Category: Global Cybercrime Marketplace Takedown
Features: Cross-border arrest, multi-million-dollar data breach damages, cryptocurrency tracing, marketplace dismantling
Delivery Method: Forum-based data trading via BreachForums; credential abuse and darknet syndicate operations
Threat Actor: “IntelBroker” a.k.a. Kai West — affiliated with BreachForums syndicate including “ShinyHunters,” “Hollow,” “Noct,” “Depressed”
They called him IntelBroker. Behind the screen, a 25-year-old British national named Kai West allegedly ran one of the most prolific data-trafficking personas on the darknet, responsible for a string of cyber intrusions that compromised healthcare systems, telecoms, state agencies, and global enterprises. Today, that alias stands indicted.
According to a newly unsealed U.S. Department of Justice filing, West was formally charged with hacking over 40 organizations across multiple sectors — including telecom, healthcare, and internet infrastructure — and causing more than $25 million in damages. West was arrested in France in February 2025, and is now awaiting extradition to the United States, where he faces up to 20 years in prison. But this isn’t just another breach case — it’s the exposure of a cybercriminal nucleus.
THE BREACHFORUMS CARTEL
West is believed to have operated under the handle “IntelBroker,” one of the core administrators and data brokers on BreachForums, a notorious marketplace for buying and selling stolen data, tools, and access credentials. Once operated by Conor Fitzpatrick, the forum became a black-market staple — until the FBI seized it in 2023.
However, like a virus mutating to survive, BreachForums resurfaced in 2024 under new management, allegedly helmed by a group of avatars: ShinyHunters, Hollow, Noct, Depressed, and West himself, who acted as a moderator, seller, and platform administrator.
According to U.S. prosecutors, West didn’t just peddle raw dumps — he weaponized data as a commodity, offering detailed packages of stolen personal information, including:
- Social Security numbers
- Health insurance details
- Internal corporate communications
- Government login credentials
- Marketing and strategy materials from Fortune 500 companies
THE DIGITAL FINGERPRINT THAT GAVE HIM AWAY
While the operation was global, West’s undoing was hyper-local.
Investigators traced a cryptocurrency transaction from a controlled FBI data purchase directly to a Coinbase account registered to West. That opened the floodgates.
A forensic search of his Gmail account turned up personal, financial, and operational records — and matching IP address logs tied to both his real-life logins and his “IntelBroker” forum activity. The digital fingerprints aligned, and the paper trail was airtight.
This kind of deanonymization is becoming a hallmark of modern cybercrime prosecution — and a stark reminder that blockchain doesn’t guarantee invisibility.
BIG TARGETS. BIGGER CONSEQUENCES.
According to the DOJ, West’s alleged breaches affected:
- A U.S.-based telecommunications provider
- A major healthcare plan administrator — including data for thousands of patients tied to the U.S. House of Representatives
- A European law enforcement platform used by Europol
- U.S. state-level agencies, several of which were hit with backdoor exploits
- A global internet service provider used by commercial and defense clients
This wasn’t low-level spray-and-pray hacking. These were targeted, high-stakes infiltrations, often involving lateral movement across systems, strategic exfiltration, and marketplace monetization.
IntelBroker, it seems, wasn’t just selling information — he was selling entry points into systems of power.
TRJ VERDICT: THE MARKET’S NOT DEAD — JUST DUG IN
Even after BreachForums was shuttered (again) in May 2024, attempts to resurrect its infrastructure have continued. French authorities recently arrested multiple individuals tied to the platform’s revival — among them, forum figures operating under names like Hollow, ShinyHunters, and Noct. All are believed to have operated under shared architecture, replicating forums and injecting fresh malware distribution vectors across Telegram, TOR, and P2P platforms.
This confirms what many in the cybersecurity intelligence world already suspected: the fall of BreachForums was a disruption, not a destruction. The marketplace persists. Only the architecture changes.
And for actors like IntelBroker, even as indictments stack up, copycat brokers and replacement admins are already testing the perimeter. For every one captured, another is promoted.
That’s the truth of cybercrime in 2025: You don’t kill the syndicate.
You inconvenience the infrastructure — temporarily.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


Fascinating, thank you. Kai not a traditionally British name, well dodgy 🤨
Appreciate that — and good catch.
You’re right: Kai isn’t your stereotypical British alias, and in this case, that might’ve been intentional. Whether it was a name chosen to blend in, stand out, or mislead, it fits the pattern: deception wasn’t just a tactic — it was the brand.
IntelBroker didn’t operate like a common script kiddie. He built a persona that walked the line between global digital native and market vendor — just familiar enough to trust, just anonymous enough to vanish.
And as we’re learning… the name is never just a name.
It’s a layer in the mask.
Fascinating, thanks for your insight. I had a job for 6months with a fraud department, very insightful & the knowledge has stayed with me. Best wishes on trailing & capturing more crooks. There sure is a hell of a load of them!
That’s solid — and six months in a fraud department is more than enough to see how deep the rabbit hole really goes. The tactics might evolve, but the underlying patterns? Timeless.
Glad to have someone in the comments who’s walked that side of the system — it sharpens the signal.
We’re not just reporting cases — we’re tracing the undercurrents behind them. And yeah… there’s no shortage of digital predators out there.
Appreciate your insight — and your time.
Hope you have a great day. 😎