BreachForums Power Seller IntelBroker Exposed
Overview
The unmasking of IntelBroker provides one of the clearest views yet into how modern data brokers operate behind the scenes. Court filings show a sustained cybercrime operation that combined network intrusions, data theft, underground forum activity, and cryptocurrency laundering over multiple years.
Rather than a single breach or ransomware event, the IntelBroker operation functioned as a data-as-a-service model, supplying stolen datasets to other criminals while maintaining a high-profile presence in underground communities.
Who IntelBroker Really Was
According to investigators, IntelBroker was the primary online identity used by Kai Logan West, who allegedly led and coordinated a loosely structured hacking collective. The group targeted organizations across telecommunications, healthcare, government services, and internet infrastructure providers.
The operation was not opportunistic. Evidence shows repeated intrusions between late 2022 and early 2025, with stolen data being sold, traded, or released to build reputation and influence.
Image Credit: justice[.]gov
Technical Breakdown of the Operation
1. Initial Access and Exploitation
Investigators documented multiple intrusion techniques, including exploitation of misconfigured servers and exposed APIs. In at least one case, a server was accessed without credentials due to improper security controls, allowing thousands of files to be exfiltrated and deleted.
2. Data Exfiltration and Monetization
Once access was obtained, data was exfiltrated in bulk and offered on underground forums. Listings included full databases, internal communications, and sensitive personal records. Some datasets were sold for cryptocurrency, while others were distributed for free to increase underground credibility.
This approach allowed IntelBroker to generate revenue while also strengthening influence within hacking communities.
3. Cryptocurrency and Financial Obfuscation
Payments were primarily requested in privacy-focused cryptocurrency. Investigators later traced transactions through intermediary wallets and financial service accounts, revealing patterns commonly used to obscure ownership and fund flows.
Wallet seeding, pass-through accounts, and exchange activity ultimately linked multiple transactions back to a single operator.
4. Behavioral and Operational Exposure
Beyond infrastructure and finances, behavioral data played a critical role. Posting habits, repeated use of specific aliases, reused signature blocks, and synchronized online activity created a consistent fingerprint across platforms.
Investigators correlated these behaviors with account access logs, narrowing attribution over time. This demonstrates how long-term OpSec failures, not single mistakes, often expose cybercriminals.
Scale of Impact
Authorities estimate that the operation attempted to generate millions of dollars in illicit revenue, while victim organizations collectively suffered tens of millions in losses related to breach response, remediation, and downstream risk.
Healthcare-related intrusions were particularly severe, as stolen data included information that could directly impact patient privacy and care continuity.
Why This Case Matters
The IntelBroker case is significant because it illustrates how the cybercrime ecosystem has evolved:
- Data brokers now act as suppliers for broader criminal operations
- Reputation on underground forums is treated as currency
- Technical skill is only one part of sustained cybercrime success
- Behavioral and financial traces are increasingly decisive in attribution
For defenders, this reinforces the importance of monitoring data leak forums, securing third-party infrastructure, and treating exposed APIs and misconfigurations as high-risk attack surfaces.
Closing Insight
IntelBroker’s downfall shows that even sophisticated cybercrime operations struggle to maintain anonymity over time. As investigations combine technical forensics with behavioral and financial analysis, the margin for error continues to shrink.
For organizations, the lesson is clear: data theft is not a secondary risk, it is often the primary objective.
❗️A video of threat actor IntelBroker showing his French prison cell
— International Cyber Digest (@IntCyberDigest) January 20, 2026
IntelBroker, aka Kai Logan West, was arrested in France in February 2025 for cybercrimes. He was also an admin of BreachForums.
The French prison system is known to be 'loose', you can for example have mobile… pic.twitter.com/Mx4IC2Ko2V
No Comment! Be the first one.