DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Law enforcement seizes domains owned by “Pompompurin” and one currently owned by DataBreaches

Posted on June 22, 2023 by Dissent

When the owner of Breached.vc was arrested in March, people expected to see Conor Fitzpatrick’s BreachForums site seized by authorities. Somewhat surprisingly, it wasn’t, and Baphomet, the forum’s administrator, was able to post messages on the site explaining what was going on and that he was taking the site down for fear it had been compromised. For months, the site was empty except for a warning posted by Baphomet not to trust any site claiming to be them. But when a new forum also called BreachForums opened, more warnings appeared on breached.vc.  But who was posting them? Was it law enforcement or someone who still had access to the domain?

Today, the clearnet version of the site (Breached.vc) was seized.

Seizure notice shows Pompompurin's avatar with handcuffs on it and a notice that domains associated with Breach Forums have been seized.

The notice says, “The domains related to Breach Forums have been seized by the Federal Bureau of Investigation, U.S. Department of Health and Human Services, Office of Inspector General, and the Department of Justice in accordance with a seizure warrant issued pursuant to 18 U.S. §§ 981, 982, inter alia, by the United States District Court for the Eastern District of Virginia as part of law enforcement action taken in parallel with the U.S. Secret Service, Homeland Security Investigations, the New York Police Department, the U.S. Postal Inspection Service, the Dutch National Police, the Australian Federal Police, the United Kingdom National Crime Agency, and Police Scotland.”

The seizure notice has a “BF” with Pompompurin’s avatar (the Sanrio pompompurin .gif), but the .gif was edited to put handcuffs on Pompompurin.  As one person commented, the use of that .gif with handcuffs on it made them wonder if this was a real seizure notice or a joke.

Why the government decided to seize the domains now has not been revealed by the government. There has been no press release today by the U.S. Attorney for the Eastern District of Virginia, DOJ Main, or the FBI. Perhaps they will issue one tomorrow that explains why they delayed for three months and first seized domains now.

Collateral Damage

The government not only seized Fitzpatrick’s domains today, but they also seized one of DataBreaches’ domains. The domain breaches.net is a domain that had been owned by Pompompurin. It was never used illegally and was used to provide a listing of breaches much like Have I Been Pwned and the vigilante.pw site.

A screencap of breaches.net from April 2023 stored on archive.org shows that the site provided information on breaches but did not make any data from any of the breaches available. The site’s FAQ reiterated that its purpose is purely informative. Nowhere did the site even link to BreachForums.

After Pompompurin’s arrest, when he realized he would not be using any of his domains, he offered breaches.net to DataBreaches because the domain name seemed like an obvious match. He did not ask for payment for it and would not accept money for the bequest. He simply provided the key and authorization to transfer the domain registration. DataBreaches arranged for the transfer of domain name ownership and paid the transfer fee. Breaches.net was owned by and registered by me before it was seized.

DataBreaches does not know when the warrant for seizure was first written or authorized, but in any event, not all domains seized today were related to BreachForums and DataBreaches hopes the government recognizes the over-reach and corrects it. Tomorrow, DataBreaches will contact the USAO or court and ask about trying to get breaches.net un-seized. DataBreaches makes no predictions as to how this will go.

Updated June 29:  DataBreaches is happy to report that the FBI followed up promptly when I contacted them to ask for their help in getting the domain back. They responded the same to my email, telling me they would look into it. Then after the weekend, I heard from another agent who requested I provide specific kinds of proof, which I then sent him as screencaps showing domain registration, etc. etc.

Yesterday, they asked for a quick meeting by phone. When we met, they told me I would be getting the domain unseized, but to expect it to take time as they have to go through a whole court procedure because there had been a warrant and an order involved.  So it will not be quick, but I will eventually have Breaches.net back as my domain that I can develop, thanks to the kindness of Conor Fitzpatrick (“Pom”) who donated it to me to use for good purposes and thanks to the FBI agents who responded so quickly and courteously to my request.


Related:

  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
Category: Breach IncidentsCommentaries and AnalysesOther

Post navigation

← Confused about the drama with the new BreachForums? Reading this will either help you or make your head spin.
Hacker responsible for 2020 Twitter breach sentenced to prison →

1 thought on “Law enforcement seizes domains owned by “Pompompurin” and one currently owned by DataBreaches”

  1. Moola Moo says:
    June 23, 2023 at 11:40 am

    Neat souvenir, lol.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • EU-wide Breach Notification Template on the Horizon
  • Sex toy maker Lovense caught leaking users’ email addresses and exposing accounts to takeovers
  • Hackers wipe out Rs 384 crore from Bengaluru cryptocurrency firm Neblio Technologies; firm says inside job
  • Intelligence cyberattack on Crimea. Documents confirming abduction of children from Ukraine found
  • Seminole County Schools recovers money taken by hackers
  • Minnesota National Guard deployed; St. Paul declares state of emergency in response to cyberattack
  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.