provided by them included data on future products, employee information, customer information, source code, and financial records.[27] AMD quickly contacted law enforcement agencies to investigate the breach.[28] Soon after AMD claimed that the breach was limited in scope, would not impact the business, and implied that it did not include employee or customer information, conflicting with the initial report by The Cyber Express.[29]Bloomberg correlated the attack with a 2.4% fall in AMD stock soon after the breach was announced.[30]