Hacking AI Platform WormGPT Breached, 19,000 Users Exposed
WormGPT database allegedly leaked on dark web forums, exposing emails, payment data, and subscription details of cybercriminals using the service.
In an ironic twist, WormGPT—a notorious AI platform explicitly designed to assist cybercriminals—has allegedly been breached, with a threat actor claiming to have leaked the complete user database affecting over 19,000 accounts. The exposed data reportedly includes email addresses, payment information, and subscription details.
What Happened
A threat actor using the alias "Sythe" posted on multiple dark web forums claiming responsibility for compromising WormGPT.AI's infrastructure. The listing, which appeared across at least five cybercrime forums, includes what purports to be a downloadable database containing the platform's entire user base.
WormGPT gained notoriety in 2023 as a malicious alternative to ChatGPT, specifically marketed for criminal purposes including phishing email generation, business email compromise assistance, and malware development. The platform operates without the ethical guardrails built into legitimate AI services.
Exposed Data Categories
According to the breach claim, compromised data includes:
- Email addresses: Direct identification of WormGPT users
- User IDs (UIDs): Internal account identifiers
- Payment data: Customer IDs, payment method tokens, and invoice records
- Subscription details: Service tiers, token counts, and trial status
- Priority scores: Likely indicating user activity levels
- Metadata: Order IDs and timestamps documenting user activity
The payment information exposure is particularly notable. Unlike legitimate services, WormGPT users presumably preferred pseudonymity—having their transaction records exposed undermines whatever operational security they believed they had.
Verification Status
At the time of reporting, the breach claim remains unverified by independent security researchers. However, SOCRadar analysis noted that data samples included in the posting appear credible, and the threat actor has an established reputation on the forums where the claim appeared.
The listing asserts that more than 19,000 unique users are affected—a number that, if accurate, provides insight into the scale of WormGPT's user base.
The Irony Isn't Lost
There's poetic justice in a platform built to facilitate cybercrime becoming a victim itself. WormGPT users specifically sought a service to help them attack others, and now face potential exposure of their own activities and identities.
The breach could have several downstream effects:
Law Enforcement Interest: User email addresses and payment records provide investigative leads for authorities tracking cybercriminal activity. Even pseudonymous cryptocurrency payments often leave traceable patterns.
Targeting by Other Criminals: Exposed WormGPT users make attractive targets for blackmail, scams, or other exploitation by fellow bad actors who now know they engage in cybercrime.
Credential Stuffing Risks: Email addresses and any reused credentials could enable account compromise across other platforms WormGPT users frequent.
Criminal AI's Growing Ecosystem
WormGPT represents part of a broader trend of AI services explicitly designed for malicious purposes. The platform emerged following concerns about jailbreaking mainstream AI models, offering criminals a purpose-built alternative without ethical restrictions.
The breach highlights risks inherent to the criminal AI ecosystem. Users of these services entrust their data to operators who themselves may lack security expertise, face no regulatory oversight, and have no accountability mechanisms. WormGPT's alleged compromise demonstrates those risks materialize.
This incident joins a pattern of cybercriminal infrastructure becoming targets itself. Earlier this year, BreachForums leaked data on 324,000 users when its database was compromised—another case of criminal platforms failing to protect their own user bases.
Implications for Defenders
While the exposed users are themselves threat actors, security teams can potentially leverage this breach:
Threat Intelligence: Exposed email addresses may correlate with accounts on legitimate services, helping identify bad actors operating across platforms.
Attribution Assistance: Payment records and timestamps could support ongoing investigations into specific cybercriminal campaigns.
Understanding the Threat Landscape: The 19,000 user figure provides a datapoint about the scale of demand for criminal AI tools.
Organizations investigating business email compromise attacks or AI-generated phishing campaigns may find useful intelligence once researchers analyze the leaked data.
The Bigger Picture
The WormGPT breach underscores a fundamental truth about the cybercrime ecosystem: participants cannot trust each other. Criminal platforms face no legal accountability, operate with minimal transparency, and their users have no recourse when things go wrong.
For defenders, this represents an opportunity. Criminal infrastructure compromises provide intelligence that legitimate law enforcement and security research can leverage. Every breach of a criminal platform potentially exposes operations, identifies participants, and disrupts ongoing campaigns.
For those tempted to use criminal AI services, this breach is a reminder: if you're trusting cybercriminals with your data, don't expect them to protect it. The platform designed to help you attack others just got attacked itself.
The hunters became the hunted. And somewhere, legitimate security researchers are already downloading that database.
Related Articles
Moltbook Breach Exposes 1.5 Million AI Agent API Keys
Wiz researchers found Moltbook's Supabase database exposed without authentication, leaking 1.5M API tokens, private messages, and plaintext OpenAI keys.
Feb 17, 2026BreachForums Database Leaked, Exposing 324K Users
A backup misconfiguration led to the exposure of nearly 324,000 user records from the notorious hacking forum, including usernames, hashed passwords, and IP addresses.
Jan 19, 2026PayPal Breach Exposed SSNs for Six Months Before Detection
A coding error in PayPal Working Capital exposed customer SSNs and business data since July 2025. Unauthorized transactions detected on some affected accounts.
Feb 24, 2026ShinyHunters Demands $1.5M From Wynn Resorts Over Stolen Data
ShinyHunters claims 800,000+ Wynn Resorts employee records including SSNs, salaries, and personal details. Group demands 22 Bitcoin by February 23, exploited Oracle PeopleSoft.
Feb 23, 2026