├── themes └── breaches-net │ ├── assets │ └── scss │ │ ├── _mixins.scss │ │ ├── _404.scss │ │ └── main.scss │ ├── images │ ├── tn.png │ ├── BDLogo.png │ └── screenshot.png │ ├── static │ └── fonts │ │ ├── Inter-Bold.woff │ │ ├── Inter-Bold.woff2 │ │ ├── Inter-Italic.woff │ │ ├── Inter-Italic.woff2 │ │ ├── Inter-Medium.woff │ │ ├── Inter-Medium.woff2 │ │ ├── Inter-Regular.woff │ │ ├── Inter-Regular.woff2 │ │ ├── Inter-BoldItalic.woff │ │ ├── Inter-BoldItalic.woff2 │ │ ├── Inter-MediumItalic.woff │ │ └── Inter-MediumItalic.woff2 │ ├── archetypes │ ├── default.md │ └── posts.md │ ├── data │ └── langFlags.yaml │ ├── layouts │ ├── shortcodes │ │ └── image.html │ ├── _default │ │ └── baseof.html │ └── partials │ │ ├── categories.html │ │ └── tags.html │ └── docs │ ├── favicons.md │ └── config.md ├── content ├── faq.md ├── contact.md ├── privacy.md ├── static │ ├── img │ │ └── BDLogo.png │ ├── fonts │ │ ├── ionicons28b5.eot │ │ ├── ionicons28b5.ttf │ │ ├── ionicons28b5.woff │ │ ├── fontawesome-webfont3e6e.eot │ │ ├── fontawesome-webfont3e6e.ttf │ │ ├── fontawesome-webfontd41d.eot │ │ ├── fontawesome-webfont3e6e.woff │ │ └── fontawesome-webfont3e6e.woff2 │ └── js │ │ └── getsources.min04cc.js └── breaches │ ├── acehcf-us.md │ ├── zumiez-com.md │ ├── blockbuster-com.md │ ├── 27region-ru.md │ ├── 3roms-com.md │ ├── akimbo-ca.md │ ├── 3bkri-com.md │ ├── houdao-com.md │ ├── 8minutedating-com.md │ ├── abcdomain-am.md │ ├── 138gsm-ru.md │ ├── 51cto-com.md │ ├── aia-gr.md │ ├── 24webhost-com.md │ ├── 40kforums-com.md │ ├── 4uck-org.md │ ├── egpet-net.md │ ├── eyeofdubai-ae.md │ ├── muzhiwan-com.md │ ├── mypoints-com.md │ ├── 3dsiso-com.md │ ├── 766-com.md │ ├── 7orbetter-com.md │ ├── alora-io.md │ ├── scam-com.md │ ├── 163-com.md │ ├── 3dsuperb-com.md │ ├── 4cheat-ru.md │ ├── 9teens-org.md │ ├── abibids-com.md │ ├── albshara-net.md │ ├── alizzaa-net.md │ ├── over-blog-com.md │ ├── 178-com.md │ ├── 360icons-com.md │ ├── aheyo-com.md │ ├── alkheeer-com.md │ ├── allpoker-ro.md │ ├── epochmod-com.md │ ├── ewhore-pro.md │ ├── kolyan-net.md │ ├── rule34hentai-net.md │ ├── 212300-com.md │ ├── aerocenter-ir.md │ ├── aimjunkies-com.md │ ├── 1337-crew-to.md │ ├── abidoc-com.md │ ├── admincurve-net.md │ ├── adoking-fr.md │ ├── aeroquad-com.md │ ├── ageofwushu-com.md │ ├── alfanord-pt.md │ ├── taklope-com.md │ ├── 212-booter-net.md │ ├── adfoc-us.md │ ├── admins-co.md │ ├── aerocare-com-au.md │ ├── aims-fao-org.md │ ├── dragonnest-com-1.md │ ├── thelastdoor-com.md │ ├── adbit-biz.md │ ├── fhostingesps6bly-onion.md │ ├── 4metin-org.md │ ├── adecco-com.md │ ├── adkgamers-com.md │ ├── airsoft-cfs-ru.md │ ├── alienboot-net.md │ ├── alliancedating-com.md │ ├── smolderforge-com.md │ ├── actionnetwork-com.md │ ├── addictedcheats-net.md │ ├── linustechtips-com.md │ ├── minecrafthosting-pro.md │ ├── xiledgaming-com.md │ ├── 1394store-com.md │ ├── 99fame-com.md │ ├── afabula-com-br.md │ ├── ains-rs.md │ ├── sonyuserforum-de.md │ ├── 5headgaming-com.md │ ├── 8minecraft-ru.md │ ├── accessily-com.md │ ├── accountsupplier-com.md │ ├── alexis-com-my.md │ ├── aiapiercing-com.md │ ├── buy-xbox-live-com.md │ ├── 143vpn-com.md │ ├── afd-gov-bd.md │ ├── aimware-net.md │ ├── keywordrevealer-com.md │ ├── adult-fanfiction-org.md │ ├── allwomenstalk-com.md │ ├── acparadise-com.md │ ├── ajax-netwerk-to.md │ ├── darkspace-net.md │ ├── primegaming-com.md │ ├── abaforlawstudents-com.md │ ├── jumpcraft-org.md │ ├── akargo-com.md │ ├── agpestores-com.md │ ├── affordablemantel-com.md │ ├── renren-com.md │ ├── aasaanjobs-com.md │ ├── airtel-com.md │ ├── 55-la.md │ ├── abandonia-com.md │ ├── 8ch-net.md │ ├── accountrs-com.md │ ├── abraham-hicks-com.md │ ├── adobe-com.md │ ├── albumwash-com.md │ ├── ajarn-com.md │ ├── seedpeer-eu.md │ ├── abcaustralasia-org-au.md │ ├── twitter-com.md │ ├── 17-media.md │ ├── aantv-com.md │ ├── albiononline-com.md │ ├── aloamembers-org.md │ ├── yahoo-com.md │ ├── d3scene-com.md │ ├── youku-com.md │ ├── 2007runescapegold-com.md │ ├── akorn-com.md │ ├── sumotorrent-sx.md │ ├── aadalsiden-info.md │ ├── filmai-in.md │ ├── ilikecheats-net.md │ ├── uuu9-com.md │ ├── devil-torrents-pl.md │ ├── dodonew-com.md │ ├── nihonomaru-net.md │ ├── androidlista-com.md │ ├── 500px-com.md │ ├── abusewith-us.md │ ├── avast-com.md │ ├── jm-ca.md │ ├── mpgh-net.md │ ├── onverse-com.md │ ├── sanriotown-com.md │ ├── ala-org.md │ ├── mac-torrents-com.md │ ├── bvc-com.md │ ├── hbxdev-com.md │ ├── shoeout-ru.md │ ├── svenskamagic-com.md │ ├── zhenai-com.md │ ├── ziprar-com.md │ ├── aipai-com.md │ ├── bazylia-pl.md │ ├── bhtoner-com.md │ ├── emuparadise-me.md │ ├── givoni-com-au.md │ ├── hibboux-com.md │ ├── idealmed-com.md │ ├── ovh-com.md │ ├── paklap-pk.md │ ├── taobao-com.md │ ├── ussextoy-com.md │ ├── watchxl-eu.md │ ├── wiiuiso-com.md │ ├── xkcd-com.md │ ├── 2dlayer-com.md │ ├── aircenter-ch.md │ ├── astroavl-com.md │ ├── chromres-com.md │ ├── demonforums-net.md │ ├── hantermann-eu.md │ ├── interpals-net.md │ ├── klimazona-pl.md │ ├── laenestol-dk.md │ ├── madamlili-com.md │ ├── magnifier-com.md │ ├── med-lab-co-uk.md │ ├── peatix-com.md │ ├── retroplus-ma.md │ ├── sunovisio-com.md │ ├── thecellar-cn.md │ ├── thefappening-so.md │ ├── tyr-shop-co-uk.md │ ├── vantharp-com.md │ ├── zoomaailm-ee.md │ ├── accountgear-com.md │ ├── autocentrum-pl.md │ ├── belvitta-com-br.md │ ├── cardmafia-cc.md │ ├── cbytools-co-uk.md │ ├── dressnocode-nl.md │ ├── duowan-com.md │ ├── epicnpc-com.md │ ├── getwells-net-br.md │ ├── godirectinc-com.md │ ├── hiapk-com.md │ ├── ipackaging-com.md │ ├── macknmall-com.md │ ├── maxblack-com-au.md │ ├── sportphoto-shop.md │ ├── stack-sport-ru.md │ ├── 7k7k-com.md │ ├── alsaifhome-com.md │ ├── arrowandbeast-com.md │ ├── coloredjugs-com.md │ ├── dailyquiz-me.md │ ├── eoryginalne-pl.md │ ├── expertoffice-it.md │ ├── funimation-com.md │ ├── gfan-com.md │ ├── holmeslumber-com.md │ ├── hr-cedeterija-com.md │ ├── kaffetilbud-dk.md │ ├── lecoqcuisine-com.md │ ├── minecraftworldmap-com.md │ ├── sweeperparts-net.md │ ├── thewarinc-com.md │ ├── totalpoles-co-uk.md │ ├── xtreme-toys-co-uk.md │ ├── yuyubottle-com.md │ ├── 17173-com.md │ ├── 7seasproshopthai-com.md │ ├── artcomvidros-com-br.md │ ├── bannerbit-com.md │ ├── crackingforum-com.md │ ├── danclarkaudio-com.md │ ├── daylightshops-se.md │ ├── flavourista-com-au.md │ ├── gen-ebooks-com.md │ ├── healthy-house-co-uk.md │ ├── hellohandbag-co-uk.md │ ├── idcgames-com.md │ ├── isub-supplies-co-uk.md │ ├── kartenbauer-an-ch.md │ ├── mumsandbabes-com.md │ ├── mylife-direct-ch.md │ ├── tgbus-com.md │ ├── avvo-com.md │ ├── bucatoprofumato-com.md │ ├── cafemom-com.md │ ├── majorgeeks-com.md │ ├── nutranextstage-com.md │ ├── opposite-fashion-com.md │ ├── pspiso-com.md │ ├── thecaratshop-co-uk.md │ ├── wallysnatural-com.md │ ├── gamigo-com.md │ ├── luft-entfeuchter-ch.md │ ├── onlinefrancestore-com.md │ ├── strongholdsafety-com.md │ ├── 2fast4u-be.md │ ├── agusiq-torrents-pl.md │ ├── anatechelectronics-com.md │ ├── blueovaltruckparts-com.md │ ├── broadwayproscooters-com.md │ ├── hfmultiferramentas-com-br.md │ ├── lanwar-com.md │ ├── modaco-com.md │ ├── play-gar-com.md │ ├── realealfaiataria-com-br.md │ ├── tianya-cn.md │ ├── vendoguardachuva-com-br.md │ ├── vipracingshopping-com-br.md │ ├── xbox360iso-com.md │ ├── xsplit-com.md │ ├── acne-org.md │ ├── animegame-me.md │ ├── botoflegends-com.md │ ├── co188-com.md │ ├── kickstarter-com.md │ ├── topstreetperformance-com.md │ ├── uiggy-com.md │ ├── xpgamesaves-com.md │ ├── bolt-cd.md │ ├── ffshrine-org.md │ ├── powerbot-org.md │ ├── sktorrent-eu.md │ ├── slitexbedrijfskleding-nl.md │ ├── thetvdb-com.md │ ├── bombuj-eu.md │ ├── brazzers-com.md │ ├── dangdang-com.md │ ├── eham-ru.md │ ├── hltv-org.md │ ├── mcbans-com.md │ ├── myqsx-net.md │ ├── petflow-com.md │ ├── protectivemasksdirect-co-uk.md │ ├── superiorwholesaleblinds-com.md │ ├── thelakedistrictwalker-co-uk.md │ ├── warmane-com.md │ ├── apacheindustrialworkwear-co-uk.md │ ├── bakerro-com.md │ ├── cheapassgamer-com.md │ ├── hongfire-com.md │ ├── mangafox-me.md │ ├── mctina-org.md │ ├── otbva-com.md │ ├── poker-org.md │ ├── reboot-hr.md │ ├── snail-com.md │ ├── 3djobs-com.md │ ├── aviafora-com.md │ ├── clan30-com.md │ ├── debanked-com.md │ ├── dynamite-com.md │ ├── efupw-com.md │ └── fakeornot-fr.md └── .gitignore /themes/breaches-net/assets/scss/_mixins.scss: -------------------------------------------------------------------------------- 1 | @mixin dimmed { 2 | opacity: .6; 3 | } 4 | -------------------------------------------------------------------------------- /content/faq.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "FAQ" 3 | page = "faq" 4 | [ author ] 5 | name = "Hugo Authors" 6 | +++ -------------------------------------------------------------------------------- /content/contact.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Contact Us" 3 | page = "contact" 4 | [ author ] 5 | name = "Hugo Authors" 6 | +++ -------------------------------------------------------------------------------- /content/privacy.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Privacy" 3 | page = "privacy" 4 | [ author ] 5 | name = "Hugo Authors" 6 | +++ -------------------------------------------------------------------------------- /content/static/img/BDLogo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/img/BDLogo.png -------------------------------------------------------------------------------- /themes/breaches-net/images/tn.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/images/tn.png -------------------------------------------------------------------------------- /content/static/fonts/ionicons28b5.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/ionicons28b5.eot -------------------------------------------------------------------------------- /content/static/fonts/ionicons28b5.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/ionicons28b5.ttf -------------------------------------------------------------------------------- /content/static/fonts/ionicons28b5.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/ionicons28b5.woff -------------------------------------------------------------------------------- /themes/breaches-net/images/BDLogo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/images/BDLogo.png -------------------------------------------------------------------------------- /content/static/js/getsources.min04cc.js: -------------------------------------------------------------------------------- 1 | $.get("./sources.php",(function(e){$("#source-container").html(e),$("#sources").DataTable({})})); -------------------------------------------------------------------------------- /themes/breaches-net/images/screenshot.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/images/screenshot.png -------------------------------------------------------------------------------- /content/static/fonts/fontawesome-webfont3e6e.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/fontawesome-webfont3e6e.eot -------------------------------------------------------------------------------- /content/static/fonts/fontawesome-webfont3e6e.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/fontawesome-webfont3e6e.ttf -------------------------------------------------------------------------------- /content/static/fonts/fontawesome-webfontd41d.eot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/fontawesome-webfontd41d.eot -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Bold.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Bold.woff -------------------------------------------------------------------------------- /content/static/fonts/fontawesome-webfont3e6e.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/fontawesome-webfont3e6e.woff -------------------------------------------------------------------------------- /content/static/fonts/fontawesome-webfont3e6e.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/content/static/fonts/fontawesome-webfont3e6e.woff2 -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Bold.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Bold.woff2 -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Italic.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Italic.woff -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Italic.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Italic.woff2 -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Medium.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Medium.woff -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Medium.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Medium.woff2 -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Regular.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Regular.woff -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-Regular.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-Regular.woff2 -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-BoldItalic.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-BoldItalic.woff -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-BoldItalic.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-BoldItalic.woff2 -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-MediumItalic.woff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-MediumItalic.woff -------------------------------------------------------------------------------- /themes/breaches-net/static/fonts/Inter-MediumItalic.woff2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/breaches-net/website/HEAD/themes/breaches-net/static/fonts/Inter-MediumItalic.woff2 -------------------------------------------------------------------------------- /themes/breaches-net/archetypes/default.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: "{{ replace .Name "-" " " | title }}" 3 | date: {{ .Date }} 4 | draft: true 5 | comments: false 6 | images: 7 | --- 8 | 9 | -------------------------------------------------------------------------------- /themes/breaches-net/archetypes/posts.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: "{{ replace .Name "-" " " | title }}" 3 | date: {{ .Date }} 4 | draft: true 5 | toc: false 6 | images: 7 | tags: 8 | - untagged 9 | --- 10 | 11 | -------------------------------------------------------------------------------- /themes/breaches-net/assets/scss/_404.scss: -------------------------------------------------------------------------------- 1 | .btn-404 svg { 2 | vertical-align: middle; 3 | display: inline-block; 4 | margin-right: 5px; 5 | } 6 | 7 | .btn-404 a { 8 | margin: 0 10px; 9 | } 10 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | # https://github.com/github/gitignore/blob/main/community/Golang/Hugo.gitignore 2 | /public/ 3 | /resources/_gen/ 4 | /assets/jsconfig.json 5 | hugo_stats.json 6 | 7 | # Temporary lock file while building 8 | /.hugo_build.lock -------------------------------------------------------------------------------- /themes/breaches-net/data/langFlags.yaml: -------------------------------------------------------------------------------- 1 | de: de 2 | en: gb 3 | es: es 4 | fr: fr 5 | gl: es-ga 6 | hi: in 7 | it: it 8 | ja: jp 9 | ml: in 10 | nl: nl 11 | pt-br: br 12 | ru: ru 13 | tr: tr 14 | uk: uk 15 | zh-cn: cn 16 | zh-hk: hk 17 | zh-tw: tw 18 | ro: ro 19 | -------------------------------------------------------------------------------- /themes/breaches-net/layouts/shortcodes/image.html: -------------------------------------------------------------------------------- 1 | {{ if .Get "src" }} 2 | {{ . | plainify }} 3 | {{ end }} 4 | -------------------------------------------------------------------------------- /content/breaches/acehcf-us.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AceHCF" 3 | domain = "acehcf.us" 4 | date_breached = "2017-08-15" 5 | date = "2022-05-04" 6 | record_count = "195" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/zumiez-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Zumiez" 3 | domain = "https://zumiez.com" 4 | date_breached = "2017-01-01" 5 | date = "2022-05-04" 6 | record_count = "160,442,823" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/blockbuster-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Blockbuster" 3 | domain = "https://blockbuster.com" 4 | date_breached = "2006-12-01" 5 | date = "2022-05-04" 6 | record_count = "8,754,401" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/27region-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "27region" 3 | domain = "https://27r.ru" 4 | date_breached = "2020-08-13" 5 | date = "2022-05-04" 6 | record_count = "42,170" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["News"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/3roms-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "3Roms" 3 | domain = "https://3roms.com" 4 | date_breached = "2017-03-24" 5 | date = "2022-05-04" 6 | record_count = "30,011" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/akimbo-ca.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Akimbo" 3 | domain = "https://akimbo.ca" 4 | date_breached = "2016-10-11" 5 | date = "2022-05-04" 6 | record_count = "9,692" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["DEScrypt"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Art"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/3bkri-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "3bkri" 3 | domain = "https://3bkri.com/" 4 | date_breached = "2021-04-30" 5 | date = "2022-05-04" 6 | record_count = "9,581" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Education"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/houdao-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Houdao" 3 | domain = "https://houdao.com" 4 | date_breached = "2011-04-01" 5 | date = "2022-05-04" 6 | record_count = "28,627,846" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/8minutedating-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "8MinuteDating" 3 | domain = "https://8minutedating.com" 4 | date_breached = "2016-12-08" 5 | date = "2022-05-04" 6 | record_count = "237,394" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses"] 11 | categories = ["Dating"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/abcdomain-am.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ABCDomain" 3 | domain = "https://abcdomain.am" 4 | date_breached = "2013-02-01" 5 | date = "2022-05-04" 6 | record_count = "1,844" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/138gsm-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "138gsm" 3 | domain = "https://138gsm.ru" 4 | date_breached = "2019-02-18" 5 | date = "2022-05-04" 6 | record_count = "35,281" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/51cto-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "51cto" 3 | domain = "https://51cto.com" 4 | date_breached = "2013-12-01" 5 | date = "2022-05-04" 6 | record_count = "2,154,744" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/aia-gr.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Athens International Airport" 3 | domain = "https://aia.gr" 4 | date_breached = "2021-04-07" 5 | date = "2022-05-04" 6 | record_count = "187" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/24webhost-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "24webhost" 3 | domain = "https://24webhost.com" 4 | date_breached = "2018-01-25" 5 | date = "2022-05-04" 6 | record_count = "994" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Hosting"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/40kforums-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "40kforums" 3 | domain = "https://40kforums.com" 4 | date_breached = "2017-02-05" 5 | date = "2022-05-04" 6 | record_count = "39,273" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/4uck-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "4uck" 3 | domain = "http://4uck.org" 4 | date_breached = "2017-01-02" 5 | date = "2022-05-04" 6 | record_count = "10,182" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/egpet-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "EGPet" 3 | domain = "https://egpet.net" 4 | date_breached = "2017-09-01" 5 | date = "2022-05-05" 6 | record_count = "326,644" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/eyeofdubai-ae.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "eyeofdubai.ae" 3 | domain = "https://eyeofdubai.ae" 4 | date_breached = "2014-08-07" 5 | date = "2022-05-04" 6 | record_count = "1,626" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/muzhiwan-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Muzhiwan" 3 | domain = "https://muzhiwan.com" 4 | date_breached = "2016-10-01" 5 | date = "2022-05-04" 6 | record_count = "4,920,389" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/mypoints-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MyPoints.com" 3 | domain = "https://mypoints.com" 4 | date_breached = "2006-05-01" 5 | date = "2022-05-04" 6 | record_count = "4,393,565" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Physical addresses", "Names"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/3dsiso-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "3DSISO" 3 | domain = "https://3dsiso.com" 4 | date_breached = "2015-09-11" 5 | date = "2022-05-04" 6 | record_count = "128,062" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/766-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "766" 3 | domain = "https://766.com" 4 | date_breached = "2009-07-01" 5 | date = "2022-05-04" 6 | record_count = "9,035,417" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["MD5", "plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/7orbetter-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "7OrBetter" 3 | domain = "https://7orbetter.com" 4 | date_breached = "2015-02-23" 5 | date = "2022-05-04" 6 | record_count = "57,520" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Dating"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/alora-io.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Alora" 3 | domain = "https://alora.io" 4 | date_breached = "2018-10-02" 5 | date = "2022-05-04" 6 | record_count = "207,537" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/scam-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Scam Forums" 3 | domain = "https://scam.com" 4 | date_breached = "2019-11-01" 5 | date = "2022-05-09" 6 | record_count = "411,803" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/163-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "NetEase (126.com & 163.com)" 3 | domain = "https://163.com" 4 | date_breached = "2015-10-19" 5 | date = "2022-05-04" 6 | record_count = "234,842,089" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/3dsuperb-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "3D Superb" 3 | domain = "https://3dsuperb.com" 4 | date_breached = "2017-04-16" 5 | date = "2022-05-04" 6 | record_count = "102,064" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Design"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/4cheat-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "4cheat.ru" 3 | domain = "https://4cheat.ru" 4 | date_breached = "2018-03-13" 5 | date = "2022-05-04" 6 | record_count = "163,512" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Hacking"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/9teens-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "9teens" 3 | domain = "https://9teens.org" 4 | date_breached = "2016-11-21" 5 | date = "2022-05-04" 6 | record_count = "13,797" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/abibids-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "abiBids" 3 | domain = "https://abibids.com" 4 | date_breached = "2021-04-11" 5 | date = "2022-05-04" 6 | record_count = "12,129" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Shopping", "Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/albshara-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Albshara" 3 | domain = "https://albshara.net" 4 | date_breached = "2020-11-15" 5 | date = "2022-05-04" 6 | record_count = "426" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/alizzaa-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Alizzaa" 3 | domain = "https://alizzaa.net" 4 | date_breached = "2019-11-14" 5 | date = "2022-05-04" 6 | record_count = "113" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/over-blog-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Overblog" 3 | domain = "https://over-blog.com" 4 | date_breached = "2019-04-01" 5 | date = "2022-05-08" 6 | record_count = "1,927,791" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/178-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "178" 3 | domain = "https://178.com" 4 | date_breached = "2011-12-01" 5 | date = "2022-05-04" 6 | record_count = "9,072,884" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Passwords", "Usernames"] 11 | categories = ["Gaming", "Forums"] 12 | acknowledged = "No" 13 | +++ 14 | a Chinese Gaming Forum. 15 | -------------------------------------------------------------------------------- /content/breaches/360icons-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "360icons" 3 | domain = "http://360icons.com" 4 | date_breached = "2013-11-01" 5 | date = "2022-05-04" 6 | record_count = "101,883" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/aheyo-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Aheyo" 3 | domain = "https://aheyo.com" 4 | date_breached = "2017-02-18" 5 | date = "2022-05-04" 6 | record_count = "214" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Unknown"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/alkheeer-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Alkheeer" 3 | domain = "https://alkheeer.com" 4 | date_breached = "2019-11-14" 5 | date = "2022-05-04" 6 | record_count = "7,180" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/allpoker-ro.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AllPoker" 3 | domain = "https://allpoker.ro" 4 | date_breached = "2014-08-19" 5 | date = "2022-05-04" 6 | record_count = "197,739" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names"] 11 | categories = ["Gambling"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/epochmod-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "EpochMod" 3 | domain = "https://epochmod.com" 4 | date_breached = "2015-05-01" 5 | date = "2022-05-05" 6 | record_count = "31,581" 7 | privacy = "Semi-private" 8 | Verified = "True" 9 | hashing = ["IPB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/ewhore-pro.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ewhore.pro" 3 | domain = "https://ewhore.pro" 4 | date_breached = "2012-11-26" 5 | date = "2022-05-04" 6 | record_count = "794" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["IPB", "MyBB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/kolyan-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Kolyan" 3 | domain = "https://kolyan.net" 4 | date_breached = "2021-01-13" 5 | date = "2022-05-09" 6 | record_count = "491,482" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Names"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/rule34hentai-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Rule34Hentai" 3 | domain = "https://rule34hentai.net" 4 | date_breached = "2021-07-10" 5 | date = "2022-05-09" 6 | record_count = "215,620" 7 | privacy = "Semi-private" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Porn"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/212300-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "212300" 3 | domain = "https://212300.com" 4 | date_breached = "2012-11-14" 5 | date = "2022-05-04" 6 | record_count = "700,673" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/aerocenter-ir.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Aerocenter" 3 | domain = "https://aerocenter.ir" 4 | date_breached = "2017-02-10" 5 | date = "2022-05-04" 6 | record_count = "44,428" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/aimjunkies-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AimJunkies" 3 | domain = "https://aimjunkies.com" 4 | date_breached = "2014-04-19" 5 | date = "2022-05-04" 6 | record_count = "166,316" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Usernames", "IP addresses"] 11 | categories = ["Gaming", "Hacking"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/1337-crew-to.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "1337-crew" 3 | domain = "https://1337-crew.to" 4 | date_breached = "2013-06-30" 5 | date = "2022-05-04" 6 | record_count = "18,835" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1", "IPB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Hacking"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/abidoc-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AbiDoc" 3 | domain = "https://abidoc.com" 4 | date_breached = "2016-08-23" 5 | date = "2022-05-04" 6 | record_count = "2,693" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | Breached by "Motaz saqr" in 2016. 15 | -------------------------------------------------------------------------------- /content/breaches/admincurve-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AdminCurve" 3 | domain = "https://admincurve.net" 4 | date_breached = "2013-03-25" 5 | date = "2022-05-04" 6 | record_count = "98" 7 | privacy = "Public" 8 | Verified = "False" 9 | hashing = ["MyBB", "IPB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/adoking-fr.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Adoking.fr" 3 | domain = "https://adoking.fr" 4 | date_breached = "2017-02-18" 5 | date = "2022-05-04" 6 | record_count = "487" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Genders"] 11 | categories = ["Unknown"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/aeroquad-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AeroQuad" 3 | domain = "https://aeroquad.com" 4 | date_breached = "2016-11-20" 5 | date = "2022-05-04" 6 | record_count = "13,694" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming", "Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/ageofwushu-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Age of Wushu" 3 | domain = "https://ageofwushu.com" 4 | date_breached = "2015-03-15" 5 | date = "2022-05-04" 6 | record_count = "180,698" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/alfanord-pt.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Alfanord" 3 | domain = "https://alfanord.pt" 4 | date_breached = "2021-08-07" 5 | date = "2022-05-04" 6 | record_count = "21,649" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["Wordpress"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Dates of birth"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/taklope-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Taklope" 3 | domain = "https://taklope.com" 4 | date_breached = "2022-01-15" 5 | date = "2022-05-09" 6 | record_count = "269,889" 7 | privacy = "Semi-private" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Dates of birth", "Names"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/212-booter-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "212-booter" 3 | domain = "https://212-booter.net" 4 | date_breached = "2013-07-19" 5 | date = "2022-05-04" 6 | record_count = "140" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Hacking", "Booter"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/adfoc-us.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AdFoc" 3 | domain = "https://adfoc.us" 4 | date_breached = "2015-04-01" 5 | date = "2022-05-04" 6 | record_count = "256,370" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Phone numbers", "Physical addresses", "Names"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/admins-co.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Admins.co" 3 | domain = "https://admins.co" 4 | date_breached = "2013-01-12" 5 | date = "2022-05-04" 6 | record_count = "6,352" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MyBB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Dates of birth"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/aerocare-com-au.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Aerocare" 3 | domain = "https://aerocare.com.au" 4 | date_breached = "2021-01-07" 5 | date = "2022-05-04" 6 | record_count = "12,993" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Names", "Phone numbers", "Physical addresses"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/aims-fao-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "FAO AIMS" 3 | domain = "https://aims.fao.org" 4 | date_breached = "2020-03-13" 5 | date = "2022-05-04" 6 | record_count = "10,502" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["Drupal"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses"] 11 | categories = ["Nonprofit"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/dragonnest-com-1.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Dragon Nest" 3 | domain = "https://dragonnest.com" 4 | date_breached = "2013-08-01" 5 | date = "2022-05-08" 6 | record_count = "3,104,019" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/thelastdoor-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "The Last Door" 3 | domain = "https://thelastdoor.com" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-09" 6 | record_count = "158,974" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Names"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /themes/breaches-net/layouts/_default/baseof.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | {{ partial "head.html" . }} 5 | 6 | 7 | {{ block "body" . }} 8 | 9 | {{ end }} 10 | {{ partial "header.html" . }} 11 | 12 | {{ block "main" . }}{{ end }} 13 | 14 | {{ block "footer" . }} 15 | {{ partial "footer.html" . }} 16 | {{ end }} 17 | 18 | 19 | 20 | -------------------------------------------------------------------------------- /content/breaches/adbit-biz.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AdBit.biz Ad Network" 3 | domain = "https://adbit.biz" 4 | date_breached = "2020-04-09" 5 | date = "2022-05-04" 6 | record_count = "285,312" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/fhostingesps6bly-onion.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Freedom Hosting II" 3 | domain = "https://fhostingesps6bly.onion" 4 | date_breached = "2017-01-31" 5 | date = "2022-05-04" 6 | record_count = "380,830" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Hosting"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/4metin-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "4Metin" 3 | domain = "https://4Metin.org" 4 | date_breached = "2016-08-28" 5 | date = "2022-05-04" 6 | record_count = "150,927" 7 | privacy = "Public" 8 | Verified = "False" 9 | hashing = ["phpBB3"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Dates of birth"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/adecco-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Adecco" 3 | domain = "adecco.com" 4 | date_breached = "2021-03-01" 5 | date = "2022-05-04" 6 | record_count = "4,469,407" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Names", "Phone numbers", "Physical addresses", "Genders"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/adkgamers-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ADKGamers" 3 | domain = "https://adkgamers.com" 4 | date_breached = "2016-08-02" 5 | date = "2022-05-04" 6 | record_count = "3,121" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["IPB", "blowfish"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming", "Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/airsoft-cfs-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Russian Strikeball Federation" 3 | domain = "https://airsoft-cfs.ru" 4 | date_breached = "2020-10-01" 5 | date = "2022-05-04" 6 | record_count = "39,149" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/alienboot-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AlienBoot" 3 | domain = "https://alienboot.net" 4 | date_breached = "2018-03-20" 5 | date = "2022-05-04" 6 | record_count = "4,289" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses"] 11 | categories = ["Hacking", "Booter"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/alliancedating-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AllianceDating" 3 | domain = "https://alliancedating.com" 4 | date_breached = "2018-08-24" 5 | date = "2022-05-04" 6 | record_count = "14,860" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Names", "Dates of birth"] 11 | categories = ["Dating"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/smolderforge-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Smolderforge" 3 | domain = "https://smolderforge.com" 4 | date_breached = "2017-08-01" 5 | date = "2022-05-05" 6 | record_count = "9,660" 7 | privacy = "Semi-private" 8 | Verified = "True" 9 | hashing = ["bcrypt", "phpBB3"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/actionnetwork-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ActionNetwork" 3 | domain = "https://actionnetwork.com" 4 | date_breached = "2019-12-31" 5 | date = "2022-05-04" 6 | record_count = "692,310" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "Phone numbers"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/addictedcheats-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AddictedCheats" 3 | domain = "https://addictedcheats.net" 4 | date_breached = "2016-06-03" 5 | date = "2022-05-04" 6 | record_count = "1,052" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Hacking", "Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/linustechtips-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Linus Tech Tips" 3 | domain = "https://linustechtips.com" 4 | date_breached = "2014-11-01" 5 | date = "2022-05-05" 6 | record_count = "149,135" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["vB", "IPB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming", "Forums"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/minecrafthosting-pro.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MinecraftHosting.pro" 3 | domain = "https://minecrafthosting.pro" 4 | date_breached = "2015-11-01" 5 | date = "2022-05-04" 6 | record_count = "54,113" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/xiledgaming-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Xiled Gaming" 3 | domain = "https://xiledgaming.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-09" 6 | record_count = "113,557" 7 | privacy = "Semi-private" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Dates of birth"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /themes/breaches-net/docs/favicons.md: -------------------------------------------------------------------------------- 1 | # Favicons 2 | 3 | Use [RealFaviconGenerator](https://realfavicongenerator.net/) to generate these files, put them into your site's static folder: 4 | 5 | - android-chrome-192x192.png 6 | - android-chrome-512x512.png 7 | - apple-touch-icon.png 8 | - favicon-16x16.png 9 | - favicon-32x32.png 10 | - favicon.ico 11 | - mstile-150x150.png 12 | - safari-pinned-tab.svg 13 | - site.webmanifest -------------------------------------------------------------------------------- /content/breaches/1394store-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "1394store" 3 | domain = "https://1394store.com" 4 | date_breached = "2016-06-01" 5 | date = "2022-05-04" 6 | record_count = "20,410" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | Leaked by "3v3rybeginning" on siph0n in 2016. 15 | -------------------------------------------------------------------------------- /content/breaches/99fame-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "99fame" 3 | domain = "http://99fame.com" 4 | date_breached = "2016-02-01" 5 | date = "2022-05-04" 6 | record_count = "1,103" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | Leaked by "@SonnySpooks" on siph0n in 2016. 15 | -------------------------------------------------------------------------------- /content/breaches/afabula-com-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Fabula" 3 | domain = "https://afabula.com.br" 4 | date_breached = "2021-06-22" 5 | date = "2022-05-04" 6 | record_count = "40,661" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Names", "Phone numbers", "Physical addresses", "Banking information"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/ains-rs.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "АИНС" 3 | domain = "https://ains.rs" 4 | date_breached = "2021-05-05" 5 | date = "2022-05-04" 6 | record_count = "1,828" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "Phone numbers", "Physical addresses", "Job titles"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/sonyuserforum-de.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "SonyUserforum" 3 | domain = "https://sonyuserforum.de" 4 | date_breached = "2021-01-29" 5 | date = "2022-05-09" 6 | record_count = "50,952" 7 | privacy = "Semi-private" 8 | Verified = "True" 9 | hashing = ["MyBB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Dates of birth"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/5headgaming-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "5Head Gaming" 3 | domain = "https://5headgaming.com" 4 | date_breached = "2015-12-11" 5 | date = "2022-05-04" 6 | record_count = "1,136" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MyBB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Dates of birth"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/8minecraft-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "8minecraft" 3 | domain = "https://8minecraft.ru" 4 | date_breached = "2013-11-06" 5 | date = "2022-05-04" 6 | record_count = "50,855" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Dates of birth", "Genders"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/accessily-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Accessily" 3 | domain = "https://accessily.com" 4 | date_breached = "2021-05-13" 5 | date = "2022-05-04" 6 | record_count = "18,954" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Physical addresses"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/accountsupplier-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AccountSupplier" 3 | domain = "https://accountsupplier.com" 4 | date_breached = "2015-07-24" 5 | date = "2022-05-04" 6 | record_count = "1,117" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["Unknown"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Hacking", "Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/alexis-com-my.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Alexis Bistro" 3 | domain = "https://alexis.com.my" 4 | date_breached = "2017-08-20" 5 | date = "2022-05-04" 6 | record_count = "1,810" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Names", "Phone numbers"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | Breached by "4prili666h05T" in 2017. 15 | -------------------------------------------------------------------------------- /content/breaches/aiapiercing-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AIA Piercing" 3 | domain = "https://aiapiercing.com" 4 | date_breached = "2009-02-08" 5 | date = "2022-05-04" 6 | record_count = "87,154" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "Phone numbers", "Physical addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/buy-xbox-live-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Buy-Xbox-Live" 3 | domain = "https://buy-xbox-live.com" 4 | date_breached = "2021-03-27" 5 | date = "2022-05-09" 6 | record_count = "412,270" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["osCommerce"] 10 | breached_data = ["Email addresses", "Passwords", "IP addresses", "Phone numbers", "Names"] 11 | categories = ["Shopping", "Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/143vpn-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "143VPN" 3 | domain = "https://143vpn.com" 4 | date_breached = "2014-03-01" 5 | date = "2022-05-04" 6 | record_count = "586" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5", "IPB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Phone numbers", "Physical addresses"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/afd-gov-bd.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Armed Forces of Bangladesh" 3 | domain = "https://afd.gov.bd" 4 | date_breached = "2016-08-13" 5 | date = "2022-05-04" 6 | record_count = "3,849" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Government"] 12 | acknowledged = "No" 13 | +++ 14 | Breached by "Kerala Cyber Warriors" in 2016. 15 | -------------------------------------------------------------------------------- /content/breaches/aimware-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AimWare" 3 | domain = "https://aimware.net" 4 | date_breached = "2019-04-28" 5 | date = "2022-05-04" 6 | record_count = "247,093" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MyBB", "IPB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Banking information"] 11 | categories = ["Gaming", "Hacking"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/keywordrevealer-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Keyword Revealer" 3 | domain = "https://keywordrevealer.com" 4 | date_breached = "2021-03-23" 5 | date = "2022-05-09" 6 | record_count = "491,482" 7 | privacy = "Semi-private" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | Domain was previously "kwrev.com" -------------------------------------------------------------------------------- /content/breaches/adult-fanfiction-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Adult FanFiction" 3 | domain = "https://adult-fanfiction.org" 4 | date_breached = "2018-05-30" 5 | date = "2022-05-04" 6 | record_count = "200,491" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt", "plaintext", "IPB"] 10 | breached_data = ["Email addresses", "Passwords", "Names", "Dates of birth"] 11 | categories = ["Porn", "Forums"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/allwomenstalk-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AllWomensTalk" 3 | domain = "https://allwomenstalk.com" 4 | date_breached = "2016-01-05" 5 | date = "2022-05-04" 6 | record_count = "200,258" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["Wordpress"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | Breached by "twitter.com/ciadotgov" in 2016. 15 | -------------------------------------------------------------------------------- /content/breaches/acparadise-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ACParadise" 3 | domain = "https://acparadise.com" 4 | date_breached = "2016-07-12" 5 | date = "2022-05-04" 6 | record_count = "55,182" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt", "phpBB3"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | Leaked by SonnySpooks on siph0n in 2016. 15 | -------------------------------------------------------------------------------- /content/breaches/ajax-netwerk-to.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Ajax.netwerk.to" 3 | domain = "https://ajax.netwerk.to" 4 | date_breached = "2017-05-01" 5 | date = "2022-05-04" 6 | record_count = "62,617" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names"] 11 | categories = ["Sports"] 12 | acknowledged = "No" 13 | +++ 14 | Passwords were generated, not set by the user. 15 | -------------------------------------------------------------------------------- /content/breaches/darkspace-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "DarkSpace" 3 | domain = "darkspace.net" 4 | date_breached = "2019-09-11" 5 | date = "2022-05-09" 6 | record_count = "164,543" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://archive.ph/T8aZW#selection-1843.0-1863.1" 14 | +++ -------------------------------------------------------------------------------- /content/breaches/primegaming-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "PrimeGaming" 3 | domain = "https://primegaming.com" 4 | date_breached = "2014-10-01" 5 | date = "2022-05-04" 6 | record_count = "4,393,565" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Phone numbers", "Physical addresses", "Names"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ -------------------------------------------------------------------------------- /content/breaches/abaforlawstudents-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ABA for Law Students" 3 | domain = "https://abaforlawstudents.com" 4 | date_breached = "2018-12-03" 5 | date = "2022-05-04" 6 | record_count = "310" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["Wordpress"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | Breached by "KelvinSecurity" in 2018. 15 | -------------------------------------------------------------------------------- /content/breaches/jumpcraft-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "JumpCraft" 3 | domain = "jumpcraft.org" 4 | date_breached = "2017-10-13" 5 | date = "2022-05-09" 6 | record_count = "688" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Usernames", "IP addresses"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | IP Addresses & Usernames from server log file found in Owners MediaFire account. The log was made on Oct 13th 2017. -------------------------------------------------------------------------------- /content/breaches/akargo-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Akargo" 3 | domain = "https://akargo.com" 4 | date_breached = "2021-01-11" 5 | date = "2022-05-04" 6 | record_count = "10,951" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["osCommerce"] 10 | breached_data = ["Email addresses", "Passwords", "Names", "IP addresses", "Phone numbers", "Physical addresses", "Genders"] 11 | categories = ["Apps"] 12 | acknowledged = "No" 13 | +++ 14 | Breached by DonJuji on 2021-01-11. 15 | -------------------------------------------------------------------------------- /content/breaches/agpestores-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AGP Estores" 3 | domain = "https://agpestores.com" 4 | date_breached = "2015-12-19" 5 | date = "2022-05-04" 6 | record_count = "151,402" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Names", "IP addresses", "Phone numbers", "Physical addresses"] 11 | categories = ["Finance"] 12 | acknowledged = "No" 13 | +++ 14 | Leaked by "Comcastkids" on siph0n in 2015. 15 | -------------------------------------------------------------------------------- /themes/breaches-net/assets/scss/main.scss: -------------------------------------------------------------------------------- 1 | /* Must be loaded before everything else */ 2 | @import "normalize"; 3 | @import "prism"; 4 | /* Main stuff */ 5 | @import "variables"; 6 | @import "mixins"; 7 | @import "fonts"; 8 | @import "buttons"; 9 | /* Modules */ 10 | @import "header"; 11 | @import "logo"; 12 | @import "menu"; 13 | @import "main"; 14 | @import "list"; 15 | @import "single"; 16 | @import "footer"; 17 | @import "sharing-buttons"; 18 | @import "tables"; 19 | @import "404"; 20 | -------------------------------------------------------------------------------- /content/breaches/affordablemantel-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Affordable Mantel" 3 | domain = "https://affordablemantel.com" 4 | date_breached = "2019-09-18" 5 | date = "2022-05-04" 6 | record_count = "15,143" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Phone numbers", "Physical addresses", "Dates of birth"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | -------------------------------------------------------------------------------- /content/breaches/renren-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "RenRen" 3 | domain = "https://renren.com" 4 | date_breached = "2011-12-01" 5 | date = "2022-05-08" 6 | record_count = "4,768,600" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In December 2011 a database breach affecting renren.com leaked 4.7 million user records including email addresses and plaintext passwords. -------------------------------------------------------------------------------- /content/breaches/aasaanjobs-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Aasaanjobs" 3 | domain = "https://aasaanjobs.com" 4 | date_breached = "2015-05-15" 5 | date = "2022-05-04" 6 | record_count = "22,031" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["PBKDF2-SHA256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Services"] 12 | acknowledged = "No" 13 | +++ 14 | As of October 9th 2021, aasaanjobs.com is redirecting to waahjobs.com. This might be their new company name. 15 | -------------------------------------------------------------------------------- /content/breaches/airtel-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Airtel" 3 | domain = "https://airtel.com" 4 | date_breached = "2016-02-10" 5 | date = "2022-05-04" 6 | record_count = "202,709" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Usernames", "Physical addresses", "Genders"] 11 | categories = ["Telecommunications"] 12 | acknowledged = "No" 13 | +++ 14 | Not all 202k records have email addresses. We only found 30,874 unique email addresses in this data. 15 | -------------------------------------------------------------------------------- /content/breaches/55-la.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "55.la" 3 | domain = "https://55.la" 4 | date_breached = "2013-11-21" 5 | date = "2022-05-04" 6 | record_count = "1,038,189" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Unknown"] 12 | acknowledged = "No" 13 | +++ 14 | The date of this breach is going by the date of the last user who registered before it was dumped. Date might not be 100% accurate. 15 | -------------------------------------------------------------------------------- /content/breaches/abandonia-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Abandonia" 3 | domain = "https://abandonia.com" 4 | date_breached = "2015-11-15" 5 | date = "2022-05-04" 6 | record_count = "782,608" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20211009172657/https://en.wikipedia.org/wiki/Abandonia#Data_breach" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/8ch-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "8chan" 3 | domain = "https://8ch.net" 4 | date_breached = "2017-04-01" 5 | date = "2022-05-04" 6 | record_count = "15,735" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["sha512crypt", "SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["imageboard"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20211006003523/https://twitter.com/infinitechan/status/848139757758562304?s=20" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/accountrs-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AccountRS" 3 | domain = "https://accountrs.com" 4 | date_breached = "2014-09-04" 5 | date = "2022-05-04" 6 | record_count = "2,301" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | Website breached sometime in 2014 (According to file dates). Databreach has been determined to have resulted from SQL injection. 15 | -------------------------------------------------------------------------------- /content/breaches/abraham-hicks-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Abraham-Hicks" 3 | domain = "https://abraham-hicks.com" 4 | date_breached = "2018-03-06" 5 | date = "2022-05-04" 6 | record_count = "244,099" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext", "PBKDF1-SHA1"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Shopping", "Services", "Reading"] 12 | acknowledged = "No" 13 | +++ 14 | Breached multiple times over the years due to website administrators not patching vulnerabilities. 15 | -------------------------------------------------------------------------------- /content/breaches/adobe-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Adobe" 3 | domain = "https://adobe.com" 4 | date_breached = "2013-10-04" 5 | date = "2022-05-04" 6 | record_count = "153,004,874" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["Unknown"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Password hints"] 11 | categories = ["Software"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20211010040632/https://helpx.adobe.com/x-productkb/policy-pricing/customer-alert.html" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/albumwash-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AlbumWash" 3 | domain = "https://albumwash.com" 4 | date_breached = "2019-01-06" 5 | date = "2022-05-04" 6 | record_count = "438,360" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Music"] 12 | acknowledged = "No" 13 | +++ 14 | The last user registration date in the breach was "Sun Jan 06 2019 09:22:44 GMT+0000", so I have concluded that it was breached on this date. 15 | -------------------------------------------------------------------------------- /content/breaches/ajarn-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Ajarn" 3 | domain = "ajarn.com" 4 | date_breached = "2018-12-13" 5 | date = "2022-05-04" 6 | record_count = "266,399" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Names", "Phone numbers", "Physical addresses", "Dates of birth", "Genders", "Job titles"] 11 | categories = ["Services"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20211009174654/https://www.ajarn.com/data-breach" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/seedpeer-eu.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Seedpeer" 3 | domain = "https://seedpeer.eu" 4 | date_breached = "2015-07-12" 5 | date = "2022-05-04" 6 | record_count = "281,924" 7 | privacy = "Not rated" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In July 2015, the torrent site Seedpeer was hacked and 282k member records were exposed. The data included usernames, email addresses and passwords stored as weak MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/abcaustralasia-org-au.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ABC Australasia" 3 | domain = "https://abcaustralasia.org.au" 4 | date_breached = "2020-06-22" 5 | date = "2022-05-04" 6 | record_count = "54" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Names", "Physical addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | Breach was in an exposed directory, file has now been removed. It can be seen in this archived version of the page. https://archive.is/1B8Yb 15 | -------------------------------------------------------------------------------- /content/breaches/twitter-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Twitter.com (Scraped Emails)" 3 | domain = "https://twitter.com" 4 | date_breached = "2017-12-01" 5 | date = "2022-05-04" 6 | record_count = "301,086,279" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses"] 11 | categories = ["Scraped Data"] 12 | acknowledged = "No" 13 | +++ 14 | 15 | Listed in vigilante.pw, list of over 300 million email addresses checked against Twitter in late 2017 to see if they're registered. The file is just a list of Email addresses. 16 | -------------------------------------------------------------------------------- /content/breaches/17-media.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "17.media" 3 | domain = "https://17.media" 4 | date_breached = "2016-03-18" 5 | date = "2022-05-04" 6 | record_count = "28,052,322" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Services"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20211006005340/https://www.vice.com/en/article/qkjvww/another-day-another-hack-millions-of-user-accounts-for-streaming-app-17" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/aantv-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AANtv" 3 | domain = "https://aantv.com" 4 | date_breached = "2017-02-01" 5 | date = "2022-05-04" 6 | record_count = "22,677" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["MySQL323"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | Hash-type was hard to be identified correctly. It could be that the person that hacked this only grabbed half of the MD5 Hashes (if it was an SQL Injection attack), or it could be "MySQL323" (According to hashid). 15 | -------------------------------------------------------------------------------- /content/breaches/albiononline-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Albion Online Forum" 3 | domain = "https://albiononline.com" 4 | date_breached = "2020-10-16" 5 | date = "2022-05-04" 6 | record_count = "293,205" 7 | privacy = "Semi-public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Gaming"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20211017212858/https://forum.albiononline.com/index.php/Thread/138652-Forum-Data-Breach-Please-Change-Your-Password/" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/aloamembers-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ALOA Members" 3 | domain = "https://aloamembers.org" 4 | date_breached = "2021-02-24" 5 | date = "2022-05-04" 6 | record_count = "24,948" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Usernames", "Names", "IP addresses", "Phone numbers", "Physical addresses"] 11 | categories = ["Services"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20211017221438/https://gpla.org/wp-content/uploads/2021/07/July2021-Newsletter-PDF.pdf" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/yahoo-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Yahoo" 3 | domain = "https://yahoo.com" 4 | date_breached = "2012-07-11" 5 | date = "2022-05-04" 6 | record_count = "453,427" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In July 2012, Yahoo! had their online publishing service "Voices" compromised via a SQL injection attack. The breach resulted in the disclosure of nearly half a million usernames and passwords stored in plain text. 15 | -------------------------------------------------------------------------------- /content/breaches/d3scene-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "D3Scene" 3 | domain = "https://d3scene.com" 4 | date_breached = "2016-01-01" 5 | date = "2022-05-04" 6 | record_count = "568,827" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In January 2016, the gaming website D3Scene, suffered a data breach. The compromised vBulletin forum exposed 569k million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/youku-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Youku" 3 | domain = "https://youku.com" 4 | date_breached = "2016-12-01" 5 | date = "2022-05-04" 6 | record_count = "91,890,110" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In late 2016, the online Chinese video service Youku suffered a data breach. The incident exposed 92 million unique user accounts and corresponding MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/2007runescapegold-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "2007RunescapeGold" 3 | domain = "https://www.2007runescapegold.com" 4 | date_breached = "2020-01-01" 5 | date = "2022-05-04" 6 | record_count = "37,898" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Shopping", "Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | "it was probably breached in early 2020" - @FEDERALE on Raidforums. Due to not knowing the exact date, it has been set to "2020-01-01" until I get further information on this breach. 15 | -------------------------------------------------------------------------------- /content/breaches/akorn-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Akorn" 3 | domain = "https://akorn.com" 4 | date_breached = "2015-07-03" 5 | date = "2022-05-04" 6 | record_count = "30,309" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "Phone numbers", "Physical addresses"] 11 | categories = ["Pharmaceuticals"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20210125173445/https://www.hipaajournal.com/akorn-database-for-highest-bidder-hacker-holds-pharma-data-auction-7088/" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/sumotorrent-sx.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Sumo Torrent" 3 | domain = "https://sumotorrent.sx" 4 | date_breached = "2014-06-21" 5 | date = "2022-05-04" 6 | record_count = "285,191" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In June 2014, the torrent site Sumo Torrent was hacked and 285k member records were exposed. The data included IP addresses, email addresses and passwords stored as weak MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/aadalsiden-info.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Aadalsiden" 3 | domain = "https://aadalsiden.info" 4 | date_breached = "2018-04-02" 5 | date = "2022-05-04" 6 | record_count = "48,072" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | Website has been breached many times in the past. Present in many different data-breach collections. The date of this breached was taken from HackNotice.com as I believe that is the most accurate time for when this breach occurred. 15 | -------------------------------------------------------------------------------- /content/breaches/filmai-in.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Filmai.in" 3 | domain = "https://filmai.in" 4 | date_breached = "2020-01-01" 5 | date = "2022-05-04" 6 | record_count = "645,786" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately 2019 or 2020, the Lithuanian movie streaming service Filmai.in suffered a data breach exposing 645k email addresses, usernames and plain text passwords. 15 | -------------------------------------------------------------------------------- /themes/breaches-net/layouts/partials/categories.html: -------------------------------------------------------------------------------- 1 | {{ with .Params.categories }} 2 |

3 | 4 | 5 | {{ range . -}} 6 | {{.}} 7 | {{ end }} 8 |

9 | {{ end }} -------------------------------------------------------------------------------- /content/breaches/ilikecheats-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ILikeCheats" 3 | domain = "https://ilikecheats.net" 4 | date_breached = "2014-10-18" 5 | date = "2022-05-04" 6 | record_count = "188,847" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In October 2014, the game cheats website known as ILikeCheats suffered a data breach that exposed 189k accounts. The vBulletin based forum leaked usernames, IP and email addresses and weak MD5 hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/uuu9-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "uuu9" 3 | domain = "https://uuu9.com" 4 | date_breached = "2016-09-06" 5 | date = "2022-05-04" 6 | record_count = "7,485,802" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In September 2016, data was allegedly obtained from the Chinese website known as uuu9.com and contained 7.5M accounts. The data in the breach contains email addresses and user names. 15 | -------------------------------------------------------------------------------- /content/breaches/devil-torrents-pl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Devil-Torrents.pl" 3 | domain = "https://devil-torrents.pl" 4 | date_breached = "2021-01-04" 5 | date = "2022-05-04" 6 | record_count = "63,451" 7 | privacy = "Not Rated" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In early 2021, the Polish torrents website Devil-Torrents.pl suffered a data breach. A subset of the data including 63k unique email addresses and cracked passwords were subsequently socialised on a popular data breach sharing service. -------------------------------------------------------------------------------- /content/breaches/dodonew-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Dodonew.com" 3 | domain = "https://dodonew.com" 4 | date_breached = "2011-12-01" 5 | date = "2022-05-04" 6 | record_count = "8,718,404" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In late 2011, data was allegedly obtained from the Chinese website known as Dodonew.com and contained 8.7M accounts. The data in the breach contains email addresses and user names. 15 | -------------------------------------------------------------------------------- /content/breaches/nihonomaru-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Nihonomaru" 3 | domain = "https://nihonomaru.net" 4 | date_breached = "2015-12-01" 5 | date = "2022-05-04" 6 | record_count = "1,697,282" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In late 2015, the anime community known as Nihonomaru had their vBulletin forum hacked and 1.7 million accounts exposed. The compromised data included email and IP addresses, usernames and salted hashes of passwords. 15 | -------------------------------------------------------------------------------- /themes/breaches-net/layouts/partials/tags.html: -------------------------------------------------------------------------------- 1 | {{ with . }} 2 |

3 | 4 | 5 | {{ range . -}} 6 | {{.}} 7 | {{ end }} 8 |

9 | {{ end }} -------------------------------------------------------------------------------- /content/breaches/androidlista-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AndroidLista" 3 | domain = "https://androidlista.com" 4 | date_breached = "2021-07-28" 5 | date = "2022-05-04" 6 | record_count = "6,644,661" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | Most users logged in via SSO, so there were very few password hashes. This was stated by the leaker on his post: "androidlista.com 6m users, alot are on sso login so few actually have hashes though all have emails". 15 | -------------------------------------------------------------------------------- /content/breaches/500px-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "500px" 3 | domain = "https://500px.com" 4 | date_breached = "2018-07-05" 5 | date = "2022-05-04" 6 | record_count = "14,867,999" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt", "MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Names", "IP addresses", "Physical addresses", "Dates of birth", "Genders"] 11 | categories = ["photo-sharing"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20210811223933/https://support.500px.com/hc/en-us/articles/360017752493-Security-Issue-February-2019-FAQ" 14 | +++ 15 | -------------------------------------------------------------------------------- /content/breaches/abusewith-us.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AbuseWithUs Scrape" 3 | domain = "https://abusewith.us" 4 | date_breached = "2016-07-01" 5 | date = "2022-05-04" 6 | record_count = "1,372,550" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Hacking"] 12 | acknowledged = "No" 13 | +++ 14 | It should be noted that this breach happened due to "Scraping". AbuseWith.us was just a databreach search website similar to WeLeakInfo, and someone did wildcard queries to retrieve most of the records they held. 15 | -------------------------------------------------------------------------------- /content/breaches/avast-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Avast" 3 | domain = "https://avast.com" 4 | date_breached = "2014-05-26" 5 | date = "2022-05-04" 6 | record_count = "422,959" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In May 2014, the Avast anti-virus forum was hacked and 423k member records were exposed. The Simple Machines Based forum included usernames, emails and password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/jm-ca.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "JM" 3 | domain = "https://jm.ca" 4 | date_breached = "2019-12-24" 5 | date = "2022-05-04" 6 | record_count = "4,884" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/mpgh-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MPGH" 3 | domain = "https://mpgh.net" 4 | date_breached = "2015-10-22" 5 | date = "2022-05-04" 6 | record_count = "3,122,898" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In October 2015, the multiplayer game hacking website MPGH was hacked and 3.1 million user accounts disclosed. The vBulletin forum breach contained usernames, email addresses, IP addresses and salted hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/onverse-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Onverse" 3 | domain = "https://onverse.com" 4 | date_breached = "2016-01-01" 5 | date = "2022-05-04" 6 | record_count = "800,157" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In January 2016, the online virtual world known as Onverse was hacked and 800k accounts were exposed. Along with email and IP addresses, the site also exposed salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/sanriotown-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Sanriotown" 3 | domain = "https://sanriotown.com" 4 | date_breached = "2015-11-22" 5 | date = "2022-05-04" 6 | record_count = "3,319,634" 7 | privacy = "Private" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses", "Dates of birth", "Phone numbers", "Genders", "Names", "Password hints"] 11 | categories = ["Gaming"] 12 | acknowledged = "Yes" 13 | acknowledged_url = "https://web.archive.org/web/20220505193105/https://www.csoonline.com/article/3017171/database-leak-exposes-3-3-million-hello-kitty-fans.html" 14 | +++ -------------------------------------------------------------------------------- /themes/breaches-net/docs/config.md: -------------------------------------------------------------------------------- 1 | # Configuration 2 | 3 | There are some settings you can set in your `config.toml`. 4 | 5 | ## Default area 6 | 7 | The settings in the default area are usually provided by Hugo itself. Check [Configure Hugo](https://gohugo.io/getting-started/configuration/#all-configuration-settings) for more information. But I want to list some important things here which are relevant to this theme. 8 | 9 | ### paginate 10 | 11 | ``` 12 | paginate = 10 13 | ``` 14 | 15 | This setting will paginate your list views. Set to `0` to disable it. For more information check (https://gohugo.io/templates/pagination/). 16 | -------------------------------------------------------------------------------- /content/breaches/ala-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "American Library Association" 3 | domain = "https://ala.org" 4 | date_breached = "2018-03-05" 5 | date = "2022-05-04" 6 | record_count = "7,880" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5", "Drupal"] 10 | breached_data = ["Email addresses", "Passwords", "Names", "Phone numbers", "Physical addresses"] 11 | categories = ["Shopping", "Education"] 12 | acknowledged = "No" 13 | +++ 14 | Two files were leaked, "1,2G ala.org_store_2018_10k.sql", and "738M ala.org_classes_2016_89k.sql". Date breached has been set to 2018-03-05 as that is when the second, bigger file was created. 15 | -------------------------------------------------------------------------------- /content/breaches/mac-torrents-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Mac-Torrents" 3 | domain = "https://mac-torrents.com" 4 | date_breached = "2015-10-31" 5 | date = "2022-05-04" 6 | record_count = "93,992" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | 14 | +++ 15 | 16 | In October 2015, the torrent site Mac-Torrents was hacked and almost 94k usernames, email addresses and passwords were leaked. The passwords were hashed with MD5 and no salt. 17 | -------------------------------------------------------------------------------- /content/breaches/bvc-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Ventamatic" 3 | domain = "https://bvc.com" 4 | date_breached = "2018-02-15" 5 | date = "2022-05-04" 6 | record_count = "3,108" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/hbxdev-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Hbxdev" 3 | domain = "https://hbxdev.com" 4 | date_breached = "2019-12-18" 5 | date = "2022-05-04" 6 | record_count = "5,550" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/shoeout-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Shoeout" 3 | domain = "https://shoeout.ru" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "5,353" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/svenskamagic-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "SvenskaMagic" 3 | domain = "https://svenskamagic.com" 4 | date_breached = "2015-07-01" 5 | date = "2022-05-04" 6 | record_count = "30,327" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | Sometime in 2015, the Swedish magic website SvenskaMagic suffered a data breach that exposed over 30k records. The compromised data included usernames, email addresses and MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/zhenai-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Zhenai.com" 3 | domain = "https://zhenai.com" 4 | date_breached = "2011-12-21" 5 | date = "2022-05-04" 6 | record_count = "5,024,908" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In December 2011, the Chinese dating site known as Zhenai.com suffered a data breach that impacted 5 million subscribers. The data in the breach contains email addresses and plain text passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/ziprar-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Ziprar" 3 | domain = "https://ziprar.com" 4 | date_breached = "2019-12-24" 5 | date = "2022-05-04" 6 | record_count = "15,713" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/aipai-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Aipai" 3 | domain = "https://aipai.com" 4 | date_breached = "2016-09-27" 5 | date = "2022-05-04" 6 | record_count = "7,699,035" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5", "plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | In September 2016, data allegedly obtained from the Chinese gaming website known as Aipai.com and containing 6.5M accounts was leaked online. MD5 vs. Plaintext usage for passwords: MD5 (207,130) & plaintext (7,491,905) 15 | -------------------------------------------------------------------------------- /content/breaches/bazylia-pl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Bazylia" 3 | domain = "https://bazylia.pl" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "31,275" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/bhtoner-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "BH Toner" 3 | domain = "https://bhtoner.com" 4 | date_breached = "2019-12-29" 5 | date = "2022-05-04" 6 | record_count = "3,573" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/emuparadise-me.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Emuparadise" 3 | domain = "https://emuparadise.me" 4 | date_breached = "2018-04-01" 5 | date = "2022-05-04" 6 | record_count = "1,131,229" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In April 2018, the self-proclaimed "biggest retro gaming website on earth", Emuparadise, suffered a data breach. The compromised vBulletin forum exposed 1.1 million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/givoni-com-au.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Givoni" 3 | domain = "https://givoni.com.au" 4 | date_breached = "2017-03-23" 5 | date = "2022-05-04" 6 | record_count = "1,315" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/hibboux-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Hibboux" 3 | domain = "https://hibboux.com" 4 | date_breached = "2020-02-23" 5 | date = "2022-05-04" 6 | record_count = "4,703" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/idealmed-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "IdealMed" 3 | domain = "https://idealmed.com" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "2,102" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/ovh-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "OVH" 3 | domain = "https://ovh.com" 4 | date_breached = "2015-05-01" 5 | date = "2022-05-04" 6 | record_count = "452,899" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In mid-2015, the forum for the hosting provider known as OVH suffered a data breach. The vBulletin forum contained 453k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/paklap-pk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Paklap" 3 | domain = "https://paklap.pk" 4 | date_breached = "2019-12-03" 5 | date = "2022-05-04" 6 | record_count = "67,832" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/taobao-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Taobao" 3 | domain = "https://taobao.com" 4 | date_breached = "2012-01-01" 5 | date = "2022-05-04" 6 | record_count = "21,149,008" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately 2012, it's alleged that the Chinese shopping site known as Taobao suffered a data breach that impacted over 21 million subscribers. The data in the breach contains email addresses and plain text passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/ussextoy-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Ussextoy" 3 | domain = "https://ussextoy.com" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "2,827" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/watchxl-eu.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "WatchXL" 3 | domain = "https://watchxl.eu" 4 | date_breached = "2018-04-18" 5 | date = "2022-05-04" 6 | record_count = "24,607" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/wiiuiso-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "WIIU ISO" 3 | domain = "https://wiiuiso.com" 4 | date_breached = "2015-09-25" 5 | date = "2022-05-04" 6 | record_count = "458,155" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In September 2015, the Nintendo Wii U forum known as WIIU ISO was hacked and 458k accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/xkcd-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "XKCD" 3 | domain = "https://xkcd.com" 4 | date_breached = "2019-07-01" 5 | date = "2022-05-04" 6 | record_count = "561,991" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["phpBB3"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In July 2019, the forum for webcomic XKCD suffered a data breach that impacted 562k subscribers. The breached phpBB forum leaked usernames, email and IP addresses and passwords stored in MD5 phpBB3 format. 15 | -------------------------------------------------------------------------------- /content/breaches/2dlayer-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "2dlayer" 3 | domain = "https://2dlayer.com" 4 | date_breached = "2019-10-18" 5 | date = "2022-05-04" 6 | record_count = "5,292" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/aircenter-ch.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AirCenter" 3 | domain = "https://aircenter.ch" 4 | date_breached = "2019-09-09" 5 | date = "2022-05-04" 6 | record_count = "1,367" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/astroavl-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Astro AVL" 3 | domain = "https://astroavl.com" 4 | date_breached = "2020-01-25" 5 | date = "2022-05-04" 6 | record_count = "12,373" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/chromres-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Chromres" 3 | domain = "https://chromres.com" 4 | date_breached = "2019-03-27" 5 | date = "2022-05-04" 6 | record_count = "580" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/demonforums-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Demon Forums" 3 | domain = "https://demonforums.net" 4 | date_breached = "2019-02-20" 5 | date = "2022-05-04" 6 | record_count = "52,623" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MyBB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In February 2019, the hacking forum Demon Forums suffered a data breach. The compromise of the vBulletin forum exposed 52k unique email addresses alongside usernames and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/hantermann-eu.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Hantermann" 3 | domain = "https://hantermann.eu" 4 | date_breached = "2019-07-18" 5 | date = "2022-05-04" 6 | record_count = "1,401" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/interpals-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "InterPals" 3 | domain = "https://interpals.net" 4 | date_breached = "2015-11-04" 5 | date = "2022-05-04" 6 | record_count = "3,439,414" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5", "phpBB"] 10 | breached_data = ["Dates of birth", "Email addresses", "Geographic locations", "Names", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In late 2015, the online penpal site InterPals had their website hacked and 3.4 million accounts exposed. The compromised data included email addresses, geographical locations, birthdates and salted hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/klimazona-pl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Klimazona" 3 | domain = "https://klimazona.pl" 4 | date_breached = "2019-07-10" 5 | date = "2022-05-04" 6 | record_count = "727" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/laenestol-dk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Laenestol" 3 | domain = "https://laenestol.dk" 4 | date_breached = "2020-01-18" 5 | date = "2022-05-04" 6 | record_count = "3,038" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/madamlili-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Madamlili" 3 | domain = "https://madamlili.com" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "12,261" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/magnifier-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Magnifier" 3 | domain = "https://magnifier.com" 4 | date_breached = "2019-01-25" 5 | date = "2022-05-04" 6 | record_count = "1,508" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/med-lab-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Med-Lab" 3 | domain = "https://med-lab.co.uk" 4 | date_breached = "2020-02-13" 5 | date = "2022-05-04" 6 | record_count = "4,137" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/peatix-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Peatix" 3 | domain = "https://peatix.com" 4 | date_breached = "2019-01-20" 5 | date = "2022-05-04" 6 | record_count = "4,227,907" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["NSLDAPS"] 10 | breached_data = ["Email addresses", "Names", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In January 2019, the event organising platform Peatix suffered a data breach. The incident exposed 4.2M email addresses, names and salted password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/retroplus-ma.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "RetroPlus" 3 | domain = "https://retroplus.ma" 4 | date_breached = "2017-07-03" 5 | date = "2022-05-04" 6 | record_count = "589" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/sunovisio-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "SunoVisio" 3 | domain = "https://sunovisio.com" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "2,767" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/thecellar-cn.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Thecellar" 3 | domain = "https://thecellar.cn" 4 | date_breached = "2019-03-13" 5 | date = "2022-05-04" 6 | record_count = "1,765" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/thefappening-so.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "The Fappening" 3 | domain = "https://thefappening.so" 4 | date_breached = "2015-12-01" 5 | date = "2022-05-04" 6 | record_count = "179,030" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["XF"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In December 2015, the forum for discussing naked celebrity photos known as "The Fappening" (named after the iCloud leaks of 2014) was compromised and 179k accounts were leaked. Exposed member data included usernames, email addresses and salted hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/tyr-shop-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Tyr Shop" 3 | domain = "https://tyr-shop.co.uk" 4 | date_breached = "2019-12-03" 5 | date = "2022-05-04" 6 | record_count = "1,820" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/vantharp-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Vantharp" 3 | domain = "https://vantharp.com" 4 | date_breached = "2019-12-17" 5 | date = "2022-05-04" 6 | record_count = "2,439" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/zoomaailm-ee.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Zoomaailm" 3 | domain = "https://zoomaailm.ee" 4 | date_breached = "2019-07-02" 5 | date = "2022-05-04" 6 | record_count = "1,800" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/accountgear-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AccountGear" 3 | domain = "https://accountgear.com" 4 | date_breached = "2017-08-19" 5 | date = "2022-05-04" 6 | record_count = "270,893" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | Record count is as reported by Vigilante.pw & from the file we obtained, although leak-lookup.com reports there being "512,331" records in a different 74.59MB file. We have only been able to verify that there was a 270,893 record breach, so that is why the entry-count is that. 15 | -------------------------------------------------------------------------------- /content/breaches/autocentrum-pl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Autocentrum.pl" 3 | domain = "https://autocentrum.pl" 4 | date_breached = "2018-02-04" 5 | date = "2022-05-04" 6 | record_count = "143,717" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In February 2018, data belonging to the Polish motoring website autocentrum.pl was found online. The data contained 144k email addresses and plain text passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/belvitta-com-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Belvitta" 3 | domain = "https://belvitta.com.br" 4 | date_breached = "2018-07-18" 5 | date = "2022-05-04" 6 | record_count = "13,211" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/cardmafia-cc.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Carding Mafia" 3 | domain = "https://cardmafia.cc" 4 | date_breached = "2021-03-18" 5 | date = "2022-05-04" 6 | record_count = "297,744" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In March 2021, the Carding Mafia forum suffered a data breach that exposed almost 300k members' email addresses. Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/cbytools-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "CBY Tools" 3 | domain = "https://cbytools.co.uk" 4 | date_breached = "2019-05-08" 5 | date = "2022-05-04" 6 | record_count = "1,810" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/dressnocode-nl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Dressnocode" 3 | domain = "https://dressnocode.nl" 4 | date_breached = "2019-11-26" 5 | date = "2022-05-04" 6 | record_count = "35,542" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/duowan-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Duowan.com" 3 | domain = "https://duowan.com" 4 | date_breached = "2011-01-01" 5 | date = "2022-05-04" 6 | record_count = "2,639,894" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately 2011, data was allegedly obtained from the Chinese gaming website known as Duowan.com and contained 2.6M accounts. The data in the breach contains email addresses, user names and plain text passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/epicnpc-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "EpicNPC" 3 | domain = "https://epicnpc.com" 4 | date_breached = "2016-01-02" 5 | date = "2022-05-04" 6 | record_count = "408,795" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In January 2016, the hacked account reseller EpicNPC suffered a data breach that impacted 409k subscribers. The impacted data included usernames, IP and email addresses and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/getwells-net-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Getwells" 3 | domain = "https://getwells.net.br" 4 | date_breached = "2019-08-20" 5 | date = "2022-05-04" 6 | record_count = "4,600" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/godirectinc-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Godirectinc" 3 | domain = "https://godirectinc.com" 4 | date_breached = "2017-06-09" 5 | date = "2022-05-04" 6 | record_count = "1,719" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/hiapk-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "HiAPK" 3 | domain = "https://hiapk.com" 4 | date_breached = "2014-01-01" 5 | date = "2022-05-04" 6 | record_count = "13,873,674" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately 2014, it's alleged that the Chinese Android store known as HIAPK suffered a data breach that impacted 13.8 million unique subscribers. The data in the breach contains usernames, email addresses and salted MD5 password hashes. -------------------------------------------------------------------------------- /content/breaches/ipackaging-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Ipackaging" 3 | domain = "https://ipackaging.com" 4 | date_breached = "2019-09-04" 5 | date = "2022-05-04" 6 | record_count = "3,791" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/macknmall-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Macknmall" 3 | domain = "https://macknmall.com" 4 | date_breached = "2020-01-15" 5 | date = "2022-05-04" 6 | record_count = "2,273" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/maxblack-com-au.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Maxblack" 3 | domain = "https://maxblack.com.au" 4 | date_breached = "2018-08-03" 5 | date = "2022-05-04" 6 | record_count = "4,900" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/sportphoto-shop.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Sportphoto" 3 | domain = "https://sportphoto.shop" 4 | date_breached = "2018-08-16" 5 | date = "2022-05-04" 6 | record_count = "1,738" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/stack-sport-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Stack Sport" 3 | domain = "https://stack-sport.ru" 4 | date_breached = "2019-05-14" 5 | date = "2022-05-04" 6 | record_count = "3,780" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/7k7k-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "7k7k" 3 | domain = "https://7k7k.com" 4 | date_breached = "2011-01-01" 5 | date = "2022-05-04" 6 | record_count = "9,121,434" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | In approximately 2011, it's alleged that the Chinese gaming site known as 7k7k suffered a data breach that impacted 9.1 million subscribers. The data in the breach contains usernames, email addresses and plain text passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/alsaifhome-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Alsaif Home" 3 | domain = "https://alsaifhome.com" 4 | date_breached = "2020-01-27" 5 | date = "2022-05-04" 6 | record_count = "1,742" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/arrowandbeast-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ARROW & BEAST" 3 | domain = "https://arrowandbeast.com" 4 | date_breached = "2020-01-28" 5 | date = "2022-05-04" 6 | record_count = "3,718" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/coloredjugs-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Colored Jugs" 3 | domain = "https://coloredjugs.com" 4 | date_breached = "2019-11-30" 5 | date = "2022-05-04" 6 | record_count = "7,216" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/dailyquiz-me.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Daily Quiz" 3 | domain = "https://dailyquiz.me" 4 | date_breached = "2021-01-13" 5 | date = "2022-05-04" 6 | record_count = "8,032,404" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In January 2021, the quiz website Daily Quiz suffered a data breach that exposed over 8 million unique email addresses. The data also included usernames, IP addresses and passwords stored in plain text. 15 | -------------------------------------------------------------------------------- /content/breaches/eoryginalne-pl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Eoryginalne" 3 | domain = "https://eoryginalne.pl" 4 | date_breached = "2019-12-18" 5 | date = "2022-05-04" 6 | record_count = "3,652" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/expertoffice-it.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Expert Office" 3 | domain = "https://expertoffice.it" 4 | date_breached = "2018-11-19" 5 | date = "2022-05-04" 6 | record_count = "1,312" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/funimation-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Funimation" 3 | domain = "https://funimation.com" 4 | date_breached = "2016-07-01" 5 | date = "2022-05-04" 6 | record_count = "2,491,103" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Dates of birth", "Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In July 2016, the anime site Funimation suffered a data breach that impacted 2.5 million accounts. The data contained usernames, email addresses, dates of birth and salted SHA1 hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/gfan-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "GFAN" 3 | domain = "https://gfan.com" 4 | date_breached = "2016-10-10" 5 | date = "2022-05-04" 6 | record_count = "22,526,334" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In October 2016, data surfaced that was allegedly obtained from the Chinese website known as GFAN and contained 22.5M accounts. The data in the breach contains email and IP addresses, user names and salted and hashed passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/holmeslumber-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Holmes Lumber" 3 | domain = "https://holmeslumber.com" 4 | date_breached = "2014-05-19" 5 | date = "2022-05-04" 6 | record_count = "5,887" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/hr-cedeterija-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Cedeterija" 3 | domain = "https://hr.cedeterija.com" 4 | date_breached = "2019-07-23" 5 | date = "2022-05-04" 6 | record_count = "6,333" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/kaffetilbud-dk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Kaffetilbud" 3 | domain = "https://kaffetilbud.dk" 4 | date_breached = "2019-05-14" 5 | date = "2022-05-04" 6 | record_count = "4,027" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/lecoqcuisine-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Lecoq Cuisine" 3 | domain = "https://lecoqcuisine.com" 4 | date_breached = "2018-03-15" 5 | date = "2022-05-04" 6 | record_count = "4,120" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/minecraftworldmap-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Minecraft World Map" 3 | domain = "https://minecraftworldmap.com" 4 | date_breached = "2016-01-15" 5 | date = "2022-05-04" 6 | record_count = "71,081" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MyBB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately January 2016, the Minecraft World Map site designed for sharing maps created for the game was hacked and over 71k user accounts were exposed. The data included usernames, email and IP addresses along with salted and hashed passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/sweeperparts-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Sweeper Parts" 3 | domain = "https://sweeperparts.net" 4 | date_breached = "2013-09-19" 5 | date = "2022-05-04" 6 | record_count = "1,588" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/thewarinc-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "War Inc." 3 | domain = "https://thewarinc.com" 4 | date_breached = "2012-07-04" 5 | date = "2022-05-04" 6 | record_count = "1,020,136" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In mid-2012, the real-time strategy game War Inc. suffered a data breach. The attack resulted in the exposure of over 1 million accounts including usernames, email addresses and salted MD5 hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/totalpoles-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Totalpoles" 3 | domain = "https://totalpoles.co.uk" 4 | date_breached = "2019-01-15" 5 | date = "2022-05-04" 6 | record_count = "4,752" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/xtreme-toys-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Xtreme-Toys" 3 | domain = "https://xtreme-toys.co.uk" 4 | date_breached = "2017-12-01" 5 | date = "2022-05-04" 6 | record_count = "4,563" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/yuyubottle-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Yuyu Bottle" 3 | domain = "https://yuyubottle.com" 4 | date_breached = "2019-12-09" 5 | date = "2022-05-04" 6 | record_count = "40,473" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/17173-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "17173" 3 | domain = "https://17173.com" 4 | date_breached = "2011-12-28" 5 | date = "2022-05-04" 6 | record_count = "7,485,802" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Gaming"] 12 | acknowledged = "No" 13 | +++ 14 | In late 2011, a series of data breaches in China affected up to 100 million users, including 7.5 million from the gaming site known as 17173. 15 | -------------------------------------------------------------------------------- /content/breaches/7seasproshopthai-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "7seas Home" 3 | domain = "https://7seasproshopthai.com" 4 | date_breached = "2019-01-09" 5 | date = "2022-05-04" 6 | record_count = "35,913" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/artcomvidros-com-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Artcom Vidros" 3 | domain = "https://artcomvidros.com.br" 4 | date_breached = "2018-08-27" 5 | date = "2022-05-04" 6 | record_count = "2,183" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/bannerbit-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "BannerBit" 3 | domain = "https://bannerbit.com" 4 | date_breached = "2018-12-29" 5 | date = "2022-05-04" 6 | record_count = "213,415" 7 | privacy = "Not rated" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately December 2018, the online ad platform BannerBit suffered a data breach. Containing 213k unique email addresses and plain text passwords. Multiple attempts were made to contact BannerBit, but no response was received. 15 | -------------------------------------------------------------------------------- /content/breaches/crackingforum-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "CrackingForum" 3 | domain = "https://crackingforum.com" 4 | date_breached = "2016-07-01" 5 | date = "2022-05-04" 6 | record_count = "660,305" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately mid-2016, the cracking community forum known as CrackingForum suffered a data breach. The vBulletin based forum exposed 660k email and IP addresses, usernames and salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/danclarkaudio-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Danclark Audio" 3 | domain = "https://danclarkaudio.com" 4 | date_breached = "2019-11-17" 5 | date = "2022-05-04" 6 | record_count = "8,402" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/daylightshops-se.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Daylight Shops" 3 | domain = "https://daylightshops.se" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "1,466" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/flavourista-com-au.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Flavourista" 3 | domain = "https://flavourista.com.au" 4 | date_breached = "2018-08-07" 5 | date = "2022-05-04" 6 | record_count = "439" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/gen-ebooks-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Ebooks - Gould Genealogy" 3 | domain = "https://gen-ebooks.com" 4 | date_breached = "2017-02-16" 5 | date = "2022-05-04" 6 | record_count = "3,206" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/healthy-house-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Healthy House" 3 | domain = "https://healthy-house.co.uk" 4 | date_breached = "2018-06-27" 5 | date = "2022-05-04" 6 | record_count = "6,708" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/hellohandbag-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Hello Handbag" 3 | domain = "https://hellohandbag.co.uk" 4 | date_breached = "2020-02-05" 5 | date = "2022-05-04" 6 | record_count = "4,181" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/idcgames-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "IDC Games" 3 | domain = "https://idcgames.com" 4 | date_breached = "2021-03-15" 5 | date = "2022-05-04" 6 | record_count = "3,966,871" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In March 2021, 4 million records sourced from IDC Games were shared on a public hacking forum. The data included usernames, email addresses and passwords stored as salted MD5 hashes. -------------------------------------------------------------------------------- /content/breaches/isub-supplies-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "ISub Supplies" 3 | domain = "https://isub-supplies.co.uk" 4 | date_breached = "2019-02-02" 5 | date = "2022-05-04" 6 | record_count = "1,478" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/kartenbauer-an-ch.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Kartenbauer.Ch" 3 | domain = "https://kartenbauer-an.ch" 4 | date_breached = "2018-09-07" 5 | date = "2022-05-04" 6 | record_count = "9,384" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/mumsandbabes-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Mums & Babes" 3 | domain = "https://mumsandbabes.com" 4 | date_breached = "2018-11-06" 5 | date = "2022-05-04" 6 | record_count = "2,099" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/mylife-direct-ch.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Mylife Direct DE" 3 | domain = "https://mylife-direct.ch" 4 | date_breached = "2019-03-06" 5 | date = "2022-05-04" 6 | record_count = "3,326" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/tgbus-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "TGBUS" 3 | domain = "https://tgbus.com" 4 | date_breached = "2017-09-01" 5 | date = "2022-05-04" 6 | record_count = "10,371,766" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately 2017, it's alleged that the Chinese gaming site known as TGBUS suffered a data breach that impacted over 10 million unique subscribers. The data in the breach contains usernames, email addresses and salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/avvo-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Avvo" 3 | domain = "https://avvo.com" 4 | date_breached = "2019-12-17" 5 | date = "2022-05-04" 6 | record_count = "4,101,101" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately December 2019, an alleged data breach of the lawyer directory service Avvo was published to an online hacking forum and used in an extortion scam (it's possible the exposure dates back earlier than that). The data contained 4.1M unique email addresses alongside SHA-1 hashes, most likely representing user passwords. -------------------------------------------------------------------------------- /content/breaches/bucatoprofumato-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Bucato Profumato" 3 | domain = "https://bucatoprofumato.com" 4 | date_breached = "2019-11-08" 5 | date = "2022-05-04" 6 | record_count = "10,477" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/cafemom-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "CafeMom" 3 | domain = "https://cafemom.com" 4 | date_breached = "2014-04-10" 5 | date = "2022-05-04" 6 | record_count = "2,628,148" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In 2014, the social network for mothers CafeMom suffered a data breach. The data surfaced alongside a number of other historical breaches including Kickstarter, Bitly and Disqus and contained 2.6 million email addresses and plain text passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/majorgeeks-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MajorGeeks" 3 | domain = "https://majorgeeks.com" 4 | date_breached = "2015-11-15" 5 | date = "2022-05-04" 6 | record_count = "269,548" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In November 2015, almost 270k accounts from the MajorGeeks support forum were breached. The accounts were being actively sold and traded online and included email addresses, salted password hashes and IP addresses. 15 | -------------------------------------------------------------------------------- /content/breaches/nutranextstage-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Nutranextstage" 3 | domain = "https://nutranextstage.com" 4 | date_breached = "2019-05-28" 5 | date = "2022-05-04" 6 | record_count = "2,321" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/opposite-fashion-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Opposite Fashion" 3 | domain = "https://opposite-fashion.com" 4 | date_breached = "2020-02-12" 5 | date = "2022-05-04" 6 | record_count = "21,815" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/pspiso-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "PSP ISO" 3 | domain = "https://pspiso.com" 4 | date_breached = "2015-09-25" 5 | date = "2022-05-04" 6 | record_count = "1,274,070" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately September 2015, the PlayStation PSP forum known as PSP ISO was hacked and almost 1.3 million accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/thecaratshop-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "The Carat Shop" 3 | domain = "https://thecaratshop.co.uk" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "4,590" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/wallysnatural-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Wally's Natural" 3 | domain = "https://wallysnatural.com" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "4,055" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/gamigo-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Gamigo" 3 | domain = "https://gamigo.com" 4 | date_breached = "2012-03-01" 5 | date = "2022-05-04" 6 | record_count = "8,243,604" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In March 2012, the German online game publisher Gamigo was hacked and more than 8 million accounts publicly leaked. The breach included email addresses and passwords stored as weak MD5 hashes with no salt. 15 | -------------------------------------------------------------------------------- /content/breaches/luft-entfeuchter-ch.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Luftentfeuchter Kaufen" 3 | domain = "https://luft-entfeuchter.ch" 4 | date_breached = "2019-09-09" 5 | date = "2022-05-04" 6 | record_count = "1,367" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/onlinefrancestore-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Online France Store" 3 | domain = "https://onlinefrancestore.com" 4 | date_breached = "2020-03-04" 5 | date = "2022-05-04" 6 | record_count = "4,780" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/strongholdsafety-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Stronghold Safety" 3 | domain = "https://strongholdsafety.com" 4 | date_breached = "2018-09-07" 5 | date = "2022-05-04" 6 | record_count = "390" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/2fast4u-be.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "2fast4u" 3 | domain = "https://www.2fast4u.be" 4 | date_breached = "2017-12-20" 5 | date = "2022-05-04" 6 | record_count = "17,706" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | "In December 2017, the Belgian motorcycle forum 2fast4u discovered a data breach of their system. The breach of the vBulletin message board impacted over 17k individual users and exposed email addresses, usersnames and salted MD5 passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/agusiq-torrents-pl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AgusiQ Torrents" 3 | domain = "https://agusiq-torrents.pl" 4 | date_breached = "2019-09-24" 5 | date = "2022-05-04" 6 | record_count = "90,478" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Torrents"] 12 | acknowledged = "No" 13 | +++ 14 | In September 2019, Polish torrent site AgusiQ-Torrents.pl suffered a data breach. The incident exposed 90k member records including email and IP addresses, usernames and passwords stored as MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/anatechelectronics-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Anatech Electronics" 3 | domain = "https://anatechelectronics.com" 4 | date_breached = "2019-02-18" 5 | date = "2022-05-04" 6 | record_count = "2,770" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/blueovaltruckparts-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Blue Oval Truck Parts" 3 | domain = "https://blueovaltruckparts.com" 4 | date_breached = "2017-05-03" 5 | date = "2022-05-04" 6 | record_count = "1,440" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/broadwayproscooters-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Broadway Pro Scooters" 3 | domain = "https://broadwayproscooters.com" 4 | date_breached = "2019-11-03" 5 | date = "2022-05-04" 6 | record_count = "7,082" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/hfmultiferramentas-com-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "HF Ferramentas" 3 | domain = "https://hfmultiferramentas.com.br" 4 | date_breached = "2019-08-29" 5 | date = "2022-05-04" 6 | record_count = "2,599" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/lanwar-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Lanwar" 3 | domain = "https://lanwar.com" 4 | date_breached = "2018-07-28" 5 | date = "2022-05-04" 6 | record_count = "45,120" 7 | privacy = "Not rated" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Names", "Passwords", "Physical addresses", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In July 2018, staff of the Lanwar gaming site discovered a data breach they believe dates back to sometime over the previous several months. The data contained 45k names, email addresses, usernames and plain text passwords. -------------------------------------------------------------------------------- /content/breaches/modaco-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MoDaCo" 3 | domain = "https://modaco.com" 4 | date_breached = "2016-01-01" 5 | date = "2022-05-04" 6 | record_count = "879,703" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["IPB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately January 2016, the UK based Android community known as MoDaCo suffered a data breach which exposed 880k subscriber identities. The data included email and IP addresses, usernames and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/play-gar-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Guns and Robots" 3 | domain = "https://play-gar.com" 4 | date_breached = "2016-04-01" 5 | date = "2022-05-04" 6 | record_count = "143,569" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | 14 | +++ 15 | 16 | In approximately April 2016, the gaming website Guns and Robots suffered a data breach resulting in the exposure of 143k unique records. The data contained email and IP addresses, usernames and SHA-1 password hashes. -------------------------------------------------------------------------------- /content/breaches/realealfaiataria-com-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Realealfaiataria" 3 | domain = "https://realealfaiataria.com.br" 4 | date_breached = "2018-07-12" 5 | date = "2022-05-04" 6 | record_count = "352" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/tianya-cn.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Tianya" 3 | domain = "https://tianya.cn" 4 | date_breached = "2011-12-26" 5 | date = "2022-05-04" 6 | record_count = "29,020,808" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Names", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In December 2011, China's largest online forum known as Tianya was hacked and tens of millions of accounts were obtained by the attacker. The leaked data included names, usernames and email addresses. 15 | -------------------------------------------------------------------------------- /content/breaches/vendoguardachuva-com-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Vendo Guarda-Chuva" 3 | domain = "https://vendoguardachuva.com.br" 4 | date_breached = "2019-03-19" 5 | date = "2022-05-04" 6 | record_count = "4,793" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/vipracingshopping-com-br.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Vip Racing Shopping" 3 | domain = "https://vipracingshopping.com.br" 4 | date_breached = "2016-08-19" 5 | date = "2022-05-04" 6 | record_count = "985" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/xbox360iso-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Xbox 360 ISO" 3 | domain = "https://xbox360iso.com" 4 | date_breached = "2015-09-25" 5 | date = "2022-05-04" 6 | record_count = "1,296,959" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately September 2015, the XBOX 360 forum known as XBOX360 ISO was hacked and 1.2 million accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/xsplit-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "XSplit" 3 | domain = "https://xsplit.com" 4 | date_breached = "2013-11-07" 5 | date = "2022-05-04" 6 | record_count = "2,983,472" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Names", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In November 2013, the makers of gaming live streaming and recording software XSplit was compromised in an online attack. The data breach leaked almost 3M names, email addresses, usernames and hashed passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/acne-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Acne.org" 3 | domain = "https://acne.org" 4 | date_breached = "2014-11-25" 5 | date = "2022-05-04" 6 | record_count = "432,943" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["IPB"] 10 | breached_data = ["Dates of birth", "Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In November 2014, the acne website acne.org suffered a data breach that exposed over 430k forum members' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/animegame-me.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "AnimeGame" 3 | domain = "https://animegame.me" 4 | date_breached = "2020-02-27" 5 | date = "2022-05-04" 6 | record_count = "1,431,378" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In February 2020, the gaming website AnimeGame suffered a data breach. The incident affected 1.4M subscribers and exposed email addresses, usernames and passwords stored as salted MD5 hashes. The data was subsequently shared on a popular hacking forum. 15 | -------------------------------------------------------------------------------- /content/breaches/botoflegends-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Bot of Legends" 3 | domain = "https://botoflegends.com" 4 | date_breached = "2014-11-13" 5 | date = "2022-05-04" 6 | record_count = "238,373" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In November 2014, the forum for Bot of Legends suffered a data breach. The IP.Board forum contained 238k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/co188-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Civil Online" 3 | domain = "https://co188.com" 4 | date_breached = "2011-07-10" 5 | date = "2022-05-04" 6 | record_count = "7,830,195" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In mid-2011, data was allegedly obtained from the Chinese engineering website known as Civil Online and contained 7.8M accounts. The data in the breach contains email and IP addresses, user names and MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/kickstarter-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Kickstarter" 3 | domain = "https://kickstarter.com" 4 | date_breached = "2014-02-16" 5 | date = "2022-05-04" 6 | record_count = "5,176,463" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-1"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In February 2014, the crowdfunding platform Kickstarter announced they'd suffered a data breach. The breach contained almost 5.2 million unique email addresses, usernames and salted SHA1 hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/topstreetperformance-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Top Street Performance" 3 | domain = "https://topstreetperformance.com" 4 | date_breached = "2019-12-20" 5 | date = "2022-05-04" 6 | record_count = "1,910" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/uiggy-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Uiggy" 3 | domain = "https://uiggy.com" 4 | date_breached = "2016-06-01" 5 | date = "2022-05-04" 6 | record_count = "2,682,650" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses", "Genders", "Names", "Social connections", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In June 2016, the Facebook application known as Uiggy was hacked and 4.3M accounts were exposed, 2.7M of which had email addresses against them. The leaked accounts also exposed names, genders and the Facebook ID of the owners. 15 | -------------------------------------------------------------------------------- /content/breaches/xpgamesaves-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "XPG" 3 | domain = "https://xpgamesaves.com" 4 | date_breached = "2016-01-01" 5 | date = "2022-05-04" 6 | record_count = "890,341" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["IPB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately early 2016, the gaming website Xpgamesaves (XPG) suffered a data breach resulting in the exposure of 890k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/bolt-cd.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Bolt" 3 | domain = "https://bolt.cd" 4 | date_breached = "2017-03-01" 5 | date = "2022-05-04" 6 | record_count = "995,274" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately March 2017, the file sharing website Bolt suffered a data breach resulting in the exposure of 995k unique user records. The data was sourced from their vBulletin forum and contained email and IP addresses, usernames and salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/ffshrine-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Final Fantasy Shrine" 3 | domain = "https://ffshrine.org" 4 | date_breached = "2015-09-18" 5 | date = "2022-05-04" 6 | record_count = "620,677" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In September 2015, the Final Fantasy discussion forum known as FFShrine was breached and the data dumped publicly. Approximately 620k records were released containing email addresses, IP addresses and salted hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/powerbot-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Powerbot" 3 | domain = "https://powerbot.org" 4 | date_breached = "2014-09-01" 5 | date = "2022-05-04" 6 | record_count = "503,501" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately September 2014, the RuneScape bot website Powerbot suffered a data breach resulting in the exposure of over half a million unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. -------------------------------------------------------------------------------- /content/breaches/sktorrent-eu.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "SkTorrent" 3 | domain = "https://sktorrent.eu" 4 | date_breached = "2016-02-19" 5 | date = "2022-05-04" 6 | record_count = "117,070" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In February 2016, the Slovak torrent tracking site SkTorrent was hacked and over 117k records leaked online. The data dump included usernames, email addresses and passwords stored in plain text. 15 | -------------------------------------------------------------------------------- /content/breaches/slitexbedrijfskleding-nl.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Slitex Bedrijfskleding" 3 | domain = "https://slitexbedrijfskleding.nl" 4 | date_breached = "2019-07-26" 5 | date = "2022-05-04" 6 | record_count = "2,231" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/thetvdb-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "TheTVDB.com" 3 | domain = "https://thetvdb.com" 4 | date_breached = "2017-11-21" 5 | date = "2022-05-04" 6 | record_count = "181,871" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MySQL5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In November 2017, the open television database known as TheTVDB.com suffered a data breach. The breached data was posted to a hacking forum and included 182k records with usernames, email addresses and MySQL password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/bombuj-eu.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Bombuj.eu" 3 | domain = "https://bombuj.eu" 4 | date_breached = "2018-12-07" 5 | date = "2022-05-04" 6 | record_count = "575,437" 7 | privacy = "Not rated" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In December 2018, the Slovak website for watching movies online for free Bombuj.eu suffered a data breach. The incident exposed over 575k unique email addresses and passwords stored as unsalted MD5 hashes. No response was received from Bombuj.eu when contacted about the incident. 15 | -------------------------------------------------------------------------------- /content/breaches/brazzers-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Brazzers" 3 | domain = "https://brazzers.com" 4 | date_breached = "2013-04-01" 5 | date = "2022-05-04" 6 | record_count = "790,724" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["plaintext"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In April 2013, the adult website known as Brazzers was hacked and 790k accounts were exposed publicly. Each record included a username, email address and password stored in plain text. 15 | -------------------------------------------------------------------------------- /content/breaches/dangdang-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Dangdang" 3 | domain = "https://dangdang.com" 4 | date_breached = "2011-06-01" 5 | date = "2022-05-04" 6 | record_count = "4,848,734" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["N/A"] 10 | breached_data = ["Email addresses"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In 2011, the Chinese e-commerce site Dangdang suffered a data breach. The incident exposed over 4.8 million unique email addresses which were subsequently traded online over the ensuing years. 15 | -------------------------------------------------------------------------------- /content/breaches/eham-ru.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Eham Forums" 3 | domain = "https://eham.ru" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "746" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "www.eham.ru_746.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/hltv-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "HLTV" 3 | domain = "https://hltv.org" 4 | date_breached = "2016-06-19" 5 | date = "2022-05-04" 6 | record_count = "611,070" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["bcrypt"] 10 | breached_data = ["Email addresses", "Names", "Passwords", "Usernames", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In June 2016, the "home of competitive Counter Strike" website HLTV was hacked and 611k accounts were exposed. The attack led to the exposure of names, usernames, email addresses and bcrypt hashes of passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/mcbans-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MCBans" 3 | domain = "https://mcbans.com" 4 | date_breached = "2016-10-27" 5 | date = "2022-05-04" 6 | record_count = "119,948" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-512"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames", "Website activity"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In October 2016, the Minecraft banning service known as MCBans suffered a data breach resulting in the exposure of 120k unique user records. The data contained email and IP addresses, usernames and password hashes of unknown format. -------------------------------------------------------------------------------- /content/breaches/myqsx-net.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MyQSX" 3 | domain = "https://myqsx.net" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "1,295" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "myqsx.net_1295.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/petflow-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "PetFlow" 3 | domain = "https://petflow.com" 4 | date_breached = "2017-12-09" 5 | date = "2022-05-04" 6 | record_count = "990,919" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In December 2017, the pet care delivery service PetFlow suffered a data breach which consequently appeared for sale on a dark web marketplace. Almost 1M accounts were impacted and exposed email addresses and passwords stored as unsalted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/protectivemasksdirect-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Protective Masks Direct" 3 | domain = "https://protectivemasksdirect.co.uk" 4 | date_breached = "2019-12-28" 5 | date = "2022-05-04" 6 | record_count = "1,936" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["SHA-256"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/superiorwholesaleblinds-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Superior Wholesale Blinds" 3 | domain = "https://superiorwholesaleblinds.com" 4 | date_breached = "2019-12-03" 5 | date = "2022-05-04" 6 | record_count = "6,586" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/thelakedistrictwalker-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "The Lake District Walker" 3 | domain = "https://thelakedistrictwalker.co.uk" 4 | date_breached = "2016-02-29" 5 | date = "2022-05-04" 6 | record_count = "1,355" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/warmane-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Warmane" 3 | domain = "https://warmane.com" 4 | date_breached = "2016-12-01" 5 | date = "2022-05-04" 6 | record_count = "1,116,256" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Dates of birth", "Email addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately December 2016, the online service for World of Warcraft private servers Warmane suffered a data breach. The incident exposed over 1.1M accounts including usernames, email addresses, dates of birth and salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/apacheindustrialworkwear-co-uk.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Apache Industrial Workwear" 3 | domain = "https://apacheindustrialworkwear.co.uk" 4 | date_breached = "2020-02-12" 5 | date = "2022-05-04" 6 | record_count = "14,991" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Shopping"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection of databases originating from various online stores using Magento, a self-hosted Ecommerce platform. In total, 85 databases were leaked. The collection was released on RaidForums by the user sqldb on March 29, 2020. 15 | -------------------------------------------------------------------------------- /content/breaches/bakerro-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Bakerro" 3 | domain = "https://bakerro.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "8,894" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "bakerro.com_8894.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/cheapassgamer-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "CheapAssGamer.com" 3 | domain = "https://cheapassgamer.com" 4 | date_breached = "2015-07-01" 5 | date = "2022-05-04" 6 | record_count = "444,767" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately mid-2015, the forum for CheapAssGamer.com suffered a data breach. The database from the IP.Board based forum contained 445k accounts including usernames, email and IP addresses and salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/hongfire-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "HongFire" 3 | domain = "https://hongfire.com" 4 | date_breached = "2015-03-01" 5 | date = "2022-05-04" 6 | record_count = "999,991" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Dates of birth", "Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In March 2015, the anime and manga forum HongFire suffered a data breach. The hack of their vBulletin forum led to the exposure of 1 million accounts along with email and IP addresses, usernames, dates of birth and salted MD5 passwords. 15 | -------------------------------------------------------------------------------- /content/breaches/mangafox-me.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MangaFox.me" 3 | domain = "https://mangafox.me" 4 | date_breached = "2016-06-01" 5 | date = "2022-05-04" 6 | record_count = "1,311,610" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Dates of birth", "Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In approximately July 2016, the manga website known as mangafox.me suffered a data breach. The vBulletin based forum exposed 1.3 million accounts including usernames, email and IP addresses, dates of birth and salted MD5 password hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/mctina-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "MCTINA" 3 | domain = "https://mctina.org" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "19,518" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "mctina.org_19518.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/otbva-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "OTBVA" 3 | domain = "https://otbva.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "38,303" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "www.otbva.com_38303.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/poker-org.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Poker.org" 3 | domain = "https://poker.org" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "1,795" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "poker.org_1795.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/reboot-hr.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Reboot" 3 | domain = "https://reboot.hr" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "1,229" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "www.reboot.hr_1229.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/snail-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Snail" 3 | domain = "https://snail.com" 4 | date_breached = "2015-03-14" 5 | date = "2022-05-04" 6 | record_count = "1,410,899" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["MD5"] 10 | breached_data = ["Email addresses", "IP addresses", "Passwords", "Usernames"] 11 | categories = [] 12 | acknowledged = "No" 13 | +++ 14 | In March 2015, the gaming website Snail suffered a data breach that impacted 1.4 million subscribers. The impacted data included usernames, IP and email addresses and passwords stored as unsalted MD5 hashes. 15 | -------------------------------------------------------------------------------- /content/breaches/3djobs-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "3djobs Forums" 3 | domain = "https://3djobs.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "635" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "www.3djobs.com_635.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/aviafora-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Aviafora" 3 | domain = "https://aviafora.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "492" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "www.aviafora.com_492.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/clan30-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Clan30 Forums" 3 | domain = "https://clan30.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "3,443" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "clan30.com_3443.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/debanked-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "deBanked" 3 | domain = "https://debanked.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "2,610" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "debanked.com_2610.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/dynamite-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Dynamite" 3 | domain = "https://dynamite.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "426" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "www.dynamite.com_426.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/efupw-com.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Efupw Forums" 3 | domain = "https://efupw.com" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "6,749" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "www.efupw.com_6749.txt". 15 | -------------------------------------------------------------------------------- /content/breaches/fakeornot-fr.md: -------------------------------------------------------------------------------- 1 | +++ 2 | title = "Fake or Not" 3 | domain = "https://fakeornot.fr" 4 | date_breached = "2019-09-25" 5 | date = "2022-05-04" 6 | record_count = "780" 7 | privacy = "Public" 8 | Verified = "True" 9 | hashing = ["vB"] 10 | breached_data = ["Email addresses", "Passwords", "Usernames", "IP addresses"] 11 | categories = ["Forums"] 12 | acknowledged = "No" 13 | +++ 14 | This breach was found in a large collection named "xam's DB Pack". In total, 316 websites databases were leaked, all due to a single vulnerability in the vBulletin software. The breach pack was released on RaidForums by the user xam on October 17, 2019. The filename that this entry comes from is "fakeornot.fr_780.txt". 15 | --------------------------------------------------------------------------------