Showing preview only (734K chars total). Download the full file or copy to clipboard to get everything.
Repository: doormanBreach/FreeDatabreaches
Branch: main
Commit: dd4ea6dd503d
Files: 811
Total size: 592.8 KB
Directory structure:
gitextract_hez9cc1b/
├── README.md
└── breaches/
├── 000webhost.md
├── 123RF.md
├── 126.md
├── 17173.md
├── 17Media.md
├── 2844Breaches.md
├── 2fast4u.md
├── 500px.md
├── 7k7k.md
├── 8fit.md
├── 8tracks.md
├── ABFRL.md
├── AIType.md
├── AKP.md
├── APKTW.md
├── Abandonia.md
├── Abandonia2022.md
├── AbuseWithUs.md
├── AcneOrg.md
├── ActMobile.md
├── Activision.md
├── Acuity.md
├── Adapt.md
├── Adecco.md
├── Adobe.md
├── AdultFanFiction.md
├── AdultFriendFinder.md
├── AdultFriendFinder2016.md
├── AdvanceAutoParts.md
├── AerServ.md
├── AgusiQTorrents.md
├── AhaShare.md
├── Aimware.md
├── Aipai.md
├── Ajarn.md
├── AllegedATT.md
├── AmartFurniture.md
├── Ancestry.md
├── AndroidForums.md
├── AndroidLista.md
├── AnimalJam.md
├── AnimeGame.md
├── AnimeLeague.md
├── AnimePlanet.md
├── Animoto.md
├── AntiPublic.md
├── ApexSMS.md
├── Apollo.md
├── Appartoo.md
├── Appen.md
├── Aptoide.md
├── ArmorGames.md
├── ArmyForceOnline.md
├── Artsy.md
├── Artvalue.md
├── AshleyMadison.md
├── Astoria.md
├── AstroPID.md
├── Aternos.md
├── AtlasQuantum.md
├── Atmeltomo.md
├── Audi.md
├── Autocentrum.md
├── Autotrader.md
├── Avast.md
├── Avito.md
├── Avvo.md
├── B2BUSABusinesses.md
├── BTCAlpha.md
├── BTCE.md
├── BTSec.md
├── BVD.md
├── BabyNames.md
├── Badoo.md
├── BannerBit.md
├── Banorte.md
├── BattlefieldHeroes.md
├── Battlefy.md
├── BeautifulPeople.md
├── Bell.md
├── Bell2017.md
├── Benchmark.md
├── Bestialitysextaboo.md
├── Bhinneka.md
├── BigMoneyJobs.md
├── BinWeevils.md
├── BiohackMe.md
├── BitTorrent.md
├── BitcoinTalk.md
├── Bitly.md
├── BlackBerryFans.md
├── BlackHatWorld.md
├── BlackSpigotMC.md
├── BlankMediaGames.md
├── BleachAnime.md
├── BloomsToday.md
├── BlueSnapRegpack.md
├── Bolt.md
├── BombujEu.md
├── Bonobos.md
├── BookCrossing.md
├── Bookchor.md
├── Bookmate.md
├── BotOfLegends.md
├── BourseDesVols.md
├── Boxee.md
├── BrandNewTube.md
├── Brazzers.md
├── BreachForums.md
├── BreachForumsClone.md
├── BtoBet.md
├── Bukalapak.md
├── BulgarianNationalRevenueAgency.md
├── BusinessAcumen.md
├── CDEK.md
├── CDProjektRed.md
├── CERTPolandPhish.md
├── COMELEC.md
├── CTARS.md
├── CafeMom.md
├── CafePress.md
├── CannabisForum.md
├── Canva.md
├── CapialEconomics.md
├── CardingMafia.md
├── CardingMafiaDec2021.md
├── CashCrate.md
├── Catho.md
├── Chatbooks.md
├── CheapAssGamer.md
├── Chegg.md
├── Chess.md
├── Chowbus.md
├── ChrisLeong.md
├── Cit0day.md
├── CityBee.md
├── CityJerks.md
├── CivilOnline.md
├── ClashOfKings.md
├── ClearVoiceSurveys.md
├── ClickASnap.md
├── ClixSense.md
├── CloudPets.md
├── ClubPenguinRewritten.md
├── ClubPenguinRewrittenJul2019.md
├── Coachella.md
├── CoinMarketCap.md
├── CoinTracker.md
├── Coinmama.md
├── Collection1.md
├── Comcast.md
├── CondoCom.md
├── Convex.md
├── CouponMomAndArmorGames.md
├── CrackCommunity.md
├── CrackedTO.md
├── CrackingForum.md
├── CraftRise.md
├── Creative.md
├── CrimeAgencyVBulletin.md
├── CrossFire.md
├── CutoutPro.md
├── CyberServe.md
├── D3scene.md
├── DCHealth.md
├── DDO.md
├── DLH.md
├── DVDShopCH.md
├── DaFont.md
├── DailyObjects.md
├── DailyQuiz.md
├── Dailymotion.md
├── Dangdang.md
├── DaniWeb.md
├── DatPiff.md
├── DataAndLeads.md
├── DataCamp.md
├── DataEnrichment.md
├── DateHotBrunettes.md
├── Dave.md
├── DecoratingTheHouse.md
├── Deezer.md
├── DemonForums.md
├── Descomplica.md
├── DevilTorrents.md
├── DietCom.md
├── Digimon.md
├── Disqus.md
├── DivXSubTitles.md
├── Dodonew.md
├── Dominos.md
├── DominosIndia.md
├── Doomworld.md
├── DoorDash.md
├── Dota2.md
├── Doxbin.md
├── DriveSure.md
├── Drizly.md
├── Dropbox.md
├── Dubsmash.md
├── DucksUnlimited.md
├── DuelingNetwork.md
├── Dunzo.md
├── Duolingo.md
├── Duowan.md
├── Dymocks.md
├── ECB.md
├── ECCIE.md
├── EPal.md
├── EatStreet.md
├── Eatigo.md
├── Edmodo.md
├── Elance.md
├── Elanic.md
├── ElasticsearchSalesLeads.md
├── Emotet.md
├── Emuparadise.md
├── EpicBot.md
├── EpicGames.md
├── EpicNPC.md
├── Epik.md
├── Eroticy.md
├── Eskimi.md
├── EstanteVirtual.md
├── Estonia.md
├── Ethereum.md
├── EuropaJobs.md
├── Evermotion.md
├── EverybodyEdits.md
├── Evite.md
├── Evony.md
├── Exactis.md
├── Experian.md
├── Experian2020.md
├── ExploitIn.md
├── ExploreTalent.md
├── ExploreTalentAug2024.md
├── Exvagos.md
├── Eye4Fraud.md
├── EyeEm.md
├── FFShrine.md
├── FLVS.md
├── FaceUP.md
├── Facebook.md
├── FacebookMarketplace.md
├── Facepunch.md
├── Factual.md
├── Famm.md
├── Fanpass.md
├── FantasyFootballHub.md
├── FashionFantasyGame.md
├── FilmaiIn.md
├── Fitmart.md
├── FlashFlashRevolution.md
├── FlashFlashRevolution2019.md
├── Flashback.md
├── FlexBooker.md
├── Fling.md
├── Flipkart.md
├── Foodora.md
├── Forbes.md
├── ForumCommunity.md
├── Fotolog.md
├── FoxyBingo.md
├── FreedomHostingII.md
├── FreshMenu.md
├── Fridae.md
├── Funimation.md
├── FunnyGames.md
├── FurAffinity.md
├── GFAN.md
├── GGCorp.md
├── GPSUnderground.md
├── GSMHosting.md
├── GTAGaming.md
├── Gaadi.md
├── Gab.md
├── GameSalad.md
├── GameSprite.md
├── GameTuts.md
├── GamerzPlanet.md
├── GamesBox.md
├── Gamigo.md
├── GamingMonk.md
├── GateHub.md
├── Gawker.md
├── GeekedIn.md
├── Gemini.md
├── Gemplex.md
├── GenesisMarket.md
├── GeniusU.md
├── GetRevengeOnYourEx.md
├── Gett.md
├── GiantTiger.md
├── GiveSendGo.md
├── Glofox.md
├── GoGames.md
├── GoNinja.md
├── GoldSilver.md
├── Gravatar.md
├── GunAuction.md
├── GunsDotCom.md
├── Guntrader.md
├── HDBFinancialServices.md
├── HIAPK.md
├── HLTV.md
├── HTCMania.md
├── HTHStudios.md
├── Habibs.md
├── HackForums.md
├── HackingTeam.md
├── HalloweenSpot.md
├── Hathway.md
├── HauteLook.md
├── Havenly.md
├── HealthNowNetworks.md
├── Hemmakvall.md
├── Hemmelig.md
├── HeroesOfGaia.md
├── HeroesOfNewerth.md
├── Hjedd.md
├── HomeChef.md
├── HongFire.md
├── HookersNL.md
├── HorseIsle.md
├── HoundDawgs.md
├── Houzz.md
├── Hub4Tech.md
├── Hurb.md
├── HuskyOwners.md
├── IDCGames.md
├── IGF.md
├── IIMJobs.md
├── ILikeCheats.md
├── Imavex.md
├── IndiHome.md
├── IndiaMART.md
├── IndianRailways.md
├── InflateVids.md
├── Insanelyi.md
├── InstantCheckmate.md
├── InstitutoNacionalDeDeportesDeChile.md
├── Intelimost.md
├── Interpals.md
├── JD.md
├── JDGroup.md
├── JamTangan.md
├── James.md
├── Jefit.md
├── JobAndTalent.md
├── JobStreet.md
├── Jobzone.md
├── JoomlArt.md
├── JoyGames.md
├── JukinMedia.md
├── JustDate.md
├── KMRU.md
├── Kaneva.md
├── KasperskyClub.md
├── KayoMoe.md
├── Kickstarter.md
├── Kimsufi.md
├── KitchenPal.md
├── KiwiFarms.md
├── KnownCircle.md
├── Knuddels.md
├── KodiFoundation.md
├── KomplettFritid.md
├── Kreditplus.md
├── LBB.md
├── LDLC.md
├── LOTR.md
├── LaPosteMobile.md
├── Lanwar.md
├── Lastfm.md
├── Lazada.md
├── LeSlipFrancais.md
├── LeadHunter.md
├── LeagueOfLegends.md
├── LeakedReality.md
├── Ledger.md
├── Leet.md
├── LegendasTV.md
├── Life360.md
├── Lifebear.md
├── Lifeboat.md
├── LightsHope.md
├── Liker.md
├── LimeVPN.md
├── LinkedIn.md
├── LinkedInScrape.md
├── LinkedInScrape2023.md
├── LinuxForums.md
├── LinuxMint.md
├── LittleMonsters.md
├── LiveAuctioneers.md
├── LiveJournal.md
├── Livpure.md
├── LizardSquad.md
├── Locally.md
├── Lolzteam.md
├── Lookbook.md
├── Lookiero.md
├── LoungeBoard.md
├── LuLu.md
├── LuminPDF.md
├── Luxottica.md
├── LyricsMania.md
├── MCBans.md
├── MDPI.md
├── MEO.md
├── MGM.md
├── MGM2022Update.md
├── MMGFusion.md
├── MPGH.md
├── Mac-Torrents.md
├── MacForums.md
├── MacGeneration.md
├── MagicDuel.md
├── MailRu.md
├── MajorGeeks.md
├── MalindoAir.md
├── MallCZ.md
├── Malwarebytes.md
├── MangaDex.md
├── MangaFox.md
├── MangaTraders.md
├── Mangatoon.md
├── ManipulatedCaiman.md
├── Mappery.md
├── MarketMoveis.md
├── Mashable.md
├── MasterDeeds.md
├── MastercardPricelessSpecials.md
├── Mate1.md
├── Mathway.md
├── MechoDownload.md
├── MediaWorks.md
├── MeetMindful.md
├── MemeChat.md
├── MindJolt.md
├── MinecraftPocketEditionForum.md
├── MinecraftWorldMap.md
├── Minefield.md
├── Minehut.md
├── Minted.md
├── MoDaCo.md
├── MobiFriends.md
├── ModernBusinessSolutions.md
├── MoneyBookers.md
├── Moneycontrol.md
├── MoreleNet.md
├── MortalOnline.md
├── MovieBoxPro.md
├── MovieForums.md
├── MrExcel.md
├── MrGreenGaming.md
├── MultiplayerIt.md
├── MuslimDirectory.md
├── MuslimMatch.md
├── MyFHA.md
├── MyFitnessPal.md
├── MyHeritage.md
├── MyPertamina.md
├── MySpace.md
├── MyVidster.md
├── NVIDIA.md
├── NamelessMalware.md
├── NapsGear.md
├── NationalPublicData.md
├── NaughtyAmerica.md
├── NazApi.md
├── NeimanMarcus.md
├── NemoWeb.md
├── Neopets.md
├── NetEase.md
├── NetGalley.md
├── NetProspex.md
├── Neteller.md
├── Netlog.md
├── Netshoes.md
├── NextGenUpdate.md
├── NexusMods.md
├── Nihonomaru.md
├── Nitro.md
├── Nival.md
├── NonNudeGirls.md
├── NotAcxiom.md
├── NotSOCRadar.md
├── Nulled.md
├── NulledCH.md
├── NurseryCam.md
├── OGUsers.md
├── OGUsers2020.md
├── OGUsers2021.md
├── OGUsers2022.md
├── OMGPOP.md
├── OVH.md
├── OnlineTrade.md
├── OnlinerSpambot.md
├── Onverse.md
├── OpenCSGO.md
├── OpenSubtitles.md
├── OperationEndgame.md
├── OrderSnapp.md
├── OrdineAvvocatiDiRoma.md
├── OwnedCore.md
├── Oxfam.md
├── PDL.md
├── PHPFreaks.md
├── PPCGeeks.md
├── PS3Hax.md
├── PSPISO.md
├── PSX-Scene.md
├── PaddyPower.md
├── Pampling.md
├── Pandabuy.md
├── ParagonCheats.md
├── Parapa.md
├── ParkMobile.md
├── Patreon.md
├── PayAsUGym.md
├── PayHere.md
├── PaySystemTech.md
├── Paytm.md
├── Peatix.md
├── Pemiblanc.md
├── PeoplesEnergy.md
├── PetFlow.md
├── Phoenix.md
├── PhoneHouse.md
├── PipingRock.md
├── PixelFederation.md
├── Pixlr.md
├── PlanetCalypso.md
├── PlanetIce.md
├── PlayCyberGames.md
├── Playbook.md
├── Playgar.md
├── Plex.md
├── PlutoTV.md
├── Pokebip.md
├── PokemonCreed.md
├── PokemonNegro.md
├── PoliceOne.md
├── PolishCredentials.md
├── Poshmark.md
├── Powerbot.md
├── PreenMe.md
├── ProctorU.md
├── ProgrammingForums.md
├── Promo.md
├── Promofarma.md
├── PropTiger.md
├── Protemps.md
├── QIP.md
├── Qakbot.md
├── QatarNationalBank.md
├── QuantumBooter.md
├── QuestionPro.md
├── Quidd.md
├── QuinStreet.md
├── R2-2017.md
├── R2Games.md
├── RaidForums.md
├── RailYatri.md
├── Rambler.md
├── Rankwatch.md
├── Raychat.md
├── RbxRocks.md
├── ReadNovel.md
├── RealDudesInc.md
├── RealEstateMogul.md
├── RedDoorz.md
├── RedLineStealer.md
├── Reincubate.md
├── RentoMojo.md
├── RepublicanPartyOfTexas.md
├── RetinaX.md
├── Reverb-Nation.md
├── Rightbiz.md
├── RiverCityMedia.md
├── Robinhood.md
├── Roblox.md
├── RobloxDeveloperConference.md
├── RobloxDeveloperConference2024.md
├── Roll20.md
├── Romwe.md
├── RosebuttBoard.md
├── RoyalEnfield.md
├── RussianAmerica.md
├── SCDailyPhoneSpamList.md
├── SHEIN.md
├── SIAE.md
├── SalvadoranCitizens.md
├── SaverSpy.md
├── Scentbird.md
├── SchoolDistrict42.md
├── Seedpeer.md
├── Sephora.md
├── ServerPact.md
├── SevenRooms.md
├── Shadi.md
├── Shadow.md
├── ShareThis.md
├── Shitexpress.md
├── ShockGore.md
├── ShoeZone.md
├── ShopBack.md
├── ShopperPlus.md
├── ShortEdition.md
├── Shotbow.md
├── SirHurt.md
├── SitePoint.md
├── SkTorrent.md
├── Slickwraps.md
├── SlideTeam.md
├── Smogon.md
├── Snail.md
├── Snapchat.md
├── SoarGames.md
├── SocialEngineered.md
├── Solomid.md
├── Sonicbids.md
├── Sony.md
├── Soundwave.md
├── SpecialKSpamList.md
├── Sphero.md
├── Spirol.md
├── Sport2000.md
├── Spoutible.md
├── SprashivaiRu.md
├── SpyFone.md
├── Spytech.md
├── Staminus.md
├── StarNet.md
├── StarTribune.md
├── Start.md
├── SterKinekor.md
├── StockX.md
├── StoryBird.md
├── Straffic.md
├── Stratfor.md
├── StreetEasy.md
├── Stripchat.md
├── StrongholdKingdoms.md
├── SubaGames.md
├── SumoTorrent.md
├── SundryFiles.md
├── SuperVPNGeckoVPN.md
├── SurveyLama.md
├── SvenskaMagic.md
├── SweClockers.md
├── SwordFantasy.md
├── Swvl.md
├── T2.md
├── TAPAirPortugal.md
├── TGBUS.md
├── TRAI.md
├── TaiLieu.md
├── Tamodo.md
├── Tangerine.md
├── Taobao.md
├── Tappware.md
├── Taringa.md
├── Technic.md
├── Teespring.md
├── TelegramCombolists.md
├── TelegramStealerLogs.md
├── Teracod.md
├── Terravision.md
├── Tesco.md
├── TheCandidBoard.md
├── TheFappening.md
├── TheFlyOnTheWall.md
├── TheGradCafe.md
├── TheHeritageFoundation.md
├── ThePostMillennial.md
├── TheTVDB.md
├── Thingiverse.md
├── ThisHabboForum.md
├── Tianya.md
├── Ticketcounter.md
├── Ticketek.md
├── Ticketfly.md
├── Tigo.md
├── Tokopedia.md
├── ToonDoo.md
├── TorrentInvites.md
├── Toumei.md
├── Tout.md
├── Tracki.md
├── Traderie.md
├── TravelOK.md
├── Travelio.md
├── Trello.md
├── TrikSpamBotnet.md
├── Trillian.md
├── TruckersMP.md
├── TrueFire.md
├── TruthFinder.md
├── Tumblr.md
├── TunedGlobal.md
├── Tunngle.md
├── Twitter.md
├── Twitter200M.md
├── UC.md
├── Ubook.md
├── Uiggy.md
├── Ulmon.md
├── UnderworldEmpire.md
├── UnicoCampania.md
├── Universarium.md
├── UnrealEngine.md
├── Upstox.md
├── UtahGunExchange.md
├── VBulletin.md
├── VINs.md
├── VK.md
├── VNG.md
├── VTech.md
├── VTightGel.md
├── Vakinha.md
├── Vastaamo.md
├── Vedantu.md
├── VerificationsIO.md
├── Verified.md
├── Vermillion.md
├── Vianet.md
├── VictoryPhones.md
├── ViewFines.md
├── VivaAir.md
├── Vodafone.md
├── VoidTO.md
├── WHMCS.md
├── WIIUISO.md
├── WPSandbox.md
├── WPT.md
├── Wakanim.md
├── Wanelo.md
├── WarInc.md
├── Warframe.md
├── Warmane.md
├── WashingtonStateFoodWorkerCard.md
├── Wattpad.md
├── WeHeartIt.md
├── WeLeakInfo.md
├── WedMeGood.md
├── Weee.md
├── Wendys.md
├── WhiteRoom.md
├── Whitepages.md
├── WienerBuchereien.md
├── WifeLovers.md
├── WildStar.md
├── Win7Vista.md
├── Wishbone.md
├── Wishbone2020.md
├── WiziShop.md
├── WoTLabs.md
├── Wongnai.md
├── XKCD.md
├── XPGameSaves.md
├── XSplit.md
├── Xbox-Scene.md
├── Xbox360ISO.md
├── Xiaomi.md
├── Yahoo.md
├── Yam.md
├── Yandex.md
├── Yatra.md
├── YoteprestoCom.md
├── YouNow.md
├── YouPorn.md
├── Youku.md
├── YouveBeenScraped.md
├── ZAPHosting.md
├── Zacks.md
├── ZadigVoltaire.md
├── Zhenai.md
├── Zomato.md
├── Zoomcar.md
├── Zoosk.md
├── Zoosk2020.md
├── Zooville.md
├── Zurich.md
├── Zynga.md
├── bigbasket.md
├── boAt.md
├── dBforums.md
├── db8151dd.md
├── devkitPro.md
├── eThekwiniMunicipality.md
├── gPotato.md
├── iDTech.md
├── iDressup.md
├── iMenu360.md
├── iMesh.md
├── iPmart.md
├── imgur.md
├── ixigo.md
├── mSpy.md
├── mSpy2024.md
├── myRepoSpace.md
├── pcTattletale.md
├── piZap.md
├── uTorrent.md
├── uuu9.md
├── xHamster.md
└── xat.md
================================================
FILE CONTENTS
================================================
================================================
FILE: README.md
================================================
# 📂 Historical Data Breaches Archive
Welcome to the **Historical Data Breaches Archive**! This repository contains a comprehensive and ever-growing collection of data breaches throughout history. All the data breaches stored here are publicly available and can be freely downloaded for research, analysis, or educational purposes.
## 🔍 About This Repository
This repository is a centralized hub for **data breaches** that have occurred over the years. Whether you are a cybersecurity researcher, data analyst, or simply curious about data breaches, you can access, download, and explore these datasets.
### Key Features:
- 📜 **Complete List of Data Breaches**: Every breach is cataloged with its details.
- 📥 **Free Downloadable Files**: Each breach can be freely downloaded using the provided links.
- 🗂️ **Organized by Year and Industry**: The breaches are sorted for easier navigation.
## 📁 Directory of Data Breaches
All the data breach files are available in the `Data` folder of this repository. They are sorted by year and can be accessed directly through the links below:
## 🚀 How to Download
You can freely download any data breach file using the links provided in the `Data` directory. Each breach is stored in a separate folder with detailed information. Follow these steps:
1. Navigate to the [Data Breaches Directory](/breaches).
2. Choose the breach file you're interested in.
3. Click on the download link to save the file to your local machine.
## 🛡️ Why Explore Data Breaches?
Studying data breaches can help:
- **Understand cybersecurity vulnerabilities**.
- **Prevent future breaches**.
- **Analyze attack trends and patterns**.
Whether you're doing research or simply want to explore, these datasets can help you uncover valuable insights.
## 📚 Educational and Research Use
These datasets are free to use for:
- **Cybersecurity research**.
- **Data science projects**.
- **Academic studies**.
You can also contribute new data breaches by submitting a pull request or by suggesting updates via an issue.
## 📊 Popular Breaches in the Archive
Here are some of the most notable breaches included in this archive:
- **2013 Yahoo Breach** – affected 3 billion accounts.
- **2019 Verification.io Breach** – exposed sensitive information of 147 million individuals.
- **2021 Facebook Breach** – impacted 106 million people.
## 🔧 Contributions & Issues
If you come across a new data breach or notice outdated information, feel free to contribute. You can submit a pull request or open an issue for review.
## 🔗 External Resources
If you're interested in learning more about data breaches or cybersecurity:
- [Stay Safe Online - Cybersecurity Tips](https://staysafeonline.org)
- [Have I Been Pwned](https://haveibeenpwned.com)
================================================
FILE: breaches/000webhost.md
================================================
# 000webhost database leak
## Description
2015-03-01
In approximately March 2015, the free web hosting provider <a href="http://www.troyhunt.com/2015/10/breaches-traders-plain-text-passwords.html" target="_blank" rel="noopener">000webhost suffered a major data breach</a> that exposed almost 15 million customer records. The data was sold and traded before 000webhost was alerted in October. The breach included names, email addresses and plain text passwords.
## Breached data
Email addresses, IP addresses, Names, Passwords
## Free download Link
[000webhost breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/123RF.md
================================================
# 123RF database leak
## Description
2020-03-22
In March 2020, the stock photo site <a href="https://www.bleepingcomputer.com/news/security/popular-stock-photo-service-hit-by-data-breach-83m-records-for-sale/" target="_blank" rel="noopener">123RF suffered a data breach</a> which impacted over 8 million subscribers and was subsequently sold online. The breach included email, IP and physical addresses, names, phone numbers and passwords stored as MD5 hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames
## Free download Link
[123RF breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/126.md
================================================
# 126 database leak
## Description
2012-01-01
In approximately 2012, it's alleged that the Chinese email service known as <a href="http://126.com" target="_blank" rel="noopener">126</a> suffered a data breach that impacted 6.4 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified". The data in the breach contains email addresses and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a>
## Breached data
Email addresses, Passwords
## Free download Link
[126 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/17173.md
================================================
# 17173 database leak
## Description
2011-12-28
In late 2011, <a href="https://news.softpedia.com/news/China-Investigates-Hacking-Operations-That-Exposed-100-Million-Users-244312.shtml" target="_blank" rel="noopener">a series of data breaches in China affected up to 100 million users</a>, including 7.5 million from the gaming site known as 17173. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified". The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided with support from <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a>
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[17173 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/17Media.md
================================================
# 17Media database leak
## Description
2016-04-19
In April 2016, customer data obtained from the streaming app known as "17" <a href="http://motherboard.vice.com/read/another-day-another-hack-millions-of-user-accounts-for-streaming-app-17" target="_blank" rel="noopener">appeared listed for sale on a Tor hidden service marketplace</a>. The data contained over 4 million unique email addresses along with IP addresses, usernames and passwords stored as unsalted MD5 hashes.
## Breached data
Device information, Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[17Media breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/2844Breaches.md
================================================
# 2844Breaches database leak
## Description
2018-02-19
In February 2018, <a href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/" target="_blank" rel="noopener">a massive collection of almost 3,000 alleged data breaches was found online</a>. Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen. Each file contained both an email address and plain text password and were consequently loaded as a single "unverified" data breach.
## Breached data
Email addresses, Passwords
## Free download Link
[2844Breaches breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/2fast4u.md
================================================
# 2fast4u database leak
## Description
2017-12-20
In December 2017, the Belgian motorcycle forum <a href="https://www.2fast4u.be" target="_blank" rel="noopener">2fast4u</a> discovered a data breach of their system. The breach of the vBulletin message board impacted over 17k individual users and exposed email addresses, usersnames and salted MD5 passwords.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[2fast4u breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/500px.md
================================================
# 500px database leak
## Description
2018-07-05
In mid-2018, the online photography community <a href="https://support.500px.com/hc/en-us/articles/360017752493-Security-Issue-February-2019-FAQ" target="_blank" rel="noopener">500px suffered a data breach</a>. The incident exposed almost 15 million unique email addresses alongside names, usernames, genders, dates of birth and either an MD5 or bcrypt password hash. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".
## Breached data
Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames
## Free download Link
[500px breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/7k7k.md
================================================
# 7k7k database leak
## Description
2011-01-01
In approximately 2011, it's alleged that the Chinese gaming site known as <a href="http://www.7k7k.com" target="_blank" rel="noopener">7k7k</a> suffered a data breach that impacted 9.1 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified". The data in the breach contains usernames, email addresses and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a>
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[7k7k breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/8fit.md
================================================
# 8fit database leak
## Description
2018-07-01
In July 2018, the health and fitness service <a href="https://8fit.zendesk.com/hc/en-us/articles/360017746394-Notice" target="_blank" rel="noopener">8fit suffered a data breach</a>. The data subsequently appeared for sale on a dark web marketplace in February 2019 and included over 15M unique email addresses alongside names, genders, IP addresses and passwords stored as bcrypt hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords
## Free download Link
[8fit breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/8tracks.md
================================================
# 8tracks database leak
## Description
2017-06-27
In June 2017, the online playlists service known as <a href="https://blog.8tracks.com/2017/06/27/password-security-alert/" target="_blank" rel="noopener">8Tracks suffered a data breach</a> which impacted 18 million accounts. In their disclosure, 8Tracks advised that "the vector for the attack was an employee’s GitHub account, which was not secured using two-factor authentication". Salted SHA-1 password hashes for users who <em>didn't</em> sign up with either Google or Facebook authentication were also included. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses. The complete set of 18M records was later provided by JimScott.Sec@protonmail.com and updated in HIBP accordingly.
## Breached data
Email addresses, Passwords
## Free download Link
[8tracks breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ABFRL.md
================================================
# ABFRL database leak
## Description
2021-12-01
In December 2021, Indian retailer <a href="https://restoreprivacy.com/aditya-birla-fashion-and-retail-ltd-abfrl-hack-2022/" target="_blank" rel="noopener">Aditya Birla Fashion and Retail Ltd was breached and ransomed</a>. The ransom demand was allegedly rejected and data containing 5.4M unique email addresses was subsequently dumped publicly on a popular hacking forum the next month. The data contained extensive personal customer information including names, phone numbers, physical addresses, DoBs, order histories and passwords stored as MD5 hashes. Employee data was also dumped publicly and included salary grades, marital statuses and religions. The data was provided to HIBP by a source who requested it be attributed to "white_peacock@riseup.net".
## Breached data
Email addresses, Genders, Income levels, Job titles, Marital statuses, Names, Passwords, Phone numbers, Physical addresses, Purchases, Religions, Salutations
## Free download Link
[ABFRL breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AIType.md
================================================
# AIType database leak
## Description
2017-12-05
In December 2017, the virtual keyboard application <a href="https://mackeepersecurity.com/post/virtual-keyboard-developer-leaked-31-million-of-client-records" target="_blank" rel="noopener">ai.type was found to have left a huge amount of data publicly facing in an unsecured MongoDB instance</a>. Discovered by researchers at The Kromtech Security Center, the 577GB data set included extensive personal information including over 20 million unique email addresses, social media profiles and address book contacts. The email addresses alone were provided to HIBP to enable impacted users to assess their exposure.
## Breached data
Address book contacts, Apps installed on devices, Cellular network names, Dates of birth, Device information, Email addresses, Genders, Geographic locations, IMEI numbers, IMSI numbers, IP addresses, Names, Phone numbers, Profile photos, Social media profiles
## Free download Link
[AIType breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AKP.md
================================================
# AKP database leak
## Description
2016-07-19
In July 2016, a hacker known as Phineas Fisher <a href="https://motherboard.vice.com/en_us/article/yp3n55/phineas-fisher-turkish-government-hack" target="_blank" rel="noopener">hacked Turkey's ruling party (Justice and Development Party or "AKP") and gained access to 300k emails</a>. The full contents of the emails were subsequently <a href="https://wikileaks.org/akp-emails/" target="_blank" rel="noopener">published by WikiLeaks and made searchable</a>. HIBP identified over 917k unique email address patterns in the data set, including message IDs and a number of other non-user addresses.
## Breached data
Email addresses, Email messages
## Free download Link
[AKP breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/APKTW.md
================================================
# APKTW database leak
## Description
2022-09-03
In September 2022, the Taiwanese Android forum APK.TW suffered a data breach <a href="https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/" target="_blank" rel="noopener">that was later redistributed as part of a larger corpus of data</a>. The breach exposed 2.5M unique email addresses along with IP addresses, usernames and salted MD5 password hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[APKTW breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Abandonia.md
================================================
# Abandonia database leak
## Description
2015-11-01
In November 2015, the gaming website dedicated to classic DOS games <a href="http://www.abandonia.com" target="_blank" rel="noopener">Abandonia</a> suffered a data breach resulting in the exposure of 776k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Abandonia breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Abandonia2022.md
================================================
# Abandonia2022 database leak
## Description
2022-11-15
In November 2022, the gaming website dedicated to classic DOS games <a href="https://twitter.com/FalconFeedsio/status/1594670215471792130" target="_blank" rel="noopener">Abandonia</a> suffered a data breach resulting in the exposure of 920k unique user records. This breach was in addition to another one 7 years earlier in 2015. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Abandonia2022 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AbuseWithUs.md
================================================
# AbuseWithUs database leak
## Description
2016-07-01
In 2016, the site dedicated to helping people hack email and online gaming accounts known as Abusewith.us suffered multiple data breaches. The site <a href="https://krebsonsecurity.com/2017/02/who-ran-leakedsource-com/" target="_blank" rel="noopener">allegedly had an administrator in common with the nefarious LeakedSource site</a>, both of which have since been shut down. The exposed data included more than 1.3 million unique email addresses, often accompanied by usernames, IP addresses and plain text or hashed passwords retrieved from various sources and intended to be used to compromise the victims' accounts.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[AbuseWithUs breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AcneOrg.md
================================================
# AcneOrg database leak
## Description
2014-11-25
In November 2014, the acne website <a href="http://www.acne.org/" target="_blank" rel="noopener">acne.org</a> suffered a data breach that exposed over 430k forum members' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and passwords.
## Breached data
Dates of birth, Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[AcneOrg breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ActMobile.md
================================================
# ActMobile database leak
## Description
2021-10-08
In October 2021, <a href="https://www.comparitech.com/blog/information-security/vpn-database-leak/" target="_blank" rel="noopener">security researcher Bob Diachenko discovered an exposed database he attributed to ActMobile, the operators of Dash VPN and FreeVPN</a>. The exposed data included 1.6 million unique email addresses along with IP addresses and password hashes, all of which were subsequently leaked on a popular hacking forum. Although usage of the service was verified by HIBP subscribers, <a href="https://www.databreaches.net/shoot-the-messenger-monday-edition-actmobile-threatens-researcher-whose-only-sin-was-trying-to-let-them-know-they-are-leaking-data/" target="_blank" rel="noopener">ActMobile denied the data was sourced from them</a> and the breach has subsequently been flagged as "unverified".
## Breached data
Email addresses, IP addresses
## Free download Link
[ActMobile breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Activision.md
================================================
# Activision database leak
## Description
2022-12-04
In December 2022, <a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-alleged-activision-employee-data-on-cybercrime-forum/" target="_blank" rel="noopener">attackers socially engineered an Activision HR employee into disclosing information which led to the breach of almost 20k employee records</a>. The data contained 16k unique email addresses along with names, phone numbers, job titles and the office location of the employee. Activision advised that no sensitive employee information was included in the breach.
## Breached data
Email addresses, Geographic locations, Job titles, Names, Phone numbers
## Free download Link
[Activision breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Acuity.md
================================================
# Acuity database leak
## Description
2020-06-18
In mid-2020, <a href="https://www.troyhunt.com/acuity-who-attempts-and-failures-to-attribute-437gb-of-breached-data" target="_blank" rel="noopener">a 437GB corpus of data attributed to an entity named "Acuity" was created and later extensively distributed</a>. However, the source could not be confidently verified as any known companies named Acuity. The data totalled over 14M unique email addresses with each row containing extensive personal information across more than 400 columns of data including names, phone numbers, physical addresses, genders and dates of birth.
## Breached data
Dates of birth, Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses, Salutations
## Free download Link
[Acuity breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Adapt.md
================================================
# Adapt database leak
## Description
2018-11-05
In November 2018, <a href="https://blog.hackenproof.com/industry-news/another-decision-makers-database-leaked/" target="_blank" rel="noopener">security researcher Bob Diachenko identified an unprotected database hosted by data aggregator "Adapt"</a>. A provider of "Fresh Quality Contacts", the service exposed over 9.3M unique records of individuals and employer information including their names, employers, job titles, contact information and data relating to the employer including organisation description, size and revenue. No response was received from Adapt when contacted.
## Breached data
Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses, Social media profiles
## Free download Link
[Adapt breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Adecco.md
================================================
# Adecco database leak
## Description
2021-01-03
In March 2021, <a href="https://cybernews.com/security/5-million-adecco-com-users-data-leaked/" target="_blank" rel="noopener">news broke of a massive data breach impacting millions of Adecco customers in South America</a> which was subsequently sold on a popular hacking forum. The breach exposed over 4M unique email addresses as well as genders, dates of birth, marital statuses, phone numbers and passwords stored as bcrypt hashes.
## Breached data
Email addresses, Genders, Geographic locations, Marital statuses, Names, Passwords, Phone numbers
## Free download Link
[Adecco breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Adobe.md
================================================
# Adobe database leak
## Description
2013-10-04
In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, <em>encrypted</em> password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also <a href="http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html" target="_blank" rel="noopener">disclosed much about the passwords</a> adding further to the risk that hundreds of millions of Adobe customers already faced.
## Breached data
Email addresses, Password hints, Passwords, Usernames
## Free download Link
[Adobe breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AdultFanFiction.md
================================================
# AdultFanFiction database leak
## Description
2018-05-30
In May 2018, the website for sharing adult-orientated works of fiction known as <a href="http://www.adult-fanfiction.org" target="_blank" rel="noopener">Adult-FanFiction.Org</a> had 186k records exposed in a data breach. The data contained names, email addresses, dates of birth and passwords stored as <em>both</em> MD5 hashes and plain text. AFF did not respond when contacted about the breach and the site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory.
## Breached data
Dates of birth, Email addresses, Names, Passwords
## Free download Link
[AdultFanFiction breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AdultFriendFinder.md
================================================
# AdultFriendFinder database leak
## Description
2015-05-21
In May 2015, the adult hookup site <a href="http://www.bbc.com/news/business-32839196" target="_blank" rel="noopener">Adult FriendFinder was hacked</a> and nearly 4 million records dumped publicly. The data dump included extremely sensitive personal information about individuals and their relationship statuses and sexual preferences combined with personally identifiable information.
## Breached data
Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Races, Relationship statuses, Sexual orientations, Spoken languages, Usernames
## Free download Link
[AdultFriendFinder breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AdultFriendFinder2016.md
================================================
# AdultFriendFinder2016 database leak
## Description
2016-10-16
In October 2016, the adult entertainment company <a href="https://www.zdnet.com/article/adultfriendfinder-network-hack-exposes-secrets-of-412-million-users/" target="_blank" rel="noopener">Friend Finder Networks suffered a massive data breach</a>. The incident impacted multiple separate online assets owned by the company, the largest of which was the Adult FriendFinder website alleged to be "the world's largest sex & swinger community". Exposed data included usernames, passwords stored as SHA-1 hashes and 170 million unique email addresses. This incident is separate to the 2015 data breach Adult FriendFinder also suffered. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, Passwords, Spoken languages, Usernames
## Free download Link
[AdultFriendFinder2016 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AdvanceAutoParts.md
================================================
# AdvanceAutoParts database leak
## Description
2024-06-05
In June 2024, <a href="https://www.bleepingcomputer.com/news/security/advance-auto-parts-confirms-data-breach-exposed-employee-information/" target="_blank" rel="noopener">Advance Auto Parts confirmed they had suffered a data breach</a> which was posted for sale to a popular hacking forum. Linked to unauthorised access to Snowflake cloud services, the breach exposed a large number of records related to both customers and employees. In total, 79M unique email addresses were included in the breach, alongside names, phone numbers, addresses and further data attributes related to company employees.
## Breached data
Email addresses, Names, Phone numbers, Physical addresses
## Free download Link
[AdvanceAutoParts breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AerServ.md
================================================
# AerServ database leak
## Description
2018-04-01
In April 2018, the ad management platform known as <a href="https://www.aerserv.com/" target="_blank" rel="noopener">AerServ</a> suffered a data breach. Acquired by InMobi earlier in the year, the AerServ breach impacted over 66k unique email addresses and also included contact information and passwords stored as salted SHA-512 hashes. The data was publicly posted to Twitter later in 2018 after which InMobi was notified and advised they were aware of the incident.
## Breached data
Email addresses, Employers, Job titles, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[AerServ breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AgusiQTorrents.md
================================================
# AgusiQTorrents database leak
## Description
2019-09-24
In September 2019, Polish torrent site <a href="http://agusiq-torrents.pl/" target="_blank" rel="noopener">AgusiQ-Torrents.pl</a> suffered a data breach. The incident exposed 90k member records including email and IP addresses, usernames and passwords stored as MD5 hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[AgusiQTorrents breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AhaShare.md
================================================
# AhaShare database leak
## Description
2013-05-30
In May 2013, the torrent site <a href="http://www.ahashare.com">AhaShare.com</a> suffered a breach which resulted in more than 180k user accounts being published publicly. The breach included a raft of personal information on registered users plus despite assertions of not distributing personally identifiable information, the site also leaked the IP addresses used by the registered identities.
## Breached data
Email addresses, Genders, Geographic locations, IP addresses, Partial dates of birth, Passwords, Usernames, Website activity
## Free download Link
[AhaShare breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Aimware.md
================================================
# Aimware database leak
## Description
2019-04-28
In mid-2019, the video game cheats website "Aimware" suffered a data breach that exposed hundreds of thousands of subscribers' personal information. Data included email and IP addresses, usernames, forum posts, private messages, website activity and passwords stored as salted MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to "clerk/anthrax/soontoberichh".
## Breached data
Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity
## Free download Link
[Aimware breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Aipai.md
================================================
# Aipai database leak
## Description
2016-09-27
In September 2016, data allegedly obtained from the Chinese gaming website known as <a href="http://aipai.com" target="_blank" rel="noopener">Aipai.com</a> and containing 6.5M accounts was leaked online. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified". The data in the breach contains email addresses and MD5 password hashes. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a>
## Breached data
Email addresses, Passwords
## Free download Link
[Aipai breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Ajarn.md
================================================
# Ajarn database leak
## Description
2018-12-13
In September 2021, the Thai-based English language teaching website <a href="https://www.ajarn.com/data-breach" target="_blank" rel="noopener">Ajarn discovered they'd been the victim of a data breach dating back to December 2018</a>. The breach was self-submitted to HIBP and included 266k email addresses, names, genders, phone numbers and other personal information. Hashed passwords were also impacted in the breach.
## Breached data
Dates of birth, Education levels, Email addresses, Genders, Geographic locations, Job applications, Marital statuses, Names, Nationalities, Passwords, Phone numbers, Profile photos
## Free download Link
[Ajarn breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AllegedATT.md
================================================
# AllegedATT database leak
## Description
2021-08-20
In March 2024, <a href="https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach" target="_blank" rel="noopener">tens of millions of records allegedly breached from AT&T were posted to a popular hacking forum</a>. Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT&T maintained that there had not been a breach of their systems and that the data originated from elsewhere. 12 days later, <a href="https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html" target="_blank" rel="noopener">AT&T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor</a>. <a href="https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/" target="_blank" rel="noopener">AT&T also proceeded to reset customer account passcodes</a>, an indicator that there was sufficient belief passcodes had been compromised. The incident exposed names, email and physical addresses, dates of birth, phone numbers and US social security numbers.
## Breached data
Dates of birth, Email addresses, Government issued IDs, Names, Phone numbers, Physical addresses
## Free download Link
[AllegedATT breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AmartFurniture.md
================================================
# AmartFurniture database leak
## Description
2022-05-16
In May 2022, the Australian retailer <a href="https://www.ozbargain.com.au/node/701231" target="_blank" rel="noopener">Amart Furniture advised that their warranty claims database hosted on Amazon Web Services had been the target of a cyber attack</a>. Over 100k records containing email and physical address, names, phone numbers and passwords stored as bcrypt hashes were exposed and shared online by the attacker.
## Breached data
Email addresses, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[AmartFurniture breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Ancestry.md
================================================
# Ancestry database leak
## Description
2015-11-07
In November 2015, an Ancestry service known as <a href="https://blogs.ancestry.com/ancestry/2017/12/23/rootsweb-security-update/" target="_blank" rel="noopener">RootsWeb suffered a data breach</a>. The breach was not discovered until late 2017 when a file containing almost 300k email addresses and plain text passwords was identified.
## Breached data
Email addresses, Passwords
## Free download Link
[Ancestry breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AndroidForums.md
================================================
# AndroidForums database leak
## Description
2011-10-30
In October 2011, the Android Forums website <a href="http://www.pcworld.com/article/259201/online_android_forum_hacked_user_data_accessed.html" target="_blank" rel="noopener">was hacked</a> and 745k user accounts were subsequently leaked publicly. The compromised data included email addresses, user birth dates and passwords stored as a salted MD5 hash.
## Breached data
Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords
## Free download Link
[AndroidForums breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AndroidLista.md
================================================
# AndroidLista database leak
## Description
2021-07-28
In July 2021, the Android applications and games review site <a href="https://www.androidlista.com/" target="_blank" rel="noopener">AndroidLista</a> suffered a data breach. The incident exposed 6.6M user records containing email addresses, names, usernames and passwords stored as salted SHA-1 hashes, all of which were subsequently posted to a popular hacking forum. AndroidLista did not respond when contacted about the breach.
## Breached data
Email addresses, Names, Passwords, Usernames
## Free download Link
[AndroidLista breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AnimalJam.md
================================================
# AnimalJam database leak
## Description
2020-10-12
In October 2020, the online game for kids <a href="https://www.animaljam.com/en/2020databreach" target="_blank" rel="noopener">Animal Jam suffered a data breach</a> which was subsequently shared through online hacking communities the following month. The data contained 46 million user accounts with over 7 million unique email addresses. Impacted data also included usernames, IP addresses and for some records, dates of birth (sometimes in partial form), physical addresses, parent names and passwords stored as PBKDF2 hashes.
## Breached data
Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Physical addresses, Usernames
## Free download Link
[AnimalJam breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AnimeGame.md
================================================
# AnimeGame database leak
## Description
2020-02-27
In February 2020, the gaming website <a href="http://animegame.me/" target="_blank" rel="noopener">AnimeGame</a> suffered a data breach. The incident affected 1.4M subscribers and exposed email addresses, usernames and passwords stored as salted MD5 hashes. The data was subsequently shared on a popular hacking forum and was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[AnimeGame breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AnimeLeague.md
================================================
# AnimeLeague database leak
## Description
2024-07-04
In July 2024, <a href="https://www.animeleague.net/forum/viewtopic.php?f=55&t=134675" target="_blank" rel="noopener">AnimeLeague disclosed a data breach of their services</a>. The data was posted for sale on a popular hacking forum and included 2 databases covering both event registration records and a dump of the phpBB bulletin board. The impacted data included passwords in various hashed formats including SHA-1, salted md5 and bcrypt, as well as usernames, private messages, dates of birth, purchases and 192k unique email addresses.
## Breached data
Dates of birth, Email addresses, IP addresses, Passwords, Phone numbers, Private messages, Purchases, Usernames
## Free download Link
[AnimeLeague breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AnimePlanet.md
================================================
# AnimePlanet database leak
## Description
2016-01-01
In approximately 2016, the anime website <a href="https://www.anime-planet.com/" target="_blank" rel="noopener">Anime-Planet</a> suffered a data breach that impacted 369k subscribers. The exposed data included usernames, IP and email addresses, dates of birth and passwords stored as unsalted MD5 hashes and for newer accounts, bcrypt hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Dates of birth, Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[AnimePlanet breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Animoto.md
================================================
# Animoto database leak
## Description
2018-07-10
In July 2018, the cloud-based video making service <a href="https://techcrunch.com/2018/08/20/animoto-hack-exposes-personal-information-geolocation-data/" target="_blank" rel="noopener">Animoto suffered a data breach</a>. The breach exposed 22 million unique email addresses alongside names, dates of birth, country of origin and salted password hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
## Breached data
Dates of birth, Email addresses, Geographic locations, Names, Passwords
## Free download Link
[Animoto breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AntiPublic.md
================================================
# AntiPublic database leak
## Description
2016-12-16
In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read <a href="https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned" target="_blank" rel="noopener">Password reuse, credential stuffing and another billion records in Have I Been Pwned</a>.
## Breached data
Email addresses, Passwords
## Free download Link
[AntiPublic breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ApexSMS.md
================================================
# ApexSMS database leak
## Description
2019-04-15
In May 2019, <a href="https://techcrunch.com/2019/05/09/sms-spammers-doxxed/?guccounter=1" target="_blank" rel="noopener">news broke of a massive SMS spam operation known as "ApexSMS" which was discovered after a MongoDB instance of the same name was found exposed without a password</a>. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and IP addresses.
## Breached data
Email addresses, Genders, Geographic locations, IP addresses, Names, Phone numbers, Telecommunications carrier
## Free download Link
[ApexSMS breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Apollo.md
================================================
# Apollo database leak
## Description
2018-07-23
In July 2018, the sales engagement startup <a href="https://www.wired.com/story/apollo-breach-linkedin-salesforce-data/" target="_blank" rel="noopener">Apollo left a database containing billions of data points publicly exposed without a password</a>. The data was discovered by security researcher <a href="http://www.vinnytroia.com/" target="_blank" rel="noopener">Vinny Troia</a> who subsequently sent a subset of the data containing 126 million unique email addresses to Have I Been Pwned. The data left exposed by Apollo was used in their "revenue acceleration platform" and included personal information such as names and email addresses as well as professional information including places of employment, the roles people hold and where they're located. Apollo stressed that the exposed data did not include sensitive information such as passwords, social security numbers or financial data. <a href="https://www.apollo.io/contact" target="_blank" rel="noopener">The Apollo website has a contact form</a> for those looking to get in touch with the organisation.
## Breached data
Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Salutations, Social media profiles
## Free download Link
[Apollo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Appartoo.md
================================================
# Appartoo database leak
## Description
2017-03-25
In March 2017, the French Flatsharing site known as <a href="https://www.appartoo.com" target="_blank" rel="noopener">Appartoo</a> suffered a data breach. The incident exposed an extensive amount of personal information on almost 50k members including email addresses, genders, ages, private messages sent between users of the service and passwords stored as SHA-256 hashes. Appartoo advised that all subscribers were notified of the incident in early 2017.
## Breached data
Ages, Auth tokens, Email addresses, Employment statuses, Genders, IP addresses, Marital statuses, Names, Passwords, Physical addresses, Private messages, Social media profiles
## Free download Link
[Appartoo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Appen.md
================================================
# Appen database leak
## Description
2020-06-22
In June 2020, the AI training data company <a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/" target="_blank" rel="noopener">Appen suffered a data breach</a> exposing the details of almost 5.9 million users which were subsequently sold online. Included in the breach were names, email addresses and passwords stored as bcrypt hashes. Some records also contained phone numbers, employers and IP addresses. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, Employers, IP addresses, Names, Passwords, Phone numbers
## Free download Link
[Appen breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Aptoide.md
================================================
# Aptoide database leak
## Description
2020-04-13
In April 2020, the independent Android app store <a href="https://blog.aptoide.com/aptoide-credentials-information/" target="_blank" rel="noopener">Aptoide suffered a data breach</a>. The incident resulted in the exposure of 20M customer records which were subsequently shared online via a popular hacking forum. Impacted data included email and IP addresses, names, IP addresses and passwords stored as SHA-1 hashes without a salt.
## Breached data
Browser user agent details, Email addresses, IP addresses, Names, Passwords
## Free download Link
[Aptoide breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ArmorGames.md
================================================
# ArmorGames database leak
## Description
2019-01-01
In January 2019, the game portal website <a href="https://techraptor.net/content/armor-games-data-breach-january-2019" target="_blank" rel="noopener">Armor Games suffered a data breach</a>. A total of 10.6 million email addresses were impacted by the breach which also exposed usernames, IP addresses, birthdays of administrator accounts and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
## Breached data
Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames
## Free download Link
[ArmorGames breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ArmyForceOnline.md
================================================
# ArmyForceOnline database leak
## Description
2016-05-18
In May 2016, the online gaming site <a href="http://armyforceonline.com" target="_blank" rel="noopener">Army Force Online</a> suffered a data breach that exposed 1.5M accounts. The breached data was found being regularly traded online and included usernames, email and IP addresses and MD5 passwords.
## Breached data
Avatars, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames, Website activity
## Free download Link
[ArmyForceOnline breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Artsy.md
================================================
# Artsy database leak
## Description
2018-04-01
In April 2018, the online arts database <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">Artsy suffered a data breach which consequently appeared for sale on a dark web marketplace</a>. Over 1M accounts were impacted and included IP and email addresses, names and passwords stored as salted SHA-512 hashes. The data was provided to HIBP by a source who requested it be attributed to "nano@databases.pw".
## Breached data
Email addresses, IP addresses, Names, Passwords
## Free download Link
[Artsy breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Artvalue.md
================================================
# Artvalue database leak
## Description
2019-06-19
In June 2019, the France-based art valuation website <a href="http://artvalue.com/" target="_blank" rel="noopener">Artvalue.com</a> left their 158k member subscriber base publicly exposed in a text file on their website. The exposed data included names, usernames, email addresses and passwords stored as MD5 hashes. The site operator did not respond when contacted about the incident, although the exposed file was subsequently removed.
## Breached data
Email addresses, Names, Passwords, Salutations, Usernames
## Free download Link
[Artvalue breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AshleyMadison.md
================================================
# AshleyMadison database leak
## Description
2015-07-19
In July 2015, the infidelity website Ashley Madison <a href="http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/" target="_blank" rel="noopener">suffered a serious data breach</a>. The attackers threatened Ashley Madison with the full disclosure of the breach unless the service was shut down. One month later, the database was dumped including more than 30M unique email addresses. This breach has been classed as "sensitive" and is not publicly searchable, although individuals may discover if they've been impacted by <a href="https://haveibeenpwned.com/NotifyMe">registering for notifications</a>. <a href="http://www.troyhunt.com/2015/07/heres-how-im-going-to-handle-ashley.html" target="_blank" rel="noopener">Read about this approach in detail</a>.
## Breached data
Dates of birth, Email addresses, Ethnicities, Genders, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Security questions and answers, Sexual orientations, Usernames, Website activity
## Free download Link
[AshleyMadison breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Astoria.md
================================================
# Astoria database leak
## Description
2021-01-26
In January 2021, over 11M unique email addresses were discovered by Night Lion Security alongside an extensive amount of personal information including names, physical and IP addresses, phone numbers and dates of birth. Some records also contained social security numbers, driver's license details, personal financial information and health-related data, depending on where the information was sourced from. Initially attributed to Astoria Company, <a href="https://astoriacompany.com/cyber-update/" target="_blank" rel="noopener">they subsequently investigated the incident and confirmed the data did not originate from their services</a>.
## Breached data
Bank account numbers, Credit status information, Dates of birth, Email addresses, Employers, Health insurance information, Income levels, IP addresses, Names, Personal health data, Phone numbers, Physical addresses, Smoking habits, Social security numbers
## Free download Link
[Astoria breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AstroPID.md
================================================
# AstroPID database leak
## Description
2013-12-19
In December 2013, the vBulletin forum for the social engineering site known as "AstroPID" was breached and <a href="https://www.sinister.ly/Thread-40-Compromised-databases" target="_blank" rel="noopener">leaked publicly</a>. The site provided tips on fraudulently obtaining goods and services, often by providing a legitimate "PID" or Product Information Description. The breach resulted in nearly 6k user accounts and over 220k private messages between forum members being exposed.
## Breached data
Email addresses, Instant messenger identities, IP addresses, Names, Passwords, Private messages, Usernames, Website activity
## Free download Link
[AstroPID breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Aternos.md
================================================
# Aternos database leak
## Description
2015-12-06
In December 2015, the service for creating and running free Minecraft servers known as <a href="https://twitter.com/AternosStatus/status/696121828360716288" target="_blank" rel="noopener">Aternos suffered a data breach that impacted 1.4 million subscribers</a>. The data included usernames, email and IP addresses and hashed passwords.
## Breached data
Email addresses, IP addresses, Passwords, Usernames, Website activity
## Free download Link
[Aternos breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/AtlasQuantum.md
================================================
# AtlasQuantum database leak
## Description
2018-08-25
In August 2018, the cryptocurrency investment platform <a href="https://www.facebook.com/notes/atlas-quantum/comunicado-importante/2196456297259749/" target="_blank" rel="noopener">Atlas Quantum suffered a data breach</a>. The breach leaked the personal data of 261k investors on the platform including their names, phone numbers, email addresses and account balances.
## Breached data
Account balances, Email addresses, Names, Phone numbers
## Free download Link
[AtlasQuantum breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Atmeltomo.md
================================================
# Atmeltomo database leak
## Description
2021-04-16
In April 2021, "Japan's largest e-mail friend search site" <a href="https://socradar.io/the-week-in-dark-web-29-august-2022-access-sales-and-data-leaks/" target="_blank" rel="noopener">Atmeltomo suffered a data breach that was later sold on a popular hacking forum</a>. The breach exposed 1.3M records with 580k unique email addresses along with usernames, IP addresses and unsalted MD5 password hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Atmeltomo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Audi.md
================================================
# Audi database leak
## Description
2019-08-14
In August 2019, <a href="https://techcrunch.com/2021/06/11/volkswagen-says-a-vendors-security-lapse-exposed-3-3-million-drivers-details/" target="_blank" rel="noopener">Audi USA suffered a data breach after a vendor left data unsecured and exposed on the internet</a>. The data contained 2.7M unique email addresses along with names, phone numbers, physical addresses and vehicle information including VIN. In <a href="https://techcrunch.com/2021/06/11/volkswagen-says-a-vendors-security-lapse-exposed-3-3-million-drivers-details/" target="_blank" rel="noopener">a disclosure statement from Audi</a>, they also advised some customers had driver's licenses, dates of birth, social security numbers and other personal information exposed.
## Breached data
Dates of birth, Driver's licenses, Email addresses, Names, Phone numbers, Physical addresses, Social security numbers, Vehicle details
## Free download Link
[Audi breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Autocentrum.md
================================================
# Autocentrum database leak
## Description
2018-02-04
In February 2018, <a href="https://niebezpiecznik.pl/post/wyciek-hasel-144-000-uzytkownikow-autocentrum-pl/" target="_blank" rel="noopener">data belonging to the Polish motoring website autocentrum.pl was found online</a>. The data contained 144k email addresses and plain text passwords.
## Breached data
Email addresses, Passwords
## Free download Link
[Autocentrum breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Autotrader.md
================================================
# Autotrader database leak
## Description
2023-01-06
In January 2023, <a href="https://thecyberexpress.com/data1-4-million-autotrader-user-exposed/" target="_blank" rel="noopener">1.4M records from the Autotrader online vehicle marketplace appeared on a popular hacking forum</a>. Autotrader stated that the "data in question relates to aged listing data that was generally publicly available on our site at the time and open to automated collection methods". The data contained 20k unique email addresses alongside physical addresses and phone numbers of dealers and vehicle details including VIN numbers. The data was provided to HIBP by a source who requested it be attributed to "IntelBroker".
## Breached data
Email addresses, Phone numbers, Physical addresses, Vehicle details, Vehicle identification numbers (VINs)
## Free download Link
[Autotrader breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Avast.md
================================================
# Avast database leak
## Description
2014-05-26
In May 2014, <a href="https://www.grahamcluley.com/2014/05/avast-forum-hacked/" target="_blank" rel="noopener">the Avast anti-virus forum was hacked</a> and 423k member records were exposed. The Simple Machines Based forum included usernames, emails and password hashes.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Avast breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Avito.md
================================================
# Avito database leak
## Description
2022-11-18
In November 2022, the Moroccan e-commerce service <a href="https://ledesk.ma/2022/12/20/avito-sexplique-sur-le-data-breach-ayant-touche-27-millions-dutilisateurs-de-sa-plateforme/" target="_blank" rel="noopener">Avito suffered a data breach that exposed the personal information of 2.7M customers</a>. The data included name, email, phone, IP address and geographic location.
## Breached data
Email addresses, Geographic locations, IP addresses, Names, Phone numbers
## Free download Link
[Avito breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Avvo.md
================================================
# Avvo database leak
## Description
2019-12-17
In approximately December 2019, an alleged data breach of the lawyer directory service Avvo was published to an online hacking forum and used in an extortion scam (it's possible the exposure dates back earlier than that). The data contained 4.1M unique email addresses alongside SHA-1 hashes, most likely representing user passwords. <a href="https://troyhunt.com/breach-disclosure-blow-by-blow-heres-why-its-so-hard" target="_blank" rel="noopener">Multiple attempts at contacting Avvo over the course of a week were unsuccessful and the authenticity of the data was eventually verified with common Avvo and HIBP subscribers.</a>
## Breached data
Email addresses, Passwords
## Free download Link
[Avvo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/B2BUSABusinesses.md
================================================
# B2BUSABusinesses database leak
## Description
2017-07-18
In mid-2017, a spam list of over 105 million individuals in corporate America was discovered online. Referred to as "B2B USA Businesses", the list categorised email addresses by employer, providing information on individuals' job titles plus their work phone numbers and physical addresses. <a href="https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information" target="_blank" rel="noopener">Read more about spam lists in HIBP.</a>
## Breached data
Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses
## Free download Link
[B2BUSABusinesses breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BTCAlpha.md
================================================
# BTCAlpha database leak
## Description
2021-11-02
In November 2021, the crypto exchange platform <a href="https://www.techtarget.com/searchsecurity/news/252509877/Cryptocurrency-exchange-BTC-Alpha-confirms-ransomware-attack" target="_blank" rel="noopener">BTC-Alpha suffered a ransomware attack data breach</a> after which customer data was publicly dumped. The impacted data included 362k email and IP addresses, usernames and passwords stored as PBKDF2 hashes. The data was provided to HIBP by a source who requested it be attributed to "white_peacock@riseup.net".
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[BTCAlpha breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BTCE.md
================================================
# BTCE database leak
## Description
2014-10-01
In October 2014, <a href="https://www.databreaches.net/bitcoin-exchange-btc-e-and-bitcointalk-forum-breaches/" target="_blank" rel="noopener">the Bitcoin exchange BTC-E was hacked</a> and 568k accounts were exposed. The data included email and IP addresses, wallet balances and hashed passwords.
## Breached data
Account balances, Email addresses, IP addresses, Passwords, Usernames, Website activity
## Free download Link
[BTCE breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BTSec.md
================================================
# BTSec database leak
## Description
2014-01-09
In September 2014, a large dump of nearly 5M usernames and passwords was <a href="https://forum.btcsec.com/index.php?/topic/9426-gmail-meniai-parol/" target="_blank" rel="noopener">posted to a Russian Bitcoin forum</a>. Whilst commonly reported as 5M "Gmail passwords", the dump also contained 123k yandex.ru addresses. Whilst the origin of the breach remains unclear, the breached credentials were <a href="http://web.archive.org/web/20140910190920/http://www.reddit.com/r/netsec/comments/2fz13q/5_millions_of_gmail_passwords_leaked_rus_most/" target="_blank" rel="noopener">confirmed by multiple source as correct</a>, albeit a number of years old.
## Breached data
Email addresses, Passwords
## Free download Link
[BTSec breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BVD.md
================================================
# BVD database leak
## Description
2021-08-19
In approximately August 2021, <a href="https://kaduu.io/blog/2022/02/04/us-strategic-company-bureau-van-dijk-hacked/" target="_blank" rel="noopener">hundreds of gigabytes of business data collated from public sources was obtained and later published to a popular hacking forum</a>. Sourced from a customer of Bureau van Dijk's (BvD) "Orbis" product, the corpus of data released contained hundreds of millions of lines about corporations and individuals, including personal information such as names and dates of birth. The data also included 28M unique email addresses along with physical addresses (presumedly corporate locations), phone numbers and job titles. There was no unauthorised access to BvD's systems, nor did the incident expose any of their or parent company's Moody's clients.
## Breached data
Dates of birth, Email addresses, Job titles, Names, Phone numbers, Physical addresses
## Free download Link
[BVD breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BabyNames.md
================================================
# BabyNames database leak
## Description
2008-10-24
In approximately 2008, the site to help parents name their children known as <a href="https://www.babynames.com/" target="_blank" rel="noopener">Baby Names</a> suffered a data breach. The incident exposed 846k email addresses and passwords stored as salted MD5 hashes. When contacted in October 2018, Baby Names advised that "the breach happened at least ten years ago" and that members were notified at the time.
## Breached data
Email addresses, Passwords
## Free download Link
[BabyNames breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Badoo.md
================================================
# Badoo database leak
## Description
2013-06-01
In June 2016, <a href="http://motherboard.vice.com/read/another-day-another-hack-user-accounts-of-dating-site-badoo" target="_blank" rel="noopener">a data breach allegedly originating from the social website Badoo was found to be circulating amongst traders</a>. Likely obtained several years earlier, the data contained 112 million unique email addresses with personal data including names, birthdates and passwords stored as MD5 hashes. Whilst there are many indicators suggesting Badoo did indeed suffer a data breach, <a href="https://www.troyhunt.com/introducing-unverified-breaches-to-have-i-been-pwned" target="_blank" rel="noopener">the legitimacy of the data could not be emphatically proven</a> so this breach has been categorised as "unverified".
## Breached data
Dates of birth, Email addresses, Genders, Names, Passwords, Usernames
## Free download Link
[Badoo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BannerBit.md
================================================
# BannerBit database leak
## Description
2018-12-29
In approximately December 2018, the online ad platform <a href="https://bannerbit.com/" target="_blank" rel="noopener">BannerBit</a> suffered a data breach. Containing 213k unique email addresses and plain text passwords, the data was provided to HIBP by a third party. Multiple attempts were made to contact BannerBit, but no response was received.
## Breached data
Email addresses, Passwords
## Free download Link
[BannerBit breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Banorte.md
================================================
# Banorte database leak
## Description
2014-08-18
In August 2022, <a href="https://krebsonsecurity.com/2022/08/when-efforts-to-contain-a-data-breach-backfire/" target="_blank" rel="noopener">millions of records from Mexican bank "Banorte" were publicly dumped on a popular hacking forum</a> including 2.1M unique email addresses, physical addresses, names, phone numbers, RFC (tax) numbers, genders and bank balances. Banorte have stated that the data is "outdated", although have not yet indicated how far back it dates to. Anecdotal feedback from HIBP subscribers suggests the data may date back 8 years to 2014.
## Breached data
Account balances, Email addresses, Genders, Government issued IDs, Names, Phone numbers, Physical addresses
## Free download Link
[Banorte breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BattlefieldHeroes.md
================================================
# BattlefieldHeroes database leak
## Description
2011-06-26
In June 2011 as part of a final breached data dump, the hacker collective "LulzSec" <a href="http://www.rockpapershotgun.com/2011/06/26/lulzsec-over-release-battlefield-heroes-data" target="_blank" rel="noopener">obtained and released over half a million usernames and passwords from the game Battlefield Heroes</a>. The passwords were stored as MD5 hashes with no salt and many were easily converted back to their plain text versions.
## Breached data
Passwords, Usernames
## Free download Link
[BattlefieldHeroes breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Battlefy.md
================================================
# Battlefy database leak
## Description
2016-01-11
In January 2016, the esports website <a href="https://dotesports.com/general/news/battlefy-hack-data-breach-user-credentials-2800" target="_blank" rel="noopener">Battlefy suffered a data breach that exposed 83k customer records</a>. The impacted data included email addresses, usernames and passwords stored as bcrypt hashes.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Battlefy breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BeautifulPeople.md
================================================
# BeautifulPeople database leak
## Description
2015-11-11
In November 2015, the dating website <a href="http://www.forbes.com/sites/thomasbrewster/2016/04/25/beautiful-people-hack-sexual-preference-location-addresses/#26a2cdf7559f" target="_blank" rel="noopener">Beautiful People was hacked</a> and over 1.1M accounts were leaked. The data was being traded in underground circles and included a huge amount of personal information related to dating.
## Breached data
Beauty ratings, Car ownership statuses, Dates of birth, Drinking habits, Education levels, Email addresses, Genders, Geographic locations, Home ownership statuses, Income levels, IP addresses, Job titles, Names, Passwords, Personal descriptions, Personal interests, Physical attributes, Sexual orientations, Smoking habits, Website activity
## Free download Link
[BeautifulPeople breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bell.md
================================================
# Bell database leak
## Description
2014-02-01
In February 2014, <a href="http://news.softpedia.com/news/Hackers-Claim-to-Have-Breached-Bell-Canada-s-Systems-422952.shtml?utm_medium=twitter&utm_source=FredToadster" target="_blank" rel="noopener">Bell Canada suffered a data breach via the hacker collective known as NullCrew</a>. The breach included data from multiple locations within Bell and exposed email addresses, usernames, user preferences and a number of unencrypted passwords and credit card data from 40,000 records containing just over 20,000 unique email addresses and usernames.
## Breached data
Credit cards, Genders, Passwords, Usernames
## Free download Link
[Bell breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bell2017.md
================================================
# Bell2017 database leak
## Description
2017-05-15
In May 2017, <a href="http://www.cbc.ca/beta/news/technology/bell-data-breach-customer-names-phone-numbers-emails-leak-1.4116608" target="_blank" rel="noopener">the Bell telecommunications company in Canada suffered a data breach</a> resulting in the exposure of millions of customer records. The data was consequently leaked online with a message from the attacker stating that they were "releasing a significant portion of Bell.ca's data due to the fact that they have failed to cooperate with us" and included a threat to leak more. The impacted data included over 2 million unique email addresses and 153k survey results dating back to 2011 and 2012. There were also 162 Bell employee records with more comprehensive personal data including names, phone numbers and plain text "passcodes". Bell suffered another breach in 2014 which exposed 40k records.
## Breached data
Email addresses, Geographic locations, IP addresses, Job titles, Names, Passwords, Phone numbers, Spoken languages, Survey results, Usernames
## Free download Link
[Bell2017 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Benchmark.md
================================================
# Benchmark database leak
## Description
2019-11-01
In November 2019, the Serbian technology news website <a href="https://forum.benchmark.rs/threads/benchmark-forum-kompromitovan.489760/" target="_blank" rel="noopener">Benchmark suffered a breach of its forum</a> that exposed 93k customer records. The breach exposed IP and email addresses, usernames and passwords stored as salted MD5 hashes. <a href="https://forum.benchmark.rs/threads/benchmark-forum-kompromitovan.489760/#post-6758095" target="_blank" rel="noopener">A forum administrator subsequently advised that the breach was due to the forum previously running on an outdated vBulletin instance</a>. The data was provided to HIBP by a source who requested it be attributed to "ZAN @ BF".
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Benchmark breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bestialitysextaboo.md
================================================
# Bestialitysextaboo database leak
## Description
2018-03-19
In March 2018, the animal bestiality website known as <a href="https://motherboard.vice.com/en_us/article/evqvpz/bestiality-website-hacked-troy-hunt-have-i-been-pwned" target="_blank" rel="noopener">Bestialitysextaboo was hacked</a>. A collection of various sites running on the same service were also compromised and details of the hack (including links to the data) were posted on a popular forum. In all, more than 3.2k unique email addresses were included alongside usernames, IP addresses, dates of birth, genders and bcrypt hashes of passwords.
## Breached data
Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Private messages, Usernames
## Free download Link
[Bestialitysextaboo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bhinneka.md
================================================
# Bhinneka database leak
## Description
2020-01-27
In early 2020, the Indonesian consumer electronics website <a href="https://www.thejakartapost.com/news/2020/05/13/e-commerce-platform-bhinneka-com-reported-to-be-latest-target-of-data-theft.html" target="_blank" rel="noopener">Bhinneka suffered a data breach that exposed almost 1.3M customer records</a>. The data included email and physical addresses, names, genders, dates of birth, phone numbers and salted password hashes.
## Breached data
Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[Bhinneka breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BigMoneyJobs.md
================================================
# BigMoneyJobs database leak
## Description
2014-04-03
In April 2014, the job site <a href="http://www.bigmoneyjobs.com">bigmoneyjobs.com</a> was <a href="https://twitter.com/ProbablyOnion2/status/451477310319779841" target="_blank" rel="noopener">hacked by an attacker known as "ProbablyOnion"</a>. The attack resulted in the <a href="http://news.softpedia.com/news/BigMoneyJobs-Hacked-Details-of-36-000-Users-Leaked-Online-436250.shtml?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=information_security" target="_blank" rel="noopener">exposure of over 36,000 user accounts</a> including email addresses, usernames and passwords which were stored in plain text. The attack was allegedly mounted by exploiting a SQL injection vulnerability.
## Breached data
Career levels, Education levels, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Salutations, User website URLs, Website activity
## Free download Link
[BigMoneyJobs breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BinWeevils.md
================================================
# BinWeevils database leak
## Description
2014-09-01
In September 2014, the online game <a href="http://blog.binweevils.com/2014/09/important-security-update/" target="_blank" rel="noopener">Bin Weevils suffered a data breach</a>. Whilst originally stating that only usernames and passwords had been exposed, <a href="https://www.databreaches.net/data-from-2014-hack-of-childrens-online-game-bin-weevils-leaked-online-hacker-claims-20m-records/" target="_blank" rel="noopener">a subsequent story on DataBreaches.net indicated that a more extensive set of personal attributes were impacted</a> (comments there also suggest the data may have come from a later breach). Data matching that pattern was later provided to Have I Been Pwned by <a href="https://twitter.com/akshayindia6" target="_blank" rel="noopener">@akshayindia6</a> and included almost 1.3m unique email addresses, genders, ages and plain text passwords.
## Breached data
Ages, Email addresses, Genders, IP addresses, Passwords, Usernames
## Free download Link
[BinWeevils breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BiohackMe.md
================================================
# BiohackMe database leak
## Description
2016-12-02
In December 2016, the forum for the biohacking website <a href="https://forum.biohack.me/index.php?p=/discussion/2101/critical-website-server-compromised-read-this-action-needed" target="_blank" rel="noopener">Biohack.me suffered a data breach</a> that exposed 3.4k accounts. The data included usernames, email addresses and hashed passwords along with the private messages of forum members. The data was self-submitted to HIBP by the Biohack.me operators.
## Breached data
Email addresses, Passwords, Private messages, Usernames
## Free download Link
[BiohackMe breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BitTorrent.md
================================================
# BitTorrent database leak
## Description
2016-01-01
In January 2016, the forum for the popular torrent software <a href="https://motherboard.vice.com/read/another-day-another-hack-user-accounts-for-bittorrents-forum-hacking" target="_blank" rel="noopener">BitTorrent was hacked</a>. The IP.Board based forum stored passwords as weak SHA1 salted hashes and the breached data also included usernames, email and IP addresses.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[BitTorrent breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BitcoinTalk.md
================================================
# BitcoinTalk database leak
## Description
2015-05-22
In May 2015, the Bitcoin forum <a href="https://www.cryptocoinsnews.com/bitcoin-exchange-btc-e-bitcointalk-forum-breaches-details-revealed/" target="_blank" rel="noopener">Bitcoin Talk was hacked</a> and over 500k unique email addresses were exposed. The attack led to the exposure of a raft of personal data including usernames, email and IP addresses, genders, birth dates, security questions and MD5 hashes of their answers plus hashes of the passwords themselves.
## Breached data
Dates of birth, Email addresses, Genders, IP addresses, Passwords, Security questions and answers, Usernames, Website activity
## Free download Link
[BitcoinTalk breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bitly.md
================================================
# Bitly database leak
## Description
2014-05-08
In May 2014, the link management company <a href="https://bitly.com/blog/urgent-security-update-regarding-your-bitly-account/" target="_blank" rel="noopener">Bitly announced they'd suffered a data breach</a>. The breach contained over 9.3 million unique email addresses, usernames and hashed passwords, most using SHA1 with a small number using bcrypt.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Bitly breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BlackBerryFans.md
================================================
# BlackBerryFans database leak
## Description
2022-05-06
In May 2022, the Chinese BlackBerry enthusiasts website <a href="http://blackberryfans.org/" target="_blank" rel="noopener">BlackBerry Fans</a> suffered a data breach that exposed 174k member records. The impacted data included usernames, email and IP addresses and passwords stored as salted MD5 hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[BlackBerryFans breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BlackHatWorld.md
================================================
# BlackHatWorld database leak
## Description
2014-06-23
In June 2014, the search engine optimisation forum <a href="http://www.blackhatworld.com" target="_blank" rel="noopener">Black Hat World</a> had three quarters of a million accounts breached from their system. The breach included various personally identifiable attributes which were publicly released in a MySQL database script.
## Breached data
Dates of birth, Email addresses, Instant messenger identities, IP addresses, Passwords, Usernames, Website activity
## Free download Link
[BlackHatWorld breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BlackSpigotMC.md
================================================
# BlackSpigotMC database leak
## Description
2019-07-14
In July 2019, the hacking website <a href="https://blackspigot.com/" target="_blank" rel="noopener">BlackSpigotMC suffered a data breach</a>. The XenForo forum based site was allegedly compromised by a rival hacking website and resulted in 8.5GB of data being leaked including the database and website itself. The exposed data included 140k unique email addresses, usernames, IP addresses, genders, geographic locations and passwords stored as bcrypt hashes.
## Breached data
Device information, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames
## Free download Link
[BlackSpigotMC breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BlankMediaGames.md
================================================
# BlankMediaGames database leak
## Description
2018-12-28
In December 2018, the Town of Salem website produced by <a href="https://blog.dehashed.com/town-of-salem-blankmediagames-hacked/" target="_blank" rel="noopener">BlankMediaGames suffered a data breach</a>. Reported to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">DeHashed</a>, the data contained 7.6M unique user email addresses alongside usernames, IP addresses, purchase histories and passwords stored as phpass hashes. DeHashed made multiple attempts to contact BlankMediaGames over various channels and many days but had yet to receive a response at the time of publishing.
## Breached data
Browser user agent details, Email addresses, IP addresses, Passwords, Purchases, Usernames, Website activity
## Free download Link
[BlankMediaGames breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BleachAnime.md
================================================
# BleachAnime database leak
## Description
2015-01-01
In 2015, the now defunct independent forum for the Bleach Anime series suffered a data breach that exposed 144k user records. The impacted data included usernames, email addresses and salted MD5 password hashes.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[BleachAnime breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BloomsToday.md
================================================
# BloomsToday database leak
## Description
2023-11-11
In April 2024, <a href="https://dailydarkweb.net/blooms-today-alleged-data-breach-threat-actor-offers-15-million-records-for-sale-at-5000/" target="_blank" rel="noopener">15M records from the online florist Blooms Today were listed for sale on a popular hacking forum</a>. The most recent data in the breach corpus was from November 2023 and appeared alongside 3.2M unique email addresses, names, phone numbers physical addresses and partial credit card data (card type, 4 digits of the number and expiry date). The breach did not expose sufficient card data to make purchases. Blooms Today did not respond when contacted about the incident.
## Breached data
Email addresses, Names, Partial credit card data, Phone numbers, Physical addresses
## Free download Link
[BloomsToday breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BlueSnapRegpack.md
================================================
# BlueSnapRegpack database leak
## Description
2016-05-20
In July 2016, a tweet was posted with a link to an alleged data breach of <a href="http://bluesnap.com" target="_blank" rel="noopener">BlueSnap, a global payment gateway and merchant account provider</a>. The data contained 324k payment records across 105k unique email addresses and included personal attributes such as name, home address and phone number. The data was verified with multiple Have I Been Pwned subscribers who confirmed it also contained valid transactions, partial credit card numbers, expiry dates and CVVs. A downstream consumer of BlueSnap services known as <a href="http://www.regpacks.com/" target="_blank" rel="noopener">Regpack</a> was subsequently identified as the source of the data after they identified human error had left the transactions exposed on a publicly facing server. A full investigation of the data and statement by Regpack is detailed in the post titled <a href="https://www.troyhunt.com/someone-just-lost-324k-payment-records-complete-with-cvvs/" target="_blank" rel="noopener">Someone just lost 324k payment records, complete with CVVs</a>.
## Breached data
Browser user agent details, Credit card CVV, Email addresses, IP addresses, Names, Partial credit card data, Phone numbers, Physical addresses, Purchases
## Free download Link
[BlueSnapRegpack breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bolt.md
================================================
# Bolt database leak
## Description
2017-03-01
In approximately March 2017, the file sharing website <a href="http://bolt.cd/" target="_blank" rel="noopener">Bolt</a> suffered a data breach resulting in the exposure of 995k unique user records. The data was sourced from their vBulletin forum and contained email and IP addresses, usernames and salted MD5 password hashes. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Bolt breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BombujEu.md
================================================
# BombujEu database leak
## Description
2018-12-07
In December 2018, the Slovak website for watching movies online for free <a href="https://www.bombuj.eu" target="_blank" rel="noopener">Bombuj.eu</a> suffered a data breach. The incident exposed over 575k unique email addresses and passwords stored as unsalted MD5 hashes. No response was received from Bombuj.eu when contacted about the incident.
## Breached data
Email addresses, Passwords
## Free download Link
[BombujEu breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bonobos.md
================================================
# Bonobos database leak
## Description
2020-08-14
In August 2020, the clothing store <a href="https://www.bleepingcomputer.com/news/security/bonobos-clothing-store-suffers-a-data-breach-hacker-leaks-70gb-database/" target="_blank" rel="noopener">Bonobos suffered a data breach</a> that exposed almost 70GB of data containing 2.8 million unique email addresses. The breach also exposed names, physical and IP addresses, phone numbers, order histories and passwords stored as salted SHA-512 hashes, including historical passwords. The breach also exposed partial credit card data including card type, the name on the card, expiry date and the last 4 digits of the card. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, Historical passwords, IP addresses, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses, Purchases
## Free download Link
[Bonobos breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BookCrossing.md
================================================
# BookCrossing database leak
## Description
2012-11-05
In August 2022, the book social networking site <a href="https://www.bookcrossing.com/forum/9/584194" target="_blank" rel="noopener">BookCrossing disclosed a data breach that dated back to a database backup from November 2012</a>. The incident exposed almost 1.6M records including names, usernames, email and IP addresses, dates of birth and plain text passwords.
## Breached data
Dates of birth, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames
## Free download Link
[BookCrossing breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bookchor.md
================================================
# Bookchor database leak
## Description
2021-01-28
In January 2021, the Indian book trading website <a href="https://www.opindia.com/2021/04/bookchor-data-breach-information-of-over-5-lakh-users-leaked-what-we-know-so-far/" target="_blank" rel="noopener">Bookchor suffered a data breach that exposed half a million customer records</a>. The exposed data included email and IP addresses, names, genders, dates of birth, phone numbers and passwords stored as unsalted MD5 hashes. The data was subsequently traded on a popular hacking forum.
## Breached data
Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Social media profiles
## Free download Link
[Bookchor breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bookmate.md
================================================
# Bookmate database leak
## Description
2018-07-08
In mid-2018, the social ebook subscription service <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">Bookmate was among a raft of sites that were breached and their data then sold in early-2019</a>. The data included almost 4 million unique email addresses alongside names, genders, dates of birth and passwords stored as salted SHA-512 hashes. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".
## Breached data
Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames
## Free download Link
[Bookmate breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BotOfLegends.md
================================================
# BotOfLegends database leak
## Description
2014-11-13
In November 2014, the forum for <a href="http://botoflegends.com" target="_blank" rel="noopener">Bot of Legends</a> suffered a data breach. The IP.Board forum contained 238k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames, Website activity
## Free download Link
[BotOfLegends breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BourseDesVols.md
================================================
# BourseDesVols database leak
## Description
2021-01-12
In January 2021, the French travel company <a href="https://www.riskbasedsecurity.com/2021/02/19/dark-web-roundup-january-2021/" target="_blank" rel="noopener">Bourse des Vols suffered a data breach that exposed 1.46M unique email addresses</a> across more than 1.2k .sql files and over 9GB of data. The impacted data exposed personal information and travel histories including names, phone numbers, IP and physical addresses, dates of birth along with flights taken and purchases.
## Breached data
Dates of birth, Email addresses, Flights taken, IP addresses, Names, Phone numbers, Physical addresses, Purchases
## Free download Link
[BourseDesVols breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Boxee.md
================================================
# Boxee database leak
## Description
2014-03-29
In March 2014, the home theatre PC software maker Boxee had their forums compromised in an attack. The attackers obtained the entire vBulletin MySQL database and promptly posted it for download on the Boxee forum itself. The data included 160k users, password histories, private messages and a variety of other data exposed across nearly 200 publicly exposed tables.
## Breached data
Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, User website URLs, Usernames
## Free download Link
[Boxee breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BrandNewTube.md
================================================
# BrandNewTube database leak
## Description
2022-08-14
In August 2022, the streaming website <a href="https://unitynewsnetwork.co.uk/streaming-site-brand-new-tube-sees-massive-data-breach-with-ip-addresses-and-names-of-users-revealed/" target="_blank" rel="noopener">Brand New Tube suffered a data breach that exposed the personal information of almost 350k subscribers</a>. The impacted data included email and IP addresses, usernames, genders, passwords stored as unsalted SHA-1 hashes and private messages.
## Breached data
Email addresses, Genders, IP addresses, Passwords, Private messages, Usernames
## Free download Link
[BrandNewTube breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Brazzers.md
================================================
# Brazzers database leak
## Description
2013-04-01
In April 2013, the adult website known as <a href="https://motherboard.vice.com/read/nearly-800000-brazzers-porn-site-accounts-exposed-in-forum-hack" target="_blank" rel="noopener">Brazzers was hacked</a> and 790k accounts were exposed publicly. Each record included a username, email address and password stored in plain text. The breach was brought to light by the <a href="https://vigilante.pw" target="_blank" rel="noopener">Vigilante.pw</a> data breach reporting site in September 2016.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Brazzers breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BreachForums.md
================================================
# BreachForums database leak
## Description
2022-11-29
In November 2022, the well-known hacking forum "BreachForums" was itself, breached. Later the following year, <a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-breachforums-after-arresting-its-owner-pompompurin-in-march/" target="_blank" rel="noopener">the operator of the website was arrested and the site seized by law enforcement agencies</a>. The breach exposed 212k records including usernames, IP and email addresses, private messages between site members and passwords stored as argon2 hashes. The data was provided to HIBP by a source who requested it be attributed to <a href="http://t.me/breached_db_person" target="_blank" rel="noopener">"breached_db_person"</a>.
## Breached data
Email addresses, IP addresses, Passwords, Private messages, Usernames
## Free download Link
[BreachForums breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BreachForumsClone.md
================================================
# BreachForumsClone database leak
## Description
2023-06-17
In June 2023, <a href="https://www.hackread.com/breachforums-data-breach-members-data-leak/" target="_blank" rel="noopener">a clone of the previously shuttered popular hacking forum "BreachForums" suffered a data breach that exposed over 4k records</a>. The breach was due to an exposed backup of the MyBB database which included email and IP addresses, usernames and Argon2 password hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[BreachForumsClone breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BtoBet.md
================================================
# BtoBet database leak
## Description
2019-12-26
In December 2019, <a href="https://www.troyhunt.com/the-difficulty-of-disclosure-surebet247-and-the-streisand-effect/" target="_blank" rel="noopener">a large collection of data from Nigerian gambling company Surebet247 was sent to HIBP</a>. Alongside the Surebet247, database backups from gambling sites BetAlfa, BetWay, BongoBongo and TopBet was also included. Further investigation <a href="https://www.iafrikan.com/2020/01/09/btobet-sports-betting-technology-software-neuron-platform-surebet247-gambling-data-security-breach/" target="_blank" rel="noopener">implicated betting platform provider BtoBet as being the common source of the data</a>. Impacted data included user records and extensive information on gambling histories.
## Breached data
Dates of birth, Email addresses, Financial transactions, Geographic locations, IP addresses, Names, Usernames
## Free download Link
[BtoBet breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Bukalapak.md
================================================
# Bukalapak database leak
## Description
2017-10-23
In March 2019, the Indonesian e-commerce website <a href="https://www.bukalapak.com/blog/feature-updates/petunjuk-teknis-105502" target="_blank" rel="noopener">Bukalapak discovered a data breach of the organisation's backups dating back to October 2017</a>. The incident exposed approximately 13 million unique email addresses alongside IP addresses, names and passwords stored as bcrypt and salted SHA-512 hashes. The data was provided to HIBP by a source who requested it to be attributed to "Maxime Thalet".
## Breached data
Email addresses, IP addresses, Names, Passwords, Usernames
## Free download Link
[Bukalapak breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BulgarianNationalRevenueAgency.md
================================================
# BulgarianNationalRevenueAgency database leak
## Description
2019-07-15
In July 2019, <a href="https://thenextweb.com/security/2019/07/16/bulgaria-tax-agency-data-leak-hack/" target="_blank" rel="noopener">a massive data breach of the Bulgarian National Revenue Agency began circulating with data on 5 million people</a>. Allegedly obtained in June, the data was broadly shared online and included taxation information alongside names, phone numbers, physical addresses and 471 thousand unique email addresses. The breach is said to have affected "nearly all adults in Bulgaria".
## Breached data
Email addresses, Names, Phone numbers, Physical addresses, Taxation records
## Free download Link
[BulgarianNationalRevenueAgency breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/BusinessAcumen.md
================================================
# BusinessAcumen database leak
## Description
2014-04-25
In April 2014, the Australian "Business Acumen Magazine" website was <a href="http://1337mir.com/cracked/2014/04/businessacumen-biz-hacked-26000-user-password-leaked/" target="_blank" rel="noopener">hacked by an attacker known as 1337MiR</a>. The breach resulted in over 26,000 accounts being exposed including usernames, email addresses and password stored with a weak cryptographic hashing algorithm (MD5 with no salt).
## Breached data
Email addresses, Names, Passwords, Usernames, Website activity
## Free download Link
[BusinessAcumen breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CDEK.md
================================================
# CDEK database leak
## Description
2022-03-09
In early 2022, a collective known as <a href="https://www.bleepingcomputer.com/news/security/ukraine-recruits-it-army-to-hack-russian-entities-lists-31-targets/" target="_blank" rel="noopener">IT Army whose stated goal is to "completely de-anonymise most Russian users by leaking hundreds of gigabytes of databases"</a> published over 30GB of data allegedly sourced from Russian courier service CDEK. The data contained over 19M unique email addresses along with names and phone numbers. The authenticity of the breach could not be independently established and has been flagged as "unverfieid".
## Breached data
Email addresses, Names, Phone numbers
## Free download Link
[CDEK breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CDProjektRed.md
================================================
# CDProjektRed database leak
## Description
2016-03-01
In March 2016, <a href="http://forums.cdprojektred.com/forum/en/the-witcher-series/news-aa/7248610-important-potential-unauthorized-access-to-the-forums%E2%80%99-data" target="_blank" rel="noopener">Polish game developer CD Projekt RED suffered a data breach</a>. The hack of their forum led to the exposure of almost 1.9 million accounts along with usernames, email addresses and salted SHA1 passwords.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[CDProjektRed breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CERTPolandPhish.md
================================================
# CERTPolandPhish database leak
## Description
2023-02-25
In August 2023, <a href="https://www.troyhunt.com/68k-polish-phishing-victims-are-now-searchable-in-have-i-been-pwned-courtesy-of-cert-poland" target="_blank" rel="noopener">CERT Poland observed a phishing campaign that collected credentials from 68k victims</a>. The campaign collected email addresses and passwords via a phishing email masquerading as a purchase order confirmation. CERT Poland identified a further 202 other phishing campaigns operating on the same C2 server, which has now been dismantled.
## Breached data
Email addresses, Passwords
## Free download Link
[CERTPolandPhish breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/COMELEC.md
================================================
# COMELEC database leak
## Description
2016-03-27
In March 2016, <a href="http://www.comelec.gov.ph/" target="_blank" rel="noopener">the Philippines Commission of Elections website</a> (COMELEC) was <a href="http://www.rappler.com/nation/politics/elections/2016/127256-comelec-website-hacked-anonymous-philippines" target="_blank" rel="noopener">attacked and defaced</a>, allegedly by Anonymous Philippines. Shortly after, <a href="http://www.theregister.co.uk/2016/04/07/philippine_voter_data_breach/" target="_blank" rel="noopener">data on 55 million Filipino voters was leaked publicly</a> and included sensitive information such as genders, marital statuses, height and weight and biometric fingerprint data. The breach only included 228k email addresses.
## Breached data
Biometric data, Dates of birth, Email addresses, Family members' names, Genders, Job titles, Marital statuses, Names, Passport numbers, Phone numbers, Physical addresses, Physical attributes
## Free download Link
[COMELEC breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CTARS.md
================================================
# CTARS database leak
## Description
2021-05-21
In May 2022, the client management system for the Australian government's NDIS (National Disability Insurance Scheme) <a href="https://ctars.com.au/ctars-data-breach" target="_blank" rel="noopener">suffered a data breach which was subsequently posted to an online hacking forum</a>. The CTARS cloud platform is used by care providers to record information about NDIS participants and often contains sensitive medical information. Impacted data includes over 12k unique email addresses, physical addresses, names, dates of birth, phone numbers and data related to patient conditions and treatments.
## Breached data
Dates of birth, Email addresses, Genders, Names, Passwords, Personal health data, Phone numbers, Physical addresses, Salutations, Usernames
## Free download Link
[CTARS breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CafeMom.md
================================================
# CafeMom database leak
## Description
2014-04-10
In 2014, the social network for mothers <a href="http://www.cafemom.com" target="_blank" rel="noopener">CafeMom</a> suffered a data breach. The data surfaced alongside a number of other historical breaches including Kickstarter, Bitly and Disqus and contained 2.6 million email addresses and plain text passwords.
## Breached data
Email addresses, Passwords
## Free download Link
[CafeMom breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CafePress.md
================================================
# CafePress database leak
## Description
2019-02-20
In February 2019, the custom merchandise retailer <a href="https://www.cafepress.com/" target="_blank" rel="noopener">CafePress</a> suffered a data breach. The exposed data included 23 million unique email addresses with some records also containing names, physical addresses, phone numbers and passwords stored as SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
## Breached data
Email addresses, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[CafePress breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CannabisForum.md
================================================
# CannabisForum database leak
## Description
2014-02-05
In February 2014, the vBulletin forum for the Marijuana site cannabis.com was breached and <a href="https://www.google.com/search?q=%22cannabisforum.tar%22" target="_blank" rel="noopener">leaked publicly</a>. Whilst there has been no public attribution of the breach, the leaked data included over 227k accounts and nearly 10k private messages between users of the forum.
## Breached data
Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, Usernames, Website activity
## Free download Link
[CannabisForum breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Canva.md
================================================
# Canva database leak
## Description
2019-05-24
In May 2019, the graphic design tool website <a href="https://support.canva.com/contact/customer-support/may-24-security-incident-faqs/" target="_blank" rel="noopener">Canva suffered a data breach</a> that impacted 137 million subscribers. The exposed data included email addresses, usernames, names, cities of residence and passwords stored as bcrypt hashes for users not using social logins. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
## Breached data
Email addresses, Geographic locations, Names, Passwords, Usernames
## Free download Link
[Canva breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CapialEconomics.md
================================================
# CapialEconomics database leak
## Description
2020-12-12
In December 2020, the economic research company <a href="https://securityaffairs.co/wordpress/113581/deep-web/capital-economics-data-leak.html" target="_blank" rel="noopener">Capital Economics suffered a data breach that exposed 263k customer records</a>. The exposed data included email and physical addresses, names, phone numbers, job titles and the employer of impacted customers.
## Breached data
Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses
## Free download Link
[CapialEconomics breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CardingMafia.md
================================================
# CardingMafia database leak
## Description
2021-03-18
In March 2021, the Carding Mafia forum suffered a data breach that exposed almost 300k members' email addresses. Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[CardingMafia breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CardingMafiaDec2021.md
================================================
# CardingMafiaDec2021 database leak
## Description
2021-12-28
In December 2021, the Carding Mafia forum suffered a data breach that exposed over 300k members' email addresses. Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes. This breach came only 9 months after another breach of the forum in March 2021.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[CardingMafiaDec2021 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CashCrate.md
================================================
# CashCrate database leak
## Description
2016-11-17
In June 2017, news broke that <a href="https://motherboard.vice.com/en_us/article/bj8pvq/hackers-steal-6-million-user-accounts-for-cash-for-surveys-site" target="_blank" rel="noopener">CashCrate had suffered a data breach exposing 6.8 million records</a>. The breach of the cash-for-surveys site dated back to November 2016 and exposed names, physical addresses, email addresses and passwords stored in plain text for older accounts along with weak MD5 hashes for newer ones.
## Breached data
Email addresses, Names, Passwords, Physical addresses
## Free download Link
[CashCrate breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Catho.md
================================================
# Catho database leak
## Description
2020-03-01
In approximately March 2020, the Brazilian recruitment website <a href="https://www.binarydefense.com/threat_watch/shinyhunters-serving-up-21-new-compromised-databases/" target="_blank" rel="noopener">Catho was compromised and subsequently appeared alongside 20 other breached websites</a> listed for sale on a dark web marketplace. The breach included almost 11 million records with 1.2 million unique email addresses. Names, usernames and plain text passwords were also exposed. The data was provided to HIBP by <a href="https://breachbase.pw/" target="_blank" rel="noopener">breachbase.pw</a>.
## Breached data
Email addresses, Names, Passwords, Usernames
## Free download Link
[Catho breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Chatbooks.md
================================================
# Chatbooks database leak
## Description
2020-03-26
In March 2020, the photo print service <a href="https://www.bleepingcomputer.com/news/security/chatbooks-discloses-data-breach-after-data-sold-on-dark-web/" target="_blank" rel="noopener">Chatbooks suffered a data breach</a> which was subsequently put up for sale on a dark web marketplace. The breach contained 15 million user records with 2.5 million unique email addresses alongside names, phone numbers, social media profiles and salted SHA-512 password hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, Names, Passwords, Phone numbers, Social media profiles
## Free download Link
[Chatbooks breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CheapAssGamer.md
================================================
# CheapAssGamer database leak
## Description
2015-07-01
In approximately mid-2015, the forum for <a href="https://www.cheapassgamer.com" target="_blank" rel="noopener">CheapAssGamer.com</a> suffered a data breach. The database from the IP.Board based forum contained 445k accounts including usernames, email and IP addresses and salted MD5 password hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[CheapAssGamer breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Chegg.md
================================================
# Chegg database leak
## Description
2018-04-28
In April 2018, the textbook rental service <a href="https://techcrunch.com/2018/09/26/chegg-resets-40-million-user-passwords-after-data-breach/" target="_blank" rel="noopener">Chegg suffered a data breach</a> that impacted 40 million subscribers. The exposed data included email addresses, usernames, names and passwords stored as unsalted MD5 hashes. A small number of records also contained physical address or phone number. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
## Breached data
Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames
## Free download Link
[Chegg breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Chess.md
================================================
# Chess database leak
## Description
2023-11-08
In November 2023, <a href="https://www.hackread.com/hacker-leaks-scraped-chess-com-user-records/" target="_blank" rel="noopener">over 800k user records were scraped from the Chess website and posted to a popular hacking forum</a>. The data included email address, name, username and the geographic location of the user.
## Breached data
Email addresses, Geographic locations, Names, Usernames
## Free download Link
[Chess breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Chowbus.md
================================================
# Chowbus database leak
## Description
2020-10-05
In October 2020, the Asian food delivery app <a href="https://www.reddit.com/r/UIUC/comments/j5fcjp/chowbus_is_hacked_leaks_800000_entries_of/" target="_blank" rel="noopener">Chowbus suffered a data breach which led to over 800,000 records being emailed to customers</a>. The email contained a link to a CSV file with customer data including physical addresses, names, phone numbers and over 444,000 unique email addresses.
## Breached data
Email addresses, Names, Phone numbers, Physical addresses
## Free download Link
[Chowbus breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ChrisLeong.md
================================================
# ChrisLeong database leak
## Description
2024-08-10
In August 2024, <a href="https://x.com/DarkWebInformer/status/1822330521147376007" target="_blank" rel="noopener">the website of Master Chris Leong "a leading Tit Tar practitioner in Malaysia" suffered a data breach</a>. The incident exposed 27k unique email addresses along with names, physical addresses, dates of birth, genders, nationalities and in many cases, links to Facebook profiles. The company did not respond when contacted about the breach.
## Breached data
Dates of birth, Email addresses, Genders, Names, Nationalities, Phone numbers, Physical addresses, Purchases, Social media profiles
## Free download Link
[ChrisLeong breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Cit0day.md
================================================
# Cit0day database leak
## Description
2020-11-04
In November 2020, <a href="https://www.troyhunt.com/inside-the-cit0day-breach-collection" target="_blank" rel="noopener">a collection of more than 23,000 allegedly breached websites known as Cit0day were made available for download on several hacking forums</a>. The data consisted of 226M unique email address alongside password pairs, often represented as both password hashes and the cracked, plain text versions. Independent verification of the data established it contains many legitimate, previously undisclosed breaches. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, Passwords
## Free download Link
[Cit0day breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CityBee.md
================================================
# CityBee database leak
## Description
2021-02-05
In February 2021, the Lithuanian car-sharing service <a href="https://www.reuters.com/article/us-baltic-dataprotection-idUSKBN2AG2BW" target="_blank" rel="noopener">CityBee announced they'd suffered a data breach that exposed 110k customers' personal information</a>. The breach exposed names, email addresses, government issued IDs and passwords stored as unsalted SHA-1 hashes.
## Breached data
Email addresses, Government issued IDs, Names, Passwords
## Free download Link
[CityBee breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CityJerks.md
================================================
# CityJerks database leak
## Description
2023-02-27
In early 2023, the "mutual masturbation" website <a href="https://techcrunch.com/2023/04/27/hackers-steal-emails-private-messages-from-hookup-websites/" target="_blank" rel="noopener">CityJerks suffered a data breach that exposed 177k unique email addresses</a>. The breach also included data from the TruckerSucker "dating app for REAL TRUCKERS and REAL MEN" with the combined corpus of data also exposing usernames, IP addresses, dates of birth, sexual orientations, geo locations, private messages between members and passwords stored as salted MD5 hashes. The data was listed on a public hacking site and provided to HIBP by a source who requested it be attributed to "discord.gg/gN9C9em".
## Breached data
Bios, Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Private messages, Profile photos, Sexual orientations, Usernames
## Free download Link
[CityJerks breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CivilOnline.md
================================================
# CivilOnline database leak
## Description
2011-07-10
In mid-2011, data was allegedly obtained from the Chinese engineering website known as <a href="http://www.co188.com/" target="_blank" rel="noopener">Civil Online</a> and contained 7.8M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified". The data in the breach contains email and IP addresses, user names and MD5 password hashes. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a>
## Breached data
Email addresses, IP addresses, Passwords, Usernames, Website activity
## Free download Link
[CivilOnline breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ClashOfKings.md
================================================
# ClashOfKings database leak
## Description
2016-07-14
In July 2016, <a href="https://www.zdnet.com/article/hacker-steals-forums-of-clash-of-kings-mobile-game/" target="_blank" rel="noopener">the forum for the game "Clash of Kings" suffered a data breach</a> that impacted 1.6 million subscribers. The impacted data included usernames, IP and email addresses and passwords stored as MD5 hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[ClashOfKings breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ClearVoiceSurveys.md
================================================
# ClearVoiceSurveys database leak
## Description
2015-08-23
In April 2021, the market research surveys company <a href="https://www.clearvoicesurveys.com/" target="_blank" rel="noopener">ClearVoice Surveys</a> had a publicly facing database backup from 2015 taken and redistributed on a popular hacking forum. The data included 15M unique email addresses across more than 17M rows of data that also included names, physical and IP addresses, genders, dates of birth and plain text passwords. ClearVoice Surveys advised they were aware of the breach and confirmed its authenticity.
## Breached data
Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[ClearVoiceSurveys breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ClickASnap.md
================================================
# ClickASnap database leak
## Description
2022-09-24
In September 2022, the online photo sharing platform <a href="https://blog.clickasnap.com/2022/10/14/clickasnap-website-breach-24-09-22/" target="_blank" rel="noopener">ClickASnap suffered a data breach</a>. The incident exposed almost 3.3M personal records including email addresses, usernames and passwords stored as SHA-512 hashes. Further, a collection of paid subscriptions were also included and contained names, physical addresses and amounts paid.
## Breached data
Email addresses, Names, Passwords, Physical addresses, Purchases, Social media profiles, Usernames
## Free download Link
[ClickASnap breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ClixSense.md
================================================
# ClixSense database leak
## Description
2016-09-04
In September 2016, the paid-to-click site <a href="http://cybercashworldwide.com/clixsense-has-been-hacked" target="_blank" rel="noopener">ClixSense suffered a data breach</a> which exposed 2.4 million subscriber identities. The breached data was then posted online by the attackers who claimed it was a subset of a larger data breach totalling 6.6 million records. The leaked data was extensive and included names, physical, email and IP addresses, genders and birth dates, account balances and passwords stored as plain text.
## Breached data
Account balances, Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Payment histories, Payment methods, Physical addresses, Usernames, Website activity
## Free download Link
[ClixSense breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CloudPets.md
================================================
# CloudPets database leak
## Description
2017-01-01
In January, the maker of teddy bears that record children's voices and sends them to family and friends via the internet <a href="https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages" target="_blank" rel="noopener">CloudPets left their database publicly exposed and it was subsequently downloaded by external parties</a> (the data was also subject to 3 different ransom demands). 583k records were provided to HIBP via a data trader and included email addresses and bcrypt hashes, but the full extent of user data exposed by the system was over 821k records and also included children's names and references to portrait photos and voice recordings.
## Breached data
Email addresses, Family members' names, Passwords
## Free download Link
[CloudPets breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ClubPenguinRewritten.md
================================================
# ClubPenguinRewritten database leak
## Description
2018-01-21
In January 2018, the children's gaming site <a href="https://community.cprewritten.net/" target="_blank" rel="noopener">Club Penguin Rewritten</a> (CPRewritten) suffered a data breach (note: CPRewritten is an independent recreation of Disney's Club Penguin game). The incident exposed almost 1.7 million unique email addresses alongside IP addresses, usernames and passwords stored as bcrypt hashes. When contacted, CPRewritten advised they were aware of the breach and had "contacted affected users".
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[ClubPenguinRewritten breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ClubPenguinRewrittenJul2019.md
================================================
# ClubPenguinRewrittenJul2019 database leak
## Description
2019-07-27
In July 2019, the children's gaming site <a href="https://community.cprewritten.net/" target="_blank" rel="noopener">Club Penguin Rewritten</a> (CPRewritten) suffered a data breach (note: CPRewritten is an independent recreation of Disney's Club Penguin game). In addition to an earlier data breach that impacted 1.7 million accounts, the subsequent breach exposed 4 million unique email addresses alongside IP addresses, usernames and passwords stored as bcrypt hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[ClubPenguinRewrittenJul2019 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Coachella.md
================================================
# Coachella database leak
## Description
2017-02-22
In February 2017, <a href="https://motherboard.vice.com/en_us/article/mgkzkp/someone-is-selling-coachella-user-accounts-on-the-dark-web" target="_blank" rel="noopener">hundreds of thousands of records from the Coachella music festival were discovered being sold online</a>. Allegedly taken from a combination of the main Coachella website and their vBulletin-based message board, the data included almost 600k usernames, IP and email addresses and salted hashes of passwords (MD5 in the case of the message board).
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Coachella breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CoinMarketCap.md
================================================
# CoinMarketCap database leak
## Description
2021-10-12
During October 2021, 3.1 million email addresses with accounts on the cryptocurrency market capitalisation website <a href="https://coinmarketcap.com/" target="_blank" rel="noopener">CoinMarketCap</a> were discovered being traded on hacking forums. Whilst the email addresses were found to correlate with CoinMarketCap accounts, it's unclear precisely how they were obtained. CoinMarketCap has provided the following statement on the data: "CoinMarketCap has become aware that batches of data have shown up online purporting to be a list of user accounts. While the data lists we have seen are only email addresses (no passwords), we have found a correlation with our subscriber base. We have not found any evidence of a data leak from our own servers — we are actively investigating this issue and will update our subscribers as soon as we have any new information."
## Breached data
Email addresses
## Free download Link
[CoinMarketCap breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CoinTracker.md
================================================
# CoinTracker database leak
## Description
2022-12-01
In December 2022, the Crypto & NFT taxes service <a href="https://www.databreaches.net/important-cointracker-security-update/" target="_blank" rel="noopener">CoinTracker reported a data breach that impacted over 1.5M of their customers</a>. The company <a href="https://www.cointracker.io/blog/sendgrid-data-breach" target="_blank" rel="noopener">later attributed the breach to a compromise SendGrid</a> in an attack that targeted multiple customers of the email provider. The breach exposed email addresses and partially redacted phone numbers, with CoinTracker advising that the later did not originate from their service.
## Breached data
Email addresses, Partial phone numbers
## Free download Link
[CoinTracker breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Coinmama.md
================================================
# Coinmama database leak
## Description
2017-08-03
In August 2017, the crypto coin brokerage service <a href="https://cointelegraph.com/news/major-crypto-brokerage-coinmama-reports-450-000-users-affected-by-data-breach" target="_blank" rel="noopener">Coinmama suffered a data breach</a> that impacted 479k subscribers. The breach was discovered in February 2019 with exposed data including email addresses, usernames and passwords stored as MD5 WordPress hashes. The data was provided to HIBP by white hat security researcher and data analyst Adam Davies.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Coinmama breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Collection1.md
================================================
# Collection1 database leak
## Description
2019-01-07
In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 <em>billion</em> records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post <a href="https://www.troyhunt.com/the-773-million-record-collection-1-data-reach" target="_blank" rel="noopener">The 773 Million Record "Collection #1" Data Breach</a>.
## Breached data
Email addresses, Passwords
## Free download Link
[Collection1 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Comcast.md
================================================
# Comcast database leak
## Description
2015-11-08
In November 2015, the US internet and cable TV provider Comcast <a href="http://www.ibtimes.co.uk/comcast-data-breach-590000-customer-passwords-go-sale-dark-web-1528026" target="_blank" rel="noopener">suffered a data breach that exposed 590k customer email addresses and plain text passwords</a>. A further 27k accounts appeared with home addresses with the entire data set being sold on underground forums.
## Breached data
Email addresses, Passwords, Physical addresses
## Free download Link
[Comcast breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CondoCom.md
================================================
# CondoCom database leak
## Description
2019-06-01
In June 2019, now defunct website Condo.com suffered a data breach <a href="https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/" target="_blank" rel="noopener">that was later redistributed as part of a larger corpus of data</a>. The impacted data included 1.5M email addresses alongside names, phone numbers and for a small number of records, physical addresses.
## Breached data
Email addresses, Names, Phone numbers, Physical addresses
## Free download Link
[CondoCom breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Convex.md
================================================
# Convex database leak
## Description
2023-02-01
In February 2023, the Russian telecommunications provider <a href="https://www.hackread.com/anonymous-data-leak-russia-isp-convex/" target="_blank" rel="noopener">Convex was hacked by "Anonymous" who subsequently released 128GB of data publicly</a>, alleging it revealed illegal government surveillance. The leaked data contained 150k unique email, IP and physical addresses, names and phone numbers.
## Breached data
Email addresses, IP addresses, Names, Phone numbers
## Free download Link
[Convex breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CouponMomAndArmorGames.md
================================================
# CouponMomAndArmorGames database leak
## Description
2014-02-08
In 2014, a file allegedly containing data hacked from <a href="https://www.couponmom.com" target="_blank" rel="noopener">Coupon Mom</a> was created and included 11 million email addresses and plain text passwords. On further investigation, the file was also found to contain data indicating it had been sourced from <a href="https://armorgames.com" target="_blank" rel="noopener">Armor Games</a>. Subsequent verification with HIBP subscribers confirmed the passwords had previously been used and many subscribers had used either Coupon Mom or Armor Games in the past. On disclosure to both organisations, each found that the data did not represent their entire customer base and possibly includes records from other sources with common subscribers. The breach has subsequently been flagged as "unverified" as the source cannot be emphatically proven. In July 2020, <a href="https://www.troyhunt.com/how-beeradvocate-learned-theyd-been-pwned/" target="_blank" rel="noopener">the data was also found to contain BeerAdvocate accounts sourced from a previously unknown breach</a>.
## Breached data
Email addresses, Passwords
## Free download Link
[CouponMomAndArmorGames breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CrackCommunity.md
================================================
# CrackCommunity database leak
## Description
2013-09-09
In late 2013, the <a href="http://crackcommunity.com" target="_blank" rel="noopener">Crack Community</a> forum specialising in cracks for games was compromised and over 19k accounts published online. Built on the MyBB forum platform, the compromised data included email addresses, IP addresses and salted MD5 passwords.
## Breached data
Email addresses, IP addresses, Passwords, Usernames, Website activity
## Free download Link
[CrackCommunity breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CrackedTO.md
================================================
# CrackedTO database leak
## Description
2019-07-21
In July 2019, the hacking website <a href="https://cracked.to" target="_blank" rel="noopener">Cracked.to</a> suffered a data breach. There were 749k unique email addresses spread across 321k forum users and other tables in the database. A rival hacking website claimed responsibility for breaching the MyBB based forum which disclosed email and IP addresses, usernames, private messages and passwords stored as bcrypt hashes.
## Breached data
Email addresses, IP addresses, Passwords, Private messages, Usernames
## Free download Link
[CrackedTO breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CrackingForum.md
================================================
# CrackingForum database leak
## Description
2016-07-01
In approximately mid-2016, the cracking community forum known as <a href="http://crackingforum.com" target="_blank" rel="noopener">CrackingForum</a> suffered a data breach. The vBulletin based forum exposed 660k email and IP addresses, usernames and salted MD5 hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[CrackingForum breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CraftRise.md
================================================
# CraftRise database leak
## Description
2022-03-05
In May 2023, <a href="https://memoryhackers.org/konular/craftrise-verileri-sizdirilmis.270536/" target="_blank" rel="noopener">news broke of a data breach of the Turkish Minecraft server known as CraftRise</a>. The data of over 2.5M users was subsequently shared on a popular hacking forum and included email addresses, usernames, geographic locations and plain text passwords. The newest records indicate the data was obtained in March 2022.
## Breached data
Email addresses, Geographic locations, Passwords, Usernames
## Free download Link
[CraftRise breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Creative.md
================================================
# Creative database leak
## Description
2018-05-01
In May 2018, <a href="http://forums.creative.com/" target="_blank" rel="noopener">the forum for Singaporean hardware company Creative Technology</a> suffered a data breach which resulted in the disclosure of 483k unique email addresses. Running on an old version of vBulletin, the breach also disclosed usernames, IP addresses and salted MD5 password hashes. After being notified of the incident, Creative permanently shut down the forum.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Creative breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CrimeAgencyVBulletin.md
================================================
# CrimeAgencyVBulletin database leak
## Description
2017-01-19
In January 2016, <a href="http://news.softpedia.com/news/vbulletin-hack-exposes-820-000-accounts-from-126-forums-513416.shtml" target="_blank" rel="noopener">a large number of unpatched vBulletin forums were compromised by an actor known as "CrimeAgency"</a>. A total of 140 forums had data including usernames, email addresses and passwords (predominantly stored as salted MD5 hashes), extracted and then distributed. Refer to <a href="https://troyhunt.com/i-just-added-another-140-data-breaches-to-have-i-been-pwned" target="_blank" rel="noopener">the complete list of the forums</a> for further information on which sites were impacted.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[CrimeAgencyVBulletin breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CrossFire.md
================================================
# CrossFire database leak
## Description
2016-08-08
In August 2016, <a href="http://www.zdnet.com/article/over-25-million-accounts-stolen-after-mail-ru-forums-raided-by-hackers/" target="_blank" rel="noopener">the Russian gaming forum known as Cross Fire (or cfire.mail.ru) was hacked</a> along with a number of other forums on the Russian mail provider, mail.ru. The vBulletin forum contained 12.8 million accounts including usernames, email addresses and passwords stored as salted MD5 hashes.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[CrossFire breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CutoutPro.md
================================================
# CutoutPro database leak
## Description
2024-02-26
In February 2024, the AI-powered visual design platform <a href="https://twitter.com/H4ckManac/status/1762387053889675658" target="_blank" rel="noopener">Cutout.Pro suffered a data breach that exposed 20M records</a>. The data included email and IP addresses, names and salted MD5 password hashes which were subsequently broadly distributed on a popular hacking forum and Telegram channels.
## Breached data
Email addresses, IP addresses, Names, Passwords
## Free download Link
[CutoutPro breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/CyberServe.md
================================================
# CyberServe database leak
## Description
2021-10-29
In October 2021, the Israeli hosting provider <a href="https://www.timesofisrael.com/black-shadow-hackers-leak-medical-records-of-290000-israeli-patients/" target="_blank" rel="noopener">CyberServe was breached and ransomed before having a substantial amount of their customer data leaked publicly by a group known as "Black Shadow"</a>. Amongst the data was the LGBTQ dating site Atraf and the Machon Mor medical institute. Due to multiple different sites being compromised, the impacted data is broad and ranges from relationship information to medical data to email addresses and passwords stored in plain text. The data was made available to HIBP with support from May Brooks-Kempler, founder of <a href="https://www.facebook.com/groups/Think.Safe.Cyber/" target="_blank" rel="noopener">the Think Safe Cyber community in Israel</a>.
## Breached data
Dates of birth, Drinking habits, Email addresses, Family structure, Genders, Geographic locations, HIV statuses, IP addresses, Names, Passwords, Personal health data, Phone numbers, Physical attributes, Private messages, Profile photos, Religions, Sexual orientations, Smoking habits, Usernames
## Free download Link
[CyberServe breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/D3scene.md
================================================
# D3scene database leak
## Description
2016-01-01
In January 2016, the gaming website D3Scene, suffered a data breach. The compromised vBulletin forum exposed 569k million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[D3scene breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DCHealth.md
================================================
# DCHealth database leak
## Description
2023-03-06
In March 2023, <a href="https://cyberscoop.com/dc-health-link-breach-russia-hacker-congress/" target="_blank" rel="noopener">DC Health Link discovered a data breach</a> that was later publicly posted to a popular data breach forum. The impacted data included 48k unique email addresses alongside names, genders, dates of birth, home addresses, phone numbers and social security numbers. The data was provided to HIBP by a source who requested it be attributed to "Aegis" and "IntelBroker".
## Breached data
Citizenship statuses, Dates of birth, Email addresses, Employers, Ethnicities, Genders, Names, Phone numbers, Physical addresses, Purchases, Social security numbers
## Free download Link
[DCHealth breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DDO.md
================================================
# DDO database leak
## Description
2013-04-02
In April 2013, the interactive video game <a href="https://www.ddo.com" target="_blank" rel="noopener">Dungeons & Dragons Online</a> suffered a data breach that exposed almost 1.6M players' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and password hashes.
## Breached data
Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity
## Free download Link
[DDO breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DLH.md
================================================
# DLH database leak
## Description
2016-07-31
In July 2016, the gaming news site <a href="http://www.zdnet.com/article/millions-of-steam-game-keys-stolen-after-site-hack/" target="_blank" rel="noopener">DLH.net suffered a data breach</a> which exposed 3.3M subscriber identities. Along with the keys used to redeem and activate games on the Steam platform, the breach also resulted in the exposure of email addresses, birth dates and salted MD5 password hashes. The data was donated to Have I Been Pwned by data breach monitoring service <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a>.
## Breached data
Dates of birth, Email addresses, Names, Passwords, Usernames, Website activity
## Free download Link
[DLH breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DVDShopCH.md
================================================
# DVDShopCH database leak
## Description
2017-12-05
In December 2017, the online Swiss DVD store known as <a href="https://www.melani.admin.ch/melani/de/home/dokumentation/newsletter/passwoerter-von-70000-e-mail-konten-im-umlauf.html" target="_blank" rel="noopener">dvd-shop.ch suffered a data breach</a>. The incident led to the exposure of 68k email addresses and plain text passwords. The site has since been updated to indicate that it is currently closed.
## Breached data
Email addresses, Passwords
## Free download Link
[DVDShopCH breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DaFont.md
================================================
# DaFont database leak
## Description
2017-05-16
In May 2017, <a href="http://www.zdnet.com/article/font-sharing-site-dafont-hacked-thousands-of-accounts-stolen/" target="_blank" rel="noopener">font sharing site DaFont suffered a data breach</a> resulting in the exposure of 637k records. Allegedly due to a SQL injection vulnerability exploited by multiple parties, the exposed data included usernames, email addresses and passwords stored as MD5 without a salt.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[DaFont breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DailyObjects.md
================================================
# DailyObjects database leak
## Description
2018-01-01
In approximately January 2018, a collection of more than 464k customer records from the Indian online retailer <a href="https://www.dailyobjects.com/" target="_blank" rel="noopener">DailyObjects</a> were leaked online. The data included names, physical and email addresses, phone numbers and "pincodes" stored in plain text. After multiple attempts to contact them, DailyObjects responded and received a copy of the data for verification, however failed to respond to multiple contact attempts following that.
## Breached data
Email addresses, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[DailyObjects breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DailyQuiz.md
================================================
# DailyQuiz database leak
## Description
2021-01-13
In January 2021, the quiz website <a href="https://dailyquiz.me/" target="_blank" rel="noopener">Daily Quiz</a> suffered a data breach that exposed over 8 million unique email addresses. The data also included usernames, IP addresses and passwords stored in plain text.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[DailyQuiz breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dailymotion.md
================================================
# Dailymotion database leak
## Description
2016-10-20
In October 2016, the video sharing platform <a href="http://thehackernews.com/2016/12/dailymotion-video-hacked.html" target="_blank" rel="noopener">Dailymotion suffered a data breach</a>. The attack led to the exposure of more than 85 million user accounts and included email addresses, usernames and bcrypt hashes of passwords.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Dailymotion breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dangdang.md
================================================
# Dangdang database leak
## Description
2011-06-01
In 2011, the Chinese e-commerce site <a href="https://www.marbridgeconsulting.com/marbridgedaily/2011-12-29/article/52564/rumor_dangdang_alipay_suffer_data_breaches" target="_blank" rel="noopener">Dangdang suffered a data breach</a>. The incident exposed over 4.8 million unique email addresses which were subsequently traded online over the ensuing years.
## Breached data
Email addresses
## Free download Link
[Dangdang breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DaniWeb.md
================================================
# DaniWeb database leak
## Description
2015-12-01
In late 2015, the technology and social site <a href="https://www.daniweb.com" target="_blank" rel="noopener">DaniWeb</a> suffered a data breach. The attack resulted in the disclosure of 1.1 million accounts including email and IP addresses which were also accompanied by salted MD5 hashes of passwords. However, DaniWeb have advised that "the breached password hashes and salts are incorrect" and that they have since switched to new infrastructure and software.
## Breached data
Email addresses, IP addresses, Passwords
## Free download Link
[DaniWeb breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DatPiff.md
================================================
# DatPiff database leak
## Description
2021-08-25
In late 2021, <a href="https://www.numerama.com/cyberguerre/784965-la-plateforme-de-rap-datpiff-piratee-les-mots-de-passe-dans-la-nature.html" target="_blank" rel="noopener">email address and plain text password pairs from the rap mixtape website DatPiff appeared for sale on a popular hacking forum</a>. The data allegedly dated back to an earlier breach and in total, contained almost 7.5M email addresses and cracked password pairs. The original data source allegedly contained usernames, security questions and answers and passwords stored as MD5 hashes with a static salt.
## Breached data
Email addresses, Passwords, Security questions and answers, Usernames
## Free download Link
[DatPiff breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DataAndLeads.md
================================================
# DataAndLeads database leak
## Description
2018-11-14
In November 2018, <a href="https://blog.hackenproof.com/industry-news/new-data-breach-exposes-57-million-records" target="_blank" rel="noopener">security researcher Bob Diachenko identified an unprotected database believed to be hosted by a data aggregator</a>. Upon further investigation, the data was linked to marketing company <a href="http://web.archive.org/web/20180925092401/https://www.datanleads.com/" target="_blank" rel="noopener">Data & Leads</a>. The exposed Elasticsearch instance contained over 44M unique email addresses along with names, IP and physical addresses, phone numbers and employment information. No response was received from Data & Leads when contacted by Bob and their site subsequently went offline.
## Breached data
Email addresses, Employers, IP addresses, Job titles, Names, Phone numbers, Physical addresses
## Free download Link
[DataAndLeads breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DataCamp.md
================================================
# DataCamp database leak
## Description
2017-01-30
In December 2018, the data science website <a href="https://support.datacamp.com/hc/en-us/articles/360017716074-DataCamp-Security-Update-Frequently-Asked-Questions" target="_blank" rel="noopener">DataCamp suffered a data breach</a> of records dating back to January 2017. The incident exposed 760k unique email and IP addresses along with names and passwords stored as bcrypt hashes. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".
## Breached data
Email addresses, Geographic locations, IP addresses, Names, Passwords
## Free download Link
[DataCamp breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DataEnrichment.md
================================================
# DataEnrichment database leak
## Description
2016-12-23
In December 2016, <a href="http://www.csoonline.com/article/3149713/security/data-enrichment-records-for-200-million-people-up-for-sale-on-the-darknet.html" target="_blank" rel="noopener">more than 200 million "data enrichment profiles" were found for sale on the darknet</a>. The seller claimed the data was sourced from Experian and whilst that claim was rejected by the company, the data itself was found to be legitimate suggesting it may have been sourced from other legitimate locations. In total, there were more than 8 million unique email addresses in the data which also contained a raft of other personal attributes including credit ratings, home ownership status, family structure and other fields described in the story linked to above. The email addresses alone were provided to HIBP.
## Breached data
Buying preferences, Charitable donations, Credit status information, Dates of birth, Email addresses, Family structure, Financial investments, Home ownership statuses, Income levels, Job titles, Marital statuses, Names, Net worths, Phone numbers, Physical addresses, Political donations
## Free download Link
[DataEnrichment breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DateHotBrunettes.md
================================================
# DateHotBrunettes database leak
## Description
2021-01-12
In January 2021, the now defunct website Date Hot Brunettes which provided a service to "Date Neglected Women Who Can Keep a Secret", suffered a data breach. The incident exposed 1.5M unique email addresses along with IP addresses, usernames, user-entered bios and MD5 password hashes.
## Breached data
Bios, Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[DateHotBrunettes breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dave.md
================================================
# Dave database leak
## Description
2020-06-28
In June 2020, the digital banking app <a href="https://www.zdnet.com/article/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/" target="_blank" rel="noopener">Dave suffered a data breach</a> which exposed 7.5 million rows of data and subsequently appeared for public download on a hacking forum. The breach exposed extensive personal information including almost 3 million unique email addresses alongside names, dates of birth, encrypted social security numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Social security numbers
## Free download Link
[Dave breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DecoratingTheHouse.md
================================================
# DecoratingTheHouse database leak
## Description
2020-03-27
In March 2020, the Korean interior decoration website <a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/" target="_blank" rel="noopener">???? (Decorating the House) suffered a data breach</a> which impacted almost 1.3 million members. Served via the URL <a href="https://www.ggumim.co.kr/" target="_blank" rel="noopener">ggumim.co.kr</a>, the exposed data included email addresses, names, usernames and phone numbers, all of which was subsequently shared extensively throughout online hacking communities. The data was provided to HIBP by <a href="https://breachbase.pw/" target="_blank" rel="noopener">breachbase.pw</a>.
## Breached data
Email addresses, Names, Phone numbers, Usernames
## Free download Link
[DecoratingTheHouse breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Deezer.md
================================================
# Deezer database leak
## Description
2019-04-22
In late 2022, the music streaming service <a href="https://restoreprivacy.com/music-service-deezer-data-breach/" target="_blank" rel="noopener">Deezer disclosed a data breach that impacted over 240M customers</a>. The breach dated back to a mid-2019 backup exposed by a 3rd party partner which was subsequently sold and then broadly redistributed on a popular hacking forum. Impacted data included 229M unique email addresses, IP addresses, names, usernames, genders, DoBs and the geographic location of the customer.
## Breached data
Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Spoken languages, Usernames
## Free download Link
[Deezer breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DemonForums.md
================================================
# DemonForums database leak
## Description
2019-02-20
In February 2019, the hacking forum <a href="https://demonforums.net/" target="_blank" rel="noopener">Demon Forums</a> suffered a data breach. The compromise of the vBulletin forum exposed 52k unique email addresses alongside usernames and passwords stored as salted MD5 hashes.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[DemonForums breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Descomplica.md
================================================
# Descomplica database leak
## Description
2021-03-14
In March 2021, the Brazilian EdTech company <a href="https://atendimento.descomplica.com.br/hc/pt-br/articles/1500003993042-FAQ-Ataque-cibern%C3%A9tico-14-03" target="_blank" rel="noopener">Descomplica suffered a data breach</a> which was subsequently posted to a popular hacking forum. The data included almost 5 million email addresses, names, the first 6 and last 4 digits and the expiry date of credit cards, purchase histories and password hashes.
## Breached data
Email addresses, Names, Partial credit card data, Passwords, Purchases
## Free download Link
[Descomplica breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DevilTorrents.md
================================================
# DevilTorrents database leak
## Description
2021-01-04
In early 2021, the Polish torrents website Devil-Torrents.pl suffered a data breach. A subset of the data including 63k unique email addresses and cracked passwords were subsequently socialised on a popular data breach sharing service.
## Breached data
Email addresses, Passwords
## Free download Link
[DevilTorrents breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DietCom.md
================================================
# DietCom database leak
## Description
2014-08-10
In August 2014, the diet and nutrition website <a href="https://diet.com/" target="_blank" rel="noopener">diet.com</a> suffered a data breach resulting in the exposure of 1.4 million unique user records dating back as far as 2004. The data contained email and IP addresses, usernames, plain text passwords and dietary information about the site members including eating habits, BMI and birth date. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory.
## Breached data
Dates of birth, Eating habits, Email addresses, IP addresses, Names, Passwords, Physical attributes, Usernames
## Free download Link
[DietCom breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Digimon.md
================================================
# Digimon database leak
## Description
2016-09-05
In September 2016, over 16GB of logs from a service indicated to be digimon.co.in were obtained, most likely from an unprotected Mongo DB instance. The service ceased running shortly afterwards and no information remains about the precise nature of it. Based on <a href="https://twitter.com/troyhunt/status/1045178309926051840" target="_blank" rel="noopener">enquiries made via Twitter</a>, it appears to have been a mail service possibly based on PowerMTA and used for delivering spam. The logs contained information including 7.7M unique email recipients (names and addresses), mail server IP addresses, email subjects and tracking information including mail opens and clicks.
## Breached data
Email addresses, Email messages, IP addresses, Names
## Free download Link
[Digimon breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Disqus.md
================================================
# Disqus database leak
## Description
2012-07-01
In October 2017, the blog commenting service <a href="https://blog.disqus.com/security-alert-user-info-breach" target="_blank" rel="noopener">Disqus announced they'd suffered a data breach</a>. The breach dated back to July 2012 but wasn't identified until years later when the data finally surfaced. The breach contained over 17.5 million unique email addresses and usernames. Users who created logins on Disqus had salted SHA1 hashes of passwords whilst users who logged in via social providers only had references to those accounts.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Disqus breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DivXSubTitles.md
================================================
# DivXSubTitles database leak
## Description
2010-01-01
In approximately 2010, the now defunct website DivX SubTitles suffered a data breach that exposed 783k user accounts including email addresses, usernames and plain text passwords.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[DivXSubTitles breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dodonew.md
================================================
# Dodonew database leak
## Description
2011-12-01
In late 2011, data was allegedly obtained from the Chinese website known as <a href="http://dodonew.com" target="_blank" rel="noopener">Dodonew.com</a> and contained 8.7M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified". The data in the breach contains email addresses and user names. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a>
## Breached data
Email addresses, Usernames
## Free download Link
[Dodonew breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dominos.md
================================================
# Dominos database leak
## Description
2014-06-13
In June 2014, <a href="http://www.welivesecurity.com/2014/06/16/dominos-pizza-hacked/" target="_blank" rel="noopener">Domino's Pizza in France and Belgium was hacked</a> by a group going by the name "Rex Mundi" and their customer data held to ransom. Domino's refused to pay the ransom and six months later, the attackers <a href="http://cyberintelligence.in/rex-mundi-hackers-leaked-data-dominos-accord-easypay/" target="_blank" rel="noopener">released the data</a> along with troves of other hacked accounts. Amongst the customer data was passwords stored with a weak MD5 hashing algorithm and no salt.
## Breached data
Email addresses, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[Dominos breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DominosIndia.md
================================================
# DominosIndia database leak
## Description
2021-03-24
In April 2021, <a href="https://www.bleepingcomputer.com/news/security/dominos-india-discloses-data-breach-after-hackers-sell-data-online/" target="_blank" rel="noopener">13TB of compromised Domino's India appeared for sale on a hacking forum</a> after which the company acknowledged a major data breach they dated back to March. The compromised data included 22.5 million unique email addresses, names, phone numbers, order histories and physical addresses.
## Breached data
Email addresses, Names, Phone numbers, Physical addresses, Purchases
## Free download Link
[DominosIndia breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Doomworld.md
================================================
# Doomworld database leak
## Description
2022-10-12
In October 2022, <a href="https://www.doomworld.com/announcement/4-doomworld-probably-got-hacked/" target="_blank" rel="noopener">the Doomworld fourm suffered a data breach</a> that exposed 34k member records. The data included email and IP addresses, usernames and bcrypt password hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Doomworld breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DoorDash.md
================================================
# DoorDash database leak
## Description
2022-08-02
In August 2022, the food ordering and delivery service <a href="https://mashable.com/article/doordash-hack-customer-details-exposed" target="_blank" rel="noopener">DoorDash disclosed a data breach that impacted a portion of their customers</a>. DoorDash attributed the breach to an unnamed "third-party vendor" they stated was the victim of a phishing campaign. The incident exposed 367k unique personal email addresses alongside names, post codes and partial card data, namely the brand, expiry data and last four digits of the card.
## Breached data
Email addresses, Geographic locations, Names, Partial credit card data
## Free download Link
[DoorDash breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dota2.md
================================================
# Dota2 database leak
## Description
2016-07-10
In July 2016, <a href="https://news.softpedia.com/news/data-of-nearly-2-million-users-exposed-in-dota2-forum-hack-507162.shtml" target="_blank" rel="noopener">the Dota2 official developers forum suffered a data breach that exposed almost 2 million users</a>. The hack of the vBulletin forum led to the disclosure of email and IP addresses, usernames and passwords stored as salted MD5 hashes.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Dota2 breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Doxbin.md
================================================
# Doxbin database leak
## Description
2022-01-05
In January 2022, the "doxing" website designed to disclose the personal information of targeted individuals ("doxes") <a href="https://www.flashpoint-intel.com/blog/doxbin-leak/" target="_blank" rel="noopener">Doxbin suffered a data breach</a>. The breach was subsequently leaked online and included over 370k unique email addresses across user accounts and doxes. User accounts also included usernames, password hashes and browser user agents. The personal information disclosed in the doxes was often extensive including names, physical addresses, phone numbers and more.
## Breached data
Browser user agent details, Email addresses, Passwords, Usernames
## Free download Link
[Doxbin breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DriveSure.md
================================================
# DriveSure database leak
## Description
2020-12-19
In December 2020, the car dealership service provider <a href="https://www.riskbasedsecurity.com/2021/02/01/personal-data-of-3-million-people-exposed-in-drivesure-hack/" target="_blank" rel="noopener">DriveSure suffered a data breach</a>. The incident resulted in 26GB of data being downloaded and later shared on a hacking forum. Impacted personal information included 3.6 million unique email addresses, names, phone numbers and physical addresses. Vehicle data was also exposed and included makes, models, VIN numbers and odometer readings. A small number of passwords stored as bcrypt hashes were also included in the data set.
## Breached data
Email addresses, Names, Passwords, Phone numbers, Physical addresses, Vehicle details
## Free download Link
[DriveSure breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Drizly.md
================================================
# Drizly database leak
## Description
2020-07-02
In approximately July 2020, the US-based online alcohol delivery service <a href="https://techcrunch.com/2020/07/28/drizly-data-breach/" target="_blank" rel="noopener">Drizly suffered a data breach</a>. The data was sold online before being extensively redistributed and contained 2.5 million unique email addresses alongside names, physical and IP addresses, phone numbers, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Dates of birth, Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[Drizly breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dropbox.md
================================================
# Dropbox database leak
## Description
2012-07-01
In mid-2012, Dropbox suffered a data breach which exposed the stored credentials of tens of millions of their customers. In August 2016, <a href="https://motherboard.vice.com/read/dropbox-forces-password-resets-after-user-credentials-exposed" target="_blank" rel="noopener">they forced password resets for customers they believed may be at risk</a>. A large volume of data totalling over 68 million records <a href="https://motherboard.vice.com/read/hackers-stole-over-60-million-dropbox-accounts" target="_blank" rel="noopener">was subsequently traded online</a> and included email addresses and salted hashes of passwords (half of them SHA1, half of them bcrypt).
## Breached data
Email addresses, Passwords
## Free download Link
[Dropbox breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dubsmash.md
================================================
# Dubsmash database leak
## Description
2018-12-01
In December 2018, the video messaging service <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">Dubsmash suffered a data breach</a>. The incident exposed 162 million unique email addresses alongside usernames and PBKDF2 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".
## Breached data
Email addresses, Geographic locations, Names, Passwords, Phone numbers, Spoken languages, Usernames
## Free download Link
[Dubsmash breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DucksUnlimited.md
================================================
# DucksUnlimited database leak
## Description
2021-01-29
In mid-2021, <a href="https://www.riskbasedsecurity.com/2021/06/14/dark-web-roundup-may-2021/" target="_blank" rel="noopener">Risk Based Security reported on a database sourced from Ducks Unlimited being traded online</a>. The data dated back to January 2021 and contained 1.3M unique email addresses across both a membership list and a list of website users. Impacted data included names, phones numbers, physical addresses, dates of birth and passwords stored as unsalted MD5 hashes.
## Breached data
Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses
## Free download Link
[DucksUnlimited breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/DuelingNetwork.md
================================================
# DuelingNetwork database leak
## Description
2017-03-29
In March 2017, the Flash game based on the Yu-Gi-Oh trading card game <a href="https://www.vice.com/amp/en_us/article/783dkz/hacker-steals-millions-of-accounts-from-yu-gi-oh-fan-project-dueling-network" target="_blank" rel="noopener">Dueling Network suffered a data breach</a>. The site itself was taken offline in 2016 due to a cease-and-desist order but the forum remained online for another year. The data breach exposed usernames, IP and email addresses and passwords stored as MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to "burger vault".
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[DuelingNetwork breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dunzo.md
================================================
# Dunzo database leak
## Description
2020-06-19
In approximately June 2019, the Indian delivery service <a href="https://www.thenewsminute.com/article/dunzo-suffers-data-breach-launches-internal-investigation-128415" target="_blank" rel="noopener">Dunzo suffered a data breach</a>. Exposing 3.5 million unique email addresses, the Dunzo breach also included names, phone numbers and IP addresses which were all broadly distributed online via a hacking forum. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Device information, Email addresses, Geographic locations, IP addresses, Names, Phone numbers
## Free download Link
[Dunzo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Duolingo.md
================================================
# Duolingo database leak
## Description
2023-01-24
In August 2023, <a href="https://www.bleepingcomputer.com/news/security/scraped-data-of-26-million-duolingo-users-released-on-hacking-forum/" target="_blank" rel="noopener">2.6M records of data scraped from Duolingo were broadly distributed on a popular hacking forum</a>. Obtained by enumerating a vulnerable API, the data had earlier appeared for sale in January 2023 and contained email addresses, names, the languages being learned, XP (experience points), and other data related to learning progress on Duolingo. Whilst some of the data attributes are intentionally public, the ability to map private email addresses to them presents an ongoing risk to user privacy.
## Breached data
Email addresses, Names, Spoken languages, Usernames
## Free download Link
[Duolingo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Duowan.md
================================================
# Duowan database leak
## Description
2011-01-01
In approximately 2011, data was allegedly obtained from the Chinese gaming website known as <a href="http://www.duowan.com" target="_blank" rel="noopener">Duowan.com</a> and contained 2.6M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified". The data in the breach contains email addresses, user names and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a>
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Duowan breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Dymocks.md
================================================
# Dymocks database leak
## Description
2023-06-20
In September 2023, the Australian book retailer <a href="https://www.abc.net.au/news/2023-09-08/dymocks-warns-customers-after-information-leaked-to-dark-web/102833430" target="_blank" rel="noopener">Dymocks announced a data breach</a>. The data dated back to June 2023 and contained 1.2M records with 836k unique email addresses. The breach also exposed names, dates of birth, genders, phone numbers and physical addresses.
## Breached data
Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses
## Free download Link
[Dymocks breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ECB.md
================================================
# ECB database leak
## Description
2024-03-23
In March 2024, <a href="https://www.thecricketer.com/Topics/grassroots/ecb_issue_warning_to_users_of_online_coaching_platform_following_data_breach.html" target="_blank" rel="noopener">English Cricket's icoachcricket website suffered a data breach that exposed over 40k records</a>. The data included email addresses and passwords stored as either bcrypt hashes, salted MD5 hashes or both. The data was provided to HIBP by a source who requested it be attributed to "IntelBroker".
## Breached data
Email addresses, Passwords
## Free download Link
[ECB breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ECCIE.md
================================================
# ECCIE database leak
## Description
2021-07-01
In January 2021, the adult escort forum <a href="https://www.eccie.net/showthread.php?p=1062479958" target="_blank" rel="noopener">ECCIE suffered a data breach</a> which was later posted to a popular hacking forum. The data included 536k user records with email and IP addresses, usernames, dates of birth and salted MD5 password hashes.
## Breached data
Dates of birth, Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[ECCIE breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/EPal.md
================================================
# EPal database leak
## Description
2022-04-15
In October 2022, the service dedicated to finding friends on Discord known as <a href="https://twitter.com/PogoWasRight/status/1578496290534539264" target="_blank" rel="noopener">E-Pal disclosed a data breach</a>. The compromised data included over 100k unique email addresses and usernames spanning approximately 1M orders. The data was subsequently distributed via a popular hacking forum.
## Breached data
Email addresses, Purchases, Usernames
## Free download Link
[EPal breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/EatStreet.md
================================================
# EatStreet database leak
## Description
2019-05-03
In May 2019, the online food ordering service <a href="https://www.zdnet.com/article/eatstreet-food-ordering-service-discloses-security-breach/" target="_blank" rel="noopener">EatStreet suffered a data breach affecting 6.4 million customers</a>. An extensive amount of personal data was obtained including names, phone numbers, addresses, partial credit card data and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
## Breached data
Dates of birth, Email addresses, Genders, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses, Social media profiles
## Free download Link
[EatStreet breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Eatigo.md
================================================
# Eatigo database leak
## Description
2018-10-16
In October 2018, the restaurant reservation service <a href="https://www.channelnewsasia.com/singapore/eatigo-data-breach-personal-information-millions-account-1307916" target="_blank" rel="noopener">Eatigo suffered a data breach that exposed 2.8 million accounts</a>. The data included email addresses, names, phone numbers, social media profiles, genders and passwords stored as unsalted MD5 hashes.
## Breached data
Email addresses, Genders, Names, Passwords, Phone numbers, Social media profiles
## Free download Link
[Eatigo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Edmodo.md
================================================
# Edmodo database leak
## Description
2017-05-11
In May 2017, the education platform <a href="https://motherboard.vice.com/en_us/article/hacker-steals-millions-of-user-account-details-from-education-platform-edmodo" target="_blank" rel="noopener">Edmodo was hacked</a> resulting in the exposure of 77 million records comprised of over 43 million unique customer email addresses. The data was consequently published to a popular hacking forum and made freely available. The records in the breach included usernames, email addresses and bcrypt hashes of passwords.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[Edmodo breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Elance.md
================================================
# Elance database leak
## Description
2009-01-01
Sometime in 2009, staffing platform <a href="http://www.ibtimes.co.uk/elance-data-breach-hacker-leaks-1-3-million-accounts-staffing-platform-1605368" target="_blank" rel="noopener">Elance suffered a data breach that impacted 1.3 million accounts</a>. Appearing online 8 years later, the data contained usernames, email addresses, phone numbers and SHA1 hashes of passwords, amongst other personal data.
## Breached data
Email addresses, Employers, Geographic locations, Passwords, Phone numbers, Usernames
## Free download Link
[Elance breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Elanic.md
================================================
# Elanic database leak
## Description
2018-01-01
In January 2020, the Indian fashion marketplace <a href="https://elanic.in/" target="_blank" rel="noopener">Elanic</a> had 2.8M records with 2.3M unique email addresses posted publicly to a popular hacking forum. Elanic confirmed that they had "verified the data and it was pulled from one of our test servers where this data was exposed publicly" and that the data was "old" (the hacking forum reported it as being from 2016-2018). When asked about disclosure to impacted customers, Elanic advised that they had "decided to not have as such any communication and public disclosure".
## Breached data
Email addresses, Geographic locations, Usernames
## Free download Link
[Elanic breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/ElasticsearchSalesLeads.md
================================================
# ElasticsearchSalesLeads database leak
## Description
2018-10-29
In October 2018, <a href="https://blog.hacken.io/how-sensitive-is-your-non-sensitive-data" target="_blank" rel="noopener">security researcher Bob Diachenko identified multiple exposed databases with hundreds of millions of records</a>. One of those datasets was an Elasticsearch instance on AWS containing sales lead data and 5.8M unique email addresses. The data contained information relating to individuals and the companies they worked for including their names, email addresses and company name and contact information. Despite best efforts, it was not possible to identify the owner of the data hence this breach as been titled "Elasticsearch Sales Leads".
## Breached data
Email addresses, Employers, Names, Physical addresses
## Free download Link
[ElasticsearchSalesLeads breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Emotet.md
================================================
# Emotet database leak
## Description
2021-01-27
In January 2021, <a href="https://www.troyhunt.com/data-from-the-emotet-malware-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi-and-nhtcu" target="_blank" rel="noopener">the FBI in partnership with the Dutch NHTCU, German BKA and other international law enforcement agencies brought down the world's most dangerous malware: Emotet</a>. The agencies obtained data collected by the malware and provided impacted email addresses to HIBP so that impacted individuals and domain owners could assess their exposure. <a href="https://www.troyhunt.com/data-from-the-emotet-malware-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi-and-nhtcu" target="_blank" rel="noopener">Read more about the takedown and recommended actions</a>.
## Breached data
Email addresses, Passwords
## Free download Link
[Emotet breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Emuparadise.md
================================================
# Emuparadise database leak
## Description
2018-04-01
In April 2018, the self-proclaimed "biggest retro gaming website on earth", Emuparadise, suffered a data breach. The compromised vBulletin forum exposed 1.1 million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[Emuparadise breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/EpicBot.md
================================================
# EpicBot database leak
## Description
2019-09-01
In September 2019, the RuneScape bot provider <a href="https://arstechnica.com/information-technology/2019/11/password-data-dumped-online-for-2-2-million-users-of-currency-and-gaming-sites/" target="_blank" rel="noopener">EpicBot suffered a data breach that impacted 817k subscribers</a>. Data from the breach was subsequently shared on a popular hacking forum and included usernames, email and IP addresses and passwords stored as either salted MD5 or bcrypt hashes. EpicBot did not respond when contacted about the incident.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[EpicBot breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/EpicGames.md
================================================
# EpicGames database leak
## Description
2016-08-11
In August 2016, <a href="http://www.zdnet.com/article/epic-games-unreal-engine-forums-hacked-in-latest-data-breach" target="_blank" rel="noopener">the Epic Games forum suffered a data breach</a>, allegedly due to a SQL injection vulnerability in vBulletin. The attack resulted in the exposure of 252k accounts including usernames, email addresses and salted MD5 hashes of passwords.
## Breached data
Email addresses, Passwords, Usernames
## Free download Link
[EpicGames breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/EpicNPC.md
================================================
# EpicNPC database leak
## Description
2016-01-02
In January 2016, the hacked account reseller <a href="https://www.epicnpc.com" target="_blank" rel="noopener">EpicNPC</a> suffered a data breach that impacted 409k subscribers. The impacted data included usernames, IP and email addresses and passwords stored as salted MD5 hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>.
## Breached data
Email addresses, IP addresses, Passwords, Usernames
## Free download Link
[EpicNPC breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Epik.md
================================================
# Epik database leak
## Description
2021-09-13
In September 2021, <a href="https://arstechnica.com/information-technology/2021/09/anonymous-leaks-gigabytes-of-data-from-epik-web-host-of-gab-and-parler/" target="_blank" rel="noopener">the domain registrar and web host Epik suffered a significant data breach</a>, allegedly in retaliation for hosting alt-right websites. The breach exposed a huge volume of data not just of Epik customers, but also scraped WHOIS records belonging to individuals and organisations who were not Epik customers. The data included over 15 million unique email addresses (including anonymised versions for domain privacy), names, phone numbers, physical addresses, purchases and passwords stored in various formats.
## Breached data
Email addresses, Names, Phone numbers, Physical addresses, Purchases
## Free download Link
[Epik breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Eroticy.md
================================================
# Eroticy database leak
## Description
2015-06-01
In mid-2016, it's alleged that the adult website known as <a href="http://eroticy.com" target="_blank" rel="noopener">Eroticy</a> was hacked. Almost 1.4 million unique accounts were found circulating in late 2016 which contained a raft of personal information ranging from email addresses to phone numbers to plain text passwords. Whilst many HIBP subscribers confirmed their data was legitimate, the actual source of the breach remains inconclusive. <a href="https://www.troyhunt.com/a-data-breach-investigation-blow-by-blow" target="_blank" rel="noopener">A detailed account of the data has been published</a> in the hope of identifying the origin of the breach.
## Breached data
Email addresses, IP addresses, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Usernames, Website activity
## Free download Link
[Eroticy breach Free Download Link](https://tinyurl.com/2b2k277t)
================================================
FILE: breaches/Eskimi.md
================================================
# Eskimi database leak
## Description
2020-09-25
In late 2020, the AdTech platform <a href="https://www.riskbasedsecurity.
gitextract_hez9cc1b/
├── README.md
└── breaches/
├── 000webhost.md
├── 123RF.md
├── 126.md
├── 17173.md
├── 17Media.md
├── 2844Breaches.md
├── 2fast4u.md
├── 500px.md
├── 7k7k.md
├── 8fit.md
├── 8tracks.md
├── ABFRL.md
├── AIType.md
├── AKP.md
├── APKTW.md
├── Abandonia.md
├── Abandonia2022.md
├── AbuseWithUs.md
├── AcneOrg.md
├── ActMobile.md
├── Activision.md
├── Acuity.md
├── Adapt.md
├── Adecco.md
├── Adobe.md
├── AdultFanFiction.md
├── AdultFriendFinder.md
├── AdultFriendFinder2016.md
├── AdvanceAutoParts.md
├── AerServ.md
├── AgusiQTorrents.md
├── AhaShare.md
├── Aimware.md
├── Aipai.md
├── Ajarn.md
├── AllegedATT.md
├── AmartFurniture.md
├── Ancestry.md
├── AndroidForums.md
├── AndroidLista.md
├── AnimalJam.md
├── AnimeGame.md
├── AnimeLeague.md
├── AnimePlanet.md
├── Animoto.md
├── AntiPublic.md
├── ApexSMS.md
├── Apollo.md
├── Appartoo.md
├── Appen.md
├── Aptoide.md
├── ArmorGames.md
├── ArmyForceOnline.md
├── Artsy.md
├── Artvalue.md
├── AshleyMadison.md
├── Astoria.md
├── AstroPID.md
├── Aternos.md
├── AtlasQuantum.md
├── Atmeltomo.md
├── Audi.md
├── Autocentrum.md
├── Autotrader.md
├── Avast.md
├── Avito.md
├── Avvo.md
├── B2BUSABusinesses.md
├── BTCAlpha.md
├── BTCE.md
├── BTSec.md
├── BVD.md
├── BabyNames.md
├── Badoo.md
├── BannerBit.md
├── Banorte.md
├── BattlefieldHeroes.md
├── Battlefy.md
├── BeautifulPeople.md
├── Bell.md
├── Bell2017.md
├── Benchmark.md
├── Bestialitysextaboo.md
├── Bhinneka.md
├── BigMoneyJobs.md
├── BinWeevils.md
├── BiohackMe.md
├── BitTorrent.md
├── BitcoinTalk.md
├── Bitly.md
├── BlackBerryFans.md
├── BlackHatWorld.md
├── BlackSpigotMC.md
├── BlankMediaGames.md
├── BleachAnime.md
├── BloomsToday.md
├── BlueSnapRegpack.md
├── Bolt.md
├── BombujEu.md
├── Bonobos.md
├── BookCrossing.md
├── Bookchor.md
├── Bookmate.md
├── BotOfLegends.md
├── BourseDesVols.md
├── Boxee.md
├── BrandNewTube.md
├── Brazzers.md
├── BreachForums.md
├── BreachForumsClone.md
├── BtoBet.md
├── Bukalapak.md
├── BulgarianNationalRevenueAgency.md
├── BusinessAcumen.md
├── CDEK.md
├── CDProjektRed.md
├── CERTPolandPhish.md
├── COMELEC.md
├── CTARS.md
├── CafeMom.md
├── CafePress.md
├── CannabisForum.md
├── Canva.md
├── CapialEconomics.md
├── CardingMafia.md
├── CardingMafiaDec2021.md
├── CashCrate.md
├── Catho.md
├── Chatbooks.md
├── CheapAssGamer.md
├── Chegg.md
├── Chess.md
├── Chowbus.md
├── ChrisLeong.md
├── Cit0day.md
├── CityBee.md
├── CityJerks.md
├── CivilOnline.md
├── ClashOfKings.md
├── ClearVoiceSurveys.md
├── ClickASnap.md
├── ClixSense.md
├── CloudPets.md
├── ClubPenguinRewritten.md
├── ClubPenguinRewrittenJul2019.md
├── Coachella.md
├── CoinMarketCap.md
├── CoinTracker.md
├── Coinmama.md
├── Collection1.md
├── Comcast.md
├── CondoCom.md
├── Convex.md
├── CouponMomAndArmorGames.md
├── CrackCommunity.md
├── CrackedTO.md
├── CrackingForum.md
├── CraftRise.md
├── Creative.md
├── CrimeAgencyVBulletin.md
├── CrossFire.md
├── CutoutPro.md
├── CyberServe.md
├── D3scene.md
├── DCHealth.md
├── DDO.md
├── DLH.md
├── DVDShopCH.md
├── DaFont.md
├── DailyObjects.md
├── DailyQuiz.md
├── Dailymotion.md
├── Dangdang.md
├── DaniWeb.md
├── DatPiff.md
├── DataAndLeads.md
├── DataCamp.md
├── DataEnrichment.md
├── DateHotBrunettes.md
├── Dave.md
├── DecoratingTheHouse.md
├── Deezer.md
├── DemonForums.md
├── Descomplica.md
├── DevilTorrents.md
├── DietCom.md
├── Digimon.md
├── Disqus.md
├── DivXSubTitles.md
├── Dodonew.md
├── Dominos.md
├── DominosIndia.md
├── Doomworld.md
├── DoorDash.md
├── Dota2.md
├── Doxbin.md
├── DriveSure.md
├── Drizly.md
├── Dropbox.md
├── Dubsmash.md
├── DucksUnlimited.md
├── DuelingNetwork.md
├── Dunzo.md
├── Duolingo.md
├── Duowan.md
├── Dymocks.md
├── ECB.md
├── ECCIE.md
├── EPal.md
├── EatStreet.md
├── Eatigo.md
├── Edmodo.md
├── Elance.md
├── Elanic.md
├── ElasticsearchSalesLeads.md
├── Emotet.md
├── Emuparadise.md
├── EpicBot.md
├── EpicGames.md
├── EpicNPC.md
├── Epik.md
├── Eroticy.md
├── Eskimi.md
├── EstanteVirtual.md
├── Estonia.md
├── Ethereum.md
├── EuropaJobs.md
├── Evermotion.md
├── EverybodyEdits.md
├── Evite.md
├── Evony.md
├── Exactis.md
├── Experian.md
├── Experian2020.md
├── ExploitIn.md
├── ExploreTalent.md
├── ExploreTalentAug2024.md
├── Exvagos.md
├── Eye4Fraud.md
├── EyeEm.md
├── FFShrine.md
├── FLVS.md
├── FaceUP.md
├── Facebook.md
├── FacebookMarketplace.md
├── Facepunch.md
├── Factual.md
├── Famm.md
├── Fanpass.md
├── FantasyFootballHub.md
├── FashionFantasyGame.md
├── FilmaiIn.md
├── Fitmart.md
├── FlashFlashRevolution.md
├── FlashFlashRevolution2019.md
├── Flashback.md
├── FlexBooker.md
├── Fling.md
├── Flipkart.md
├── Foodora.md
├── Forbes.md
├── ForumCommunity.md
├── Fotolog.md
├── FoxyBingo.md
├── FreedomHostingII.md
├── FreshMenu.md
├── Fridae.md
├── Funimation.md
├── FunnyGames.md
├── FurAffinity.md
├── GFAN.md
├── GGCorp.md
├── GPSUnderground.md
├── GSMHosting.md
├── GTAGaming.md
├── Gaadi.md
├── Gab.md
├── GameSalad.md
├── GameSprite.md
├── GameTuts.md
├── GamerzPlanet.md
├── GamesBox.md
├── Gamigo.md
├── GamingMonk.md
├── GateHub.md
├── Gawker.md
├── GeekedIn.md
├── Gemini.md
├── Gemplex.md
├── GenesisMarket.md
├── GeniusU.md
├── GetRevengeOnYourEx.md
├── Gett.md
├── GiantTiger.md
├── GiveSendGo.md
├── Glofox.md
├── GoGames.md
├── GoNinja.md
├── GoldSilver.md
├── Gravatar.md
├── GunAuction.md
├── GunsDotCom.md
├── Guntrader.md
├── HDBFinancialServices.md
├── HIAPK.md
├── HLTV.md
├── HTCMania.md
├── HTHStudios.md
├── Habibs.md
├── HackForums.md
├── HackingTeam.md
├── HalloweenSpot.md
├── Hathway.md
├── HauteLook.md
├── Havenly.md
├── HealthNowNetworks.md
├── Hemmakvall.md
├── Hemmelig.md
├── HeroesOfGaia.md
├── HeroesOfNewerth.md
├── Hjedd.md
├── HomeChef.md
├── HongFire.md
├── HookersNL.md
├── HorseIsle.md
├── HoundDawgs.md
├── Houzz.md
├── Hub4Tech.md
├── Hurb.md
├── HuskyOwners.md
├── IDCGames.md
├── IGF.md
├── IIMJobs.md
├── ILikeCheats.md
├── Imavex.md
├── IndiHome.md
├── IndiaMART.md
├── IndianRailways.md
├── InflateVids.md
├── Insanelyi.md
├── InstantCheckmate.md
├── InstitutoNacionalDeDeportesDeChile.md
├── Intelimost.md
├── Interpals.md
├── JD.md
├── JDGroup.md
├── JamTangan.md
├── James.md
├── Jefit.md
├── JobAndTalent.md
├── JobStreet.md
├── Jobzone.md
├── JoomlArt.md
├── JoyGames.md
├── JukinMedia.md
├── JustDate.md
├── KMRU.md
├── Kaneva.md
├── KasperskyClub.md
├── KayoMoe.md
├── Kickstarter.md
├── Kimsufi.md
├── KitchenPal.md
├── KiwiFarms.md
├── KnownCircle.md
├── Knuddels.md
├── KodiFoundation.md
├── KomplettFritid.md
├── Kreditplus.md
├── LBB.md
├── LDLC.md
├── LOTR.md
├── LaPosteMobile.md
├── Lanwar.md
├── Lastfm.md
├── Lazada.md
├── LeSlipFrancais.md
├── LeadHunter.md
├── LeagueOfLegends.md
├── LeakedReality.md
├── Ledger.md
├── Leet.md
├── LegendasTV.md
├── Life360.md
├── Lifebear.md
├── Lifeboat.md
├── LightsHope.md
├── Liker.md
├── LimeVPN.md
├── LinkedIn.md
├── LinkedInScrape.md
├── LinkedInScrape2023.md
├── LinuxForums.md
├── LinuxMint.md
├── LittleMonsters.md
├── LiveAuctioneers.md
├── LiveJournal.md
├── Livpure.md
├── LizardSquad.md
├── Locally.md
├── Lolzteam.md
├── Lookbook.md
├── Lookiero.md
├── LoungeBoard.md
├── LuLu.md
├── LuminPDF.md
├── Luxottica.md
├── LyricsMania.md
├── MCBans.md
├── MDPI.md
├── MEO.md
├── MGM.md
├── MGM2022Update.md
├── MMGFusion.md
├── MPGH.md
├── Mac-Torrents.md
├── MacForums.md
├── MacGeneration.md
├── MagicDuel.md
├── MailRu.md
├── MajorGeeks.md
├── MalindoAir.md
├── MallCZ.md
├── Malwarebytes.md
├── MangaDex.md
├── MangaFox.md
├── MangaTraders.md
├── Mangatoon.md
├── ManipulatedCaiman.md
├── Mappery.md
├── MarketMoveis.md
├── Mashable.md
├── MasterDeeds.md
├── MastercardPricelessSpecials.md
├── Mate1.md
├── Mathway.md
├── MechoDownload.md
├── MediaWorks.md
├── MeetMindful.md
├── MemeChat.md
├── MindJolt.md
├── MinecraftPocketEditionForum.md
├── MinecraftWorldMap.md
├── Minefield.md
├── Minehut.md
├── Minted.md
├── MoDaCo.md
├── MobiFriends.md
├── ModernBusinessSolutions.md
├── MoneyBookers.md
├── Moneycontrol.md
├── MoreleNet.md
├── MortalOnline.md
├── MovieBoxPro.md
├── MovieForums.md
├── MrExcel.md
├── MrGreenGaming.md
├── MultiplayerIt.md
├── MuslimDirectory.md
├── MuslimMatch.md
├── MyFHA.md
├── MyFitnessPal.md
├── MyHeritage.md
├── MyPertamina.md
├── MySpace.md
├── MyVidster.md
├── NVIDIA.md
├── NamelessMalware.md
├── NapsGear.md
├── NationalPublicData.md
├── NaughtyAmerica.md
├── NazApi.md
├── NeimanMarcus.md
├── NemoWeb.md
├── Neopets.md
├── NetEase.md
├── NetGalley.md
├── NetProspex.md
├── Neteller.md
├── Netlog.md
├── Netshoes.md
├── NextGenUpdate.md
├── NexusMods.md
├── Nihonomaru.md
├── Nitro.md
├── Nival.md
├── NonNudeGirls.md
├── NotAcxiom.md
├── NotSOCRadar.md
├── Nulled.md
├── NulledCH.md
├── NurseryCam.md
├── OGUsers.md
├── OGUsers2020.md
├── OGUsers2021.md
├── OGUsers2022.md
├── OMGPOP.md
├── OVH.md
├── OnlineTrade.md
├── OnlinerSpambot.md
├── Onverse.md
├── OpenCSGO.md
├── OpenSubtitles.md
├── OperationEndgame.md
├── OrderSnapp.md
├── OrdineAvvocatiDiRoma.md
├── OwnedCore.md
├── Oxfam.md
├── PDL.md
├── PHPFreaks.md
├── PPCGeeks.md
├── PS3Hax.md
├── PSPISO.md
├── PSX-Scene.md
├── PaddyPower.md
├── Pampling.md
├── Pandabuy.md
├── ParagonCheats.md
├── Parapa.md
├── ParkMobile.md
├── Patreon.md
├── PayAsUGym.md
├── PayHere.md
├── PaySystemTech.md
├── Paytm.md
├── Peatix.md
├── Pemiblanc.md
├── PeoplesEnergy.md
├── PetFlow.md
├── Phoenix.md
├── PhoneHouse.md
├── PipingRock.md
├── PixelFederation.md
├── Pixlr.md
├── PlanetCalypso.md
├── PlanetIce.md
├── PlayCyberGames.md
├── Playbook.md
├── Playgar.md
├── Plex.md
├── PlutoTV.md
├── Pokebip.md
├── PokemonCreed.md
├── PokemonNegro.md
├── PoliceOne.md
├── PolishCredentials.md
├── Poshmark.md
├── Powerbot.md
├── PreenMe.md
├── ProctorU.md
├── ProgrammingForums.md
├── Promo.md
├── Promofarma.md
├── PropTiger.md
├── Protemps.md
├── QIP.md
├── Qakbot.md
├── QatarNationalBank.md
├── QuantumBooter.md
├── QuestionPro.md
├── Quidd.md
├── QuinStreet.md
├── R2-2017.md
├── R2Games.md
├── RaidForums.md
├── RailYatri.md
├── Rambler.md
├── Rankwatch.md
├── Raychat.md
├── RbxRocks.md
├── ReadNovel.md
├── RealDudesInc.md
├── RealEstateMogul.md
├── RedDoorz.md
├── RedLineStealer.md
├── Reincubate.md
├── RentoMojo.md
├── RepublicanPartyOfTexas.md
├── RetinaX.md
├── Reverb-Nation.md
├── Rightbiz.md
├── RiverCityMedia.md
├── Robinhood.md
├── Roblox.md
├── RobloxDeveloperConference.md
├── RobloxDeveloperConference2024.md
├── Roll20.md
├── Romwe.md
├── RosebuttBoard.md
├── RoyalEnfield.md
├── RussianAmerica.md
├── SCDailyPhoneSpamList.md
├── SHEIN.md
├── SIAE.md
├── SalvadoranCitizens.md
├── SaverSpy.md
├── Scentbird.md
├── SchoolDistrict42.md
├── Seedpeer.md
├── Sephora.md
├── ServerPact.md
├── SevenRooms.md
├── Shadi.md
├── Shadow.md
├── ShareThis.md
├── Shitexpress.md
├── ShockGore.md
├── ShoeZone.md
├── ShopBack.md
├── ShopperPlus.md
├── ShortEdition.md
├── Shotbow.md
├── SirHurt.md
├── SitePoint.md
├── SkTorrent.md
├── Slickwraps.md
├── SlideTeam.md
├── Smogon.md
├── Snail.md
├── Snapchat.md
├── SoarGames.md
├── SocialEngineered.md
├── Solomid.md
├── Sonicbids.md
├── Sony.md
├── Soundwave.md
├── SpecialKSpamList.md
├── Sphero.md
├── Spirol.md
├── Sport2000.md
├── Spoutible.md
├── SprashivaiRu.md
├── SpyFone.md
├── Spytech.md
├── Staminus.md
├── StarNet.md
├── StarTribune.md
├── Start.md
├── SterKinekor.md
├── StockX.md
├── StoryBird.md
├── Straffic.md
├── Stratfor.md
├── StreetEasy.md
├── Stripchat.md
├── StrongholdKingdoms.md
├── SubaGames.md
├── SumoTorrent.md
├── SundryFiles.md
├── SuperVPNGeckoVPN.md
├── SurveyLama.md
├── SvenskaMagic.md
├── SweClockers.md
├── SwordFantasy.md
├── Swvl.md
├── T2.md
├── TAPAirPortugal.md
├── TGBUS.md
├── TRAI.md
├── TaiLieu.md
├── Tamodo.md
├── Tangerine.md
├── Taobao.md
├── Tappware.md
├── Taringa.md
├── Technic.md
├── Teespring.md
├── TelegramCombolists.md
├── TelegramStealerLogs.md
├── Teracod.md
├── Terravision.md
├── Tesco.md
├── TheCandidBoard.md
├── TheFappening.md
├── TheFlyOnTheWall.md
├── TheGradCafe.md
├── TheHeritageFoundation.md
├── ThePostMillennial.md
├── TheTVDB.md
├── Thingiverse.md
├── ThisHabboForum.md
├── Tianya.md
├── Ticketcounter.md
├── Ticketek.md
├── Ticketfly.md
├── Tigo.md
├── Tokopedia.md
├── ToonDoo.md
├── TorrentInvites.md
├── Toumei.md
├── Tout.md
├── Tracki.md
├── Traderie.md
├── TravelOK.md
├── Travelio.md
├── Trello.md
├── TrikSpamBotnet.md
├── Trillian.md
├── TruckersMP.md
├── TrueFire.md
├── TruthFinder.md
├── Tumblr.md
├── TunedGlobal.md
├── Tunngle.md
├── Twitter.md
├── Twitter200M.md
├── UC.md
├── Ubook.md
├── Uiggy.md
├── Ulmon.md
├── UnderworldEmpire.md
├── UnicoCampania.md
├── Universarium.md
├── UnrealEngine.md
├── Upstox.md
├── UtahGunExchange.md
├── VBulletin.md
├── VINs.md
├── VK.md
├── VNG.md
├── VTech.md
├── VTightGel.md
├── Vakinha.md
├── Vastaamo.md
├── Vedantu.md
├── VerificationsIO.md
├── Verified.md
├── Vermillion.md
├── Vianet.md
├── VictoryPhones.md
├── ViewFines.md
├── VivaAir.md
├── Vodafone.md
├── VoidTO.md
├── WHMCS.md
├── WIIUISO.md
├── WPSandbox.md
├── WPT.md
├── Wakanim.md
├── Wanelo.md
├── WarInc.md
├── Warframe.md
├── Warmane.md
├── WashingtonStateFoodWorkerCard.md
├── Wattpad.md
├── WeHeartIt.md
├── WeLeakInfo.md
├── WedMeGood.md
├── Weee.md
├── Wendys.md
├── WhiteRoom.md
├── Whitepages.md
├── WienerBuchereien.md
├── WifeLovers.md
├── WildStar.md
├── Win7Vista.md
├── Wishbone.md
├── Wishbone2020.md
├── WiziShop.md
├── WoTLabs.md
├── Wongnai.md
├── XKCD.md
├── XPGameSaves.md
├── XSplit.md
├── Xbox-Scene.md
├── Xbox360ISO.md
├── Xiaomi.md
├── Yahoo.md
├── Yam.md
├── Yandex.md
├── Yatra.md
├── YoteprestoCom.md
├── YouNow.md
├── YouPorn.md
├── Youku.md
├── YouveBeenScraped.md
├── ZAPHosting.md
├── Zacks.md
├── ZadigVoltaire.md
├── Zhenai.md
├── Zomato.md
├── Zoomcar.md
├── Zoosk.md
├── Zoosk2020.md
├── Zooville.md
├── Zurich.md
├── Zynga.md
├── bigbasket.md
├── boAt.md
├── dBforums.md
├── db8151dd.md
├── devkitPro.md
├── eThekwiniMunicipality.md
├── gPotato.md
├── iDTech.md
├── iDressup.md
├── iMenu360.md
├── iMesh.md
├── iPmart.md
├── imgur.md
├── ixigo.md
├── mSpy.md
├── mSpy2024.md
├── myRepoSpace.md
├── pcTattletale.md
├── piZap.md
├── uTorrent.md
├── uuu9.md
├── xHamster.md
└── xat.md
Condensed preview — 811 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (665K chars).
[
{
"path": "README.md",
"chars": 2760,
"preview": "# 📂 Historical Data Breaches Archive\n\nWelcome to the **Historical Data Breaches Archive**! This repository contains a co"
},
{
"path": "breaches/000webhost.md",
"chars": 623,
"preview": "# 000webhost database leak\n\n## Description\n\n2015-03-01\n\nIn approximately March 2015, the free web hosting provider <a hr"
},
{
"path": "breaches/123RF.md",
"chars": 778,
"preview": "# 123RF database leak\n\n## Description\n\n2020-03-22\n\nIn March 2020, the stock photo site <a href=\"https://www.bleepingcomp"
},
{
"path": "breaches/126.md",
"chars": 807,
"preview": "# 126 database leak\n\n## Description\n\n2012-01-01\n\nIn approximately 2012, it's alleged that the Chinese email service know"
},
{
"path": "breaches/17173.md",
"chars": 1053,
"preview": "# 17173 database leak\n\n## Description\n\n2011-12-28\n\nIn late 2011, <a href=\"https://news.softpedia.com/news/China-Investig"
},
{
"path": "breaches/17Media.md",
"chars": 667,
"preview": "# 17Media database leak\n\n## Description\n\n2016-04-19\n\nIn April 2016, customer data obtained from the streaming app known "
},
{
"path": "breaches/2844Breaches.md",
"chars": 761,
"preview": "# 2844Breaches database leak\n\n## Description\n\n2018-02-19\n\nIn February 2018, <a href=\"https://www.troyhunt.com/ive-just-a"
},
{
"path": "breaches/2fast4u.md",
"chars": 507,
"preview": "# 2fast4u database leak\n\n## Description\n\n2017-12-20\n\nIn December 2017, the Belgian motorcycle forum <a href=\"https://www"
},
{
"path": "breaches/500px.md",
"chars": 1017,
"preview": "# 500px database leak\n\n## Description\n\n2018-07-05\n\nIn mid-2018, the online photography community <a href=\"https://suppor"
},
{
"path": "breaches/7k7k.md",
"chars": 835,
"preview": "# 7k7k database leak\n\n## Description\n\n2011-01-01\n\nIn approximately 2011, it's alleged that the Chinese gaming site known"
},
{
"path": "breaches/8fit.md",
"chars": 736,
"preview": "# 8fit database leak\n\n## Description\n\n2018-07-01\n\nIn July 2018, the health and fitness service <a href=\"https://8fit.zen"
},
{
"path": "breaches/8tracks.md",
"chars": 976,
"preview": "# 8tracks database leak\n\n## Description\n\n2017-06-27\n\nIn June 2017, the online playlists service known as <a href=\"https:"
},
{
"path": "breaches/ABFRL.md",
"chars": 1084,
"preview": "# ABFRL database leak\n\n## Description\n\n2021-12-01\n\nIn December 2021, Indian retailer <a href=\"https://restoreprivacy.com"
},
{
"path": "breaches/AIType.md",
"chars": 1032,
"preview": "# AIType database leak\n\n## Description\n\n2017-12-05\n\nIn December 2017, the virtual keyboard application <a href=\"https://"
},
{
"path": "breaches/AKP.md",
"chars": 790,
"preview": "# AKP database leak\n\n## Description\n\n2016-07-19\n\nIn July 2016, a hacker known as Phineas Fisher <a href=\"https://motherb"
},
{
"path": "breaches/APKTW.md",
"chars": 603,
"preview": "# APKTW database leak\n\n## Description\n\n2022-09-03\n\nIn September 2022, the Taiwanese Android forum APK.TW suffered a data"
},
{
"path": "breaches/Abandonia.md",
"chars": 532,
"preview": "# Abandonia database leak\n\n## Description\n\n2015-11-01\n\nIn November 2015, the gaming website dedicated to classic DOS gam"
},
{
"path": "breaches/Abandonia2022.md",
"chars": 644,
"preview": "# Abandonia2022 database leak\n\n## Description\n\n2022-11-15\n\nIn November 2022, the gaming website dedicated to classic DOS"
},
{
"path": "breaches/AbuseWithUs.md",
"chars": 840,
"preview": "# AbuseWithUs database leak\n\n## Description\n\n2016-07-01\n\nIn 2016, the site dedicated to helping people hack email and on"
},
{
"path": "breaches/AcneOrg.md",
"chars": 524,
"preview": "# AcneOrg database leak\n\n## Description\n\n2014-11-25\n\nIn November 2014, the acne website <a href=\"http://www.acne.org/\" t"
},
{
"path": "breaches/ActMobile.md",
"chars": 1024,
"preview": "# ActMobile database leak\n\n## Description\n\n2021-10-08\n\nIn October 2021, <a href=\"https://www.comparitech.com/blog/inform"
},
{
"path": "breaches/Activision.md",
"chars": 773,
"preview": "# Activision database leak\n\n## Description\n\n2022-12-04\n\nIn December 2022, <a href=\"https://www.bleepingcomputer.com/news"
},
{
"path": "breaches/Acuity.md",
"chars": 854,
"preview": "# Acuity database leak\n\n## Description\n\n2020-06-18\n\nIn mid-2020, <a href=\"https://www.troyhunt.com/acuity-who-attempts-a"
},
{
"path": "breaches/Adapt.md",
"chars": 863,
"preview": "# Adapt database leak\n\n## Description\n\n2018-11-05\n\nIn November 2018, <a href=\"https://blog.hackenproof.com/industry-news"
},
{
"path": "breaches/Adecco.md",
"chars": 693,
"preview": "# Adecco database leak\n\n## Description\n\n2021-01-03\n\nIn March 2021, <a href=\"https://cybernews.com/security/5-million-ade"
},
{
"path": "breaches/Adobe.md",
"chars": 740,
"preview": "# Adobe database leak\n\n## Description\n\n2013-10-04\n\nIn October 2013, 153 million Adobe accounts were breached with each c"
},
{
"path": "breaches/AdultFanFiction.md",
"chars": 791,
"preview": "# AdultFanFiction database leak\n\n## Description\n\n2018-05-30\n\nIn May 2018, the website for sharing adult-orientated works"
},
{
"path": "breaches/AdultFriendFinder.md",
"chars": 724,
"preview": "# AdultFriendFinder database leak\n\n## Description\n\n2015-05-21\n\nIn May 2015, the adult hookup site <a href=\"http://www.bb"
},
{
"path": "breaches/AdultFriendFinder2016.md",
"chars": 1004,
"preview": "# AdultFriendFinder2016 database leak\n\n## Description\n\n2016-10-16\n\nIn October 2016, the adult entertainment company <a h"
},
{
"path": "breaches/AdvanceAutoParts.md",
"chars": 839,
"preview": "# AdvanceAutoParts database leak\n\n## Description\n\n2024-06-05\n\nIn June 2024, <a href=\"https://www.bleepingcomputer.com/ne"
},
{
"path": "breaches/AerServ.md",
"chars": 722,
"preview": "# AerServ database leak\n\n## Description\n\n2018-04-01\n\nIn April 2018, the ad management platform known as <a href=\"https:/"
},
{
"path": "breaches/AgusiQTorrents.md",
"chars": 501,
"preview": "# AgusiQTorrents database leak\n\n## Description\n\n2019-09-24\n\nIn September 2019, Polish torrent site <a href=\"http://agusi"
},
{
"path": "breaches/AhaShare.md",
"chars": 685,
"preview": "# AhaShare database leak\n\n## Description\n\n2013-05-30\n\nIn May 2013, the torrent site <a href=\"http://www.ahashare.com\">Ah"
},
{
"path": "breaches/Aimware.md",
"chars": 665,
"preview": "# Aimware database leak\n\n## Description\n\n2019-04-28\n\nIn mid-2019, the video game cheats website "Aimware" suff"
},
{
"path": "breaches/Aipai.md",
"chars": 812,
"preview": "# Aipai database leak\n\n## Description\n\n2016-09-27\n\nIn September 2016, data allegedly obtained from the Chinese gaming we"
},
{
"path": "breaches/Ajarn.md",
"chars": 758,
"preview": "# Ajarn database leak\n\n## Description\n\n2018-12-13\n\nIn September 2021, the Thai-based English language teaching website <"
},
{
"path": "breaches/AllegedATT.md",
"chars": 1396,
"preview": "# AllegedATT database leak\n\n## Description\n\n2021-08-20\n\nIn March 2024, <a href=\"https://www.troyhunt.com/inside-the-mass"
},
{
"path": "breaches/AmartFurniture.md",
"chars": 660,
"preview": "# AmartFurniture database leak\n\n## Description\n\n2022-05-16\n\nIn May 2022, the Australian retailer <a href=\"https://www.oz"
},
{
"path": "breaches/Ancestry.md",
"chars": 527,
"preview": "# Ancestry database leak\n\n## Description\n\n2015-11-07\n\nIn November 2015, an Ancestry service known as <a href=\"https://bl"
},
{
"path": "breaches/AndroidForums.md",
"chars": 630,
"preview": "# AndroidForums database leak\n\n## Description\n\n2011-10-30\n\nIn October 2011, the Android Forums website <a href=\"http://w"
},
{
"path": "breaches/AndroidLista.md",
"chars": 646,
"preview": "# AndroidLista database leak\n\n## Description\n\n2021-07-28\n\nIn July 2021, the Android applications and games review site <"
},
{
"path": "breaches/AnimalJam.md",
"chars": 798,
"preview": "# AnimalJam database leak\n\n## Description\n\n2020-10-12\n\nIn October 2020, the online game for kids <a href=\"https://www.an"
},
{
"path": "breaches/AnimeGame.md",
"chars": 630,
"preview": "# AnimeGame database leak\n\n## Description\n\n2020-02-27\n\nIn February 2020, the gaming website <a href=\"http://animegame.me"
},
{
"path": "breaches/AnimeLeague.md",
"chars": 821,
"preview": "# AnimeLeague database leak\n\n## Description\n\n2024-07-04\n\nIn July 2024, <a href=\"https://www.animeleague.net/forum/viewto"
},
{
"path": "breaches/AnimePlanet.md",
"chars": 694,
"preview": "# AnimePlanet database leak\n\n## Description\n\n2016-01-01\n\nIn approximately 2016, the anime website <a href=\"https://www.a"
},
{
"path": "breaches/Animoto.md",
"chars": 704,
"preview": "# Animoto database leak\n\n## Description\n\n2018-07-10\n\nIn July 2018, the cloud-based video making service <a href=\"https:/"
},
{
"path": "breaches/AntiPublic.md",
"chars": 960,
"preview": "# AntiPublic database leak\n\n## Description\n\n2016-12-16\n\nIn December 2016, a huge list of email address and password pair"
},
{
"path": "breaches/ApexSMS.md",
"chars": 753,
"preview": "# ApexSMS database leak\n\n## Description\n\n2019-04-15\n\nIn May 2019, <a href=\"https://techcrunch.com/2019/05/09/sms-spammer"
},
{
"path": "breaches/Apollo.md",
"chars": 1356,
"preview": "# Apollo database leak\n\n## Description\n\n2018-07-23\n\nIn July 2018, the sales engagement startup <a href=\"https://www.wire"
},
{
"path": "breaches/Appartoo.md",
"chars": 797,
"preview": "# Appartoo database leak\n\n## Description\n\n2017-03-25\n\nIn March 2017, the French Flatsharing site known as <a href=\"https"
},
{
"path": "breaches/Appen.md",
"chars": 822,
"preview": "# Appen database leak\n\n## Description\n\n2020-06-22\n\nIn June 2020, the AI training data company <a href=\"https://www.bleep"
},
{
"path": "breaches/Aptoide.md",
"chars": 670,
"preview": "# Aptoide database leak\n\n## Description\n\n2020-04-13\n\nIn April 2020, the independent Android app store <a href=\"https://b"
},
{
"path": "breaches/ArmorGames.md",
"chars": 772,
"preview": "# ArmorGames database leak\n\n## Description\n\n2019-01-01\n\nIn January 2019, the game portal website <a href=\"https://techra"
},
{
"path": "breaches/ArmyForceOnline.md",
"chars": 586,
"preview": "# ArmyForceOnline database leak\n\n## Description\n\n2016-05-18\n\nIn May 2016, the online gaming site <a href=\"http://armyfor"
},
{
"path": "breaches/Artsy.md",
"chars": 690,
"preview": "# Artsy database leak\n\n## Description\n\n2018-04-01\n\nIn April 2018, the online arts database <a href=\"https://www.theregis"
},
{
"path": "breaches/Artvalue.md",
"chars": 659,
"preview": "# Artvalue database leak\n\n## Description\n\n2019-06-19\n\nIn June 2019, the France-based art valuation website <a href=\"http"
},
{
"path": "breaches/AshleyMadison.md",
"chars": 1173,
"preview": "# AshleyMadison database leak\n\n## Description\n\n2015-07-19\n\nIn July 2015, the infidelity website Ashley Madison <a href=\""
},
{
"path": "breaches/Astoria.md",
"chars": 1058,
"preview": "# Astoria database leak\n\n## Description\n\n2021-01-26\n\nIn January 2021, over 11M unique email addresses were discovered by"
},
{
"path": "breaches/AstroPID.md",
"chars": 771,
"preview": "# AstroPID database leak\n\n## Description\n\n2013-12-19\n\nIn December 2013, the vBulletin forum for the social engineering s"
},
{
"path": "breaches/Aternos.md",
"chars": 567,
"preview": "# Aternos database leak\n\n## Description\n\n2015-12-06\n\nIn December 2015, the service for creating and running free Minecra"
},
{
"path": "breaches/AtlasQuantum.md",
"chars": 596,
"preview": "# AtlasQuantum database leak\n\n## Description\n\n2018-08-25\n\nIn August 2018, the cryptocurrency investment platform <a href"
},
{
"path": "breaches/Atmeltomo.md",
"chars": 631,
"preview": "# Atmeltomo database leak\n\n## Description\n\n2021-04-16\n\nIn April 2021, "Japan's largest e-mail friend search site&qu"
},
{
"path": "breaches/Audi.md",
"chars": 1027,
"preview": "# Audi database leak\n\n## Description\n\n2019-08-14\n\nIn August 2019, <a href=\"https://techcrunch.com/2021/06/11/volkswagen-"
},
{
"path": "breaches/Autocentrum.md",
"chars": 485,
"preview": "# Autocentrum database leak\n\n## Description\n\n2018-02-04\n\nIn February 2018, <a href=\"https://niebezpiecznik.pl/post/wycie"
},
{
"path": "breaches/Autotrader.md",
"chars": 939,
"preview": "# Autotrader database leak\n\n## Description\n\n2023-01-06\n\nIn January 2023, <a href=\"https://thecyberexpress.com/data1-4-mi"
},
{
"path": "breaches/Avast.md",
"chars": 466,
"preview": "# Avast database leak\n\n## Description\n\n2014-05-26\n\nIn May 2014, <a href=\"https://www.grahamcluley.com/2014/05/avast-foru"
},
{
"path": "breaches/Avito.md",
"chars": 607,
"preview": "# Avito database leak\n\n## Description\n\n2022-11-18\n\nIn November 2022, the Moroccan e-commerce service <a href=\"https://le"
},
{
"path": "breaches/Avvo.md",
"chars": 812,
"preview": "# Avvo database leak\n\n## Description\n\n2019-12-17\n\nIn approximately December 2019, an alleged data breach of the lawyer d"
},
{
"path": "breaches/B2BUSABusinesses.md",
"chars": 724,
"preview": "# B2BUSABusinesses database leak\n\n## Description\n\n2017-07-18\n\nIn mid-2017, a spam list of over 105 million individuals i"
},
{
"path": "breaches/BTCAlpha.md",
"chars": 742,
"preview": "# BTCAlpha database leak\n\n## Description\n\n2021-11-02\n\nIn November 2021, the crypto exchange platform <a href=\"https://ww"
},
{
"path": "breaches/BTCE.md",
"chars": 539,
"preview": "# BTCE database leak\n\n## Description\n\n2014-10-01\n\nIn October 2014, <a href=\"https://www.databreaches.net/bitcoin-exchang"
},
{
"path": "breaches/BTSec.md",
"chars": 845,
"preview": "# BTSec database leak\n\n## Description\n\n2014-01-09\n\nIn September 2014, a large dump of nearly 5M usernames and passwords "
},
{
"path": "breaches/BVD.md",
"chars": 1041,
"preview": "# BVD database leak\n\n## Description\n\n2021-08-19\n\nIn approximately August 2021, <a href=\"https://kaduu.io/blog/2022/02/04"
},
{
"path": "breaches/BabyNames.md",
"chars": 616,
"preview": "# BabyNames database leak\n\n## Description\n\n2008-10-24\n\nIn approximately 2008, the site to help parents name their childr"
},
{
"path": "breaches/Badoo.md",
"chars": 995,
"preview": "# Badoo database leak\n\n## Description\n\n2013-06-01\n\nIn June 2016, <a href=\"http://motherboard.vice.com/read/another-day-a"
},
{
"path": "breaches/BannerBit.md",
"chars": 542,
"preview": "# BannerBit database leak\n\n## Description\n\n2018-12-29\n\nIn approximately December 2018, the online ad platform <a href=\"h"
},
{
"path": "breaches/Banorte.md",
"chars": 854,
"preview": "# Banorte database leak\n\n## Description\n\n2014-08-18\n\nIn August 2022, <a href=\"https://krebsonsecurity.com/2022/08/when-e"
},
{
"path": "breaches/BattlefieldHeroes.md",
"chars": 648,
"preview": "# BattlefieldHeroes database leak\n\n## Description\n\n2011-06-26\n\nIn June 2011 as part of a final breached data dump, the h"
},
{
"path": "breaches/Battlefy.md",
"chars": 527,
"preview": "# Battlefy database leak\n\n## Description\n\n2016-01-11\n\nIn January 2016, the esports website <a href=\"https://dotesports.c"
},
{
"path": "breaches/BeautifulPeople.md",
"chars": 910,
"preview": "# BeautifulPeople database leak\n\n## Description\n\n2015-11-11\n\nIn November 2015, the dating website <a href=\"http://www.fo"
},
{
"path": "breaches/Bell.md",
"chars": 745,
"preview": "# Bell database leak\n\n## Description\n\n2014-02-01\n\nIn February 2014, <a href=\"http://news.softpedia.com/news/Hackers-Clai"
},
{
"path": "breaches/Bell2017.md",
"chars": 1183,
"preview": "# Bell2017 database leak\n\n## Description\n\n2017-05-15\n\nIn May 2017, <a href=\"http://www.cbc.ca/beta/news/technology/bell-"
},
{
"path": "breaches/Benchmark.md",
"chars": 924,
"preview": "# Benchmark database leak\n\n## Description\n\n2019-11-01\n\nIn November 2019, the Serbian technology news website <a href=\"ht"
},
{
"path": "breaches/Bestialitysextaboo.md",
"chars": 851,
"preview": "# Bestialitysextaboo database leak\n\n## Description\n\n2018-03-19\n\nIn March 2018, the animal bestiality website known as <a"
},
{
"path": "breaches/Bhinneka.md",
"chars": 686,
"preview": "# Bhinneka database leak\n\n## Description\n\n2020-01-27\n\nIn early 2020, the Indonesian consumer electronics website <a href"
},
{
"path": "breaches/BigMoneyJobs.md",
"chars": 1028,
"preview": "# BigMoneyJobs database leak\n\n## Description\n\n2014-04-03\n\nIn April 2014, the job site <a href=\"http://www.bigmoneyjobs.c"
},
{
"path": "breaches/BinWeevils.md",
"chars": 1099,
"preview": "# BinWeevils database leak\n\n## Description\n\n2014-09-01\n\nIn September 2014, the online game <a href=\"http://blog.binweevi"
},
{
"path": "breaches/BiohackMe.md",
"chars": 678,
"preview": "# BiohackMe database leak\n\n## Description\n\n2016-12-02\n\nIn December 2016, the forum for the biohacking website <a href=\"h"
},
{
"path": "breaches/BitTorrent.md",
"chars": 590,
"preview": "# BitTorrent database leak\n\n## Description\n\n2016-01-01\n\nIn January 2016, the forum for the popular torrent software <a h"
},
{
"path": "breaches/BitcoinTalk.md",
"chars": 764,
"preview": "# BitcoinTalk database leak\n\n## Description\n\n2015-05-22\n\nIn May 2015, the Bitcoin forum <a href=\"https://www.cryptocoins"
},
{
"path": "breaches/Bitly.md",
"chars": 548,
"preview": "# Bitly database leak\n\n## Description\n\n2014-05-08\n\nIn May 2014, the link management company <a href=\"https://bitly.com/b"
},
{
"path": "breaches/BlackBerryFans.md",
"chars": 532,
"preview": "# BlackBerryFans database leak\n\n## Description\n\n2022-05-06\n\nIn May 2022, the Chinese BlackBerry enthusiasts website <a h"
},
{
"path": "breaches/BlackHatWorld.md",
"chars": 619,
"preview": "# BlackHatWorld database leak\n\n## Description\n\n2014-06-23\n\nIn June 2014, the search engine optimisation forum <a href=\"h"
},
{
"path": "breaches/BlackSpigotMC.md",
"chars": 735,
"preview": "# BlackSpigotMC database leak\n\n## Description\n\n2019-07-14\n\nIn July 2019, the hacking website <a href=\"https://blackspigo"
},
{
"path": "breaches/BlankMediaGames.md",
"chars": 889,
"preview": "# BlankMediaGames database leak\n\n## Description\n\n2018-12-28\n\nIn December 2018, the Town of Salem website produced by <a "
},
{
"path": "breaches/BleachAnime.md",
"chars": 419,
"preview": "# BleachAnime database leak\n\n## Description\n\n2015-01-01\n\nIn 2015, the now defunct independent forum for the Bleach Anime"
},
{
"path": "breaches/BloomsToday.md",
"chars": 895,
"preview": "# BloomsToday database leak\n\n## Description\n\n2023-11-11\n\nIn April 2024, <a href=\"https://dailydarkweb.net/blooms-today-a"
},
{
"path": "breaches/BlueSnapRegpack.md",
"chars": 1418,
"preview": "# BlueSnapRegpack database leak\n\n## Description\n\n2016-05-20\n\nIn July 2016, a tweet was posted with a link to an alleged "
},
{
"path": "breaches/Bolt.md",
"chars": 697,
"preview": "# Bolt database leak\n\n## Description\n\n2017-03-01\n\nIn approximately March 2017, the file sharing website <a href=\"http://"
},
{
"path": "breaches/BombujEu.md",
"chars": 538,
"preview": "# BombujEu database leak\n\n## Description\n\n2018-12-07\n\nIn December 2018, the Slovak website for watching movies online fo"
},
{
"path": "breaches/Bonobos.md",
"chars": 1035,
"preview": "# Bonobos database leak\n\n## Description\n\n2020-08-14\n\nIn August 2020, the clothing store <a href=\"https://www.bleepingcom"
},
{
"path": "breaches/BookCrossing.md",
"chars": 633,
"preview": "# BookCrossing database leak\n\n## Description\n\n2012-11-05\n\nIn August 2022, the book social networking site <a href=\"https"
},
{
"path": "breaches/Bookchor.md",
"chars": 762,
"preview": "# Bookchor database leak\n\n## Description\n\n2021-01-28\n\nIn January 2021, the Indian book trading website <a href=\"https://"
},
{
"path": "breaches/Bookmate.md",
"chars": 786,
"preview": "# Bookmate database leak\n\n## Description\n\n2018-07-08\n\nIn mid-2018, the social ebook subscription service <a href=\"https:"
},
{
"path": "breaches/BotOfLegends.md",
"chars": 511,
"preview": "# BotOfLegends database leak\n\n## Description\n\n2014-11-13\n\nIn November 2014, the forum for <a href=\"http://botoflegends.c"
},
{
"path": "breaches/BourseDesVols.md",
"chars": 769,
"preview": "# BourseDesVols database leak\n\n## Description\n\n2021-01-12\n\nIn January 2021, the French travel company <a href=\"https://w"
},
{
"path": "breaches/Boxee.md",
"chars": 703,
"preview": "# Boxee database leak\n\n## Description\n\n2014-03-29\n\nIn March 2014, the home theatre PC software maker Boxee had their for"
},
{
"path": "breaches/BrandNewTube.md",
"chars": 706,
"preview": "# BrandNewTube database leak\n\n## Description\n\n2022-08-14\n\nIn August 2022, the streaming website <a href=\"https://unityne"
},
{
"path": "breaches/Brazzers.md",
"chars": 693,
"preview": "# Brazzers database leak\n\n## Description\n\n2013-04-01\n\nIn April 2013, the adult website known as <a href=\"https://motherb"
},
{
"path": "breaches/BreachForums.md",
"chars": 953,
"preview": "# BreachForums database leak\n\n## Description\n\n2022-11-29\n\nIn November 2022, the well-known hacking forum "BreachFor"
},
{
"path": "breaches/BreachForumsClone.md",
"chars": 635,
"preview": "# BreachForumsClone database leak\n\n## Description\n\n2023-06-17\n\nIn June 2023, <a href=\"https://www.hackread.com/breachfor"
},
{
"path": "breaches/BtoBet.md",
"chars": 1003,
"preview": "# BtoBet database leak\n\n## Description\n\n2019-12-26\n\nIn December 2019, <a href=\"https://www.troyhunt.com/the-difficulty-o"
},
{
"path": "breaches/Bukalapak.md",
"chars": 745,
"preview": "# Bukalapak database leak\n\n## Description\n\n2017-10-23\n\nIn March 2019, the Indonesian e-commerce website <a href=\"https:/"
},
{
"path": "breaches/BulgarianNationalRevenueAgency.md",
"chars": 801,
"preview": "# BulgarianNationalRevenueAgency database leak\n\n## Description\n\n2019-07-15\n\nIn July 2019, <a href=\"https://thenextweb.co"
},
{
"path": "breaches/BusinessAcumen.md",
"chars": 660,
"preview": "# BusinessAcumen database leak\n\n## Description\n\n2014-04-25\n\nIn April 2014, the Australian \"Business Acumen Magazine\" web"
},
{
"path": "breaches/CDEK.md",
"chars": 809,
"preview": "# CDEK database leak\n\n## Description\n\n2022-03-09\n\nIn early 2022, a collective known as <a href=\"https://www.bleepingcomp"
},
{
"path": "breaches/CDProjektRed.md",
"chars": 613,
"preview": "# CDProjektRed database leak\n\n## Description\n\n2016-03-01\n\nIn March 2016, <a href=\"http://forums.cdprojektred.com/forum/e"
},
{
"path": "breaches/CERTPolandPhish.md",
"chars": 715,
"preview": "# CERTPolandPhish database leak\n\n## Description\n\n2023-02-25\n\nIn August 2023, <a href=\"https://www.troyhunt.com/68k-polis"
},
{
"path": "breaches/COMELEC.md",
"chars": 1062,
"preview": "# COMELEC database leak\n\n## Description\n\n2016-03-27\n\nIn March 2016, <a href=\"http://www.comelec.gov.ph/\" target=\"_blank\""
},
{
"path": "breaches/CTARS.md",
"chars": 895,
"preview": "# CTARS database leak\n\n## Description\n\n2021-05-21\n\nIn May 2022, the client management system for the Australian governme"
},
{
"path": "breaches/CafeMom.md",
"chars": 502,
"preview": "# CafeMom database leak\n\n## Description\n\n2014-04-10\n\nIn 2014, the social network for mothers <a href=\"http://www.cafemom"
},
{
"path": "breaches/CafePress.md",
"chars": 670,
"preview": "# CafePress database leak\n\n## Description\n\n2019-02-20\n\nIn February 2019, the custom merchandise retailer <a href=\"https:"
},
{
"path": "breaches/CannabisForum.md",
"chars": 723,
"preview": "# CannabisForum database leak\n\n## Description\n\n2014-02-05\n\nIn February 2014, the vBulletin forum for the Marijuana site "
},
{
"path": "breaches/Canva.md",
"chars": 725,
"preview": "# Canva database leak\n\n## Description\n\n2019-05-24\n\nIn May 2019, the graphic design tool website <a href=\"https://support"
},
{
"path": "breaches/CapialEconomics.md",
"chars": 643,
"preview": "# CapialEconomics database leak\n\n## Description\n\n2020-12-12\n\nIn December 2020, the economic research company <a href=\"ht"
},
{
"path": "breaches/CardingMafia.md",
"chars": 492,
"preview": "# CardingMafia database leak\n\n## Description\n\n2021-03-18\n\nIn March 2021, the Carding Mafia forum suffered a data breach "
},
{
"path": "breaches/CardingMafiaDec2021.md",
"chars": 587,
"preview": "# CardingMafiaDec2021 database leak\n\n## Description\n\n2021-12-28\n\nIn December 2021, the Carding Mafia forum suffered a da"
},
{
"path": "breaches/CashCrate.md",
"chars": 695,
"preview": "# CashCrate database leak\n\n## Description\n\n2016-11-17\n\nIn June 2017, news broke that <a href=\"https://motherboard.vice.c"
},
{
"path": "breaches/Catho.md",
"chars": 799,
"preview": "# Catho database leak\n\n## Description\n\n2020-03-01\n\nIn approximately March 2020, the Brazilian recruitment website <a hre"
},
{
"path": "breaches/Chatbooks.md",
"chars": 817,
"preview": "# Chatbooks database leak\n\n## Description\n\n2020-03-26\n\nIn March 2020, the photo print service <a href=\"https://www.bleep"
},
{
"path": "breaches/CheapAssGamer.md",
"chars": 526,
"preview": "# CheapAssGamer database leak\n\n## Description\n\n2015-07-01\n\nIn approximately mid-2015, the forum for <a href=\"https://www"
},
{
"path": "breaches/Chegg.md",
"chars": 771,
"preview": "# Chegg database leak\n\n## Description\n\n2018-04-28\n\nIn April 2018, the textbook rental service <a href=\"https://techcrunc"
},
{
"path": "breaches/Chess.md",
"chars": 533,
"preview": "# Chess database leak\n\n## Description\n\n2023-11-08\n\nIn November 2023, <a href=\"https://www.hackread.com/hacker-leaks-scra"
},
{
"path": "breaches/Chowbus.md",
"chars": 643,
"preview": "# Chowbus database leak\n\n## Description\n\n2020-10-05\n\nIn October 2020, the Asian food delivery app <a href=\"https://www.r"
},
{
"path": "breaches/ChrisLeong.md",
"chars": 763,
"preview": "# ChrisLeong database leak\n\n## Description\n\n2024-08-10\n\nIn August 2024, <a href=\"https://x.com/DarkWebInformer/status/18"
},
{
"path": "breaches/Cit0day.md",
"chars": 830,
"preview": "# Cit0day database leak\n\n## Description\n\n2020-11-04\n\nIn November 2020, <a href=\"https://www.troyhunt.com/inside-the-cit0"
},
{
"path": "breaches/CityBee.md",
"chars": 598,
"preview": "# CityBee database leak\n\n## Description\n\n2021-02-05\n\nIn February 2021, the Lithuanian car-sharing service <a href=\"https"
},
{
"path": "breaches/CityJerks.md",
"chars": 1040,
"preview": "# CityJerks database leak\n\n## Description\n\n2023-02-27\n\nIn early 2023, the "mutual masturbation" website <a hre"
},
{
"path": "breaches/CivilOnline.md",
"chars": 878,
"preview": "# CivilOnline database leak\n\n## Description\n\n2011-07-10\n\nIn mid-2011, data was allegedly obtained from the Chinese engin"
},
{
"path": "breaches/ClashOfKings.md",
"chars": 687,
"preview": "# ClashOfKings database leak\n\n## Description\n\n2016-07-14\n\nIn July 2016, <a href=\"https://www.zdnet.com/article/hacker-st"
},
{
"path": "breaches/ClearVoiceSurveys.md",
"chars": 810,
"preview": "# ClearVoiceSurveys database leak\n\n## Description\n\n2015-08-23\n\nIn April 2021, the market research surveys company <a hre"
},
{
"path": "breaches/ClickASnap.md",
"chars": 722,
"preview": "# ClickASnap database leak\n\n## Description\n\n2022-09-24\n\nIn September 2022, the online photo sharing platform <a href=\"ht"
},
{
"path": "breaches/ClixSense.md",
"chars": 869,
"preview": "# ClixSense database leak\n\n## Description\n\n2016-09-04\n\nIn September 2016, the paid-to-click site <a href=\"http://cyberca"
},
{
"path": "breaches/CloudPets.md",
"chars": 927,
"preview": "# CloudPets database leak\n\n## Description\n\n2017-01-01\n\nIn January, the maker of teddy bears that record children's voice"
},
{
"path": "breaches/ClubPenguinRewritten.md",
"chars": 751,
"preview": "# ClubPenguinRewritten database leak\n\n## Description\n\n2018-01-21\n\nIn January 2018, the children's gaming site <a href=\"h"
},
{
"path": "breaches/ClubPenguinRewrittenJul2019.md",
"chars": 724,
"preview": "# ClubPenguinRewrittenJul2019 database leak\n\n## Description\n\n2019-07-27\n\nIn July 2019, the children's gaming site <a hre"
},
{
"path": "breaches/Coachella.md",
"chars": 732,
"preview": "# Coachella database leak\n\n## Description\n\n2017-02-22\n\nIn February 2017, <a href=\"https://motherboard.vice.com/en_us/art"
},
{
"path": "breaches/CoinMarketCap.md",
"chars": 1067,
"preview": "# CoinMarketCap database leak\n\n## Description\n\n2021-10-12\n\nDuring October 2021, 3.1 million email addresses with account"
},
{
"path": "breaches/CoinTracker.md",
"chars": 833,
"preview": "# CoinTracker database leak\n\n## Description\n\n2022-12-01\n\nIn December 2022, the Crypto & NFT taxes service <a href=\"https"
},
{
"path": "breaches/Coinmama.md",
"chars": 706,
"preview": "# Coinmama database leak\n\n## Description\n\n2017-08-03\n\nIn August 2017, the crypto coin brokerage service <a href=\"https:/"
},
{
"path": "breaches/Collection1.md",
"chars": 854,
"preview": "# Collection1 database leak\n\n## Description\n\n2019-01-07\n\nIn January 2019, a large collection of credential stuffing list"
},
{
"path": "breaches/Comcast.md",
"chars": 616,
"preview": "# Comcast database leak\n\n## Description\n\n2015-11-08\n\nIn November 2015, the US internet and cable TV provider Comcast <a "
},
{
"path": "breaches/CondoCom.md",
"chars": 625,
"preview": "# CondoCom database leak\n\n## Description\n\n2019-06-01\n\nIn June 2019, now defunct website Condo.com suffered a data breach"
},
{
"path": "breaches/Convex.md",
"chars": 622,
"preview": "# Convex database leak\n\n## Description\n\n2023-02-01\n\nIn February 2023, the Russian telecommunications provider <a href=\"h"
},
{
"path": "breaches/CouponMomAndArmorGames.md",
"chars": 1305,
"preview": "# CouponMomAndArmorGames database leak\n\n## Description\n\n2014-02-08\n\nIn 2014, a file allegedly containing data hacked fro"
},
{
"path": "breaches/CrackCommunity.md",
"chars": 565,
"preview": "# CrackCommunity database leak\n\n## Description\n\n2013-09-09\n\nIn late 2013, the <a href=\"http://crackcommunity.com\" target"
},
{
"path": "breaches/CrackedTO.md",
"chars": 661,
"preview": "# CrackedTO database leak\n\n## Description\n\n2019-07-21\n\nIn July 2019, the hacking website <a href=\"https://cracked.to\" ta"
},
{
"path": "breaches/CrackingForum.md",
"chars": 494,
"preview": "# CrackingForum database leak\n\n## Description\n\n2016-07-01\n\nIn approximately mid-2016, the cracking community forum known"
},
{
"path": "breaches/CraftRise.md",
"chars": 668,
"preview": "# CraftRise database leak\n\n## Description\n\n2022-03-05\n\nIn May 2023, <a href=\"https://memoryhackers.org/konular/craftrise"
},
{
"path": "breaches/Creative.md",
"chars": 654,
"preview": "# Creative database leak\n\n## Description\n\n2018-05-01\n\nIn May 2018, <a href=\"http://forums.creative.com/\" target=\"_blank\""
},
{
"path": "breaches/CrimeAgencyVBulletin.md",
"chars": 875,
"preview": "# CrimeAgencyVBulletin database leak\n\n## Description\n\n2017-01-19\n\nIn January 2016, <a href=\"http://news.softpedia.com/ne"
},
{
"path": "breaches/CrossFire.md",
"chars": 647,
"preview": "# CrossFire database leak\n\n## Description\n\n2016-08-08\n\nIn August 2016, <a href=\"http://www.zdnet.com/article/over-25-mil"
},
{
"path": "breaches/CutoutPro.md",
"chars": 604,
"preview": "# CutoutPro database leak\n\n## Description\n\n2024-02-26\n\nIn February 2024, the AI-powered visual design platform <a href=\""
},
{
"path": "breaches/CyberServe.md",
"chars": 1309,
"preview": "# CyberServe database leak\n\n## Description\n\n2021-10-29\n\nIn October 2021, the Israeli hosting provider <a href=\"https://w"
},
{
"path": "breaches/D3scene.md",
"chars": 531,
"preview": "# D3scene database leak\n\n## Description\n\n2016-01-01\n\nIn January 2016, the gaming website D3Scene, suffered a data breach"
},
{
"path": "breaches/DCHealth.md",
"chars": 838,
"preview": "# DCHealth database leak\n\n## Description\n\n2023-03-06\n\nIn March 2023, <a href=\"https://cyberscoop.com/dc-health-link-brea"
},
{
"path": "breaches/DDO.md",
"chars": 563,
"preview": "# DDO database leak\n\n## Description\n\n2013-04-02\n\nIn April 2013, the interactive video game <a href=\"https://www.ddo.com\""
},
{
"path": "breaches/DLH.md",
"chars": 805,
"preview": "# DLH database leak\n\n## Description\n\n2016-07-31\n\nIn July 2016, the gaming news site <a href=\"http://www.zdnet.com/articl"
},
{
"path": "breaches/DVDShopCH.md",
"chars": 601,
"preview": "# DVDShopCH database leak\n\n## Description\n\n2017-12-05\n\nIn December 2017, the online Swiss DVD store known as <a href=\"ht"
},
{
"path": "breaches/DaFont.md",
"chars": 612,
"preview": "# DaFont database leak\n\n## Description\n\n2017-05-16\n\nIn May 2017, <a href=\"http://www.zdnet.com/article/font-sharing-site"
},
{
"path": "breaches/DailyObjects.md",
"chars": 760,
"preview": "# DailyObjects database leak\n\n## Description\n\n2018-01-01\n\nIn approximately January 2018, a collection of more than 464k "
},
{
"path": "breaches/DailyQuiz.md",
"chars": 487,
"preview": "# DailyQuiz database leak\n\n## Description\n\n2021-01-13\n\nIn January 2021, the quiz website <a href=\"https://dailyquiz.me/\""
},
{
"path": "breaches/Dailymotion.md",
"chars": 536,
"preview": "# Dailymotion database leak\n\n## Description\n\n2016-10-20\n\nIn October 2016, the video sharing platform <a href=\"http://the"
},
{
"path": "breaches/Dangdang.md",
"chars": 536,
"preview": "# Dangdang database leak\n\n## Description\n\n2011-06-01\n\nIn 2011, the Chinese e-commerce site <a href=\"https://www.marbridg"
},
{
"path": "breaches/DaniWeb.md",
"chars": 676,
"preview": "# DaniWeb database leak\n\n## Description\n\n2015-12-01\n\nIn late 2015, the technology and social site <a href=\"https://www.d"
},
{
"path": "breaches/DatPiff.md",
"chars": 809,
"preview": "# DatPiff database leak\n\n## Description\n\n2021-08-25\n\nIn late 2021, <a href=\"https://www.numerama.com/cyberguerre/784965-"
},
{
"path": "breaches/DataAndLeads.md",
"chars": 1005,
"preview": "# DataAndLeads database leak\n\n## Description\n\n2018-11-14\n\nIn November 2018, <a href=\"https://blog.hackenproof.com/indust"
},
{
"path": "breaches/DataCamp.md",
"chars": 1017,
"preview": "# DataCamp database leak\n\n## Description\n\n2017-01-30\n\nIn December 2018, the data science website <a href=\"https://suppor"
},
{
"path": "breaches/DataEnrichment.md",
"chars": 1271,
"preview": "# DataEnrichment database leak\n\n## Description\n\n2016-12-23\n\nIn December 2016, <a href=\"http://www.csoonline.com/article/"
},
{
"path": "breaches/DateHotBrunettes.md",
"chars": 533,
"preview": "# DateHotBrunettes database leak\n\n## Description\n\n2021-01-12\n\nIn January 2021, the now defunct website Date Hot Brunette"
},
{
"path": "breaches/Dave.md",
"chars": 904,
"preview": "# Dave database leak\n\n## Description\n\n2020-06-28\n\nIn June 2020, the digital banking app <a href=\"https://www.zdnet.com/a"
},
{
"path": "breaches/DecoratingTheHouse.md",
"chars": 925,
"preview": "# DecoratingTheHouse database leak\n\n## Description\n\n2020-03-27\n\nIn March 2020, the Korean interior decoration website <a"
},
{
"path": "breaches/Deezer.md",
"chars": 790,
"preview": "# Deezer database leak\n\n## Description\n\n2019-04-22\n\nIn late 2022, the music streaming service <a href=\"https://restorepr"
},
{
"path": "breaches/DemonForums.md",
"chars": 486,
"preview": "# DemonForums database leak\n\n## Description\n\n2019-02-20\n\nIn February 2019, the hacking forum <a href=\"https://demonforum"
},
{
"path": "breaches/Descomplica.md",
"chars": 693,
"preview": "# Descomplica database leak\n\n## Description\n\n2021-03-14\n\nIn March 2021, the Brazilian EdTech company <a href=\"https://at"
},
{
"path": "breaches/DevilTorrents.md",
"chars": 436,
"preview": "# DevilTorrents database leak\n\n## Description\n\n2021-01-04\n\nIn early 2021, the Polish torrents website Devil-Torrents.pl "
},
{
"path": "breaches/DietCom.md",
"chars": 834,
"preview": "# DietCom database leak\n\n## Description\n\n2014-08-10\n\nIn August 2014, the diet and nutrition website <a href=\"https://die"
},
{
"path": "breaches/Digimon.md",
"chars": 893,
"preview": "# Digimon database leak\n\n## Description\n\n2016-09-05\n\nIn September 2016, over 16GB of logs from a service indicated to be"
},
{
"path": "breaches/Disqus.md",
"chars": 733,
"preview": "# Disqus database leak\n\n## Description\n\n2012-07-01\n\nIn October 2017, the blog commenting service <a href=\"https://blog.d"
},
{
"path": "breaches/DivXSubTitles.md",
"chars": 391,
"preview": "# DivXSubTitles database leak\n\n## Description\n\n2010-01-01\n\nIn approximately 2010, the now defunct website DivX SubTitles"
},
{
"path": "breaches/Dodonew.md",
"chars": 784,
"preview": "# Dodonew database leak\n\n## Description\n\n2011-12-01\n\nIn late 2011, data was allegedly obtained from the Chinese website "
},
{
"path": "breaches/Dominos.md",
"chars": 845,
"preview": "# Dominos database leak\n\n## Description\n\n2014-06-13\n\nIn June 2014, <a href=\"http://www.welivesecurity.com/2014/06/16/dom"
},
{
"path": "breaches/DominosIndia.md",
"chars": 699,
"preview": "# DominosIndia database leak\n\n## Description\n\n2021-03-24\n\nIn April 2021, <a href=\"https://www.bleepingcomputer.com/news/"
},
{
"path": "breaches/Doomworld.md",
"chars": 507,
"preview": "# Doomworld database leak\n\n## Description\n\n2022-10-12\n\nIn October 2022, <a href=\"https://www.doomworld.com/announcement/"
},
{
"path": "breaches/DoorDash.md",
"chars": 779,
"preview": "# DoorDash database leak\n\n## Description\n\n2022-08-02\n\nIn August 2022, the food ordering and delivery service <a href=\"ht"
},
{
"path": "breaches/Dota2.md",
"chars": 602,
"preview": "# Dota2 database leak\n\n## Description\n\n2016-07-10\n\nIn July 2016, <a href=\"https://news.softpedia.com/news/data-of-nearly"
},
{
"path": "breaches/Doxbin.md",
"chars": 819,
"preview": "# Doxbin database leak\n\n## Description\n\n2022-01-05\n\nIn January 2022, the "doxing" website designed to disclose"
},
{
"path": "breaches/DriveSure.md",
"chars": 883,
"preview": "# DriveSure database leak\n\n## Description\n\n2020-12-19\n\nIn December 2020, the car dealership service provider <a href=\"ht"
},
{
"path": "breaches/Drizly.md",
"chars": 821,
"preview": "# Drizly database leak\n\n## Description\n\n2020-07-02\n\nIn approximately July 2020, the US-based online alcohol delivery ser"
},
{
"path": "breaches/Dropbox.md",
"chars": 854,
"preview": "# Dropbox database leak\n\n## Description\n\n2012-07-01\n\nIn mid-2012, Dropbox suffered a data breach which exposed the store"
}
]
// ... and 611 more files (download for full content)
About this extraction
This page contains the full source code of the doormanBreach/FreeDatabreaches GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 811 files (592.8 KB), approximately 165.5k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.