My Games
Account 🔐
Sign Up
Login
Global Leaderboard
Case Vault
Badge Backpack
Blue Team Glossary
Login and start playing
Leaving so soon?
×
You really want to log out? We were having so much fun!
Home
›
Glossary
›
hack-and-leak
Hack-And-Leak
Definition
A **hack-and-leak** operation is when attackers first **steal sensitive data** from a target (the “hack” part) and then **publicly release it** (the “leak” part), often to cause embarrassment, damage reputations, or influence public opinion. Unlike ransomware — where stolen data is used as leverage for payment — hack-and-leak campaigns are usually about **information warfare** or strategic disruption, not direct financial extortion. The release is often timed to maximize political, social, or competitive impact. Typical steps in a hack-and-leak: 1. **Initial compromise** – Gain access via phishing, exploiting vulnerabilities, or credential theft. 2. **Data collection** – Exfiltrate emails, documents, or internal communications. 3. **Curating the leak** – Select or manipulate files to push a specific narrative. 4. **Public release** – Post on a leak site, file-sharing service, dark web forum, or through media outlets. 5. **Amplification** – Spread the leaked materials via social media, fake personas, or sympathetic influencers. Why it matters in investigations: * The **hack** part may leave traditional cyber indicators (suspicious logins, malware, exfiltration patterns). * The **leak** part blends into **influence operations** — requiring OSINT and media monitoring to track spread and context. * Adversaries may **alter or fabricate** some files, making forensics essential to verify authenticity. Real-world examples: * **DNC Email Leak (2016)** – Emails stolen from the Democratic National Committee were released via WikiLeaks during the U.S. election, linked to Russian threat actors. * **Macron Campaign Hack (2017)** – French presidential campaign emails leaked online shortly before the election. * **Hacking Team Breach (2015)** – Surveillance software vendor’s internal emails and source code leaked, revealing controversial government clients. Further reading: * MITRE ATT\&CK – Exfiltration & Impact Tactics: [https://attack.mitre.org/tactics/TA0010/](https://attack.mitre.org/tactics/TA0010/) * Atlantic Council – Anatomy of a Hack-and-Leak: [https://www.atlanticcouncil.org/in-depth-research-reports/report/hack-and-leak-operations/](https://www.atlanticcouncil.org/in-depth-research-reports/report/hack-and-leak-operations/) * Recorded Future – Tracking Hack-and-Leak Campaigns: [https://www.recordedfuture.com/hack-and-leak](https://www.recordedfuture.com/hack-and-leak)
Explore More Terms
Lateral_movement
Command-And-Control
Pyramid Of Pain
Ransom-Note
Count