SnowTeam Launches Leak Bazaar, a Corporate Data Exchange With ML-Powered Dump Analysis, DBMS Reverse Engineering, and Ransomware Negotiation Support
SnowTeam launches Leak Bazaar, a dark web marketplace for stolen corporate data with ML analysis and ransomware
Summary
SnowTeam (BlackSnow) has unveiled Leak Bazaar, a closed dark web platform designed to monetize stolen corporate data from failed ransomware negotiations. The platform features automated ML-powered filtering, DBMS reverse engineering to extract financial and payroll records, and tools to strengthen extortion leverage by identifying OFAC violations and accounting irregularities. The service targets companies with $10M+ revenue in high-value sectors (tech, pharma, finance, biotech) and takes a 30% commission on sales while offering exclusive or shared purchase models.
Full text
Dark Web Informer - Cyber Threat Intelligence SnowTeam Launches Leak Bazaar, a Corporate Data Exchange With ML-Powered Dump Analysis, DBMS Reverse Engineering, and Ransomware Negotiation Support March 27, 2026 - 11:55:52 AM UTC N/A Cybercrime Infrastructure Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more. View API Unlock Exclusive Cyber Threat Intelligence Powered by DarkWebInformer.com Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously. Subscribe Now Quick Facts Date & Time 2026-03-27 11:55:52 UTC Threat Actor BlackSnow (SnowTeam) Service Name Leak Bazaar Category Cybercrime Platform / Data Exchange Severity High Revenue Split 70% Seller / 30% Platform Target Revenue $10M+ Companies Min Data Volume 100 GB (Preferred 1 TB+) Escrow Exploit Guarantor Network Open Web Incident Overview A threat group called SnowTeam, posted by the actor BlackSnow, has announced the launch of Leak Bazaar, a closed corporate data exchange platform built to solve what they describe as the "refusenik" problem in ransomware: when a target's corporate network is compromised and terabytes of data are exfiltrated, but the victim refuses to pay the ransom, leaving the operator with data that's difficult to monetize through traditional data leak sites. Leak Bazaar positions itself as infrastructure that converts raw stolen data into structured, buyer-ready intelligence products. The platform's processing pipeline works in four stages: Automation and ML Filtering: The server cluster hardware-filters system junk (OS backups, DLLs, ISO files) and performs deep NLP analysis of text arrays. A professional mathematician is responsible for the filtering algorithms' mathematical model. DBMS Reverse Engineering: Server-side parsers automatically analyze raw database dumps from SQL, SAP, and Oracle exports, extracting financial transactions, payroll records, and contractor data into clean Excel/CSV exports. This feature is currently in beta. Cataloging: Processed material is automatically categorized into high-margin segments: quarterly financial reports (QFR), M&A data, R&D (source code and development), and personal data. Manual Validation: In-house analysts perform final manual review of all extracted data before it reaches the storefront, ensuring quality control. The platform also markets itself as a ransomware negotiation pressure tool, claiming that processed analytical reports can uncover "skeletons in the closet" such as evidence of working with OFAC/SDN sanctioned individuals, shadow accounting, and unissued financial reports, which can strengthen extortion leverage during negotiations. For buyers, the platform offers a differentiated purchasing model where you can buy only the specific data segment you need (R&D, financials, etc.) rather than an entire raw dump. Two purchase options are available: exclusive (full price, data removed after sale, seller gets 70%) or shared (half price, data remains available for resale, seller continues earning 70% on each subsequent sale). The platform accepts data from RaaS operators, initial access brokers, and independent pentesters, with unlimited seats for collaboration. Data submission requirements are strict: must be exclusive (unpublished), primarily English language, minimum 100GB volume (preferably 1TB+), from companies with revenue of $10M or above, and prioritizing technical development, biotechnology, chemistry, pharmaceuticals, law, insurance, and finance sectors. Target Industries & Data Types Technical Development / R&D Biotechnology Chemistry & Pharmaceuticals Law Firms Insurance Companies Financial Institutions Quarterly Financial Reports M&A Data Source Code & Documentation Payroll & HR Records Personal Data OFAC/SDN Sanctions Evidence Image Preview Claim URL Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers. Subscribe Subscriber Access View the original listing URL and unredacted claim images on the feeds below. Threat Feed Ransomware Feed MITRE ATT&CK Mapping T1486 Data Encrypted for Impact The platform is designed to monetize data from failed ransomware negotiations where victims refuse to pay, creating a secondary market for encrypted and exfiltrated corporate data. T1567 Exfiltration Over Web Service Provides infrastructure for receiving, processing, and reselling exfiltrated corporate data through a structured marketplace with automated analysis and cataloging. T1213 Data from Information Repositories Automated DBMS reverse engineering parsers extract structured data from raw SQL, SAP, and Oracle database dumps, converting them into clean financial, payroll, and contractor records. T1560 Archive Collected Data Processes and catalogs raw data dumps (100GB to multi-TB) into segmented, buyer-ready categories including QFR, M&A, R&D, and personal data for targeted resale. T1657 Financial Theft Facilitates monetization of stolen corporate data through structured sales, with the platform taking a 30% commission and offering consulting to strengthen extortion negotiation leverage. T1588.006 Obtain Capabilities: Vulnerabilities Actively recruits RaaS operators, initial access brokers, and independent pentesters as data suppliers, building a supply chain for corporate breach data at scale. Dark Web Informer © 2026 | Cyber Threat IntelligenceDarkWebInformer.com
Indicators of Compromise
- malware — Leak Bazaar
- malware — SnowTeam
- malware — BlackSnow