Dark Web Sale of FBI LEEP Classified Data Sparks Concerns Over National Security

The alleged FBI LEEP data sale can mean information of a critical nature is at risk of being misused by cybercriminals.

A dark web user was found selling account credentials allegedly from the Law Enforcement Enterprise Portal (LEEP).

The Federal Bureau of Investigation relies on LEEP as a platform that offers specialized investigative tools, analytical solutions, and internal networking opportunities.

The alleged FBI LEEP data sale can mean information of a critical nature is at risk of being misused by cybercriminals. The services offered by LEEP are used by US law enforcement agencies, intelligence groups, and criminal justice organizations.

FBI LEEP Data Sale

Screenshot of the FBI LEEP breach claimed on the dark web (Photo: Cyber Omniscience)

The above screenshot shows the FBI LEEP breach with a watermark on top of the portal page. The watermark of @FEDCREDS could not be taken as proof of the FBI LEEP hacking as did not log in to the portal.

The FBI LEEP credential leak was tweeted by a retired National Security Agency personnel, Cyber Omniscience.

The tweet read, “#FedCreds is selling account credentials (username/password) for the FBI’s Law Enforcement Enterprise Portal (LEEP). #SiegedSec.” If true, the FBI LEEP credential sale by SeigedSec puts classified emails and projects at risk.

It is not clear how many login credentials have been put on sale by the SeigedSec hacker group. Nor is it known if the credentials are genuine.

Previous FBI LEEP Cyber Attack

Two waves of a campaign wherein emails were sent in bulk were found in a previous instance of an FBI LEEP cyber attack.

This incident was investigated by the international nonprofit Spamhaus Project, which specializes in tacking spammy emails, phishing attempts, and malware among others.

This FBI LEEP email scam took place on 13 November 2021 and it involved sending fraudulent emails to over 100,000 recipients. The fraudulent alerts impersonated the FBI and urged users to be watchful of chain attacks.

The FBI LEEP emails were found to be sent from a legitimate ID – eims@ic.fbi.gov. The hacker was using the FBI’s IP address 153.31.119.142.

The email addresses of the over 100,000 recipients of the FBI LEEP fraudulent emails were scrapped from the American Registry for Internet Numbers (ARIN). ARIN is a nonprofit that monitors IP addresses for security purposes among others.

The issues related to the present sale of the FBI LEEP credentials could allow prominent hackers to log in and send malicious emails to several connected legal agencies.

Regardless of the legitimacy of the FBI LEEP data sale of usernames and passwords, now is a critical time to change login credentials by all US legal agencies. It is not clear if hackers have logged in to harvest the credentials of others in their contacts.

Credential hacking puts not just one organization or individual at risk but, all those whose emails a cybercriminal finds.

How the hacker found access to the first FBI LEEP user could be due to brute forcing or guessing login credentials, or using an infostealer or an information stealing malware.

Cybercriminals have also been known to cause MFA fatigue to employees of an organization, in this case, the ride-sharing platform, UBER.

A hacker from the Lapsus group caused MFA fatigue to an employee by sending multiple MFA authentication notifications on their device.

To stop the flow of messages, the Uber staff eventually accepted a login request leading to the Uber cyber attack.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Editorial

The Cyber Express brings you all the latest cybersecurity news, Hacker news and updates to help you stay ahead of the curve. Keep reading to stay safe online!

Recent Posts

Critical n8n Vulnerability CVE-2026-25049 Enables Remote Command Execution

CVE-2026-25049 is a critical n8n vulnerability that enables authenticated attackers to execute system commands by bypassing earlier security fixes.

48 minutes ago

US FDA Reissues Cybersecurity Guidance to Reflect QMSR Transition and ISO 13485 Alignment

FDA Cybersecurity Guidance was reissued to reflect the QMSR transition, updating references to ISO 13485, risk management, and inspections.

56 minutes ago

What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

When Incognito Market shut down in March 2024, Lin didn’t disappear quietly.

4 hours ago

CISA Silently Updates Vulnerabilities Exploited by Ransomware Groups

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been “silently” updating its Known Exploited Vulnerabilities (KEV) catalog when it…

13 hours ago

Ransomware Attacks Have Soared 30% in Recent Months

Ransomware attacks have soared 30% since late last year, and they’ve continued that trend so far in 2026, with many…

15 hours ago

Mountain View Shuts Down Flock Safety ALPR Cameras After Year-Long Unrestricted Data Access

ALPR surveillance cameras may offer law enforcement real investigative value, but without airtight safeguards, they risk becoming tools of unchecked…

1 day ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More