LeakedSource, the website that became notorious for Hoovering up and hosting more than three billion stolen online account credentials, has been taken down following a raid by US authorities.
The site was taken down overnight, claimed an online posting on the Ogflip.com forums, according to Arstechnica.
"LeakedSource is down forever and won't be coming back. Owner raided early this morning. Wasn't arrested, but all [solid state drives] got taken, and LeakedSource servers got subpoenaed and placed under federal investigation.
"If somehow he recovers from this and launches LeakedSource again, then I'll be wrong. But I am not wrong."
The posting, by someone bearing the handle LTD, has since been removed.
The raid follows mounting speculation over the future of the high-profile site, which offered subscriptions to a vast database of stolen passwords, which the website itself gleaned from various sources on the so-called "dark web".
While some people argued that the site merely traded in what had become publicly available data, and was covered by the US First Amendment protecting free speech, the site was quick to remove credentials when threatened with legal action. LinkedIn, for example, persuaded LeakedSource to remove 117 million stolen user names and passwords in this way.
The site had also hosted hundreds of millions of account credentials for Yahoo, Ashley Madison, FriendFinder.com and Last.fm, among many others. Many of the credentials, though, were old and out-of-date.
The site had gained notoriety for the speed with which it acquired stolen credentials, the volume of credentials it offered, and the subscription-based business model, providing access from between $2 a day to $265 a year. Its database, while huge, was also fast and relatively user friendly, unlike many alternative websites.
And it is not the only stolen password emporium. Such sites as Leakbase and "Database Search" are still going, although they are not nearly as comprehensive or fast as LeakedSource.
A new RSA report urges coders to sign a 'Hippocratic Oath' before embarking on AI programmes.
IT security vendor believes APT33 is working for the Iranian government
Darktrace pushes machine learning to take some of the pressure off of IT and security teams
Google also gets its hands on HTC's IP in a non-exclusive deal