haveibeenpwned.com Open in urlscan Pro
2606:4700::6812:ad0d  Public Scan

Submitted URL: https://haveibeenpwned.com/PwnedWebsites#GoNinja
Effective URL: https://haveibeenpwned.com/PwnedWebsites
Submission: On March 02 via api from IT — Scanned from IT

Form analysis 1 forms found in the DOM

POST /NotifyMe

<form action="/NotifyMe" id="notifyMeForm" method="post" role="form">
  <p> Get notified when future pwnage occurs and your account is compromised. </p>
  <div class="form-group row">
    <div class="col-lg-7">
      <input class="form-control" data-val="true" data-val-maxlength="The field Email must be a string or array type with a maximum length of '255'." data-val-maxlength-max="255" data-val-regex="That doesn't look like a valid email address"
        data-val-regex-pattern="^(?!^.{256})[^\x00-\x1F\*\x7F]+@[^\x00-\x1F\*\x7F]+$" data-val-required="Can't do much without an email address" id="NotifyEmail" maxlength="255" name="NotifyEmail" placeholder="enter your email address" type="email"
        value="">
    </div>
  </div>
  <div class="form-group row">
    <script src="https://www.google.com/recaptcha/api.js" async="" defer=""></script>
    <div class="g-recaptcha" data-sitekey="6Lcb0woTAAAAAJAbo3ToF_yAJMKMsZgSATbQTRmI">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-dr5r47mtu3ml" frameborder="0" scrolling="no"
            sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
            src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Lcb0woTAAAAAJAbo3ToF_yAJMKMsZgSATbQTRmI&amp;co=aHR0cHM6Ly9oYXZlaWJlZW5wd25lZC5jb206NDQz&amp;hl=it&amp;v=vj7hFxe2iNgbe-u95xTozOXW&amp;size=normal&amp;cb=8qrxfdhjzgh4"></iframe>
        </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div>
  </div>
  <div class="form-group row">
    <p class="termsOfUse">Using Have I Been Pwned is subject to <a href="/TermsOfUse" target="_blank">the terms of use</a></p>
  </div>
  <div class="validation-summary-valid alert alert-danger" data-valmsg-summary="true" id="notifyError">
    <ul>
      <li style="display:none"></li>
    </ul>
  </div>
  <div class="form-group row" id="notificationSubmitRow">
    <input type="submit" value="notify me of pwnage" class="btn btn-primary"><i class="fa fa-3x fa-cog fa-spin fa-loader" id="notificationLoading" style="display: none;"></i>
  </div>
</form>

Text Content

';--
 * Home
 * Notify me
 * Domain search
 * Who's been pwned
 * Passwords
 * API
   * Overview
   * API key
 * About
   * Who, what & why
   * Privacy
   * FAQs
   * Pastes
   * Opt-out
   * Twitter
   * Facebook
   * Mastodon
   * Suggest a feature
   * Breaches
 * Donate


PWNED WEBSITES


BREACHED WEBSITES THAT HAVE BEEN LOADED INTO HAVE I BEEN PWNED

Here's an overview of the various breaches that have been consolidated into this
Have I Been Pwned. These are accessible programmatically via the HIBP API and
also via the RSS feed.

--------------------------------------------------------------------------------


000WEBHOST

In approximately March 2015, the free web hosting provider 000webhost suffered a
major data breach that exposed almost 15 million customer records. The data was
sold and traded before 000webhost was alerted in October. The breach included
names, email addresses and plain text passwords.

Breach date: 1 March 2015
Date added to HIBP: 26 October 2015
Compromised accounts: 14,936,670
Compromised data: Email addresses, IP addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


123RF

In March 2020, the stock photo site 123RF suffered a data breach which impacted
over 8 million subscribers and was subsequently sold online. The breach included
email, IP and physical addresses, names, phone numbers and passwords stored as
MD5 hashes. The data was provided to HIBP by dehashed.com.

Breach date: 22 March 2020
Date added to HIBP: 15 November 2020
Compromised accounts: 8,661,578
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone
numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


126

In approximately 2012, it's alleged that the Chinese email service known as 126
suffered a data breach that impacted 6.4 million subscribers. Whilst there is
evidence that the data is legitimate, due to the difficulty of emphatically
verifying the Chinese breach it has been flagged as "unverified". The data in
the breach contains email addresses and plain text passwords. Read more about
Chinese data breaches in Have I Been Pwned.

Breach date: 1 January 2012
Date added to HIBP: 8 October 2016
Compromised accounts: 6,414,191
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


17

In April 2016, customer data obtained from the streaming app known as "17"
appeared listed for sale on a Tor hidden service marketplace. The data contained
over 4 million unique email addresses along with IP addresses, usernames and
passwords stored as unsalted MD5 hashes.

Breach date: 19 April 2016
Date added to HIBP: 8 July 2016
Compromised accounts: 4,009,640
Compromised data: Device information, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


17173

In late 2011, a series of data breaches in China affected up to 100 million
users, including 7.5 million from the gaming site known as 17173. Whilst there
is evidence that the data is legitimate, due to the difficulty of emphatically
verifying the Chinese breach it has been flagged as "unverified". The data in
the breach contains usernames, email addresses and salted MD5 password hashes
and was provided with support from dehashed.com. Read more about Chinese data
breaches in Have I Been Pwned.

Breach date: 28 December 2011
Date added to HIBP: 28 April 2018
Compromised accounts: 7,485,802
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


2,844 SEPARATE DATA BREACHES

In February 2018, a massive collection of almost 3,000 alleged data breaches was
found online. Whilst some of the data had previously been seen in Have I Been
Pwned, 2,844 of the files consisting of more than 80 million unique email
addresses had not previously been seen. Each file contained both an email
address and plain text password and were consequently loaded as a single
"unverified" data breach.

Breach date: 19 February 2018
Date added to HIBP: 26 February 2018
Compromised accounts: 80,115,532
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


2FAST4U

In December 2017, the Belgian motorcycle forum 2fast4u discovered a data breach
of their system. The breach of the vBulletin message board impacted over 17k
individual users and exposed email addresses, usersnames and salted MD5
passwords.

Breach date: 20 December 2017
Date added to HIBP: 7 January 2018
Compromised accounts: 17,706
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


500PX

In mid-2018, the online photography community 500px suffered a data breach. The
incident exposed almost 15 million unique email addresses alongside names,
usernames, genders, dates of birth and either an MD5 or bcrypt password hash. In
2019, the data appeared listed for sale on a dark web marketplace (along with
several other large breaches) and subsequently began circulating more broadly.
The data was provided to HIBP by a source who requested it to be attributed to
"BenjaminBlue@exploit.im".

Breach date: 5 July 2018
Date added to HIBP: 25 March 2019
Compromised accounts: 14,867,999
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


7K7K

In approximately 2011, it's alleged that the Chinese gaming site known as 7k7k
suffered a data breach that impacted 9.1 million subscribers. Whilst there is
evidence that the data is legitimate, due to the difficulty of emphatically
verifying the Chinese breach it has been flagged as "unverified". The data in
the breach contains usernames, email addresses and plain text passwords. Read
more about Chinese data breaches in Have I Been Pwned.

Breach date: 1 January 2011
Date added to HIBP: 26 September 2017
Compromised accounts: 9,121,434
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


8FIT

In July 2018, the health and fitness service 8fit suffered a data breach. The
data subsequently appeared for sale on a dark web marketplace in February 2019
and included over 15M unique email addresses alongside names, genders, IP
addresses and passwords stored as bcrypt hashes. The data was provided to HIBP
by dehashed.com.

Breach date: 1 July 2018
Date added to HIBP: 21 March 2019
Compromised accounts: 15,025,407
Compromised data: Email addresses, Genders, Geographic locations, IP addresses,
Names, Passwords
Permalink

--------------------------------------------------------------------------------


8TRACKS

In June 2017, the online playlists service known as 8Tracks suffered a data
breach which impacted 18 million accounts. In their disclosure, 8Tracks advised
that "the vector for the attack was an employee’s GitHub account, which was not
secured using two-factor authentication". Salted SHA-1 password hashes for users
who didn't sign up with either Google or Facebook authentication were also
included. The data was provided to HIBP by whitehat security researcher and data
analyst Adam Davies and contained almost 8 million unique email addresses. The
complete set of 18M records was later provided by JimScott.Sec@protonmail.com
and updated in HIBP accordingly.

Breach date: 27 June 2017
Date added to HIBP: 16 February 2018
Compromised accounts: 17,979,961
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ABANDONIA (2015)

In November 2015, the gaming website dedicated to classic DOS games Abandonia
suffered a data breach resulting in the exposure of 776k unique user records.
The data contained email and IP addresses, usernames and salted MD5 hashes of
passwords.

Breach date: 1 November 2015
Date added to HIBP: 5 June 2017
Compromised accounts: 776,125
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ABANDONIA (2022)

In November 2022, the gaming website dedicated to classic DOS games Abandonia
suffered a data breach resulting in the exposure of 920k unique user records.
This breach was in addition to another one 7 years earlier in 2015. The data
contained email and IP addresses, usernames and salted MD5 hashes of passwords.

Breach date: 15 November 2022
Date added to HIBP: 7 December 2022
Compromised accounts: 919,790
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ABUSEWITH.US

In 2016, the site dedicated to helping people hack email and online gaming
accounts known as Abusewith.us suffered multiple data breaches. The site
allegedly had an administrator in common with the nefarious LeakedSource site,
both of which have since been shut down. The exposed data included more than 1.3
million unique email addresses, often accompanied by usernames, IP addresses and
plain text or hashed passwords retrieved from various sources and intended to be
used to compromise the victims' accounts.

Breach date: 1 July 2016
Date added to HIBP: 9 October 2017
Compromised accounts: 1,372,550
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ACNE.ORG

In November 2014, the acne website acne.org suffered a data breach that exposed
over 430k forum members' accounts. The data was being actively traded on
underground forums and included email addresses, birth dates and passwords.

Breach date: 25 November 2014
Date added to HIBP: 6 March 2016
Compromised accounts: 432,943
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


ACTIVISION

In December 2022, attackers socially engineered an Activision HR employee into
disclosing information which led to the breach of almost 20k employee records.
The data contained 16k unique email addresses along with names, phone numbers,
job titles and the office location of the employee. Activision advised that no
sensitive employee information was included in the breach.

Breach date: 4 December 2022
Date added to HIBP: 3 October 2023
Compromised accounts: 16,006
Compromised data: Email addresses, Geographic locations, Job titles, Names,
Phone numbers
Permalink

--------------------------------------------------------------------------------


ACTMOBILE

In October 2021, security researcher Bob Diachenko discovered an exposed
database he attributed to ActMobile, the operators of Dash VPN and FreeVPN. The
exposed data included 1.6 million unique email addresses along with IP addresses
and password hashes, all of which were subsequently leaked on a popular hacking
forum. Although usage of the service was verified by HIBP subscribers, ActMobile
denied the data was sourced from them and the breach has subsequently been
flagged as "unverified".

Breach date: 8 October 2021
Date added to HIBP: 9 November 2021
Compromised accounts: 1,583,193
Compromised data: Email addresses, IP addresses
Permalink

--------------------------------------------------------------------------------


ACUITY

In mid-2020, a 437GB corpus of data attributed to an entity named "Acuity" was
created and later extensively distributed. However, the source could not be
confidently verified as any known companies named Acuity. The data totalled over
14M unique email addresses with each row containing extensive personal
information across more than 400 columns of data including names, phone numbers,
physical addresses, genders and dates of birth.

Breach date: 18 June 2020
Date added to HIBP: 15 November 2023
Compromised accounts: 14,055,729
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Phone numbers, Physical addresses, Salutations
Permalink

--------------------------------------------------------------------------------


ADAPT

In November 2018, security researcher Bob Diachenko identified an unprotected
database hosted by data aggregator "Adapt". A provider of "Fresh Quality
Contacts", the service exposed over 9.3M unique records of individuals and
employer information including their names, employers, job titles, contact
information and data relating to the employer including organisation
description, size and revenue. No response was received from Adapt when
contacted.

Breach date: 5 November 2018
Date added to HIBP: 22 November 2018
Compromised accounts: 9,363,740
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers,
Physical addresses, Social media profiles
Permalink

--------------------------------------------------------------------------------


ADECCO

In March 2021, news broke of a massive data breach impacting millions of Adecco
customers in South America which was subsequently sold on a popular hacking
forum. The breach exposed over 4M unique email addresses as well as genders,
dates of birth, marital statuses, phone numbers and passwords stored as bcrypt
hashes.

Breach date: 3 January 2021
Date added to HIBP: 31 May 2022
Compromised accounts: 4,284,538
Compromised data: Email addresses, Genders, Geographic locations, Marital
statuses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


ADITYA BIRLA FASHION AND RETAIL

In December 2021, Indian retailer Aditya Birla Fashion and Retail Ltd was
breached and ransomed. The ransom demand was allegedly rejected and data
containing 5.4M unique email addresses was subsequently dumped publicly on a
popular hacking forum the next month. The data contained extensive personal
customer information including names, phone numbers, physical addresses, DoBs,
order histories and passwords stored as MD5 hashes. Employee data was also
dumped publicly and included salary grades, marital statuses and religions. The
data was provided to HIBP by a source who requested it be attributed to
"white_peacock@riseup.net".

Breach date: 1 December 2021
Date added to HIBP: 15 January 2022
Compromised accounts: 5,470,063
Compromised data: Email addresses, Genders, Income levels, Job titles, Marital
statuses, Names, Passwords, Phone numbers, Physical addresses, Purchases,
Religions, Salutations
Permalink

--------------------------------------------------------------------------------


ADOBE

In October 2013, 153 million Adobe accounts were breached with each containing
an internal ID, username, email, encrypted password and a password hint in plain
text. The password cryptography was poorly done and many were quickly resolved
back to plain text. The unencrypted hints also disclosed much about the
passwords adding further to the risk that hundreds of millions of Adobe
customers already faced.

Breach date: 4 October 2013
Date added to HIBP: 4 December 2013
Compromised accounts: 152,445,165
Compromised data: Email addresses, Password hints, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ADULT FRIENDFINDER (2015)

In May 2015, the adult hookup site Adult FriendFinder was hacked and nearly 4
million records dumped publicly. The data dump included extremely sensitive
personal information about individuals and their relationship statuses and
sexual preferences combined with personally identifiable information.

Breach date: 21 May 2015
Date added to HIBP: 22 May 2015
Compromised accounts: 3,867,997
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Races, Relationship statuses, Sexual orientations,
Spoken languages, Usernames
Permalink

--------------------------------------------------------------------------------


ADULT FRIENDFINDER (2016)

In October 2016, the adult entertainment company Friend Finder Networks suffered
a massive data breach. The incident impacted multiple separate online assets
owned by the company, the largest of which was the Adult FriendFinder website
alleged to be "the world's largest sex & swinger community". Exposed data
included usernames, passwords stored as SHA-1 hashes and 170 million unique
email addresses. This incident is separate to the 2015 data breach Adult
FriendFinder also suffered. The data was provided to HIBP by dehashed.com.

Breach date: 16 October 2016
Date added to HIBP: 6 February 2020
Compromised accounts: 169,746,810
Compromised data: Email addresses, Passwords, Spoken languages, Usernames
Permalink

--------------------------------------------------------------------------------


ADULT-FANFICTION.ORG

In May 2018, the website for sharing adult-orientated works of fiction known as
Adult-FanFiction.Org had 186k records exposed in a data breach. The data
contained names, email addresses, dates of birth and passwords stored as both
MD5 hashes and plain text. AFF did not respond when contacted about the breach
and the site was previously reported as compromised on the Vigilante.pw breached
database directory.

Breach date: 30 May 2018
Date added to HIBP: 6 August 2018
Compromised accounts: 186,082
Compromised data: Dates of birth, Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


AERSERV

In April 2018, the ad management platform known as AerServ suffered a data
breach. Acquired by InMobi earlier in the year, the AerServ breach impacted over
66k unique email addresses and also included contact information and passwords
stored as salted SHA-512 hashes. The data was publicly posted to Twitter later
in 2018 after which InMobi was notified and advised they were aware of the
incident.

Breach date: 1 April 2018
Date added to HIBP: 6 December 2018
Compromised accounts: 66,308
Compromised data: Email addresses, Employers, Job titles, Names, Passwords,
Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


AGUSIQ-TORRENTS.PL

In September 2019, Polish torrent site AgusiQ-Torrents.pl suffered a data
breach. The incident exposed 90k member records including email and IP
addresses, usernames and passwords stored as MD5 hashes.

Breach date: 24 September 2019
Date added to HIBP: 4 December 2019
Compromised accounts: 90,478
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


AHASHARE.COM

In May 2013, the torrent site AhaShare.com suffered a breach which resulted in
more than 180k user accounts being published publicly. The breach included a
raft of personal information on registered users plus despite assertions of not
distributing personally identifiable information, the site also leaked the IP
addresses used by the registered identities.

Breach date: 30 May 2013
Date added to HIBP: 6 November 2014
Compromised accounts: 180,468
Compromised data: Email addresses, Genders, Geographic locations, IP addresses,
Partial dates of birth, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


AI.TYPE

In December 2017, the virtual keyboard application ai.type was found to have
left a huge amount of data publicly facing in an unsecured MongoDB instance.
Discovered by researchers at The Kromtech Security Center, the 577GB data set
included extensive personal information including over 20 million unique email
addresses, social media profiles and address book contacts. The email addresses
alone were provided to HIBP to enable impacted users to assess their exposure.

Breach date: 5 December 2017
Date added to HIBP: 8 December 2017
Compromised accounts: 20,580,060
Compromised data: Address book contacts, Apps installed on devices, Cellular
network names, Dates of birth, Device information, Email addresses, Genders,
Geographic locations, IMEI numbers, IMSI numbers, IP addresses, Names, Phone
numbers, Profile photos, Social media profiles
Permalink

--------------------------------------------------------------------------------


AIMWARE

In mid-2019, the video game cheats website "Aimware" suffered a data breach that
exposed hundreds of thousands of subscribers' personal information. Data
included email and IP addresses, usernames, forum posts, private messages,
website activity and passwords stored as salted MD5 hashes. The data was
provided to HIBP by a source who requested it be attributed to
"clerk/anthrax/soontoberichh".

Breach date: 28 April 2019
Date added to HIBP: 2 May 2022
Compromised accounts: 305,470
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


AIPAI.COM

In September 2016, data allegedly obtained from the Chinese gaming website known
as Aipai.com and containing 6.5M accounts was leaked online. Whilst there is
evidence that the data is legitimate, due to the difficulty of emphatically
verifying the Chinese breach it has been flagged as "unverified". The data in
the breach contains email addresses and MD5 password hashes. Read more about
Chinese data breaches in Have I Been Pwned.

Breach date: 27 September 2016
Date added to HIBP: 7 November 2016
Compromised accounts: 6,496,778
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


AJARN

In September 2021, the Thai-based English language teaching website Ajarn
discovered they'd been the victim of a data breach dating back to December 2018.
The breach was self-submitted to HIBP and included 266k email addresses, names,
genders, phone numbers and other personal information. Hashed passwords were
also impacted in the breach.

Breach date: 13 December 2018
Date added to HIBP: 26 September 2021
Compromised accounts: 266,399
Compromised data: Dates of birth, Education levels, Email addresses, Genders,
Geographic locations, Job applications, Marital statuses, Names, Nationalities,
Passwords, Phone numbers, Profile photos
Permalink

--------------------------------------------------------------------------------


AKP EMAILS

In July 2016, a hacker known as Phineas Fisher hacked Turkey's ruling party
(Justice and Development Party or "AKP") and gained access to 300k emails. The
full contents of the emails were subsequently published by WikiLeaks and made
searchable. HIBP identified over 917k unique email address patterns in the data
set, including message IDs and a number of other non-user addresses.

Breach date: 19 July 2016
Date added to HIBP: 1 October 2017
Compromised accounts: 917,461
Compromised data: Email addresses, Email messages
Permalink

--------------------------------------------------------------------------------


AMART FURNITURE

In May 2022, the Australian retailer Amart Furniture advised that their warranty
claims database hosted on Amazon Web Services had been the target of a cyber
attack. Over 100k records containing email and physical address, names, phone
numbers and passwords stored as bcrypt hashes were exposed and shared online by
the attacker.

Breach date: 16 May 2022
Date added to HIBP: 25 May 2022
Compromised accounts: 108,940
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


ANCESTRY

In November 2015, an Ancestry service known as RootsWeb suffered a data breach.
The breach was not discovered until late 2017 when a file containing almost 300k
email addresses and plain text passwords was identified.

Breach date: 7 November 2015
Date added to HIBP: 24 December 2017
Compromised accounts: 297,806
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ANDROID FORUMS

In October 2011, the Android Forums website was hacked and 745k user accounts
were subsequently leaked publicly. The compromised data included email
addresses, user birth dates and passwords stored as a salted MD5 hash.

Breach date: 30 October 2011
Date added to HIBP: 20 December 2015
Compromised accounts: 745,355
Compromised data: Dates of birth, Email addresses, Homepage URLs, Instant
messenger identities, IP addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ANDROIDLISTA

In July 2021, the Android applications and games review site AndroidLista
suffered a data breach. The incident exposed 6.6M user records containing email
addresses, names, usernames and passwords stored as salted SHA-1 hashes, all of
which were subsequently posted to a popular hacking forum. AndroidLista did not
respond when contacted about the breach.

Breach date: 28 July 2021
Date added to HIBP: 17 October 2023
Compromised accounts: 6,640,643
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ANIMAL JAM

In October 2020, the online game for kids Animal Jam suffered a data breach
which was subsequently shared through online hacking communities the following
month. The data contained 46 million user accounts with over 7 million unique
email addresses. Impacted data also included usernames, IP addresses and for
some records, dates of birth (sometimes in partial form), physical addresses,
parent names and passwords stored as PBKDF2 hashes.

Breach date: 12 October 2020
Date added to HIBP: 12 November 2020
Compromised accounts: 7,104,998
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Passwords, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


ANIMEGAME

In February 2020, the gaming website AnimeGame suffered a data breach. The
incident affected 1.4M subscribers and exposed email addresses, usernames and
passwords stored as salted MD5 hashes. The data was subsequently shared on a
popular hacking forum and was provided to HIBP by dehashed.com.

Breach date: 27 February 2020
Date added to HIBP: 9 March 2020
Compromised accounts: 1,431,378
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ANIME-PLANET

In approximately 2016, the anime website Anime-Planet suffered a data breach
that impacted 369k subscribers. The exposed data included usernames, IP and
email addresses, dates of birth and passwords stored as unsalted MD5 hashes and
for newer accounts, bcrypt hashes. The data was provided to HIBP by
dehashed.com.

Breach date: 1 January 2016
Date added to HIBP: 28 July 2019
Compromised accounts: 368,507
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


ANIMOTO

In July 2018, the cloud-based video making service Animoto suffered a data
breach. The breach exposed 22 million unique email addresses alongside names,
dates of birth, country of origin and salted password hashes. The data was
provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 10 July 2018
Date added to HIBP: 18 July 2019
Compromised accounts: 22,437,749
Compromised data: Dates of birth, Email addresses, Geographic locations, Names,
Passwords
Permalink

--------------------------------------------------------------------------------


ANTI PUBLIC COMBO LIST

In December 2016, a huge list of email address and password pairs appeared in a
"combo list" referred to as "Anti Public". The list contained 458 million unique
email addresses, many with multiple different passwords hacked from various
online systems. The list was broadly circulated and used for "credential
stuffing", that is attackers employ it in an attempt to identify other online
systems where the account owner had reused their password. For detailed
background on this incident, read Password reuse, credential stuffing and
another billion records in Have I Been Pwned.

Breach date: 16 December 2016
Date added to HIBP: 4 May 2017
Compromised accounts: 457,962,538
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


APEXSMS

In May 2019, news broke of a massive SMS spam operation known as "ApexSMS" which
was discovered after a MongoDB instance of the same name was found exposed
without a password. The incident leaked over 80M records with 23M unique email
addresses alongside names, phone numbers and carriers, geographic locations
(state and country), genders and IP addresses.

Breach date: 15 April 2019
Date added to HIBP: 21 September 2023
Compromised accounts: 23,246,481
Compromised data: Email addresses, Genders, Geographic locations, IP addresses,
Names, Phone numbers, Telecommunications carrier
Permalink

--------------------------------------------------------------------------------


APOLLO

In July 2018, the sales engagement startup Apollo left a database containing
billions of data points publicly exposed without a password. The data was
discovered by security researcher Vinny Troia who subsequently sent a subset of
the data containing 126 million unique email addresses to Have I Been Pwned. The
data left exposed by Apollo was used in their "revenue acceleration platform"
and included personal information such as names and email addresses as well as
professional information including places of employment, the roles people hold
and where they're located. Apollo stressed that the exposed data did not include
sensitive information such as passwords, social security numbers or financial
data. The Apollo website has a contact form for those looking to get in touch
with the organisation.

Breach date: 23 July 2018
Date added to HIBP: 5 October 2018
Compromised accounts: 125,929,660
Compromised data: Email addresses, Employers, Geographic locations, Job titles,
Names, Phone numbers, Salutations, Social media profiles
Permalink

--------------------------------------------------------------------------------


APPARTOO

In March 2017, the French Flatsharing site known as Appartoo suffered a data
breach. The incident exposed an extensive amount of personal information on
almost 50k members including email addresses, genders, ages, private messages
sent between users of the service and passwords stored as SHA-256 hashes.
Appartoo advised that all subscribers were notified of the incident in early
2017.

Breach date: 25 March 2017
Date added to HIBP: 2 May 2019
Compromised accounts: 49,681
Compromised data: Ages, Auth tokens, Email addresses, Employment statuses,
Genders, IP addresses, Marital statuses, Names, Passwords, Physical addresses,
Private messages, Social media profiles
Permalink

--------------------------------------------------------------------------------


APPEN

In June 2020, the AI training data company Appen suffered a data breach exposing
the details of almost 5.9 million users which were subsequently sold online.
Included in the breach were names, email addresses and passwords stored as
bcrypt hashes. Some records also contained phone numbers, employers and IP
addresses. The data was provided to HIBP by dehashed.com.

Breach date: 22 June 2020
Date added to HIBP: 30 July 2020
Compromised accounts: 5,888,405
Compromised data: Email addresses, Employers, IP addresses, Names, Passwords,
Phone numbers
Permalink

--------------------------------------------------------------------------------


APTOIDE

In April 2020, the independent Android app store Aptoide suffered a data breach.
The incident resulted in the exposure of 20M customer records which were
subsequently shared online via a popular hacking forum. Impacted data included
email and IP addresses, names, IP addresses and passwords stored as SHA-1 hashes
without a salt.

Breach date: 13 April 2020
Date added to HIBP: 19 April 2020
Compromised accounts: 20,012,235
Compromised data: Browser user agent details, Email addresses, IP addresses,
Names, Passwords
Permalink

--------------------------------------------------------------------------------


ARMOR GAMES

In January 2019, the game portal website Armor Games suffered a data breach. A
total of 10.6 million email addresses were impacted by the breach which also
exposed usernames, IP addresses, birthdays of administrator accounts and
passwords stored as salted SHA-1 hashes. The data was provided to HIBP by a
source who requested it be attributed to "JimScott.Sec@protonmail.com".

Breach date: 1 January 2019
Date added to HIBP: 20 July 2019
Compromised accounts: 10,604,307
Compromised data: Bios, Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ARMY FORCE ONLINE

In May 2016, the online gaming site Army Force Online suffered a data breach
that exposed 1.5M accounts. The breached data was found being regularly traded
online and included usernames, email and IP addresses and MD5 passwords.

Breach date: 18 May 2016
Date added to HIBP: 10 November 2016
Compromised accounts: 1,531,235
Compromised data: Avatars, Email addresses, Geographic locations, IP addresses,
Names, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


ARTSY

In April 2018, the online arts database Artsy suffered a data breach which
consequently appeared for sale on a dark web marketplace. Over 1M accounts were
impacted and included IP and email addresses, names and passwords stored as
salted SHA-512 hashes. The data was provided to HIBP by a source who requested
it be attributed to "nano@databases.pw".

Breach date: 1 April 2018
Date added to HIBP: 25 May 2020
Compromised accounts: 1,079,970
Compromised data: Email addresses, IP addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


ARTVALUE

In June 2019, the France-based art valuation website Artvalue.com left their
158k member subscriber base publicly exposed in a text file on their website.
The exposed data included names, usernames, email addresses and passwords stored
as MD5 hashes. The site operator did not respond when contacted about the
incident, although the exposed file was subsequently removed.

Breach date: 19 June 2019
Date added to HIBP: 19 July 2019
Compromised accounts: 157,692
Compromised data: Email addresses, Names, Passwords, Salutations, Usernames
Permalink

--------------------------------------------------------------------------------


ASHLEY MADISON

In July 2015, the infidelity website Ashley Madison suffered a serious data
breach. The attackers threatened Ashley Madison with the full disclosure of the
breach unless the service was shut down. One month later, the database was
dumped including more than 30M unique email addresses. This breach has been
classed as "sensitive" and is not publicly searchable, although individuals may
discover if they've been impacted by registering for notifications. Read about
this approach in detail.

Breach date: 19 July 2015
Date added to HIBP: 18 August 2015
Compromised accounts: 30,811,934
Compromised data: Dates of birth, Email addresses, Ethnicities, Genders, Names,
Passwords, Payment histories, Phone numbers, Physical addresses, Security
questions and answers, Sexual orientations, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


ASTROPID

In December 2013, the vBulletin forum for the social engineering site known as
"AstroPID" was breached and leaked publicly. The site provided tips on
fraudulently obtaining goods and services, often by providing a legitimate "PID"
or Product Information Description. The breach resulted in nearly 6k user
accounts and over 220k private messages between forum members being exposed.

Breach date: 19 December 2013
Date added to HIBP: 6 July 2014
Compromised accounts: 5,788
Compromised data: Email addresses, Instant messenger identities, IP addresses,
Names, Passwords, Private messages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


ATERNOS

In December 2015, the service for creating and running free Minecraft servers
known as Aternos suffered a data breach that impacted 1.4 million subscribers.
The data included usernames, email and IP addresses and hashed passwords.

Breach date: 6 December 2015
Date added to HIBP: 1 October 2016
Compromised accounts: 1,436,486
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


ATLAS QUANTUM

In August 2018, the cryptocurrency investment platform Atlas Quantum suffered a
data breach. The breach leaked the personal data of 261k investors on the
platform including their names, phone numbers, email addresses and account
balances.

Breach date: 25 August 2018
Date added to HIBP: 27 August 2018
Compromised accounts: 261,463
Compromised data: Account balances, Email addresses, Names, Phone numbers
Permalink

--------------------------------------------------------------------------------


ATMELTOMO

In April 2021, "Japan's largest e-mail friend search site" Atmeltomo suffered a
data breach that was later sold on a popular hacking forum. The breach exposed
1.3M records with 580k unique email addresses along with usernames, IP addresses
and unsalted MD5 password hashes.

Breach date: 16 April 2021
Date added to HIBP: 22 August 2023
Compromised accounts: 580,177
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


AUDI

In August 2019, Audi USA suffered a data breach after a vendor left data
unsecured and exposed on the internet. The data contained 2.7M unique email
addresses along with names, phone numbers, physical addresses and vehicle
information including VIN. In a disclosure statement from Audi, they also
advised some customers had driver's licenses, dates of birth, social security
numbers and other personal information exposed.

Breach date: 14 August 2019
Date added to HIBP: 23 July 2021
Compromised accounts: 2,743,539
Compromised data: Dates of birth, Driver's licenses, Email addresses, Names,
Phone numbers, Physical addresses, Social security numbers, Vehicle details
Permalink

--------------------------------------------------------------------------------


AUTOCENTRUM.PL

In February 2018, data belonging to the Polish motoring website autocentrum.pl
was found online. The data contained 144k email addresses and plain text
passwords.

Breach date: 4 February 2018
Date added to HIBP: 9 February 2018
Compromised accounts: 143,717
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


AUTOTRADER

In January 2023, 1.4M records from the Autotrader online vehicle marketplace
appeared on a popular hacking forum. Autotrader stated that the "data in
question relates to aged listing data that was generally publicly available on
our site at the time and open to automated collection methods". The data
contained 20k unique email addresses alongside physical addresses and phone
numbers of dealers and vehicle details including VIN numbers. The data was
provided to HIBP by a source who requested it be attributed to "IntelBroker".

Breach date: 6 January 2023
Date added to HIBP: 23 January 2023
Compromised accounts: 20,032
Compromised data: Email addresses, Phone numbers, Physical addresses, Vehicle
details, Vehicle identification numbers (VINs)
Permalink

--------------------------------------------------------------------------------


AVAST

In May 2014, the Avast anti-virus forum was hacked and 423k member records were
exposed. The Simple Machines Based forum included usernames, emails and password
hashes.

Breach date: 26 May 2014
Date added to HIBP: 12 March 2016
Compromised accounts: 422,959
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


AVITO

In November 2022, the Moroccan e-commerce service Avito suffered a data breach
that exposed the personal information of 2.7M customers. The data included name,
email, phone, IP address and geographic location.

Breach date: 18 November 2022
Date added to HIBP: 14 November 2023
Compromised accounts: 2,721,835
Compromised data: Email addresses, Geographic locations, IP addresses, Names,
Phone numbers
Permalink

--------------------------------------------------------------------------------


AVVO

In approximately December 2019, an alleged data breach of the lawyer directory
service Avvo was published to an online hacking forum and used in an extortion
scam (it's possible the exposure dates back earlier than that). The data
contained 4.1M unique email addresses alongside SHA-1 hashes, most likely
representing user passwords. Multiple attempts at contacting Avvo over the
course of a week were unsuccessful and the authenticity of the data was
eventually verified with common Avvo and HIBP subscribers.

Breach date: 17 December 2019
Date added to HIBP: 15 April 2022
Compromised accounts: 4,101,101
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


B2B USA BUSINESSES

In mid-2017, a spam list of over 105 million individuals in corporate America
was discovered online. Referred to as "B2B USA Businesses", the list categorised
email addresses by employer, providing information on individuals' job titles
plus their work phone numbers and physical addresses. Read more about spam lists
in HIBP.

Breach date: 18 July 2017
Date added to HIBP: 18 July 2017
Compromised accounts: 105,059,554
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


BABY NAMES

In approximately 2008, the site to help parents name their children known as
Baby Names suffered a data breach. The incident exposed 846k email addresses and
passwords stored as salted MD5 hashes. When contacted in October 2018, Baby
Names advised that "the breach happened at least ten years ago" and that members
were notified at the time.

Breach date: 24 October 2008
Date added to HIBP: 24 October 2018
Compromised accounts: 846,742
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


BADOO

In June 2016, a data breach allegedly originating from the social website Badoo
was found to be circulating amongst traders. Likely obtained several years
earlier, the data contained 112 million unique email addresses with personal
data including names, birthdates and passwords stored as MD5 hashes. Whilst
there are many indicators suggesting Badoo did indeed suffer a data breach, the
legitimacy of the data could not be emphatically proven so this breach has been
categorised as "unverified".

Breach date: 1 June 2013
Date added to HIBP: 6 July 2016
Compromised accounts: 112,005,531
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


BANNERBIT

In approximately December 2018, the online ad platform BannerBit suffered a data
breach. Containing 213k unique email addresses and plain text passwords, the
data was provided to HIBP by a third party. Multiple attempts were made to
contact BannerBit, but no response was received.

Breach date: 29 December 2018
Date added to HIBP: 8 January 2019
Compromised accounts: 213,415
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


BANORTE

In August 2022, millions of records from Mexican bank "Banorte" were publicly
dumped on a popular hacking forum including 2.1M unique email addresses,
physical addresses, names, phone numbers, RFC (tax) numbers, genders and bank
balances. Banorte have stated that the data is "outdated", although have not yet
indicated how far back it dates to. Anecdotal feedback from HIBP subscribers
suggests the data may date back 8 years to 2014.

Breach date: 18 August 2014
Date added to HIBP: 18 August 2022
Compromised accounts: 2,107,000
Compromised data: Account balances, Email addresses, Genders, Government issued
IDs, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


BATTLEFIELD HEROES

In June 2011 as part of a final breached data dump, the hacker collective
"LulzSec" obtained and released over half a million usernames and passwords from
the game Battlefield Heroes. The passwords were stored as MD5 hashes with no
salt and many were easily converted back to their plain text versions.

Breach date: 26 June 2011
Date added to HIBP: 23 January 2014
Compromised accounts: 530,270
Compromised data: Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BATTLEFY

In January 2016, the esports website Battlefy suffered a data breach that
exposed 83k customer records. The impacted data included email addresses,
usernames and passwords stored as bcrypt hashes.

Breach date: 11 January 2016
Date added to HIBP: 29 July 2022
Compromised accounts: 83,610
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BEAUTIFUL PEOPLE

In November 2015, the dating website Beautiful People was hacked and over 1.1M
accounts were leaked. The data was being traded in underground circles and
included a huge amount of personal information related to dating.

Breach date: 11 November 2015
Date added to HIBP: 25 April 2016
Compromised accounts: 1,100,089
Compromised data: Beauty ratings, Car ownership statuses, Dates of birth,
Drinking habits, Education levels, Email addresses, Genders, Geographic
locations, Home ownership statuses, Income levels, IP addresses, Job titles,
Names, Passwords, Personal descriptions, Personal interests, Physical
attributes, Sexual orientations, Smoking habits, Website activity
Permalink

--------------------------------------------------------------------------------


BELL (2014 BREACH)

In February 2014, Bell Canada suffered a data breach via the hacker collective
known as NullCrew. The breach included data from multiple locations within Bell
and exposed email addresses, usernames, user preferences and a number of
unencrypted passwords and credit card data from 40,000 records containing just
over 20,000 unique email addresses and usernames.

Breach date: 1 February 2014
Date added to HIBP: 1 February 2014
Compromised accounts: 20,902
Compromised data: Credit cards, Genders, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BELL (2017 BREACH)

In May 2017, the Bell telecommunications company in Canada suffered a data
breach resulting in the exposure of millions of customer records. The data was
consequently leaked online with a message from the attacker stating that they
were "releasing a significant portion of Bell.ca's data due to the fact that
they have failed to cooperate with us" and included a threat to leak more. The
impacted data included over 2 million unique email addresses and 153k survey
results dating back to 2011 and 2012. There were also 162 Bell employee records
with more comprehensive personal data including names, phone numbers and plain
text "passcodes". Bell suffered another breach in 2014 which exposed 40k
records.

Breach date: 15 May 2017
Date added to HIBP: 16 May 2017
Compromised accounts: 2,231,256
Compromised data: Email addresses, Geographic locations, IP addresses, Job
titles, Names, Passwords, Phone numbers, Spoken languages, Survey results,
Usernames
Permalink

--------------------------------------------------------------------------------


BENCHMARK

In November 2019, the Serbian technology news website Benchmark suffered a
breach of its forum that exposed 93k customer records. The breach exposed IP and
email addresses, usernames and passwords stored as salted MD5 hashes. A forum
administrator subsequently advised that the breach was due to the forum
previously running on an outdated vBulletin instance. The data was provided to
HIBP by a source who requested it be attributed to "ZAN @ BF".

Breach date: 1 November 2019
Date added to HIBP: 1 January 2023
Compromised accounts: 93,343
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BESTIALITYSEXTABOO

In March 2018, the animal bestiality website known as Bestialitysextaboo was
hacked. A collection of various sites running on the same service were also
compromised and details of the hack (including links to the data) were posted on
a popular forum. In all, more than 3.2k unique email addresses were included
alongside usernames, IP addresses, dates of birth, genders and bcrypt hashes of
passwords.

Breach date: 19 March 2018
Date added to HIBP: 29 March 2018
Compromised accounts: 3,204
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Passwords, Private messages, Usernames
Permalink

--------------------------------------------------------------------------------


BHINNEKA

In early 2020, the Indonesian consumer electronics website Bhinneka suffered a
data breach that exposed almost 1.3M customer records. The data included email
and physical addresses, names, genders, dates of birth, phone numbers and salted
password hashes.

Breach date: 27 January 2020
Date added to HIBP: 6 October 2022
Compromised accounts: 1,274,340
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


BIGBASKET

In October 2020, the Indian grocery platform bigbasket suffered a data breach
that exposed over 20 million customer records. The data was originally sold
before being leaked publicly in April the following year and included email, IP
and physical addresses, names, phones numbers, dates of birth passwords stored
as Django(SHA-1) hashes.

Breach date: 14 October 2020
Date added to HIBP: 26 April 2021
Compromised accounts: 24,500,011
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


BIGMONEYJOBS

In April 2014, the job site bigmoneyjobs.com was hacked by an attacker known as
"ProbablyOnion". The attack resulted in the exposure of over 36,000 user
accounts including email addresses, usernames and passwords which were stored in
plain text. The attack was allegedly mounted by exploiting a SQL injection
vulnerability.

Breach date: 3 April 2014
Date added to HIBP: 8 April 2014
Compromised accounts: 36,789
Compromised data: Career levels, Education levels, Email addresses, Names,
Passwords, Phone numbers, Physical addresses, Salutations, User website URLs,
Website activity
Permalink

--------------------------------------------------------------------------------


BIN WEEVILS

In September 2014, the online game Bin Weevils suffered a data breach. Whilst
originally stating that only usernames and passwords had been exposed, a
subsequent story on DataBreaches.net indicated that a more extensive set of
personal attributes were impacted (comments there also suggest the data may have
come from a later breach). Data matching that pattern was later provided to Have
I Been Pwned by @akshayindia6 and included almost 1.3m unique email addresses,
genders, ages and plain text passwords.

Breach date: 1 September 2014
Date added to HIBP: 18 August 2017
Compromised accounts: 1,287,073
Compromised data: Ages, Email addresses, Genders, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


BIOHACK.ME

In December 2016, the forum for the biohacking website Biohack.me suffered a
data breach that exposed 3.4k accounts. The data included usernames, email
addresses and hashed passwords along with the private messages of forum members.
The data was self-submitted to HIBP by the Biohack.me operators.

Breach date: 2 December 2016
Date added to HIBP: 23 August 2017
Compromised accounts: 3,402
Compromised data: Email addresses, Passwords, Private messages, Usernames
Permalink

--------------------------------------------------------------------------------


BITCOIN SECURITY FORUM GMAIL DUMP

In September 2014, a large dump of nearly 5M usernames and passwords was posted
to a Russian Bitcoin forum. Whilst commonly reported as 5M "Gmail passwords",
the dump also contained 123k yandex.ru addresses. Whilst the origin of the
breach remains unclear, the breached credentials were confirmed by multiple
source as correct, albeit a number of years old.

Breach date: 9 January 2014
Date added to HIBP: 10 September 2014
Compromised accounts: 4,789,599
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


BITCOIN TALK

In May 2015, the Bitcoin forum Bitcoin Talk was hacked and over 500k unique
email addresses were exposed. The attack led to the exposure of a raft of
personal data including usernames, email and IP addresses, genders, birth dates,
security questions and MD5 hashes of their answers plus hashes of the passwords
themselves.

Breach date: 22 May 2015
Date added to HIBP: 27 March 2017
Compromised accounts: 501,407
Compromised data: Dates of birth, Email addresses, Genders, IP addresses,
Passwords, Security questions and answers, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


BITLY

In May 2014, the link management company Bitly announced they'd suffered a data
breach. The breach contained over 9.3 million unique email addresses, usernames
and hashed passwords, most using SHA1 with a small number using bcrypt.

Breach date: 8 May 2014
Date added to HIBP: 6 October 2017
Compromised accounts: 9,313,136
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BITTORRENT

In January 2016, the forum for the popular torrent software BitTorrent was
hacked. The IP.Board based forum stored passwords as weak SHA1 salted hashes and
the breached data also included usernames, email and IP addresses.

Breach date: 1 January 2016
Date added to HIBP: 8 June 2016
Compromised accounts: 34,235
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BLACK HAT WORLD

In June 2014, the search engine optimisation forum Black Hat World had three
quarters of a million accounts breached from their system. The breach included
various personally identifiable attributes which were publicly released in a
MySQL database script.

Breach date: 23 June 2014
Date added to HIBP: 3 November 2015
Compromised accounts: 777,387
Compromised data: Dates of birth, Email addresses, Instant messenger identities,
IP addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


BLACKBERRY FANS

In May 2022, the Chinese BlackBerry enthusiasts website BlackBerry Fans suffered
a data breach that exposed 174k member records. The impacted data included
usernames, email and IP addresses and passwords stored as salted MD5 hashes.

Breach date: 6 May 2022
Date added to HIBP: 16 May 2022
Compromised accounts: 174,168
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BLACKSPIGOTMC

In July 2019, the hacking website BlackSpigotMC suffered a data breach. The
XenForo forum based site was allegedly compromised by a rival hacking website
and resulted in 8.5GB of data being leaked including the database and website
itself. The exposed data included 140k unique email addresses, usernames, IP
addresses, genders, geographic locations and passwords stored as bcrypt hashes.

Breach date: 14 July 2019
Date added to HIBP: 17 July 2019
Compromised accounts: 140,029
Compromised data: Device information, Email addresses, Genders, Geographic
locations, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BLANKMEDIAGAMES

In December 2018, the Town of Salem website produced by BlankMediaGames suffered
a data breach. Reported to HIBP by DeHashed, the data contained 7.6M unique user
email addresses alongside usernames, IP addresses, purchase histories and
passwords stored as phpass hashes. DeHashed made multiple attempts to contact
BlankMediaGames over various channels and many days but had yet to receive a
response at the time of publishing.

Breach date: 28 December 2018
Date added to HIBP: 2 January 2019
Compromised accounts: 7,633,234
Compromised data: Browser user agent details, Email addresses, IP addresses,
Passwords, Purchases, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


BLEACH ANIME FORUM

In 2015, the now defunct independent forum for the Bleach Anime series suffered
a data breach that exposed 144k user records. The impacted data included
usernames, email addresses and salted MD5 password hashes.

Breach date: 1 January 2015
Date added to HIBP: 29 November 2023
Compromised accounts: 143,711
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BOLT

In approximately March 2017, the file sharing website Bolt suffered a data
breach resulting in the exposure of 995k unique user records. The data was
sourced from their vBulletin forum and contained email and IP addresses,
usernames and salted MD5 password hashes. The site was previously reported as
compromised on the Vigilante.pw breached database directory.

Breach date: 1 March 2017
Date added to HIBP: 24 November 2017
Compromised accounts: 995,274
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BOMBUJ.EU

In December 2018, the Slovak website for watching movies online for free
Bombuj.eu suffered a data breach. The incident exposed over 575k unique email
addresses and passwords stored as unsalted MD5 hashes. No response was received
from Bombuj.eu when contacted about the incident.

Breach date: 7 December 2018
Date added to HIBP: 10 December 2018
Compromised accounts: 575,437
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


BONOBOS

In August 2020, the clothing store Bonobos suffered a data breach that exposed
almost 70GB of data containing 2.8 million unique email addresses. The breach
also exposed names, physical and IP addresses, phone numbers, order histories
and passwords stored as salted SHA-512 hashes, including historical passwords.
The breach also exposed partial credit card data including card type, the name
on the card, expiry date and the last 4 digits of the card. The data was
provided to HIBP by dehashed.com.

Breach date: 14 August 2020
Date added to HIBP: 31 January 2021
Compromised accounts: 2,811,929
Compromised data: Email addresses, Historical passwords, IP addresses, Names,
Partial credit card data, Passwords, Phone numbers, Physical addresses,
Purchases
Permalink

--------------------------------------------------------------------------------


BOOKCHOR

In January 2021, the Indian book trading website Bookchor suffered a data breach
that exposed half a million customer records. The exposed data included email
and IP addresses, names, genders, dates of birth, phone numbers and passwords
stored as unsalted MD5 hashes. The data was subsequently traded on a popular
hacking forum.

Breach date: 28 January 2021
Date added to HIBP: 3 July 2022
Compromised accounts: 498,297
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Passwords, Phone numbers, Social media profiles
Permalink

--------------------------------------------------------------------------------


BOOKCROSSING

In August 2022, the book social networking site BookCrossing disclosed a data
breach that dated back to a database backup from November 2012. The incident
exposed almost 1.6M records including names, usernames, email and IP addresses,
dates of birth and plain text passwords.

Breach date: 5 November 2012
Date added to HIBP: 25 July 2023
Compromised accounts: 1,582,323
Compromised data: Dates of birth, Email addresses, Geographic locations, IP
addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BOOKMATE

In mid-2018, the social ebook subscription service Bookmate was among a raft of
sites that were breached and their data then sold in early-2019. The data
included almost 4 million unique email addresses alongside names, genders, dates
of birth and passwords stored as salted SHA-512 hashes. The data was provided to
HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".

Breach date: 8 July 2018
Date added to HIBP: 22 March 2019
Compromised accounts: 3,830,916
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BOT OF LEGENDS

In November 2014, the forum for Bot of Legends suffered a data breach. The
IP.Board forum contained 238k accounts including usernames, email and IP
addresses and passwords stored as salted MD5 hashes.

Breach date: 13 November 2014
Date added to HIBP: 27 December 2016
Compromised accounts: 238,373
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


BOURSE DES VOLS

In January 2021, the French travel company Bourse des Vols suffered a data
breach that exposed 1.46M unique email addresses across more than 1.2k .sql
files and over 9GB of data. The impacted data exposed personal information and
travel histories including names, phone numbers, IP and physical addresses,
dates of birth along with flights taken and purchases.

Breach date: 12 January 2021
Date added to HIBP: 3 July 2022
Compromised accounts: 1,460,130
Compromised data: Dates of birth, Email addresses, Flights taken, IP addresses,
Names, Phone numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


BOXEE

In March 2014, the home theatre PC software maker Boxee had their forums
compromised in an attack. The attackers obtained the entire vBulletin MySQL
database and promptly posted it for download on the Boxee forum itself. The data
included 160k users, password histories, private messages and a variety of other
data exposed across nearly 200 publicly exposed tables.

Breach date: 29 March 2014
Date added to HIBP: 30 March 2014
Compromised accounts: 158,093
Compromised data: Dates of birth, Email addresses, Geographic locations,
Historical passwords, Instant messenger identities, IP addresses, Passwords,
Private messages, User website URLs, Usernames
Permalink

--------------------------------------------------------------------------------


BRAND NEW TUBE

In August 2022, the streaming website Brand New Tube suffered a data breach that
exposed the personal information of almost 350k subscribers. The impacted data
included email and IP addresses, usernames, genders, passwords stored as
unsalted SHA-1 hashes and private messages.

Breach date: 14 August 2022
Date added to HIBP: 8 September 2022
Compromised accounts: 349,627
Compromised data: Email addresses, Genders, IP addresses, Passwords, Private
messages, Usernames
Permalink

--------------------------------------------------------------------------------


BRAZZERS

In April 2013, the adult website known as Brazzers was hacked and 790k accounts
were exposed publicly. Each record included a username, email address and
password stored in plain text. The breach was brought to light by the
Vigilante.pw data breach reporting site in September 2016.

Breach date: 1 April 2013
Date added to HIBP: 5 September 2016
Compromised accounts: 790,724
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BREACHFORUMS

In November 2022, the well-known hacking forum "BreachForums" was itself,
breached. Later the following year, the operator of the website was arrested and
the site seized by law enforcement agencies. The breach exposed 212k records
including usernames, IP and email addresses, private messages between site
members and passwords stored as argon2 hashes. The data was provided to HIBP by
a source who requested it be attributed to "breached_db_person".

Breach date: 29 November 2022
Date added to HIBP: 26 July 2023
Compromised accounts: 212,156
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


BREACHFORUMS CLONE

In June 2023, a clone of the previously shuttered popular hacking forum
"BreachForums" suffered a data breach that exposed over 4k records. The breach
was due to an exposed backup of the MyBB database which included email and IP
addresses, usernames and Argon2 password hashes.

Breach date: 17 June 2023
Date added to HIBP: 25 June 2023
Compromised accounts: 4,204
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BTC-ALPHA

In November 2021, the crypto exchange platform BTC-Alpha suffered a ransomware
attack data breach after which customer data was publicly dumped. The impacted
data included 362k email and IP addresses, usernames and passwords stored as
PBKDF2 hashes. The data was provided to HIBP by a source who requested it be
attributed to "white_peacock@riseup.net".

Breach date: 2 November 2021
Date added to HIBP: 27 January 2022
Compromised accounts: 362,426
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BTC-E

In October 2014, the Bitcoin exchange BTC-E was hacked and 568k accounts were
exposed. The data included email and IP addresses, wallet balances and hashed
passwords.

Breach date: 1 October 2014
Date added to HIBP: 12 March 2017
Compromised accounts: 568,340
Compromised data: Account balances, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


BTOBET

In December 2019, a large collection of data from Nigerian gambling company
Surebet247 was sent to HIBP. Alongside the Surebet247, database backups from
gambling sites BetAlfa, BetWay, BongoBongo and TopBet was also included. Further
investigation implicated betting platform provider BtoBet as being the common
source of the data. Impacted data included user records and extensive
information on gambling histories.

Breach date: 26 December 2019
Date added to HIBP: 11 January 2020
Compromised accounts: 444,241
Compromised data: Dates of birth, Email addresses, Financial transactions,
Geographic locations, IP addresses, Names, Usernames
Permalink

--------------------------------------------------------------------------------


BUKALAPAK

In March 2019, the Indonesian e-commerce website Bukalapak discovered a data
breach of the organisation's backups dating back to October 2017. The incident
exposed approximately 13 million unique email addresses alongside IP addresses,
names and passwords stored as bcrypt and salted SHA-512 hashes. The data was
provided to HIBP by a source who requested it to be attributed to "Maxime
Thalet".

Breach date: 23 October 2017
Date added to HIBP: 18 April 2019
Compromised accounts: 13,369,666
Compromised data: Email addresses, IP addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


BULGARIAN NATIONAL REVENUE AGENCY

In July 2019, a massive data breach of the Bulgarian National Revenue Agency
began circulating with data on 5 million people. Allegedly obtained in June, the
data was broadly shared online and included taxation information alongside
names, phone numbers, physical addresses and 471 thousand unique email
addresses. The breach is said to have affected "nearly all adults in Bulgaria".

Breach date: 15 July 2019
Date added to HIBP: 18 July 2019
Compromised accounts: 471,167
Compromised data: Email addresses, Names, Phone numbers, Physical addresses,
Taxation records
Permalink

--------------------------------------------------------------------------------


BUSINESS ACUMEN MAGAZINE

In April 2014, the Australian "Business Acumen Magazine" website was hacked by
an attacker known as 1337MiR. The breach resulted in over 26,000 accounts being
exposed including usernames, email addresses and password stored with a weak
cryptographic hashing algorithm (MD5 with no salt).

Breach date: 25 April 2014
Date added to HIBP: 11 May 2014
Compromised accounts: 26,596
Compromised data: Email addresses, Names, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


CAFEMOM

In 2014, the social network for mothers CafeMom suffered a data breach. The data
surfaced alongside a number of other historical breaches including Kickstarter,
Bitly and Disqus and contained 2.6 million email addresses and plain text
passwords.

Breach date: 10 April 2014
Date added to HIBP: 9 November 2017
Compromised accounts: 2,628,148
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


CAFEPRESS

In February 2019, the custom merchandise retailer CafePress suffered a data
breach. The exposed data included 23 million unique email addresses with some
records also containing names, physical addresses, phone numbers and passwords
stored as SHA-1 hashes. The data was provided to HIBP by a source who requested
it be attributed to "JimScott.Sec@protonmail.com".

Breach date: 20 February 2019
Date added to HIBP: 5 August 2019
Compromised accounts: 23,205,290
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


CANNABIS.COM

In February 2014, the vBulletin forum for the Marijuana site cannabis.com was
breached and leaked publicly. Whilst there has been no public attribution of the
breach, the leaked data included over 227k accounts and nearly 10k private
messages between users of the forum.

Breach date: 5 February 2014
Date added to HIBP: 1 June 2014
Compromised accounts: 227,746
Compromised data: Dates of birth, Email addresses, Geographic locations,
Historical passwords, Instant messenger identities, IP addresses, Passwords,
Private messages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


CANVA

In May 2019, the graphic design tool website Canva suffered a data breach that
impacted 137 million subscribers. The exposed data included email addresses,
usernames, names, cities of residence and passwords stored as bcrypt hashes for
users not using social logins. The data was provided to HIBP by a source who
requested it be attributed to "JimScott.Sec@protonmail.com".

Breach date: 24 May 2019
Date added to HIBP: 9 August 2019
Compromised accounts: 137,272,116
Compromised data: Email addresses, Geographic locations, Names, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


CAPITAL ECONOMICS

In December 2020, the economic research company Capital Economics suffered a
data breach that exposed 263k customer records. The exposed data included email
and physical addresses, names, phone numbers, job titles and the employer of
impacted customers.

Breach date: 12 December 2020
Date added to HIBP: 4 July 2022
Compromised accounts: 263,829
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


CARDING MAFIA (DECEMBER 2021)

In December 2021, the Carding Mafia forum suffered a data breach that exposed
over 300k members' email addresses. Dedicated to the theft and trading of stolen
credit cards, the forum breach also exposed usernames, IP addresses and
passwords stored as salted MD5 hashes. This breach came only 9 months after
another breach of the forum in March 2021.

Breach date: 28 December 2021
Date added to HIBP: 16 January 2022
Compromised accounts: 303,877
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CARDING MAFIA (MARCH 2021)

In March 2021, the Carding Mafia forum suffered a data breach that exposed
almost 300k members' email addresses. Dedicated to the theft and trading of
stolen credit cards, the forum breach also exposed usernames, IP addresses and
passwords stored as salted MD5 hashes.

Breach date: 18 March 2021
Date added to HIBP: 23 March 2021
Compromised accounts: 297,744
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CASHCRATE

In June 2017, news broke that CashCrate had suffered a data breach exposing 6.8
million records. The breach of the cash-for-surveys site dated back to November
2016 and exposed names, physical addresses, email addresses and passwords stored
in plain text for older accounts along with weak MD5 hashes for newer ones.

Breach date: 17 November 2016
Date added to HIBP: 20 April 2018
Compromised accounts: 6,844,490
Compromised data: Email addresses, Names, Passwords, Physical addresses
Permalink

--------------------------------------------------------------------------------


CATHO

In approximately March 2020, the Brazilian recruitment website Catho was
compromised and subsequently appeared alongside 20 other breached websites
listed for sale on a dark web marketplace. The breach included almost 11 million
records with 1.2 million unique email addresses. Names, usernames and plain text
passwords were also exposed. The data was provided to HIBP by breachbase.pw.

Breach date: 1 March 2020
Date added to HIBP: 18 August 2020
Compromised accounts: 1,173,012
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CD PROJEKT RED

In March 2016, Polish game developer CD Projekt RED suffered a data breach. The
hack of their forum led to the exposure of almost 1.9 million accounts along
with usernames, email addresses and salted SHA1 passwords.

Breach date: 1 March 2016
Date added to HIBP: 31 January 2017
Compromised accounts: 1,871,373
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CDEK

In early 2022, a collective known as IT Army whose stated goal is to "completely
de-anonymise most Russian users by leaking hundreds of gigabytes of databases"
published over 30GB of data allegedly sourced from Russian courier service CDEK.
The data contained over 19M unique email addresses along with names and phone
numbers. The authenticity of the breach could not be independently established
and has been flagged as "unverfieid".

Breach date: 9 March 2022
Date added to HIBP: 17 March 2022
Compromised accounts: 19,218,203
Compromised data: Email addresses, Names, Phone numbers
Permalink

--------------------------------------------------------------------------------


CHATBOOKS

In March 2020, the photo print service Chatbooks suffered a data breach which
was subsequently put up for sale on a dark web marketplace. The breach contained
15 million user records with 2.5 million unique email addresses alongside names,
phone numbers, social media profiles and salted SHA-512 password hashes. The
data was provided to HIBP by dehashed.com.

Breach date: 26 March 2020
Date added to HIBP: 29 July 2020
Compromised accounts: 2,520,441
Compromised data: Email addresses, Names, Passwords, Phone numbers, Social media
profiles
Permalink

--------------------------------------------------------------------------------


CHEAPASSGAMER.COM

In approximately mid-2015, the forum for CheapAssGamer.com suffered a data
breach. The database from the IP.Board based forum contained 445k accounts
including usernames, email and IP addresses and salted MD5 password hashes.

Breach date: 1 July 2015
Date added to HIBP: 8 November 2016
Compromised accounts: 444,767
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CHEGG

In April 2018, the textbook rental service Chegg suffered a data breach that
impacted 40 million subscribers. The exposed data included email addresses,
usernames, names and passwords stored as unsalted MD5 hashes. The data was
provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 28 April 2018
Date added to HIBP: 16 August 2019
Compromised accounts: 39,721,127
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CHESS

In November 2023, over 800k user records were scraped from the Chess website and
posted to a popular hacking forum. The data included email address, name,
username and the geographic location of the user.

Breach date: 8 November 2023
Date added to HIBP: 10 November 2023
Compromised accounts: 827,620
Compromised data: Email addresses, Geographic locations, Names, Usernames
Permalink

--------------------------------------------------------------------------------


CHOWBUS

In October 2020, the Asian food delivery app Chowbus suffered a data breach
which led to over 800,000 records being emailed to customers. The email
contained a link to a CSV file with customer data including physical addresses,
names, phone numbers and over 444,000 unique email addresses.

Breach date: 5 October 2020
Date added to HIBP: 6 October 2020
Compromised accounts: 444,224
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


CIT0DAY

In November 2020, a collection of more than 23,000 allegedly breached websites
known as Cit0day were made available for download on several hacking forums. The
data consisted of 226M unique email address alongside password pairs, often
represented as both password hashes and the cracked, plain text versions.
Independent verification of the data established it contains many legitimate,
previously undisclosed breaches. The data was provided to HIBP by dehashed.com.

Breach date: 4 November 2020
Date added to HIBP: 19 November 2020
Compromised accounts: 226,883,414
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


CITYBEE

In February 2021, the Lithuanian car-sharing service CityBee announced they'd
suffered a data breach that exposed 110k customers' personal information. The
breach exposed names, email addresses, government issued IDs and passwords
stored as unsalted SHA-1 hashes.

Breach date: 5 February 2021
Date added to HIBP: 17 February 2021
Compromised accounts: 110,156
Compromised data: Email addresses, Government issued IDs, Names, Passwords
Permalink

--------------------------------------------------------------------------------


CITYJERKS

In early 2023, the "mutual masturbation" website CityJerks suffered a data
breach that exposed 177k unique email addresses. The breach also included data
from the TruckerSucker "dating app for REAL TRUCKERS and REAL MEN" with the
combined corpus of data also exposing usernames, IP addresses, dates of birth,
sexual orientations, geo locations, private messages between members and
passwords stored as salted MD5 hashes. The data was listed on a public hacking
site and provided to HIBP by a source who requested it be attributed to
"discord.gg/gN9C9em".

Breach date: 27 February 2023
Date added to HIBP: 27 April 2023
Compromised accounts: 177,554
Compromised data: Bios, Dates of birth, Email addresses, Geographic locations,
IP addresses, Passwords, Private messages, Profile photos, Sexual orientations,
Usernames
Permalink

--------------------------------------------------------------------------------


CIVIL ONLINE

In mid-2011, data was allegedly obtained from the Chinese engineering website
known as Civil Online and contained 7.8M accounts. Whilst there is evidence that
the data is legitimate, due to the difficulty of emphatically verifying the
Chinese breach it has been flagged as "unverified". The data in the breach
contains email and IP addresses, user names and MD5 password hashes. Read more
about Chinese data breaches in Have I Been Pwned.

Breach date: 10 July 2011
Date added to HIBP: 7 November 2016
Compromised accounts: 7,830,195
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


CLASH OF KINGS

In July 2016, the forum for the game "Clash of Kings" suffered a data breach
that impacted 1.6 million subscribers. The impacted data included usernames, IP
and email addresses and passwords stored as MD5 hashes. The data was provided to
HIBP by dehashed.com.

Breach date: 14 July 2016
Date added to HIBP: 27 July 2019
Compromised accounts: 1,604,957
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CLEARVOICE SURVEYS

In April 2021, the market research surveys company ClearVoice Surveys had a
publicly facing database backup from 2015 taken and redistributed on a popular
hacking forum. The data included 15M unique email addresses across more than 17M
rows of data that also included names, physical and IP addresses, genders, dates
of birth and plain text passwords. ClearVoice Surveys advised they were aware of
the breach and confirmed its authenticity.

Breach date: 23 August 2015
Date added to HIBP: 23 April 2021
Compromised accounts: 15,074,786
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


CLIXSENSE

In September 2016, the paid-to-click site ClixSense suffered a data breach which
exposed 2.4 million subscriber identities. The breached data was then posted
online by the attackers who claimed it was a subset of a larger data breach
totalling 6.6 million records. The leaked data was extensive and included names,
physical, email and IP addresses, genders and birth dates, account balances and
passwords stored as plain text.

Breach date: 4 September 2016
Date added to HIBP: 11 September 2016
Compromised accounts: 2,424,784
Compromised data: Account balances, Dates of birth, Email addresses, Genders, IP
addresses, Names, Passwords, Payment histories, Payment methods, Physical
addresses, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


CLOUDPETS

In January, the maker of teddy bears that record children's voices and sends
them to family and friends via the internet CloudPets left their database
publicly exposed and it was subsequently downloaded by external parties (the
data was also subject to 3 different ransom demands). 583k records were provided
to HIBP via a data trader and included email addresses and bcrypt hashes, but
the full extent of user data exposed by the system was over 821k records and
also included children's names and references to portrait photos and voice
recordings.

Breach date: 1 January 2017
Date added to HIBP: 27 February 2017
Compromised accounts: 583,503
Compromised data: Email addresses, Family members' names, Passwords
Permalink

--------------------------------------------------------------------------------


CLUB PENGUIN REWRITTEN (JANUARY 2018)

In January 2018, the children's gaming site Club Penguin Rewritten (CPRewritten)
suffered a data breach (note: CPRewritten is an independent recreation of
Disney's Club Penguin game). The incident exposed almost 1.7 million unique
email addresses alongside IP addresses, usernames and passwords stored as bcrypt
hashes. When contacted, CPRewritten advised they were aware of the breach and
had "contacted affected users".

Breach date: 21 January 2018
Date added to HIBP: 23 April 2019
Compromised accounts: 1,688,176
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CLUB PENGUIN REWRITTEN (JULY 2019)

In July 2019, the children's gaming site Club Penguin Rewritten (CPRewritten)
suffered a data breach (note: CPRewritten is an independent recreation of
Disney's Club Penguin game). In addition to an earlier data breach that impacted
1.7 million accounts, the subsequent breach exposed 4 million unique email
addresses alongside IP addresses, usernames and passwords stored as bcrypt
hashes.

Breach date: 27 July 2019
Date added to HIBP: 30 July 2019
Compromised accounts: 4,007,909
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


COACHELLA

In February 2017, hundreds of thousands of records from the Coachella music
festival were discovered being sold online. Allegedly taken from a combination
of the main Coachella website and their vBulletin-based message board, the data
included almost 600k usernames, IP and email addresses and salted hashes of
passwords (MD5 in the case of the message board).

Breach date: 22 February 2017
Date added to HIBP: 27 June 2017
Compromised accounts: 599,802
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


COINMAMA

In August 2017, the crypto coin brokerage service Coinmama suffered a data
breach that impacted 479k subscribers. The breach was discovered in February
2019 with exposed data including email addresses, usernames and passwords stored
as MD5 WordPress hashes. The data was provided to HIBP by white hat security
researcher and data analyst Adam Davies.

Breach date: 3 August 2017
Date added to HIBP: 30 August 2019
Compromised accounts: 478,824
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


COINMARKETCAP

During October 2021, 3.1 million email addresses with accounts on the
cryptocurrency market capitalisation website CoinMarketCap were discovered being
traded on hacking forums. Whilst the email addresses were found to correlate
with CoinMarketCap accounts, it's unclear precisely how they were obtained.
CoinMarketCap has provided the following statement on the data: "CoinMarketCap
has become aware that batches of data have shown up online purporting to be a
list of user accounts. While the data lists we have seen are only email
addresses (no passwords), we have found a correlation with our subscriber base.
We have not found any evidence of a data leak from our own servers — we are
actively investigating this issue and will update our subscribers as soon as we
have any new information."

Breach date: 12 October 2021
Date added to HIBP: 22 October 2021
Compromised accounts: 3,117,548
Compromised data: Email addresses
Permalink

--------------------------------------------------------------------------------


COINTRACKER

In December 2022, the Crypto & NFT taxes service CoinTracker reported a data
breach that impacted over 1.5M of their customers. The company later attributed
the breach to a compromise SendGrid in an attack that targeted multiple
customers of the email provider. The breach exposed email addresses and
partially redacted phone numbers, with CoinTracker advising that the later did
not originate from their service.

Breach date: 1 December 2022
Date added to HIBP: 12 December 2022
Compromised accounts: 1,557,153
Compromised data: Email addresses, Partial phone numbers
Permalink

--------------------------------------------------------------------------------


COLLECTION #1

In January 2019, a large collection of credential stuffing lists (combinations
of email addresses and passwords used to hijack accounts on other services) was
discovered being distributed on a popular hacking forum. The data contained
almost 2.7 billion records including 773 million unique email addresses
alongside passwords those addresses had used on other breached services. Full
details on the incident and how to search the breached passwords are provided in
the blog post The 773 Million Record "Collection #1" Data Breach.

Breach date: 7 January 2019
Date added to HIBP: 16 January 2019
Compromised accounts: 772,904,991
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


COMCAST

In November 2015, the US internet and cable TV provider Comcast suffered a data
breach that exposed 590k customer email addresses and plain text passwords. A
further 27k accounts appeared with home addresses with the entire data set being
sold on underground forums.

Breach date: 8 November 2015
Date added to HIBP: 8 February 2016
Compromised accounts: 616,882
Compromised data: Email addresses, Passwords, Physical addresses
Permalink

--------------------------------------------------------------------------------


COMELEC (PHILIPPINES VOTERS)

In March 2016, the Philippines Commission of Elections website (COMELEC) was
attacked and defaced, allegedly by Anonymous Philippines. Shortly after, data on
55 million Filipino voters was leaked publicly and included sensitive
information such as genders, marital statuses, height and weight and biometric
fingerprint data. The breach only included 228k email addresses.

Breach date: 27 March 2016
Date added to HIBP: 14 April 2016
Compromised accounts: 228,605
Compromised data: Biometric data, Dates of birth, Email addresses, Family
members' names, Genders, Job titles, Marital statuses, Names, Passport numbers,
Phone numbers, Physical addresses, Physical attributes
Permalink

--------------------------------------------------------------------------------


CONVEX

In February 2023, the Russian telecommunications provider Convex was hacked by
"Anonymous" who subsequently released 128GB of data publicly, alleging it
revealed illegal government surveillance. The leaked data contained 150k unique
email, IP and physical addresses, names and phone numbers.

Breach date: 1 February 2023
Date added to HIBP: 26 February 2023
Compromised accounts: 150,129
Compromised data: Email addresses, IP addresses, Names, Phone numbers
Permalink

--------------------------------------------------------------------------------


COUPON MOM / ARMOR GAMES

In 2014, a file allegedly containing data hacked from Coupon Mom was created and
included 11 million email addresses and plain text passwords. On further
investigation, the file was also found to contain data indicating it had been
sourced from Armor Games. Subsequent verification with HIBP subscribers
confirmed the passwords had previously been used and many subscribers had used
either Coupon Mom or Armor Games in the past. On disclosure to both
organisations, each found that the data did not represent their entire customer
base and possibly includes records from other sources with common subscribers.
The breach has subsequently been flagged as "unverified" as the source cannot be
emphatically proven. In July 2020, the data was also found to contain
BeerAdvocate accounts sourced from a previously unknown breach.

Breach date: 8 February 2014
Date added to HIBP: 9 November 2017
Compromised accounts: 11,010,525
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


COVVE

In February 2020, a massive trove of personal information referred to as
"db8151dd" was provided to HIBP after being found left exposed on a publicly
facing Elasticsearch server. Later identified as originating from the Covve
contacts app, the exposed data included extensive personal information and
interactions between Covve users and their contacts. The data was provided to
HIBP by dehashed.com.

Breach date: 20 February 2020
Date added to HIBP: 15 May 2020
Compromised accounts: 22,802,117
Compromised data: Email addresses, Job titles, Names, Phone numbers, Physical
addresses, Social media profiles
Permalink

--------------------------------------------------------------------------------


CRACK COMMUNITY

In late 2013, the Crack Community forum specialising in cracks for games was
compromised and over 19k accounts published online. Built on the MyBB forum
platform, the compromised data included email addresses, IP addresses and salted
MD5 passwords.

Breach date: 9 September 2013
Date added to HIBP: 3 February 2015
Compromised accounts: 19,210
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


CRACKED.TO

In July 2019, the hacking website Cracked.to suffered a data breach. There were
749k unique email addresses spread across 321k forum users and other tables in
the database. A rival hacking website claimed responsibility for breaching the
MyBB based forum which disclosed email and IP addresses, usernames, private
messages and passwords stored as bcrypt hashes.

Breach date: 21 July 2019
Date added to HIBP: 12 August 2019
Compromised accounts: 749,161
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


CRACKINGFORUM

In approximately mid-2016, the cracking community forum known as CrackingForum
suffered a data breach. The vBulletin based forum exposed 660k email and IP
addresses, usernames and salted MD5 hashes.

Breach date: 1 July 2016
Date added to HIBP: 10 December 2017
Compromised accounts: 660,305
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CRAFTRISE

In May 2023, news broke of a data breach of the Turkish Minecraft server known
as CraftRise. The data of over 2.5M users was subsequently shared on a popular
hacking forum and included email addresses, usernames, geographic locations and
plain text passwords. The newest records indicate the data was obtained in March
2022.

Breach date: 5 March 2022
Date added to HIBP: 8 August 2023
Compromised accounts: 2,532,527
Compromised data: Email addresses, Geographic locations, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CREATIVE

In May 2018, the forum for Singaporean hardware company Creative Technology
suffered a data breach which resulted in the disclosure of 483k unique email
addresses. Running on an old version of vBulletin, the breach also disclosed
usernames, IP addresses and salted MD5 password hashes. After being notified of
the incident, Creative permanently shut down the forum.

Breach date: 1 May 2018
Date added to HIBP: 7 June 2018
Compromised accounts: 483,015
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CRIMEAGENCY VBULLETIN HACKS

In January 2016, a large number of unpatched vBulletin forums were compromised
by an actor known as "CrimeAgency". A total of 140 forums had data including
usernames, email addresses and passwords (predominantly stored as salted MD5
hashes), extracted and then distributed. Refer to the complete list of the
forums for further information on which sites were impacted.

Breach date: 19 January 2017
Date added to HIBP: 21 March 2017
Compromised accounts: 942,044
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CROSS FIRE

In August 2016, the Russian gaming forum known as Cross Fire (or cfire.mail.ru)
was hacked along with a number of other forums on the Russian mail provider,
mail.ru. The vBulletin forum contained 12.8 million accounts including
usernames, email addresses and passwords stored as salted MD5 hashes.

Breach date: 8 August 2016
Date added to HIBP: 28 December 2016
Compromised accounts: 12,865,609
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


CTARS

In May 2022, the client management system for the Australian government's NDIS
(National Disability Insurance Scheme) suffered a data breach which was
subsequently posted to an online hacking forum. The CTARS cloud platform is used
by care providers to record information about NDIS participants and often
contains sensitive medical information. Impacted data includes over 12k unique
email addresses, physical addresses, names, dates of birth, phone numbers and
data related to patient conditions and treatments.

Breach date: 21 May 2021
Date added to HIBP: 31 May 2022
Compromised accounts: 12,314
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Personal health data, Phone numbers, Physical addresses, Salutations, Usernames
Permalink

--------------------------------------------------------------------------------


CUTOUT.PRO

In February 2024, the AI-powered visual design platform Cutout.Pro suffered a
data breach that exposed 20M records. The data included email and IP addresses,
names and salted MD5 password hashes which were subsequently broadly distributed
on a popular hacking forum and Telegram channels.

Breach date: 26 February 2024
Date added to HIBP: 28 February 2024
Compromised accounts: 19,972,829
Compromised data: Email addresses, IP addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


CYBERSERVE

In October 2021, the Israeli hosting provider CyberServe was breached and
ransomed before having a substantial amount of their customer data leaked
publicly by a group known as "Black Shadow". Amongst the data was the LGBTQ
dating site Atraf and the Machon Mor medical institute. Due to multiple
different sites being compromised, the impacted data is broad and ranges from
relationship information to medical data to email addresses and passwords stored
in plain text. The data was made available to HIBP with support from May
Brooks-Kempler, founder of the Think Safe Cyber community in Israel.

Breach date: 29 October 2021
Date added to HIBP: 4 November 2021
Compromised accounts: 1,107,034
Compromised data: Dates of birth, Drinking habits, Email addresses, Family
structure, Genders, Geographic locations, HIV statuses, IP addresses, Names,
Passwords, Personal health data, Phone numbers, Physical attributes, Private
messages, Profile photos, Religions, Sexual orientations, Smoking habits,
Usernames
Permalink

--------------------------------------------------------------------------------


D3SCENE

In January 2016, the gaming website D3Scene, suffered a data breach. The
compromised vBulletin forum exposed 569k million email addresses, IP address,
usernames and passwords stored as salted MD5 hashes. The data was provided to
HIBP by dehashed.com.

Breach date: 1 January 2016
Date added to HIBP: 15 June 2019
Compromised accounts: 568,827
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DAFONT

In May 2017, font sharing site DaFont suffered a data breach resulting in the
exposure of 637k records. Allegedly due to a SQL injection vulnerability
exploited by multiple parties, the exposed data included usernames, email
addresses and passwords stored as MD5 without a salt.

Breach date: 16 May 2017
Date added to HIBP: 18 May 2017
Compromised accounts: 637,340
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DAILY QUIZ

In January 2021, the quiz website Daily Quiz suffered a data breach that exposed
over 8 million unique email addresses. The data also included usernames, IP
addresses and passwords stored in plain text.

Breach date: 13 January 2021
Date added to HIBP: 21 May 2021
Compromised accounts: 8,032,404
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DAILYMOTION

In October 2016, the video sharing platform Dailymotion suffered a data breach.
The attack led to the exposure of more than 85 million user accounts and
included email addresses, usernames and bcrypt hashes of passwords.

Breach date: 20 October 2016
Date added to HIBP: 7 August 2017
Compromised accounts: 85,176,234
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DAILYOBJECTS

In approximately January 2018, a collection of more than 464k customer records
from the Indian online retailer DailyObjects were leaked online. The data
included names, physical and email addresses, phone numbers and "pincodes"
stored in plain text. After multiple attempts to contact them, DailyObjects
responded and received a copy of the data for verification, however failed to
respond to multiple contact attempts following that.

Breach date: 1 January 2018
Date added to HIBP: 28 January 2020
Compromised accounts: 464,260
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


DANGDANG

In 2011, the Chinese e-commerce site Dangdang suffered a data breach. The
incident exposed over 4.8 million unique email addresses which were subsequently
traded online over the ensuing years.

Breach date: 1 June 2011
Date added to HIBP: 10 January 2019
Compromised accounts: 4,848,734
Compromised data: Email addresses
Permalink

--------------------------------------------------------------------------------


DANIWEB

In late 2015, the technology and social site DaniWeb suffered a data breach. The
attack resulted in the disclosure of 1.1 million accounts including email and IP
addresses which were also accompanied by salted MD5 hashes of passwords.
However, DaniWeb have advised that "the breached password hashes and salts are
incorrect" and that they have since switched to new infrastructure and software.

Breach date: 1 December 2015
Date added to HIBP: 28 December 2016
Compromised accounts: 1,131,636
Compromised data: Email addresses, IP addresses, Passwords
Permalink

--------------------------------------------------------------------------------


DATA & LEADS

In November 2018, security researcher Bob Diachenko identified an unprotected
database believed to be hosted by a data aggregator. Upon further investigation,
the data was linked to marketing company Data & Leads. The exposed Elasticsearch
instance contained over 44M unique email addresses along with names, IP and
physical addresses, phone numbers and employment information. No response was
received from Data & Leads when contacted by Bob and their site subsequently
went offline.

Breach date: 14 November 2018
Date added to HIBP: 28 November 2018
Compromised accounts: 44,320,330
Compromised data: Email addresses, Employers, IP addresses, Job titles, Names,
Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


DATA ENRICHMENT EXPOSURE FROM PDL CUSTOMER

In October 2019, security researchers Vinny Troia and Bob Diachenko identified
an unprotected Elasticsearch server holding 1.2 billion records of personal
data. The exposed data included an index indicating it was sourced from data
enrichment company People Data Labs (PDL) and contained 622 million unique email
addresses. The server was not owned by PDL and it's believed a customer failed
to properly secure the database. Exposed information included email addresses,
phone numbers, social media profiles and job history data.

Breach date: 16 October 2019
Date added to HIBP: 22 November 2019
Compromised accounts: 622,161,052
Compromised data: Email addresses, Employers, Geographic locations, Job titles,
Names, Phone numbers, Social media profiles
Permalink

--------------------------------------------------------------------------------


DATA ENRICHMENT RECORDS

In December 2016, more than 200 million "data enrichment profiles" were found
for sale on the darknet. The seller claimed the data was sourced from Experian
and whilst that claim was rejected by the company, the data itself was found to
be legitimate suggesting it may have been sourced from other legitimate
locations. In total, there were more than 8 million unique email addresses in
the data which also contained a raft of other personal attributes including
credit ratings, home ownership status, family structure and other fields
described in the story linked to above. The email addresses alone were provided
to HIBP.

Breach date: 23 December 2016
Date added to HIBP: 8 June 2017
Compromised accounts: 8,176,132
Compromised data: Buying preferences, Charitable donations, Credit status
information, Dates of birth, Email addresses, Family structure, Financial
investments, Home ownership statuses, Income levels, Job titles, Marital
statuses, Names, Net worths, Phone numbers, Physical addresses, Political
donations
Permalink

--------------------------------------------------------------------------------


DATACAMP

In December 2018, the data science website DataCamp suffered a data breach of
records dating back to January 2017. The incident exposed 760k unique email and
IP addresses along with names and passwords stored as bcrypt hashes. In 2019,
the data appeared listed for sale on a dark web marketplace (along with several
other large breaches) and subsequently began circulating more broadly. The data
was provided to HIBP by a source who requested it to be attributed to
"BenjaminBlue@exploit.im".

Breach date: 30 January 2017
Date added to HIBP: 9 April 2019
Compromised accounts: 760,561
Compromised data: Email addresses, Geographic locations, IP addresses, Names,
Passwords
Permalink

--------------------------------------------------------------------------------


DATPIFF

In late 2021, email address and plain text password pairs from the rap mixtape
website DatPiff appeared for sale on a popular hacking forum. The data allegedly
dated back to an earlier breach and in total, contained almost 7.5M email
addresses and cracked password pairs. The original data source allegedly
contained usernames, security questions and answers and passwords stored as MD5
hashes with a static salt.

Breach date: 25 August 2021
Date added to HIBP: 4 January 2022
Compromised accounts: 7,476,940
Compromised data: Email addresses, Passwords, Security questions and answers,
Usernames
Permalink

--------------------------------------------------------------------------------


DAVE

In June 2020, the digital banking app Dave suffered a data breach which exposed
7.5 million rows of data and subsequently appeared for public download on a
hacking forum. The breach exposed extensive personal information including
almost 3 million unique email addresses alongside names, dates of birth,
encrypted social security numbers and passwords stored as bcrypt hashes. The
data was provided to HIBP by dehashed.com.

Breach date: 28 June 2020
Date added to HIBP: 27 July 2020
Compromised accounts: 2,964,182
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Physical addresses, Social security numbers
Permalink

--------------------------------------------------------------------------------


DBFORUMS

In July 2016, a data breach of the now defunct database forum "dBforums"
appeared for sale alongside several others hacked from the parent company,
Penton. The breach of the vBulletin based forum contained 363k unique email
addresses alongside usernames, IP addresses, dates of birth and salted MD5
password hashes.

Breach date: 4 July 2016
Date added to HIBP: 20 September 2023
Compromised accounts: 363,468
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


DC HEALTH LINK

In March 2023, DC Health Link discovered a data breach that was later publicly
posted to a popular data breach forum. The impacted data included 48k unique
email addresses alongside names, genders, dates of birth, home addresses, phone
numbers and social security numbers. The data was provided to HIBP by a source
who requested it be attributed to "Aegis" and "IntelBroker".

Breach date: 6 March 2023
Date added to HIBP: 14 December 2023
Compromised accounts: 48,145
Compromised data: Citizenship statuses, Dates of birth, Email addresses,
Employers, Ethnicities, Genders, Names, Phone numbers, Physical addresses,
Purchases, Social security numbers
Permalink

--------------------------------------------------------------------------------


DEEZER

In late 2022, the music streaming service Deezer disclosed a data breach that
impacted over 240M customers. The breach dated back to a mid-2019 backup exposed
by a 3rd party partner which was subsequently sold and then broadly
redistributed on a popular hacking forum. Impacted data included 229M unique
email addresses, IP addresses, names, usernames, genders, DoBs and the
geographic location of the customer.

Breach date: 22 April 2019
Date added to HIBP: 2 January 2023
Compromised accounts: 229,037,936
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Names, Spoken languages, Usernames
Permalink

--------------------------------------------------------------------------------


DEMON FORUMS

In February 2019, the hacking forum Demon Forums suffered a data breach. The
compromise of the vBulletin forum exposed 52k unique email addresses alongside
usernames and passwords stored as salted MD5 hashes.

Breach date: 20 February 2019
Date added to HIBP: 4 April 2019
Compromised accounts: 52,623
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DESCOMPLICA

In March 2021, the Brazilian EdTech company Descomplica suffered a data breach
which was subsequently posted to a popular hacking forum. The data included
almost 5 million email addresses, names, the first 6 and last 4 digits and the
expiry date of credit cards, purchase histories and password hashes.

Breach date: 14 March 2021
Date added to HIBP: 28 April 2021
Compromised accounts: 4,845,378
Compromised data: Email addresses, Names, Partial credit card data, Passwords,
Purchases
Permalink

--------------------------------------------------------------------------------


DEVIL-TORRENTS.PL

In early 2021, the Polish torrents website Devil-Torrents.pl suffered a data
breach. A subset of the data including 63k unique email addresses and cracked
passwords were subsequently socialised on a popular data breach sharing service.

Breach date: 4 January 2021
Date added to HIBP: 1 May 2022
Compromised accounts: 63,451
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


DEVKITPRO

In February 2019, the devkitPro forum suffered a data breach. The phpBB based
forum had 1,508 unique email addresses exposed in the breach alongside forum
posts, private messages and passwords stored as weak salted hashes. The data
breach was self-submitted to HIBP by the forum operator.

Breach date: 3 February 2019
Date added to HIBP: 11 February 2019
Compromised accounts: 1,508
Compromised data: Email addresses, Passwords, Private messages
Permalink

--------------------------------------------------------------------------------


DIET.COM

In August 2014, the diet and nutrition website diet.com suffered a data breach
resulting in the exposure of 1.4 million unique user records dating back as far
as 2004. The data contained email and IP addresses, usernames, plain text
passwords and dietary information about the site members including eating
habits, BMI and birth date. The site was previously reported as compromised on
the Vigilante.pw breached database directory.

Breach date: 10 August 2014
Date added to HIBP: 13 October 2017
Compromised accounts: 1,383,759
Compromised data: Dates of birth, Eating habits, Email addresses, IP addresses,
Names, Passwords, Physical attributes, Usernames
Permalink

--------------------------------------------------------------------------------


DIGIMON

In September 2016, over 16GB of logs from a service indicated to be
digimon.co.in were obtained, most likely from an unprotected Mongo DB instance.
The service ceased running shortly afterwards and no information remains about
the precise nature of it. Based on enquiries made via Twitter, it appears to
have been a mail service possibly based on PowerMTA and used for delivering
spam. The logs contained information including 7.7M unique email recipients
(names and addresses), mail server IP addresses, email subjects and tracking
information including mail opens and clicks.

Breach date: 5 September 2016
Date added to HIBP: 28 September 2018
Compromised accounts: 7,687,679
Compromised data: Email addresses, Email messages, IP addresses, Names
Permalink

--------------------------------------------------------------------------------


DISQUS

In October 2017, the blog commenting service Disqus announced they'd suffered a
data breach. The breach dated back to July 2012 but wasn't identified until
years later when the data finally surfaced. The breach contained over 17.5
million unique email addresses and usernames. Users who created logins on Disqus
had salted SHA1 hashes of passwords whilst users who logged in via social
providers only had references to those accounts.

Breach date: 1 July 2012
Date added to HIBP: 6 October 2017
Compromised accounts: 17,551,044
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DIVX SUBTITLES

In approximately 2010, the now defunct website DivX SubTitles suffered a data
breach that exposed 783k user accounts including email addresses, usernames and
plain text passwords.

Breach date: 1 January 2010
Date added to HIBP: 14 June 2022
Compromised accounts: 783,058
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DLH.NET

In July 2016, the gaming news site DLH.net suffered a data breach which exposed
3.3M subscriber identities. Along with the keys used to redeem and activate
games on the Steam platform, the breach also resulted in the exposure of email
addresses, birth dates and salted MD5 password hashes. The data was donated to
Have I Been Pwned by data breach monitoring service Vigilante.pw.

Breach date: 31 July 2016
Date added to HIBP: 7 September 2016
Compromised accounts: 3,264,710
Compromised data: Dates of birth, Email addresses, Names, Passwords, Usernames,
Website activity
Permalink

--------------------------------------------------------------------------------


DODONEW.COM

In late 2011, data was allegedly obtained from the Chinese website known as
Dodonew.com and contained 8.7M accounts. Whilst there is evidence that the data
is legitimate, due to the difficulty of emphatically verifying the Chinese
breach it has been flagged as "unverified". The data in the breach contains
email addresses and user names. Read more about Chinese data breaches in Have I
Been Pwned.

Breach date: 1 December 2011
Date added to HIBP: 10 November 2016
Compromised accounts: 8,718,404
Compromised data: Email addresses, Usernames
Permalink

--------------------------------------------------------------------------------


DOMINO'S

In June 2014, Domino's Pizza in France and Belgium was hacked by a group going
by the name "Rex Mundi" and their customer data held to ransom. Domino's refused
to pay the ransom and six months later, the attackers released the data along
with troves of other hacked accounts. Amongst the customer data was passwords
stored with a weak MD5 hashing algorithm and no salt.

Breach date: 13 June 2014
Date added to HIBP: 4 January 2015
Compromised accounts: 648,231
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


DOMINO'S INDIA

In April 2021, 13TB of compromised Domino's India appeared for sale on a hacking
forum after which the company acknowledged a major data breach they dated back
to March. The compromised data included 22.5 million unique email addresses,
names, phone numbers, order histories and physical addresses.

Breach date: 24 March 2021
Date added to HIBP: 3 June 2021
Compromised accounts: 22,527,655
Compromised data: Email addresses, Names, Phone numbers, Physical addresses,
Purchases
Permalink

--------------------------------------------------------------------------------


DOOMWORLD

In October 2022, the Doomworld fourm suffered a data breach that exposed 34k
member records. The data included email and IP addresses, usernames and bcrypt
password hashes.

Breach date: 12 October 2022
Date added to HIBP: 24 October 2022
Compromised accounts: 34,478
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DOORDASH

In August 2022, the food ordering and delivery service DoorDash disclosed a data
breach that impacted a portion of their customers. DoorDash attributed the
breach to an unnamed "third-party vendor" they stated was the victim of a
phishing campaign. The incident exposed 367k unique personal email addresses
alongside names, post codes and partial card data, namely the brand, expiry data
and last four digits of the card.

Breach date: 2 August 2022
Date added to HIBP: 7 January 2023
Compromised accounts: 367,476
Compromised data: Email addresses, Geographic locations, Names, Partial credit
card data
Permalink

--------------------------------------------------------------------------------


DOXBIN

In January 2022, the "doxing" website designed to disclose the personal
information of targeted individuals ("doxes") Doxbin suffered a data breach. The
breach was subsequently leaked online and included over 370k unique email
addresses across user accounts and doxes. User accounts also included usernames,
password hashes and browser user agents. The personal information disclosed in
the doxes was often extensive including names, physical addresses, phone numbers
and more.

Breach date: 5 January 2022
Date added to HIBP: 8 January 2022
Compromised accounts: 370,794
Compromised data: Browser user agent details, Email addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


DRIVESURE

In December 2020, the car dealership service provider DriveSure suffered a data
breach. The incident resulted in 26GB of data being downloaded and later shared
on a hacking forum. Impacted personal information included 3.6 million unique
email addresses, names, phone numbers and physical addresses. Vehicle data was
also exposed and included makes, models, VIN numbers and odometer readings. A
small number of passwords stored as bcrypt hashes were also included in the data
set.

Breach date: 19 December 2020
Date added to HIBP: 10 May 2021
Compromised accounts: 3,675,099
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses, Vehicle details
Permalink

--------------------------------------------------------------------------------


DRIZLY

In approximately July 2020, the US-based online alcohol delivery service Drizly
suffered a data breach. The data was sold online before being extensively
redistributed and contained 2.5 million unique email addresses alongside names,
physical and IP addresses, phone numbers, dates of birth and passwords stored as
bcrypt hashes. The data was provided to HIBP by dehashed.com.

Breach date: 2 July 2020
Date added to HIBP: 28 July 2020
Compromised accounts: 2,479,044
Compromised data: Dates of birth, Device information, Email addresses, IP
addresses, Names, Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


DROPBOX

In mid-2012, Dropbox suffered a data breach which exposed the stored credentials
of tens of millions of their customers. In August 2016, they forced password
resets for customers they believed may be at risk. A large volume of data
totalling over 68 million records was subsequently traded online and included
email addresses and salted hashes of passwords (half of them SHA1, half of them
bcrypt).

Breach date: 1 July 2012
Date added to HIBP: 31 August 2016
Compromised accounts: 68,648,009
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


DUBSMASH

In December 2018, the video messaging service Dubsmash suffered a data breach.
The incident exposed 162 million unique email addresses alongside usernames and
PBKDF2 password hashes. In 2019, the data appeared listed for sale on a dark web
marketplace (along with several other large breaches) and subsequently began
circulating more broadly. The data was provided to HIBP by a source who
requested it to be attributed to "BenjaminBlue@exploit.im".

Breach date: 1 December 2018
Date added to HIBP: 25 February 2019
Compromised accounts: 161,749,950
Compromised data: Email addresses, Geographic locations, Names, Passwords, Phone
numbers, Spoken languages, Usernames
Permalink

--------------------------------------------------------------------------------


DUCKS UNLIMITED

In mid-2021, Risk Based Security reported on a database sourced from Ducks
Unlimited being traded online. The data dated back to January 2021 and contained
1.3M unique email addresses across both a membership list and a list of website
users. Impacted data included names, phones numbers, physical addresses, dates
of birth and passwords stored as unsalted MD5 hashes.

Breach date: 29 January 2021
Date added to HIBP: 16 November 2021
Compromised accounts: 1,324,364
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


DUELING NETWORK

In March 2017, the Flash game based on the Yu-Gi-Oh trading card game Dueling
Network suffered a data breach. The site itself was taken offline in 2016 due to
a cease-and-desist order but the forum remained online for another year. The
data breach exposed usernames, IP and email addresses and passwords stored as
MD5 hashes. The data was provided to HIBP by a source who requested it be
attributed to "burger vault".

Breach date: 29 March 2017
Date added to HIBP: 30 March 2020
Compromised accounts: 6,486,626
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DUNGEONS & DRAGONS ONLINE

In April 2013, the interactive video game Dungeons & Dragons Online suffered a
data breach that exposed almost 1.6M players' accounts. The data was being
actively traded on underground forums and included email addresses, birth dates
and password hashes.

Breach date: 2 April 2013
Date added to HIBP: 12 March 2016
Compromised accounts: 1,580,933
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


DUNZO

In approximately June 2019, the Indian delivery service Dunzo suffered a data
breach. Exposing 3.5 million unique email addresses, the Dunzo breach also
included names, phone numbers and IP addresses which were all broadly
distributed online via a hacking forum. The data was provided to HIBP by
dehashed.com.

Breach date: 19 June 2020
Date added to HIBP: 29 July 2020
Compromised accounts: 3,465,259
Compromised data: Device information, Email addresses, Geographic locations, IP
addresses, Names, Phone numbers
Permalink

--------------------------------------------------------------------------------


DUOLINGO

In August 2023, 2.6M records of data scraped from Duolingo were broadly
distributed on a popular hacking forum. Obtained by enumerating a vulnerable
API, the data had earlier appeared for sale in January 2023 and contained email
addresses, names, the languages being learned, XP (experience points), and other
data related to learning progress on Duolingo. Whilst some of the data
attributes are intentionally public, the ability to map private email addresses
to them presents an ongoing risk to user privacy.

Breach date: 24 January 2023
Date added to HIBP: 23 August 2023
Compromised accounts: 2,676,696
Compromised data: Email addresses, Names, Spoken languages, Usernames
Permalink

--------------------------------------------------------------------------------


DUOWAN.COM

In approximately 2011, data was allegedly obtained from the Chinese gaming
website known as Duowan.com and contained 2.6M accounts. Whilst there is
evidence that the data is legitimate, due to the difficulty of emphatically
verifying the Chinese breach it has been flagged as "unverified". The data in
the breach contains email addresses, user names and plain text passwords. Read
more about Chinese data breaches in Have I Been Pwned.

Breach date: 1 January 2011
Date added to HIBP: 7 November 2016
Compromised accounts: 2,639,894
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


DVD-SHOP.CH

In December 2017, the online Swiss DVD store known as dvd-shop.ch suffered a
data breach. The incident led to the exposure of 68k email addresses and plain
text passwords. The site has since been updated to indicate that it is currently
closed.

Breach date: 5 December 2017
Date added to HIBP: 10 December 2017
Compromised accounts: 67,973
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


DYMOCKS

In September 2023, the Australian book retailer Dymocks announced a data breach.
The data dated back to June 2023 and contained 1.2M records with 836k unique
email addresses. The breach also exposed names, dates of birth, genders, phone
numbers and physical addresses.

Breach date: 20 June 2023
Date added to HIBP: 8 September 2023
Compromised accounts: 836,120
Compromised data: Dates of birth, Email addresses, Genders, Names, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


EATIGO

In October 2018, the restaurant reservation service Eatigo suffered a data
breach that exposed 2.8 million accounts. The data included email addresses,
names, phone numbers, social media profiles, genders and passwords stored as
unsalted MD5 hashes.

Breach date: 16 October 2018
Date added to HIBP: 25 August 2021
Compromised accounts: 2,789,609
Compromised data: Email addresses, Genders, Names, Passwords, Phone numbers,
Social media profiles
Permalink

--------------------------------------------------------------------------------


EATSTREET

In May 2019, the online food ordering service EatStreet suffered a data breach
affecting 6.4 million customers. An extensive amount of personal data was
obtained including names, phone numbers, addresses, partial credit card data and
passwords stored as bcrypt hashes. The data was provided to HIBP by a source who
requested it be attributed to "JimScott.Sec@protonmail.com".

Breach date: 3 May 2019
Date added to HIBP: 19 July 2019
Compromised accounts: 6,353,564
Compromised data: Dates of birth, Email addresses, Genders, Names, Partial
credit card data, Passwords, Phone numbers, Physical addresses, Social media
profiles
Permalink

--------------------------------------------------------------------------------


ECCIE

In January 2021, the adult escort forum ECCIE suffered a data breach which was
later posted to a popular hacking forum. The data included 536k user records
with email and IP addresses, usernames, dates of birth and salted MD5 password
hashes.

Breach date: 1 July 2021
Date added to HIBP: 21 August 2023
Compromised accounts: 536,923
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


EDMODO

In May 2017, the education platform Edmodo was hacked resulting in the exposure
of 77 million records comprised of over 43 million unique customer email
addresses. The data was consequently published to a popular hacking forum and
made freely available. The records in the breach included usernames, email
addresses and bcrypt hashes of passwords.

Breach date: 11 May 2017
Date added to HIBP: 1 June 2017
Compromised accounts: 43,423,561
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ELANCE

Sometime in 2009, staffing platform Elance suffered a data breach that impacted
1.3 million accounts. Appearing online 8 years later, the data contained
usernames, email addresses, phone numbers and SHA1 hashes of passwords, amongst
other personal data.

Breach date: 1 January 2009
Date added to HIBP: 18 February 2017
Compromised accounts: 1,291,178
Compromised data: Email addresses, Employers, Geographic locations, Passwords,
Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


ELANIC

In January 2020, the Indian fashion marketplace Elanic had 2.8M records with
2.3M unique email addresses posted publicly to a popular hacking forum. Elanic
confirmed that they had "verified the data and it was pulled from one of our
test servers where this data was exposed publicly" and that the data was "old"
(the hacking forum reported it as being from 2016-2018). When asked about
disclosure to impacted customers, Elanic advised that they had "decided to not
have as such any communication and public disclosure".

Breach date: 1 January 2018
Date added to HIBP: 4 May 2020
Compromised accounts: 2,325,283
Compromised data: Email addresses, Geographic locations, Usernames
Permalink

--------------------------------------------------------------------------------


ELASTICSEARCH INSTANCE OF SALES LEADS ON AWS

In October 2018, security researcher Bob Diachenko identified multiple exposed
databases with hundreds of millions of records. One of those datasets was an
Elasticsearch instance on AWS containing sales lead data and 5.8M unique email
addresses. The data contained information relating to individuals and the
companies they worked for including their names, email addresses and company
name and contact information. Despite best efforts, it was not possible to
identify the owner of the data hence this breach as been titled "Elasticsearch
Sales Leads".

Breach date: 29 October 2018
Date added to HIBP: 17 November 2018
Compromised accounts: 5,788,169
Compromised data: Email addresses, Employers, Names, Physical addresses
Permalink

--------------------------------------------------------------------------------


EMOTET

In January 2021, the FBI in partnership with the Dutch NHTCU, German BKA and
other international law enforcement agencies brought down the world's most
dangerous malware: Emotet. The agencies obtained data collected by the malware
and provided impacted email addresses to HIBP so that impacted individuals and
domain owners could assess their exposure. Read more about the takedown and
recommended actions.

Breach date: 27 January 2021
Date added to HIBP: 26 April 2021
Compromised accounts: 4,324,770
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


EMUPARADISE

In April 2018, the self-proclaimed "biggest retro gaming website on earth",
Emuparadise, suffered a data breach. The compromised vBulletin forum exposed 1.1
million email addresses, IP address, usernames and passwords stored as salted
MD5 hashes. The data was provided to HIBP by dehashed.com.

Breach date: 1 April 2018
Date added to HIBP: 9 June 2019
Compromised accounts: 1,131,229
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


E-PAL

In October 2022, the service dedicated to finding friends on Discord known as
E-Pal disclosed a data breach. The compromised data included over 100k unique
email addresses and usernames spanning approximately 1M orders. The data was
subsequently distributed via a popular hacking forum.

Breach date: 15 April 2022
Date added to HIBP: 24 October 2022
Compromised accounts: 108,887
Compromised data: Email addresses, Purchases, Usernames
Permalink

--------------------------------------------------------------------------------


EPIC GAMES

In August 2016, the Epic Games forum suffered a data breach, allegedly due to a
SQL injection vulnerability in vBulletin. The attack resulted in the exposure of
252k accounts including usernames, email addresses and salted MD5 hashes of
passwords.

Breach date: 11 August 2016
Date added to HIBP: 7 November 2016
Compromised accounts: 251,661
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


EPICBOT

In September 2019, the RuneScape bot provider EpicBot suffered a data breach
that impacted 817k subscribers. Data from the breach was subsequently shared on
a popular hacking forum and included usernames, email and IP addresses and
passwords stored as either salted MD5 or bcrypt hashes. EpicBot did not respond
when contacted about the incident.

Breach date: 1 September 2019
Date added to HIBP: 19 November 2019
Compromised accounts: 816,662
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


EPICNPC

In January 2016, the hacked account reseller EpicNPC suffered a data breach that
impacted 409k subscribers. The impacted data included usernames, IP and email
addresses and passwords stored as salted MD5 hashes. The data was provided to
HIBP by dehashed.com.

Breach date: 2 January 2016
Date added to HIBP: 27 July 2019
Compromised accounts: 408,795
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


EPIK

In September 2021, the domain registrar and web host Epik suffered a significant
data breach, allegedly in retaliation for hosting alt-right websites. The breach
exposed a huge volume of data not just of Epik customers, but also scraped WHOIS
records belonging to individuals and organisations who were not Epik customers.
The data included over 15 million unique email addresses (including anonymised
versions for domain privacy), names, phone numbers, physical addresses,
purchases and passwords stored in various formats.

Breach date: 13 September 2021
Date added to HIBP: 19 September 2021
Compromised accounts: 15,003,961
Compromised data: Email addresses, Names, Phone numbers, Physical addresses,
Purchases
Permalink

--------------------------------------------------------------------------------


EROTICY

In mid-2016, it's alleged that the adult website known as Eroticy was hacked.
Almost 1.4 million unique accounts were found circulating in late 2016 which
contained a raft of personal information ranging from email addresses to phone
numbers to plain text passwords. Whilst many HIBP subscribers confirmed their
data was legitimate, the actual source of the breach remains inconclusive. A
detailed account of the data has been published in the hope of identifying the
origin of the breach.

Breach date: 1 June 2015
Date added to HIBP: 10 January 2017
Compromised accounts: 1,370,175
Compromised data: Email addresses, IP addresses, Names, Passwords, Payment
histories, Phone numbers, Physical addresses, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


ESKIMI

In late 2020, the AdTech platform Eskimi suffered a data breach that exposed 26M
records with 1.2M unique email addresses. The data included usernames, dates of
birth, genders and passwords stored as unsalted MD5 hashes.

Breach date: 25 September 2020
Date added to HIBP: 16 July 2022
Compromised accounts: 1,197,620
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ESTANTE VIRTUAL

In February 2019, the Brazilian book store Estante Virtual suffered a data
breach that impacted 5.4M customers. The exposed data included names, usernames,
email and physical addresses, phone numbers, dates of birth and unsalted SHA-1
password hashes.

Breach date: 28 February 2019
Date added to HIBP: 29 November 2023
Compromised accounts: 5,412,603
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


ESTONIAN CITIZENS (VIA ESTONIAN CYBERCRIME BUREAU)

In June 2018, the Cybercrime Bureau of the Estonian Central Criminal Police
contacted HIBP and asked for assistance in making a data set of 655k email
addresses searchable. The Estonian police suspected the email addresses and
passwords they obtained were being used to access mailboxes, cryptocurrency
exchanges, cloud service accounts and other similar online assets. They've
requested that individuals who find themselves in the data set and also identify
that cryptocurrency has been stolen contact them at cybercrime@politsei.ee.

Breach date: 7 June 2018
Date added to HIBP: 11 June 2018
Compromised accounts: 655,161
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ETHEKWINI MUNICIPALITY

In September 2016, the new eThekwini eServices website in South Africa was
launched with a number of security holes that lead to the leak of over 98k
residents' personal information and utility bills across 82k unique email
addresses. Emails were sent prior to launch containing passwords in plain text
and the site allowed anyone to download utility bills without sufficient
authentication. Various methods of customer data enumeration was possible and
phishing attacks began appearing the day after launch.

Breach date: 7 September 2016
Date added to HIBP: 15 September 2016
Compromised accounts: 81,830
Compromised data: Dates of birth, Deceased date, Email addresses, Genders,
Government issued IDs, Names, Passport numbers, Passwords, Phone numbers,
Physical addresses, Utility bills
Permalink

--------------------------------------------------------------------------------


ETHEREUM

In December 2016, the forum for the public blockchain-based distributed
computing platform Ethereum suffered a data breach. The database contained over
16k unique email addresses along with IP addresses, private forum messages and
(mostly) bcrypt hashed passwords. Ethereum elected to self-submit the data to
HIBP, providing the service with a list of email addresses impacted by the
incident.

Breach date: 16 December 2016
Date added to HIBP: 20 December 2016
Compromised accounts: 16,431
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


EUROPA.JOBS

In August 2019, the now defunct European jobs website europa.jobs (Google cache
link) suffered a data breach. The incident exposed 226k unique email addresses
alongside extensive personal information including names, dates of birth, job
applications and passwords. The data was subsequently redistributed on a popular
hacking forum.

Breach date: 11 August 2019
Date added to HIBP: 15 January 2020
Compromised accounts: 226,095
Compromised data: Dates of birth, Email addresses, Geographic locations, Job
applications, Names, Passwords, Phone numbers, Spoken languages
Permalink

--------------------------------------------------------------------------------


EVERMOTION

In May 2015, the Polish 3D modelling website known as Evermotion suffered a data
breach resulting in the exposure of 435k unique user records. The data was
sourced from a vBulletin forum and contained email addresses, usernames, dates
of birth and salted MD5 hashes of passwords. The site was previously reported as
compromised on the Vigilante.pw breached database directory.

Breach date: 7 May 2015
Date added to HIBP: 2 July 2017
Compromised accounts: 435,510
Compromised data: Dates of birth, Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


EVERYBODY EDITS

In March 2019, the multiplayer platform game Everybody Edits suffered a data
breach. The incident exposed 871k unique email addresses alongside usernames and
IP addresses. The data was subsequently distributed online across a collection
of files.

Breach date: 23 March 2019
Date added to HIBP: 3 April 2019
Compromised accounts: 871,190
Compromised data: Email addresses, IP addresses, Usernames
Permalink

--------------------------------------------------------------------------------


EVITE

In April 2019, the social planning website for managing online invitations Evite
identified a data breach of their systems. Upon investigation, they found
unauthorised access to a database archive dating back to 2013. The exposed data
included a total of 101 million unique email addresses, most belonging to
recipients of invitations. Members of the service also had names, phone numbers,
physical addresses, dates of birth, genders and passwords stored in plain text
exposed. The data was provided to HIBP by a source who requested it be
attributed to "JimScott.Sec@protonmail.com".

Breach date: 11 August 2013
Date added to HIBP: 14 July 2019
Compromised accounts: 100,985,047
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


EVONY

In June 2016, the online multiplayer game Evony was hacked and over 29 million
unique accounts were exposed. The attack led to the exposure of usernames, email
and IP addresses and MD5 hashes of passwords (without salt).

Breach date: 1 June 2016
Date added to HIBP: 25 March 2017
Compromised accounts: 29,396,116
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


EXACTIS

In June 2018, the marketing firm Exactis inadvertently publicly leaked 340
million records of personal data. Security researcher Vinny Troia of Night Lion
Security discovered the leak contained multiple terabytes of personal
information spread across hundreds of separate fields including addresses, phone
numbers, family structures and extensive profiling data. The data was collected
as part of Exactis' service as a "compiler and aggregator of premium business &
consumer data" which they then sell for profiling and marketing purposes. A
small subset of the exposed fields were provided to Have I Been Pwned and
contained 132 million unique email addresses.

Breach date: 1 June 2018
Date added to HIBP: 25 July 2018
Compromised accounts: 131,577,763
Compromised data: Credit status information, Dates of birth, Education levels,
Email addresses, Ethnicities, Family structure, Financial investments, Genders,
Home ownership statuses, Income levels, IP addresses, Marital statuses, Names,
Net worths, Occupations, Personal interests, Phone numbers, Physical addresses,
Religions, Spoken languages
Permalink

--------------------------------------------------------------------------------


EXPERIAN (2015)

In September 2015, the US based credit bureau and consumer data broker Experian
suffered a data breach that impacted 15 million customers who had applied for
financing from T-Mobile. An alleged data breach was subsequently circulated
containing personal information including names, physical and email addresses,
birth dates and various other personal attributes. Multiple Have I Been Pwned
subscribers verified portions of the data as being accurate, but the actual
source of it was inconclusive therefor this breach has been flagged as
"unverified".

Breach date: 16 September 2015
Date added to HIBP: 6 September 2016
Compromised accounts: 7,196,890
Compromised data: Credit status information, Dates of birth, Email addresses,
Ethnicities, Family structure, Genders, Home ownership statuses, Income levels,
IP addresses, Names, Phone numbers, Physical addresses, Purchasing habits
Permalink

--------------------------------------------------------------------------------


EXPERIAN (SOUTH AFRICA)

In August 2020, Experian South Africa suffered a data breach which exposed the
personal information of tens of millions of individuals. Only 1.3M of the
records contained email addresses, whilst most contained government issued
identity numbers, names, addresses, occupations and employers, amongst other
person information.

Breach date: 19 August 2020
Date added to HIBP: 1 September 2020
Compromised accounts: 1,284,637
Compromised data: Email addresses, Employers, Government issued IDs, Names,
Occupations, Phone numbers
Permalink

--------------------------------------------------------------------------------


EXPLOIT.IN

In late 2016, a huge list of email address and password pairs appeared in a
"combo list" referred to as "Exploit.In". The list contained 593 million unique
email addresses, many with multiple different passwords hacked from various
online systems. The list was broadly circulated and used for "credential
stuffing", that is attackers employ it in an attempt to identify other online
systems where the account owner had reused their password. For detailed
background on this incident, read Password reuse, credential stuffing and
another billion records in Have I Been Pwned.

Breach date: 13 October 2016
Date added to HIBP: 6 May 2017
Compromised accounts: 593,427,119
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


EXPOSED VINS

In June 2017, an unsecured database with more than 10 million VINs (vehicle
identification numbers) was discovered by researchers. Believed to be sourced
from US car dealerships, the data included a raft of personal information and
vehicle data along with 397k unique email addresses.

Breach date: 5 June 2017
Date added to HIBP: 9 June 2017
Compromised accounts: 396,650
Compromised data: Dates of birth, Email addresses, Family structure, Genders,
Names, Phone numbers, Physical addresses, Vehicle details
Permalink

--------------------------------------------------------------------------------


EYE4FRAUD

In February 2023, data alleged to have been taken from the fraud protection
service Eye4Fraud was listed for sale on a popular hacking forum. Spanning tens
of millions of rows with 16M unique email addresses, the data was spread across
147 tables totalling 65GB and included both direct users of the service and what
appears to be individuals who'd placed orders on other services that implemented
Eye4Fraud to protect their sales. The data included names and bcrypt password
hashes for users, and names, phone numbers, physical addresses and partial
credit card data (card type and last 4 digits) for orders placed using the
service. Eye4Fraud did not respond to multiple attempts to report the incident.

Breach date: 25 January 2023
Date added to HIBP: 6 March 2023
Compromised accounts: 16,000,591
Compromised data: Email addresses, IP addresses, Names, Partial credit card
data, Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


EYEEM

In February 2018, photography website EyeEm suffered a data breach. The breach
was identified among a collection of other large incidents and exposed almost
20M unique email addresses, names, usernames, bios and password hashes. The data
was provided to HIBP by a source who asked for it to be attributed to "Kuroi'sh
or Gabriel Kimiaie-Asadi Bildstein".

Breach date: 28 February 2018
Date added to HIBP: 16 February 2019
Compromised accounts: 19,611,022
Compromised data: Bios, Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FACEBOOK

In April 2021, a large data set of over 500 million Facebook users was made
freely available for download. Encompassing approximately 20% of Facebook's
subscribers, the data was allegedly obtained by exploiting a vulnerability
Facebook advises they rectified in August 2019. The primary value of the data is
the association of phone numbers to identities; whilst each record included
phone, only 2.5 million contained an email address. Most records contained names
and genders with many also including dates of birth, location, relationship
status and employer.

Breach date: 1 August 2019
Date added to HIBP: 4 April 2021
Compromised accounts: 509,458,528
Compromised data: Dates of birth, Email addresses, Employers, Genders,
Geographic locations, Names, Phone numbers, Relationship statuses
Permalink

--------------------------------------------------------------------------------


FACEBOOK MARKETPLACE

In February 2024, 200k Facebook Marketplace records allegedly obtained from a
Meta contractor in October 2023 were posted to a popular hacking forum. The data
contained 77k unique email addresses alongside names, phone numbers, Facebook
profile IDs and geographic locations. The data also contained bcrypt password
hashes, although there is no indication these belong to the corresponding
Facebook accounts.

Breach date: 1 October 2023
Date added to HIBP: 22 February 2024
Compromised accounts: 77,267
Compromised data: Email addresses, Geographic locations, Names, Passwords, Phone
numbers, Social media profiles
Permalink

--------------------------------------------------------------------------------


FACEPUNCH

In June 2016, the game development studio Facepunch suffered a data breach that
exposed 343k users. The breached data included usernames, email and IP
addresses, dates of birth and salted MD5 password hashes. Facepunch advised they
were aware of the incident and had notified people at the time. The data was
provided to HIBP by whitehat security researcher and data analyst Adam Davies.

Breach date: 3 June 2016
Date added to HIBP: 17 October 2018
Compromised accounts: 342,913
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


FACEUP

In 2013, the Danish social media site FaceUP suffered a data breach. The
incident exposed 87k unique email addresses alongside genders, dates of birth,
names, phone numbers and passwords stored as unsalted MD5 hashes. When notified
of the incident, FaceUP advised they had identified a SQL injection
vulnerability at the time and forced password resets on impacted customers.

Breach date: 1 January 2013
Date added to HIBP: 13 January 2019
Compromised accounts: 87,633
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


FACTUAL

In March 2017, a file containing 8M rows of data allegedly sourced from data
aggregator Factual was compiled and later exchanged on the premise it was a
"breach". The data contained 2.5M unique email addresses alongside business
names, addresses and phone numbers. After consultation with Factual, they
advised the data was "publicly available information about businesses and other
points of interest that Factual makes available on its website and to
customers".

Breach date: 22 March 2017
Date added to HIBP: 24 December 2019
Compromised accounts: 2,461,696
Compromised data: Email addresses, Employers, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


FAMM

In late 2020, the Japanese family photos website Famm suffered a data breach
that subsequently exposed 1.3M customer records, including 535k unique email
addresses. Impacted data also included names, dates of birth, genders and
passwords stored as SHA-256 hashes.

Breach date: 8 October 2020
Date added to HIBP: 16 July 2022
Compromised accounts: 535,240
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords
Permalink

--------------------------------------------------------------------------------


FANPASS

In April 2022, the UK based website for buying and selling soccer tickets
Fanpass suffered a data breach which exposed 112k customer records. Impacted
data includes names, phone numbers, physical addresses, purchase histories and
salted password hashes. The data was provided to HIBP by a source who requested
it be attributed to "breaches.net".

Breach date: 30 April 2022
Date added to HIBP: 24 May 2022
Compromised accounts: 112,251
Compromised data: Email addresses, Genders, Names, Partial dates of birth,
Passwords, Phone numbers, Physical addresses, Purchases, Social media profiles
Permalink

--------------------------------------------------------------------------------


FANTASY FOOTBALL HUB

In October 2021, the fantasy premier league (soccer) website Fantasy Football
Hub suffered a data breach that exposed 66 thousand unique email addresses. The
data included names, usernames, IP addresses, transactions and passwords stored
as WordPress MD5 hashes.

Breach date: 2 October 2021
Date added to HIBP: 7 October 2021
Compromised accounts: 66,479
Compromised data: Email addresses, IP addresses, Names, Passwords, Purchases,
Usernames
Permalink

--------------------------------------------------------------------------------


FASHION NEXUS

In July 2018, UK-based ecommerce company Fashion Nexus suffered a data breach
which exposed 1.4 million records. Multiple websites developed by sister company
White Room Solutions were impacted in the breach amongst which were sites
including Jaded London and AX Paris. The various sites exposed in the incident
included a range of different data types including names, phone numbers,
addresses and passwords stored as a mix of salted MD5 and SHA-1 as well as
unsalted MD5 passwords. When asked by reporter Graham Cluley if a public
statement on the incident was available, a one-word response of "No" was
received.

Breach date: 9 July 2018
Date added to HIBP: 31 July 2018
Compromised accounts: 1,279,263
Compromised data: Browser user agent details, Dates of birth, Email addresses,
Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses,
Purchases
Permalink

--------------------------------------------------------------------------------


FASHIONFANTASYGAME

In late 2016, the fashion gaming website Fashion Fantasy Game suffered a data
breach. The incident exposed 2.3 million unique user accounts and corresponding
MD5 password hashes with no salt. The data was contributed to Have I Been Pwned
courtesy of rip@creep.im.

Breach date: 1 December 2016
Date added to HIBP: 20 April 2017
Compromised accounts: 2,357,872
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


FILMAI.IN

In approximately 2019 or 2020, the Lithuanian movie streaming service Filmai.in
suffered a data breach exposing 645k email addresses, usernames and plain text
passwords.

Breach date: 1 January 2020
Date added to HIBP: 23 February 2021
Compromised accounts: 645,786
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FINAL FANTASY SHRINE

In September 2015, the Final Fantasy discussion forum known as FFShrine was
breached and the data dumped publicly. Approximately 620k records were released
containing email addresses, IP addresses and salted hashes of passwords.

Breach date: 18 September 2015
Date added to HIBP: 31 October 2015
Compromised accounts: 620,677
Compromised data: Email addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


FITMART

In October 2021, data from the German fitness supplies store Fitmart was
obtained and later redistributed online. The data included 214k unique email
addresses accompanied by plain text passwords, allegedly "dehashed" from the
original stored version.

Breach date: 1 October 2021
Date added to HIBP: 3 November 2023
Compromised accounts: 214,492
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


FLASH FLASH REVOLUTION (2016 BREACH)

In February 2016, the music-based rhythm game known as Flash Flash Revolution
was hacked and 1.8M accounts were exposed. Along with email and IP addresses,
the vBulletin forum also exposed salted MD5 password hashes.

Breach date: 1 February 2016
Date added to HIBP: 6 September 2016
Compromised accounts: 1,771,845
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FLASH FLASH REVOLUTION (2019 BREACH)

In July 2019, the music-based rhythm game Flash Flash Revolution suffered a data
breach. The 2019 breach imapcted almost 1.9 million members and is in addition
to the 2016 data breach of the same service. Email and IP addesses, usernames,
dates of birth and salted MD5 hashes were all exposed in the breach. The data
was provided with support from dehashed.com.

Breach date: 16 July 2019
Date added to HIBP: 21 July 2019
Compromised accounts: 1,858,124
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


FLASHBACK

In February 2015, the Swedish forum known as Flashback had sensitive internal
data on 40k members published via the tabloid newspaper Aftonbladet. The data
was allegedly sold to them via Researchgruppen (The Research Group) who have a
history of exposing otherwise anonymous users, primarily those who they believe
participate in "troll like" behaviour. The compromised data includes social
security numbers, home and email addresses.

Breach date: 11 February 2015
Date added to HIBP: 12 February 2015
Compromised accounts: 40,256
Compromised data: Email addresses, Government issued IDs, Physical addresses
Permalink

--------------------------------------------------------------------------------


FLEXBOOKER

In December 2021, the online booking service FlexBooker suffered a data breach
that exposed 3.7 million accounts. The data included email addresses, names,
phone numbers and for a small number of accounts, password hashes and partial
credit card data. FlexBooker has identified the breach as originating from a
compromised account within their AWS infrastructure. The data was found being
actively traded on a popular hacking forum and was provided to HIBP by a source
who requested it be attributed to "white_peacock@riseup.net".

Breach date: 23 December 2021
Date added to HIBP: 6 January 2022
Compromised accounts: 3,756,794
Compromised data: Email addresses, Names, Partial credit card data, Passwords,
Phone numbers
Permalink

--------------------------------------------------------------------------------


FLING

In 2011, the self-proclaimed "World's Best Adult Social Network" website known
as Fling was hacked and more than 40 million accounts obtained by the attacker.
The breached data included highly sensitive personal attributes such as sexual
orientation and sexual interests as well as email addresses and passwords stored
in plain text.

Breach date: 10 March 2011
Date added to HIBP: 28 May 2016
Compromised accounts: 40,767,652
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Passwords, Phone numbers, Sexual fetishes, Sexual
orientations, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


FLORIDA VIRTUAL SCHOOL

In March 2018, the Florida Virtual School (FLVS) posted a data breach
notification to their website. The school had identified a data breach which had
occurred sometime between 6 May 2016 and 12 Feb 2018 and an XML file containing
368k student records was subsequently found circulating. Each record contained
student name, date of birth, password, grade, email and parent email resulting
in a total of 543k unique email addresses. Due to the prevalence of email
addresses belonging to individuals who are still legally children, the data
breach has been flagged as "sensitive".

Breach date: 12 February 2018
Date added to HIBP: 18 March 2018
Compromised accounts: 542,902
Compromised data: Dates of birth, Email addresses, Names, Passwords, School
grades (class levels), Usernames
Permalink

--------------------------------------------------------------------------------


FOODORA

In April 2016, the online food delivery service Foodora suffered a data breach
which was then extensively redistributed online. The breach included the
personal information of hundreds of thousands of customers from multiple
countries including their names, delivery addresses, phone numbers and passwords
stored as either a salted MD5 or a bcrypt hash.

Breach date: 22 April 2016
Date added to HIBP: 16 June 2020
Compromised accounts: 582,578
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


FORBES

In February 2014, the Forbes website succumbed to an attack that leaked over 1
million user accounts. The attack was attributed to the Syrian Electronic Army,
allegedly as retribution for a perceived "Hate of Syria". The attack not only
leaked user credentials, but also resulted in the posting of fake news stories
to forbes.com.

Breach date: 15 February 2014
Date added to HIBP: 15 February 2014
Compromised accounts: 1,057,819
Compromised data: Email addresses, Passwords, User website URLs, Usernames
Permalink

--------------------------------------------------------------------------------


FORUMCOMMUNITY

In approximately mid-2016, the Italian-based service for creating forums known
as ForumCommunity suffered a data breach. The incident impacted over 776k unique
email addresses along with usernames and unsalted MD5 password hashes. No
response was received from ForumCommunity when contacted.

Breach date: 1 June 2016
Date added to HIBP: 5 December 2018
Compromised accounts: 776,648
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FOTOLOG

In December 2018, the photo sharing social network Fotolog suffered a data
breach that exposed 16.7 million unique email addresses. The data also included
usernames and unsalted SHA-256 password hashes. The site was dissolved the
following year and repurposed as a news website based in Brcko, Bosnia and
Herzegovina.

Breach date: 1 December 2018
Date added to HIBP: 15 June 2021
Compromised accounts: 16,717,854
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FOXY BINGO

In April 2007, the online gambling site Foxy Bingo was hacked and 252,000
accounts were obtained by the hackers. The breached records were subsequently
sold and traded and included personal information data such as plain text
passwords, birth dates and home addresses.

Breach date: 4 April 2008
Date added to HIBP: 22 November 2015
Compromised accounts: 252,216
Compromised data: Account balances, Browser user agent details, Dates of birth,
Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


FREEDOM HOSTING II

In January 2017, the free hidden service host Freedom Hosting II suffered a data
breach. The attack allegedly took down 20% of dark web sites running behind Tor
hidden services with the attacker claiming that of the 10,613 impacted sites,
more than 50% of the content was child pornography. The hack led to the exposure
of MySQL databases for the sites which included a vast amount of information on
the hidden services Freedom Hosting II was managing. The impacted data classes
far exceeds those listed for the breach and differ between the thousands of
impacted sites.

Breach date: 31 January 2017
Date added to HIBP: 5 February 2017
Compromised accounts: 380,830
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FRESHMENU

In July 2016, the India-based food delivery service FreshMenu suffered a data
breach. The incident exposed the personal data of over 110k customers and
included their names, email addresses, phone numbers, home addresses and order
histories. When advised of the incident, FreshMenu acknowledged being already
aware of the breach but stated they had decided not to notify impacted
customers.

Breach date: 1 July 2016
Date added to HIBP: 10 September 2018
Compromised accounts: 110,355
Compromised data: Device information, Email addresses, Names, Phone numbers,
Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


FRIDAE

In May 2014, over 25,000 user accounts were breached from the Asian lesbian,
gay, bisexual and transgender website known as "Fridae". The attack which was
announced on Twitter appears to have been orchestrated by Deletesec who claim
that "Digital weapons shall annihilate all secrecy within governments and
corporations". The exposed data included password stored in plain text.

Breach date: 2 May 2014
Date added to HIBP: 6 May 2014
Compromised accounts: 35,368
Compromised data: Email addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


FUNIMATION

In July 2016, the anime site Funimation suffered a data breach that impacted 2.5
million accounts. The data contained usernames, email addresses, dates of birth
and salted SHA1 hashes of passwords.

Breach date: 1 July 2016
Date added to HIBP: 20 February 2017
Compromised accounts: 2,491,103
Compromised data: Dates of birth, Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FUNNY GAMES

In April 2018, the online entertainment site Funny Games suffered a data breach
that disclosed 764k records including usernames, email and IP addresses and
salted MD5 password hashes. The incident was disclosed to Funny Games in July
who acknowledged the breach and identified it had been caused by legacy code no
longer in use. The record count in the breach constitute approximately half of
the user base.

Breach date: 28 April 2018
Date added to HIBP: 24 July 2018
Compromised accounts: 764,357
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


FUR AFFINITY

In May 2016, the Fur Affinity website for people with an interest in
anthropomorphic animal characters (also known as "furries") was hacked. The
attack exposed 1.2M email addresses (many accounts had a different "first" and
"last" email against them) and hashed passwords.

Breach date: 17 May 2016
Date added to HIBP: 27 May 2016
Compromised accounts: 1,270,564
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GAADI

In May 2015, the Indian motoring website known as Gaadi had 4.3 million records
exposed in a data breach. The data contained usernames, email and IP addresses,
genders, the city of users as well as passwords stored in both plain text and as
MD5 hashes. The site was previously reported as compromised on the Vigilante.pw
breached database directory.

Breach date: 14 May 2015
Date added to HIBP: 1 July 2018
Compromised accounts: 4,261,179
Compromised data: Email addresses, Genders, Geographic locations, IP addresses,
Names, Passwords, Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


GAB

In February 2021, the alt-tech social network service Gab suffered a data
breach. The incident exposed almost 70GB of data including 4M user accounts, a
small number of private chat logs and a list of public groups and public posts
made to the service. Only a small number of accounts included email addresses
and / or passwords stored as bcrypt hashes with a total of 66.5k unique email
addresses being exposed across the corpus of data.

Breach date: 26 February 2021
Date added to HIBP: 3 March 2021
Compromised accounts: 66,521
Compromised data: Avatars, Email addresses, Names, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


GAMERZPLANET

In approximately October 2015, the online gaming forum known as Gamerzplanet was
hacked and more than 1.2M accounts were exposed. The vBulletin forum included IP
addresses and passwords stored as salted hashes using a weak implementation
enabling many to be rapidly cracked.

Breach date: 23 October 2015
Date added to HIBP: 5 February 2016
Compromised accounts: 1,217,166
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GAMESALAD

In February 2019, the education and game creation website Game Salad suffered a
data breach. The incident impacted 1.5M accounts and exposed email addresses,
usernames, IP addresses and passwords stored as SHA-256 hashes. The data was
provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 24 February 2019
Date added to HIBP: 21 July 2019
Compromised accounts: 1,506,242
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GAMESPRITE

In December 2019, the now defunct gaming platform GameSprite suffered a data
breach that exposed over 6M unique email addresses. The impacted data also
included usernames, IP addresses and salted MD5 password hashes.

Breach date: 17 December 2019
Date added to HIBP: 30 October 2023
Compromised accounts: 6,164,643
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GAMETUTS

Likely in early 2015, the video game website GameTuts suffered a data breach and
over 2 million user accounts were exposed. The site later shut down in July 2016
but was identified as having been hosted on a vBulletin forum. The exposed data
included usernames, email and IP addresses and salted MD5 hashes.

Breach date: 1 March 2015
Date added to HIBP: 23 September 2016
Compromised accounts: 2,064,274
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GAMIGO

In March 2012, the German online game publisher Gamigo was hacked and more than
8 million accounts publicly leaked. The breach included email addresses and
passwords stored as weak MD5 hashes with no salt.

Breach date: 1 March 2012
Date added to HIBP: 18 January 2016
Compromised accounts: 8,243,604
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


GAMINGMONK

In December 2020, India's "largest esports community" GamingMonk (since acquired
by and redirected to MPL Esports), suffered a data breach. The incident exposed
655k unique email addresses along with names, usernames, phone numbers, dates of
birth and bcrypt password hashes.

Breach date: 2 December 2020
Date added to HIBP: 5 November 2023
Compromised accounts: 654,510
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Usernames
Permalink

--------------------------------------------------------------------------------


GATEHUB

In October 2019, 1.4M accounts from the cryptocurrency wallet service GateHub
were posted to a popular hacking forum. GateHub had previously acknowledged a
data breach in June, albeit with a smaller number of impacted accounts. Data
from the breach included email addresses, mnemonic phrases, encrypted master
keys, encrypted recovery keys and passwords stored as bcrypt hashes.

Breach date: 4 June 2019
Date added to HIBP: 20 November 2019
Compromised accounts: 1,408,078
Compromised data: Email addresses, Encrypted keys, Mnemonic phrases, Passwords
Permalink

--------------------------------------------------------------------------------


GAWKER

In December 2010, Gawker was attacked by the hacker collective "Gnosis" in
retaliation for what was reported to be a feud between Gawker and 4Chan.
Information about Gawkers 1.3M users was published along with the data from
Gawker's other web presences including Gizmodo and Lifehacker. Due to the
prevalence of password reuse, many victims of the breach then had their Twitter
accounts compromised to send Acai berry spam.

Breach date: 11 December 2010
Date added to HIBP: 4 December 2013
Compromised accounts: 1,247,574
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GE.TT

In May 2017, the file sharing platform Ge.tt suffered a data breach. The data
was subsequently put up for sale on a dark web marketplace in February 2019
alongside a raft of other breaches. The Ge.tt breach included names, social
media profile identifiers, SHA256 password hashes and almost 2.5M unique email
addresses. The data was provided to HIBP by a source who requested it be
attributed to BreachDirectory.

Breach date: 4 May 2017
Date added to HIBP: 16 February 2021
Compromised accounts: 2,481,121
Compromised data: Email addresses, Names, Passwords, Social media profiles
Permalink

--------------------------------------------------------------------------------


GEEKEDIN

In August 2016, the technology recruitment site GeekedIn left a MongoDB database
exposed and over 8M records were extracted by an unknown third party. The
breached data was originally scraped from GitHub in violation of their terms of
use and contained information exposed in public profiles, including over 1
million members' email addresses. Full details on the incident (including how
impacted members can see their leaked data) are covered in the blog post on 8
million GitHub profiles were leaked from GeekedIn's MongoDB - here's how to see
yours.

Breach date: 15 August 2016
Date added to HIBP: 17 November 2016
Compromised accounts: 1,073,164
Compromised data: Email addresses, Geographic locations, Names, Professional
skills, Usernames, Years of professional experience
Permalink

--------------------------------------------------------------------------------


GEMINI

In late 2022, data allegedly taken from the Gemini crypto exchange was posted to
a public hacking forum. The data consisted of email addresses and partial phone
numbers, which Gemini later attributed to an incident at a third-party vendor
(the vendor was not named). The data was provided to HIBP by a source who
requested it be attributed to "ZAN @ BF".

Breach date: 13 December 2022
Date added to HIBP: 16 December 2022
Compromised accounts: 5,274,214
Compromised data: Email addresses, Partial phone numbers
Permalink

--------------------------------------------------------------------------------


GEMPLEX

In February 2021, the Indian streaming platform Gemplex suffered a data breach
that exposed 4.6M user accounts. The impacted data included device information,
names, phone numbers, email addresses and bcrypt password hashes.

Breach date: 18 February 2021
Date added to HIBP: 9 December 2023
Compromised accounts: 4,563,166
Compromised data: Device information, Email addresses, Names, Passwords, Phone
numbers
Permalink

--------------------------------------------------------------------------------


GENESIS MARKET

In April 2023, the stolen identity marketplace Genesis Market was shut down by
the FBI and a coalition of law enforcement agencies across the globe in
"Operation Cookie Monster". The service traded in "browser fingerprints" which
enabled criminals to impersonate victims and access their online services. As
many of the impacted accounts did not include email addresses, "8M" is merely an
approximation intended to indicate scale. Other personal data compromised by the
service included names, addresses and credit card information, although not all
individuals had each of these fields exposed.

Breach date: 5 April 2023
Date added to HIBP: 5 April 2023
Compromised accounts: 8,000,000
Compromised data: Browser user agent details, Credit card CVV, Credit cards,
Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical
addresses, Usernames
Permalink

--------------------------------------------------------------------------------


GENIUSU

In November 2020, a collection of data breaches were made public including the
"Entrepreneur Success Platform", GeniusU. Dating back to the previous month, the
data included 1.3M names, email and IP addresses, genders, links to social media
profiles and passwords stored as bcrypt hashes. The data was provided to HIBP by
dehashed.com.

Breach date: 2 October 2020
Date added to HIBP: 8 January 2021
Compromised accounts: 1,301,460
Compromised data: Email addresses, Genders, IP addresses, Names, Passwords,
Social media profiles
Permalink

--------------------------------------------------------------------------------


GET REVENGE ON YOUR EX

In September 2022, the revenge website Get Revenge On Your Ex suffered a data
breach that exposed almost 80k unique email addresses. The data spanned both
customers and victims including names, IP and physical addresses, phone numbers,
purchase histories and plain text passwords. The data was subsequently shared on
a public hacking forum, Get Revenge On Your Ex did not reply when contacted.

Breach date: 9 September 2022
Date added to HIBP: 15 November 2022
Compromised accounts: 79,195
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone
numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


GFAN

In October 2016, data surfaced that was allegedly obtained from the Chinese
website known as GFAN and contained 22.5M accounts. Whilst there is evidence
that the data is legitimate, due to the difficulty of emphatically verifying the
Chinese breach it has been flagged as "unverified". The data in the breach
contains email and IP addresses, user names and salted and hashed passwords.
Read more about Chinese data breaches in Have I Been Pwned.

Breach date: 10 October 2016
Date added to HIBP: 10 October 2016
Compromised accounts: 22,526,334
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GGCORP

In August 2022, the MMORPG website GGCorp suffered a data breach that exposed
almost 2.4M unique email addresses. The data also included IP addresses,
usernames and MD5 password hashes.

Breach date: 11 August 2022
Date added to HIBP: 8 November 2022
Compromised accounts: 2,376,330
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GIVESENDGO

In February 2022, the Christian fundraising service GiveSendGo suffered a data
breach which exposed the personal data of 90k donors to the Canadian "Freedom
Convoy" protest against vaccine mandates. The breach exposed names, email
addresses, post codes, donation amount and comments left at the time of
donation.

Breach date: 7 February 2022
Date added to HIBP: 15 February 2022
Compromised accounts: 89,966
Compromised data: Email addresses, Geographic locations, Names, Purchases
Permalink

--------------------------------------------------------------------------------


GLOFOX

In March 2020, the Irish gym management software company Glofox suffered a data
breach which exposed 2.3M membership records. The data included email addresses,
names, phone numbers, genders, dates of birth and passwords stored as unsalted
MD5 hashes.

Breach date: 27 March 2020
Date added to HIBP: 10 January 2021
Compromised accounts: 2,330,735
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers
Permalink

--------------------------------------------------------------------------------


GO GAMES

In approximately October 2015, the manga website Go Games suffered a data
breach. The exposed data included 3.4M customer records including email and IP
addresses, usernames and passwords stored as salted MD5 hashes. Go Games did not
respond when contacted about the incident. The data was provided to HIBP by
dehashed.com.

Breach date: 24 October 2015
Date added to HIBP: 11 January 2020
Compromised accounts: 3,430,083
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GO NINJA

In December 2019, the now defunct German gaming website Go Ninja suffered a data
breach that exposed 5M unique email addresses. The impacted data included
usernames, email and IP addresses and salted MD5 password hashes. More than 4M
of the email addresses appeared to have been generated as opposed to organically
provided by the user.

Breach date: 17 December 2019
Date added to HIBP: 30 November 2023
Compromised accounts: 4,999,001
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GOLDSILVER

In October 2018, the bullion education and dealer services site GoldSilver
suffered a data breach that exposed 243k unique email addresses spanning
customers and mailing list subscribers. An extensive amount of personal
information on customers was obtained including names, addresses, phone numbers,
purchases and passwords and answers to security questions stored as MD5 hashes.
In a small number of cases, passport, social security numbers and partial credit
card data was also exposed. The data breach and source code belonging to
GoldSilver was publicly posted on a dark web service where it remained months
later. When notified about the incident, GoldSilver advised that "all affected
customers have been directly notified".

Breach date: 21 October 2018
Date added to HIBP: 27 December 2018
Compromised accounts: 242,715
Compromised data: Bank account numbers, Email addresses, IP addresses, Names,
Partial credit card data, Passport numbers, Phone numbers, Physical addresses,
Purchases, Security questions and answers, Social security numbers
Permalink

--------------------------------------------------------------------------------


GPOTATO

In July 2007, the multiplayer game portal known as gPotato (link to archive of
the site at that time) suffered a data breach and over 2 million user accounts
were exposed. The site later merged into the Webzen portal where the original
accounts still exist today. The exposed data included usernames, email and IP
addresses, MD5 hashes and personal attributes such as gender, birth date,
physical address and security questions and answers stored in plain text.

Breach date: 12 July 2007
Date added to HIBP: 24 September 2016
Compromised accounts: 2,136,520
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Passwords, Physical addresses, Security questions and answers, Usernames,
Website activity
Permalink

--------------------------------------------------------------------------------


GPS UNDERGROUND

In early 2017, GPS Underground was amongst a collection of compromised vBulletin
websites that were found being sold online. The breach dated back to mid-2016
and included 670k records with usernames, email and IP addresses, dates of birth
and salted MD5 password hashes.

Breach date: 1 July 2016
Date added to HIBP: 19 November 2019
Compromised accounts: 669,584
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


GRAVATAR

In October 2020, a security researcher published a technique for scraping large
volumes of data from Gravatar, the service for providing globally unique avatars
. 167 million names, usernames and MD5 hashes of email addresses used to
reference users' avatars were subsequently scraped and distributed within the
hacking community. 114 million of the MD5 hashes were cracked and distributed
alongside the source hash, thus disclosing the original email address and
accompanying data. Following the impacted email addresses being searchable in
HIBP, Gravatar release an FAQ detailing the incident.

Breach date: 3 October 2020
Date added to HIBP: 5 December 2021
Compromised accounts: 113,990,759
Compromised data: Email addresses, Names, Usernames
Permalink

--------------------------------------------------------------------------------


GTAGAMING

In August 2016, the Grand Theft Auto forum GTAGaming was hacked and nearly 200k
user accounts were leaked. The vBulletin based forum included usernames, email
addresses and password hashes.

Breach date: 1 August 2016
Date added to HIBP: 23 August 2016
Compromised accounts: 197,184
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


GUNAUCTION.COM

In December 2022, the online firearms auction website GunAuction.com suffered a
data breach which was later discovered left unprotected on the hacker's server.
The data included over 565k user records with extensive personal data including
email, IP and physical addresses, names, phone numbers, genders, years of birth,
credit card type and passwords stored in plain text. The leaked identities could
subsequently be matched to firearms listed for sale on the website.

Breach date: 3 December 2022
Date added to HIBP: 2 March 2023
Compromised accounts: 565,470
Compromised data: Browser user agent details, Email addresses, Genders, IP
addresses, Partial credit card data, Partial dates of birth, Passwords, Phone
numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


GUNS AND ROBOTS

In approximately April 2016, the gaming website Guns and Robots suffered a data
breach resulting in the exposure of 143k unique records. The data contained
email and IP addresses, usernames and SHA-1 password hashes. The site was
previously reported as compromised on the Vigilante.pw breached database
directory.

Breach date: 1 April 2016
Date added to HIBP: 14 February 2018
Compromised accounts: 143,569
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


GUNS.COM

In January 2021, the firearms website guns.com suffered a data breach. The
breach exposed 376k unique email addresses along with names, phone numbers,
physical addresses, gun purchases, partial credit card data, dates of birth and
passwords stored as bcrypt hashes.

Breach date: 12 January 2021
Date added to HIBP: 13 January 2022
Compromised accounts: 375,928
Compromised data: Dates of birth, Email addresses, Names, Partial credit card
data, Passwords, Phone numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


GUNTRADER

In July 2021, the United Kingdom based website Guntrader suffered a data breach
that exposed 112k unique email addresses. Extensive personal information was
also exposed including names, phone numbers, geolocation data, IP addresses and
various physical address attributes (cities for all users, complete addresses
for some). Passwords stored as bcrypt hashes were also exposed.

Breach date: 17 July 2021
Date added to HIBP: 21 July 2021
Compromised accounts: 112,031
Compromised data: Browser user agent details, Email addresses, Geographic
locations, IP addresses, Names, Passwords, Phone numbers, Physical addresses,
Salutations
Permalink

--------------------------------------------------------------------------------


HACKFORUMS.NET

In June 2011, the hacktivist group known as "LulzSec" leaked one final large
data breach they titled "50 days of lulz". The compromised data came from
sources such as AT&T, Battlefield Heroes and the hackforums.net website. The
leaked Hack Forums data included credentials and personal information of nearly
200,000 registered forum users.

Breach date: 25 June 2011
Date added to HIBP: 11 May 2014
Compromised accounts: 191,540
Compromised data: Dates of birth, Email addresses, Instant messenger identities,
IP addresses, Passwords, Social connections, Spoken languages, Time zones, User
website URLs, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


HACKING TEAM

In July 2015, the Italian security firm Hacking Team suffered a major data
breach that resulted in over 400GB of their data being posted online via a
torrent. The data searchable on "Have I Been Pwned?" is from 189GB worth of PST
mail folders in the dump. The contents of the PST files is searchable on
Wikileaks.

Breach date: 6 July 2015
Date added to HIBP: 12 July 2015
Compromised accounts: 32,310
Compromised data: Email addresses, Email messages
Permalink

--------------------------------------------------------------------------------


HATHWAY

In December 2023, hundreds of gigabytes of data allegedly taken from Indian ISP
and digital TV provider Hathway appeared on a popular hacking website. The
incident exposed extensive personal information including 4.7M unique email
addresses along with names, physical and IP addresses, phone numbers, password
hashes and support ticket logs.

Breach date: 17 December 2023
Date added to HIBP: 12 January 2024
Compromised accounts: 4,670,080
Compromised data: Device information, Email addresses, IP addresses, Names,
Passwords, Phone numbers, Physical addresses, Salutations, Support tickets
Permalink

--------------------------------------------------------------------------------


HAUTELOOK

In mid-2018, the fashion shopping site HauteLook was among a raft of sites that
were breached and their data then sold in early-2019. The data included over 28
million unique email addresses alongside names, genders, dates of birth and
passwords stored as bcrypt hashes. The data was provided to HIBP by
dehashed.com.

Breach date: 7 August 2018
Date added to HIBP: 21 March 2019
Compromised accounts: 28,510,459
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Names, Passwords
Permalink

--------------------------------------------------------------------------------


HAVENLY

In June 2020, the interior design website Havenly suffered a data breach which
impacted almost 1.4 million members of the service. The exposed data included
email addresses, names, phone numbers, geographic locations and passwords stored
as SHA-1 hashes, all of which was subsequently shared extensively throughout
online hacking communities. The data was provided to HIBP by dehashed.com.

Breach date: 25 June 2020
Date added to HIBP: 1 August 2020
Compromised accounts: 1,369,180
Compromised data: Email addresses, Geographic locations, Names, Passwords, Phone
numbers
Permalink

--------------------------------------------------------------------------------


HDB FINANCIAL SERVICES

In March 2023, the Indian non-bank lending unit HDB Financial Services suffered
a data breach that disclosed over 70M customer records. Containing 1.6M unique
email addresses, the breach also disclosed names, dates of birth, phone numbers,
genders, post codes and loan information belonging to the customers.

Breach date: 22 February 2023
Date added to HIBP: 11 March 2023
Compromised accounts: 1,658,750
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Loan information, Names, Phone numbers
Permalink

--------------------------------------------------------------------------------


HEALTH NOW NETWORKS

In March 2017, the telemarketing service Health Now Networks left a database
containing hundreds of thousands of medical records exposed. There were over
900,000 records in total containing significant volumes of personal information
including names, dates of birth, various medical conditions and operator notes
on the individuals' health. The data included over 320k unique email addresses.

Breach date: 25 March 2017
Date added to HIBP: 7 April 2017
Compromised accounts: 321,920
Compromised data: Dates of birth, Email addresses, Genders, Health insurance
information, IP addresses, Names, Personal health data, Phone numbers, Physical
addresses, Security questions and answers, Social connections
Permalink

--------------------------------------------------------------------------------


HEMMAKVÄLL

In July 2015, the Swedish video store chain Hemmakväll was hacked and nearly 50k
records dumped publicly. The disclosed data included various attributes of their
customers including email and physical addresses, names and phone numbers.
Passwords were also leaked, stored with a weak MD5 hashing algorithm.

Breach date: 8 July 2015
Date added to HIBP: 9 July 2015
Compromised accounts: 47,297
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


HEMMELIG.COM

In December 2011, Norway's largest online sex shop hemmelig.com was hacked by a
collective calling themselves "Team Appunity". The attack exposed over 28,000
usernames and email addresses along with nicknames, gender, year of birth and
unsalted MD5 password hashes.

Breach date: 21 December 2011
Date added to HIBP: 25 March 2014
Compromised accounts: 28,641
Compromised data: Email addresses, Genders, Nicknames, Partial dates of birth,
Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


HEROES OF GAIA

In early 2013, the online fantasy multiplayer game Heroes of Gaia suffered a
data breach. The newest records in the data set indicate a breach date of 4
January 2013 and include usernames, IP and email addresses but no passwords.

Breach date: 4 January 2013
Date added to HIBP: 7 November 2016
Compromised accounts: 179,967
Compromised data: Browser user agent details, Email addresses, IP addresses,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


HEROES OF NEWERTH

In December 2012, the multiplayer online battle arena game known as Heroes of
Newerth was hacked and over 8 million accounts extracted from the system. The
compromised data included usernames, email addresses and passwords.

Breach date: 17 December 2012
Date added to HIBP: 24 January 2016
Compromised accounts: 8,089,103
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


HIAPK

In approximately 2014, it's alleged that the Chinese Android store known as
HIAPK suffered a data breach that impacted 13.8 million unique subscribers.
Whilst there is evidence that the data is legitimate, due to the difficulty of
emphatically verifying the Chinese breach it has been flagged as "unverified".
The data in the breach contains usernames, email addresses and salted MD5
password hashes and was provided to HIBP by white hat security researcher and
data analyst Adam Davies. Read more about Chinese data breaches in Have I Been
Pwned.

Breach date: 1 January 2014
Date added to HIBP: 1 April 2018
Compromised accounts: 13,873,674
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


HJEDD

In July 2022, the Chinese adult website Hjedd was found to be leaking more than
13M customer records which subsequently appeared on a popular hacking forum. The
exposed data included email and IP addresses, usernames and passwords stored as
bcrypt hashes.

Breach date: 18 July 2022
Date added to HIBP: 5 October 2023
Compromised accounts: 13,204,029
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


HLTV

In June 2016, the "home of competitive Counter Strike" website HLTV was hacked
and 611k accounts were exposed. The attack led to the exposure of names,
usernames, email addresses and bcrypt hashes of passwords.

Breach date: 19 June 2016
Date added to HIBP: 22 March 2017
Compromised accounts: 611,070
Compromised data: Email addresses, Names, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


HOME CHEF

In early 2020, the food delivery service Home Chef suffered a data breach which
was subsequently sold online. The breach exposed the personal information of
almost 9 million customers including names, IP addresses, post codes, the last 4
digits of credit card numbers and passwords stored as bcrypt hashes. The data
was provided to HIBP by dehashed.com.

Breach date: 10 February 2020
Date added to HIBP: 13 November 2020
Compromised accounts: 8,815,692
Compromised data: Email addresses, Geographic locations, IP addresses, Names,
Partial credit card data, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


HONGFIRE

In March 2015, the anime and manga forum HongFire suffered a data breach. The
hack of their vBulletin forum led to the exposure of 1 million accounts along
with email and IP addresses, usernames, dates of birth and salted MD5 passwords.

Breach date: 1 March 2015
Date added to HIBP: 5 February 2017
Compromised accounts: 999,991
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


HOOKERS.NL

In October 2019, the Dutch prostitution forum Hookers.nl suffered a data breach
which exposed the personal information of sex workers and their customers. The
IP and email addresses, usernames and either bcrypt or salted MD5 password
hashes of 291k members were accessed via an unpatched vulnerability in the
vBulletin forum software.

Breach date: 10 October 2019
Date added to HIBP: 23 October 2019
Compromised accounts: 290,955
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


HORSE ISLE

In June 2020 then again in September that same year, Horse Isle "The Secrent
Land of Horses" suffered a data breach. The incident exposed 28k unique email
addresses along with names, usernames, IP addresses, genders, purchases and
plain text passwords. The system also stored and exposed failed password
attempts for each user with the password retained in plain text.

Breach date: 19 September 2020
Date added to HIBP: 2 October 2023
Compromised accounts: 27,786
Compromised data: Email addresses, Genders, IP addresses, Names, Passwords,
Purchases, Usernames
Permalink

--------------------------------------------------------------------------------


HOUNDDAWGS

In December 2017, the Danish torrent tracker known as HoundDawgs suffered a data
breach. More than 55GB of data was dumped publicly and whilst there was
initially contention as to the severity of the incident, the data did indeed
contain more than 45k unique email addresses complete extensive logs of
torrenting activity, IP addresses and SHA1 passwords.

Breach date: 30 December 2017
Date added to HIBP: 3 January 2018
Compromised accounts: 45,701
Compromised data: Email addresses, IP addresses, Passwords, Website activity
Permalink

--------------------------------------------------------------------------------


HOUZZ

In mid-2018, the housing design website Houzz suffered a data breach. The
company learned of the incident later that year then disclosed it to impacted
members in February 2019. Almost 49 million unique email addresses were in the
breach alongside names, IP addresses, geographic locations and either salted
hashes of passwords or links to social media profiles used to authenticate to
the service. The data was provided to HIBP by dehashed.com.

Breach date: 23 May 2018
Date added to HIBP: 12 March 2019
Compromised accounts: 48,881,308
Compromised data: Email addresses, Geographic locations, IP addresses, Names,
Passwords, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


HTC MANIA

In January 2020, the Spanish mobile phone forum HTC Mania suffered a data breach
of the vBulletin based site. The incident exposed 1.5M member email addresses,
usernames, IP addresses, dates of birth and salted MD5 password hashes and
password histories. Data from the breach was subsequently redistributed on
popular hacking websites.

Breach date: 4 January 2020
Date added to HIBP: 6 April 2020
Compromised accounts: 1,488,089
Compromised data: Dates of birth, Email addresses, Historical passwords, IP
addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


HTH STUDIOS

In August 2018, the adult furry interactive game creator HTH Studios suffered a
data breach impacting multiple repositories of customer data. Several months
later, the data surfaced on a popular hacking forum and included 411k unique
email addresses along with physical and IP addresses, names, orders, salted
SHA-1 and salted MD5 hashes. HTH Studios is aware of the incident.

Breach date: 24 August 2018
Date added to HIBP: 20 November 2018
Compromised accounts: 411,755
Compromised data: Browser user agent details, Dates of birth, Email addresses,
IP addresses, Names, Phone numbers, Physical addresses, Purchases, Usernames
Permalink

--------------------------------------------------------------------------------


HUB4TECH

On an unknown date in approximately 2017, the Indian training and assessment
service known as Hub4Tech suffered a data breach via a SQL injection attack. The
incident exposed almost 37k unique email addresses and passwords stored as
unsalted MD5 hashes. No response was received from Hub4Tech when contacted about
the incident.

Breach date: 1 January 2017
Date added to HIBP: 9 December 2018
Compromised accounts: 36,916
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


HURB

In approximately March 2019, the online Brazilian travel agency Hurb (formerly
Hotel Urbano) suffered a data breach. The data subsequently appeared online for
download the following year and included over 20 million customer records with
email and IP addresses, names, dates of birth, phone numbers and passwords
stored as unsalted MD5 hashes. The data was provided to HIBP by dehashed.com.

Breach date: 14 March 2019
Date added to HIBP: 27 July 2020
Compromised accounts: 20,727,771
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Phone numbers, Social media profiles
Permalink

--------------------------------------------------------------------------------


ID TECH

In February 2023, the tech camps for kids service iD Tech had almost 1M records
posted to a popular hacking forum. The data included 415k unique email
addresses, names, dates of birth and plain text passwords which appear to have
been breached in the previous month. iD Tech did not respond to multiple
attempts to report the incident.

Breach date: 3 January 2023
Date added to HIBP: 6 March 2023
Compromised accounts: 415,121
Compromised data: Dates of birth, Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


IDC GAMES

In March 2021, 4 million records sourced from IDC Games were shared on a public
hacking forum. The data included usernames, email addresses and passwords stored
as salted MD5 hashes.

Breach date: 15 March 2021
Date added to HIBP: 17 November 2021
Compromised accounts: 3,966,871
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


I-DRESSUP

In June 2016, the teen social site known as i-Dressup was hacked and over 2
million user accounts were exposed. At the time the hack was reported, the
i-Dressup operators were not contactable and the underlying SQL injection flaw
remained open, allegedly exposing a total of 5.5 million accounts. The breach
included email addresses and passwords stored in plain text.

Breach date: 15 July 2016
Date added to HIBP: 26 September 2016
Compromised accounts: 2,191,565
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


IIMJOBS

In December 2018, the Indian job portal IIMJobs suffered a data breach that
exposed 4.1 million unique email addresses. The data also included names, phone
numbers, geographic locations, dates of birth, job titles, job applications and
cover letters plus passwords stored as unsalted MD5 hashes. The data was
provided to HIBP by dehashed.com.

Breach date: 31 December 2018
Date added to HIBP: 21 May 2021
Compromised accounts: 4,216,063
Compromised data: Dates of birth, Email addresses, Geographic locations, IP
addresses, Job applications, Job titles, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


ILIKECHEATS

In October 2014, the game cheats website known as ILikeCheats suffered a data
breach that exposed 189k accounts. The vBulletin based forum leaked usernames,
IP and email addresses and weak MD5 hashes of passwords. The data was provided
with support from dehashed.com.

Breach date: 18 October 2014
Date added to HIBP: 22 April 2018
Compromised accounts: 188,847
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


IMAVEX

In August 2021, the website development company Imavex suffered a data breach
that exposed 878 thousand unique email addresses. The data included user records
containing names, usernames and password material with some records also
containing genders and partial credit card data, including the last 4 digits of
the card and expiry date. Hundreds of thousands of form submissions and orders
via Imavex customers were also exposed and contained further personal
information of submitters and the contents of the form.

Breach date: 20 August 2021
Date added to HIBP: 26 August 2021
Compromised accounts: 878,209
Compromised data: Email addresses, Genders, Names, Partial credit card data,
Passwords, Phone numbers, Physical addresses, Purchases, Usernames
Permalink

--------------------------------------------------------------------------------


IMENU360

In approximately late 2022, 3.4M customer records from iMenu360 ("The world's #1
most trusted online ordering platform") were exposed. The data appeared to be
from ordering systems using the platform and contained email and physical
addresses, latitudes and longitudes, names and phone numbers. Numerous attempts
were made to contact iMenu360 about the incident between April and August 2023,
but no response was received.

Breach date: 11 August 2022
Date added to HIBP: 17 August 2023
Compromised accounts: 3,425,860
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


IMESH

In September 2013, the media and file sharing client known as iMesh was hacked
and approximately 50M accounts were exposed. The data was later put up for sale
on a dark market website in mid-2016 and included email and IP addresses,
usernames and salted MD5 hashes.

Breach date: 22 September 2013
Date added to HIBP: 2 July 2016
Compromised accounts: 49,467,477
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


IMGUR

In September 2013, the online image sharing community imgur suffered a data
breach. A selection of the data containing 1.7 million email addresses and
passwords surfaced more than 4 years later in November 2017. Although imgur
stored passwords as SHA-256 hashes, the data in the breach contained plain text
passwords suggesting that many of the original hashes had been cracked. imgur
advises that they rolled over to bcrypt hashes in 2016.

Breach date: 1 September 2013
Date added to HIBP: 25 November 2017
Compromised accounts: 1,749,806
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


INDIAMART

In August 2021, 38 million records from Indian e-commerce company IndiaMART were
found being traded on a popular hacking forum. Dated several months earlier, the
data included over 20 million unique email addresses alongside names, phone
numbers and physical addresses. It's unclear whether IndiaMART intentionally
exposed the data attributes as part of the intended design of the platform or
whether the data was obtained by exploiting a vulnerability in the service.

Breach date: 23 May 2021
Date added to HIBP: 27 August 2021
Compromised accounts: 20,154,583
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


INDIAN RAILWAYS

In November 2019, the website for Indian Rail left more than 2M records exposed
on an unprotected Firebase database instance. The exposed data included 583k
unique email addresses alongside usernames and passwords stored in plain text.

Breach date: 28 October 2019
Date added to HIBP: 10 January 2020
Compromised accounts: 583,377
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


INDIHOME

In mid-2021, reports emerged of a data breach of Indonesia's telecommunications
company, IndiHome. Over 26M rows of data alleged to have been sourced from the
company was posted to a popular hacking forum and contained 12.6M unique email
addresses alongside names, IP addresses, genders and geographic locations. The
most recent data was stamped as being recorded in November 2019.

Breach date: 1 November 2019
Date added to HIBP: 27 November 2023
Compromised accounts: 12,629,245
Compromised data: Device information, Email addresses, Genders, Geographic
locations, IP addresses, Names
Permalink

--------------------------------------------------------------------------------


INFLATEVIDS

In December 2023, the inflatable and balloon fetish videos website InflateVids
suffered a data breach. The incident exposed over 13k unique email addresses
alongside usernames, IP addresses, genders and SHA-1 password hashes.

Breach date: 12 December 2023
Date added to HIBP: 12 December 2023
Compromised accounts: 13,405
Compromised data: Email addresses, Genders, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


INSANELYI

In July 2014, the iOS forum Insanelyi was hacked by an attacker known as Kim
Jong-Cracks. A popular source of information for users of jailbroken iOS devices
running Cydia, the Insanelyi breach disclosed over 104k users' emails addresses,
user names and weakly hashed passwords (salted MD5).

Breach date: 22 July 2014
Date added to HIBP: 22 July 2014
Compromised accounts: 104,097
Compromised data: Email addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


INSTANT CHECKMATE

In 2019, the public records search service Instant Checkmate suffered a data
breach that later came to light in early 2023. The data included almost 12M
unique customer email addresses, names, phone numbers and passwords stored as
scrypt hashes.

Breach date: 12 April 2019
Date added to HIBP: 4 February 2023
Compromised accounts: 11,943,887
Compromised data: Email addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


INTELIMOST

In March 2019, a spam operation known as "Intelimost" sent millions of emails
appearing to come from people the recipients knew. Security researcher Bob
Diachenko found over 3 million unique email addresses in an exposed
Elasticsearch database, alongside plain text passwords used to access the
victim's mailbox and customise the spam.

Breach date: 10 March 2019
Date added to HIBP: 2 April 2019
Compromised accounts: 3,073,409
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


INTERPALS

In late 2015, the online penpal site InterPals had their website hacked and 3.4
million accounts exposed. The compromised data included email addresses,
geographical locations, birthdates and salted hashes of passwords.

Breach date: 4 November 2015
Date added to HIBP: 30 August 2016
Compromised accounts: 3,439,414
Compromised data: Dates of birth, Email addresses, Geographic locations, Names,
Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


IPMART

During 2015, the iPmart forum (now known as Mobi NUKE) was hacked and over 2
million forum members' details were exposed. The vBulletin forum included IP
addresses, birth dates and passwords stored as salted hashes using a weak
implementation enabling many to be rapidly cracked. A further 368k accounts were
added to "Have I Been Pwned" in March 2016 bringing the total to over 2.4M.

Breach date: 1 July 2015
Date added to HIBP: 23 February 2016
Compromised accounts: 2,460,787
Compromised data: Dates of birth, Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


IXIGO

In January 2019, the travel and hotel booking site ixigo suffered a data breach.
The data appeared for sale on a dark web marketplace the following month and
included over 17M unique email addresses alongside names, genders, phone
numbers, connections to Facebook profiles and passwords stored as MD5 hashes.
The data was provided to HIBP by a source who requested it to be attributed to
"BenjaminBlue@exploit.im".

Breach date: 3 January 2019
Date added to HIBP: 17 March 2019
Compromised accounts: 17,204,697
Compromised data: Auth tokens, Device information, Email addresses, Genders,
Names, Passwords, Phone numbers, Salutations, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


JAM TANGAN

In July 2021, the online Indonesian watch store, Jam Tangan (AKA Machtwatch),
suffered a data breach that exposed over 400k customer records which were
subsequently posted to a popular hacking forum. The data included email and IP
addresses, names, phone numbers, physical addresses and passwords stored as
either unsalted MD5 or bcrypt hashes.

Breach date: 6 July 2021
Date added to HIBP: 27 November 2023
Compromised accounts: 434,784
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


JAMES

In June 2020, 14 previously undisclosed data breaches appeared for sale
including the Brazilian delivery service, "James". The breach occurred in March
2020 and exposed 1.5M unique email addresses, customer locations expressed in
longitude and latitude and passwords stored as bcrypt hashes. The data was
provided to HIBP by dehashed.com.

Breach date: 25 March 2020
Date added to HIBP: 5 November 2020
Compromised accounts: 1,541,284
Compromised data: Email addresses, Geographic locations, Passwords
Permalink

--------------------------------------------------------------------------------


JD

In 2013 (exact date unknown), the Chinese e-commerce service JD suffered a data
breach that exposed 13GB of data containing 77 million unique email addresses.
The data also included usernames, phone numbers and passwords stored as SHA-1
hashes. The data was provided to HIBP by a source who requested it be attributed
to "white_peacock@riseup.net".

Breach date: 1 January 2013
Date added to HIBP: 2 June 2021
Compromised accounts: 77,449,341
Compromised data: Email addresses, Passwords, Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


JD GROUP

In May 2023, the South African retailer JD Group announced a data breach
affecting a number of their online assets including Bradlows, Everyshop, HiFi
Corp, Incredible (Connection), Rochester, Russells, and Sleepmasters. The breach
exposed over 520k unique customer records including names, email and physical
addresses, phone numbers and South African ID numbers.

Breach date: 31 May 2023
Date added to HIBP: 5 June 2023
Compromised accounts: 521,878
Compromised data: Email addresses, Government issued IDs, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


JEFIT

In August 2020, the workout tracking app Jefit suffered a data breach. The data
was subsequently sold within the hacking community and included over 9 million
email and IP addresses, usernames and passwords stored as either vBulletin or
argon2 hashes. Several million cracked passwords later appeared in broad
circulation.

Breach date: 11 August 2020
Date added to HIBP: 27 April 2021
Compromised accounts: 9,052,457
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


JOBANDTALENT

In approximately February 2018, the employment website Jobandtalent suffered a
data breach which then appeared for sale alongside other breaches a year later.
The incident impacted 11 million subscribers and exposed their names, email and
IP addresses and passwords stored as salted SHA-1 hashes.

Breach date: 1 February 2018
Date added to HIBP: 17 January 2021
Compromised accounts: 10,981,207
Compromised data: Email addresses, IP addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


JOBSTREET

In October 2017, the Malaysian website lowyat.net ran a story on a massive set
of breached data affecting millions of Malaysians after someone posted it for
sale on their forums. The data spanned multiple separate breaches including the
JobStreet jobs website which contained almost 4 million unique email addresses.
The dates in the breach indicate the incident occurred in March 2012. The data
later appeared freely downloadable on a Tor hidden service and contained
extensive information on job seekers including names, genders, birth dates,
phone numbers, physical addresses and passwords.

Breach date: 7 March 2012
Date added to HIBP: 30 October 2017
Compromised accounts: 3,883,455
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Government issued IDs, Marital statuses, Names, Nationalities,
Passwords, Phone numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


JOBZONE

In April 2023, data from the Israeli jobs website Jobzone was posted online. The
data included 30k records of email addresses, names, social security numbers,
genders, dates of birth, fathers' names and physical addresses.

Breach date: 15 April 2023
Date added to HIBP: 15 August 2023
Compromised accounts: 29,708
Compromised data: Dates of birth, Email addresses, Family members' names,
Genders, Government issued IDs, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


JOOMLART

In January 2018, the Joomla template website JoomlArt inadvertently exposed more
than 22k unique customer records in a Jira ticket. The exposed data was from
iJoomla and JomSocial, both services that JoomlArt acquired the previous year.
The data included usernames, email addresses, purchases and passwords stored as
MD5 hashes. When contacted, JoomlArt advised they were aware of the incident and
had previously notified impacted parties.

Breach date: 30 January 2018
Date added to HIBP: 1 November 2018
Compromised accounts: 22,477
Compromised data: Email addresses, Names, Passwords, Payment histories,
Usernames
Permalink

--------------------------------------------------------------------------------


JOYGAMES

In December 2019, the forum for the JoyGames website suffered a data breach that
exposed 4.5M unique email addresses. The impacted data also included usernames,
IP addresses and salted MD5 password hashes.

Breach date: 14 December 2019
Date added to HIBP: 7 December 2023
Compromised accounts: 4,461,787
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


JUKINMEDIA

In October 2021, the "global leader in user-generated entertainment" Jukin Media
suffered a data breach. The breach exposed 13GB of code, configuration and data
consisting of 314k unique email addresses along with names, phone numbers, IP
addresses and bcrypt password hashes.

Breach date: 28 October 2021
Date added to HIBP: 17 July 2022
Compromised accounts: 314,290
Compromised data: Email addresses, Employers, IP addresses, Names, Occupations,
Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


JUSTDATE.COM

An alleged breach of the dating website Justdate.com began circulating in
approximately September 2016. Comprised of over 24 million records, the data
contained various personal attributes such as email addresses, dates of birth
and physical locations. However, upon verification with HIBP subscribers, only a
fraction of the data was found to be accurate and no account owners recalled
using the Justdate.com service. This breach has consequently been flagged as
fabricated; it's highly unlikely the data was sourced from Justdate.com.

Breach date: 29 September 2016
Date added to HIBP: 7 February 2017
Compromised accounts: 24,451,312
Compromised data: Dates of birth, Email addresses, Geographic locations, Names
Permalink

--------------------------------------------------------------------------------


KANEVA

In July 2016, now defunct website Kaneva, the service to "build and explore
virtual worlds", suffered a data breach that exposed 3.9M user records. The data
included email addresses, usernames, dates of birth and salted MD5 password
hashes.

Breach date: 1 July 2016
Date added to HIBP: 9 December 2023
Compromised accounts: 3,901,179
Compromised data: Dates of birth, Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


KAYO.MOE CREDENTIAL STUFFING LIST

In September 2018, a collection of almost 42 million email address and plain
text password pairs was uploaded to the anonymous file sharing service kayo.moe.
The operator of the service contacted HIBP to report the data which, upon
further investigation, turned out to be a large credential stuffing list. For
more information, read about The 42M Record kayo.moe Credential Stuffing Data.

Breach date: 11 September 2018
Date added to HIBP: 13 September 2018
Compromised accounts: 41,826,763
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


KICKSTARTER

In February 2014, the crowdfunding platform Kickstarter announced they'd
suffered a data breach. The breach contained almost 5.2 million unique email
addresses, usernames and salted SHA1 hashes of passwords.

Breach date: 16 February 2014
Date added to HIBP: 6 October 2017
Compromised accounts: 5,176,463
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


KIMSUFI

In mid-2015, the forum for the providers of affordable dedicated servers known
as Kimsufi suffered a data breach. The vBulletin forum contained over half a
million accounts including usernames, email and IP addresses and passwords
stored as salted MD5 hashes.

Breach date: 1 May 2015
Date added to HIBP: 27 December 2016
Compromised accounts: 504,565
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


KITCHENPAL

In November 2023, the kitchen management application KitchenPal suffered a data
breach that exposed 146k lines of data. When contacted about the incident,
KitchenPal advised the corpus of data came from a staging environment, although
acknowledged it contained a small number of users for debugging purposes and
included passwords that could not be used. Impacted data included almost 100k
email addresses, names, geolocations and incomplete data on dates of birth,
genders, height and weight, social media profile identifiers and bcrypt password
hashes.

Breach date: 14 November 2023
Date added to HIBP: 24 November 2023
Compromised accounts: 98,726
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Names, Passwords, Physical attributes, Social media profiles
Permalink

--------------------------------------------------------------------------------


KIWIFARMS

In September 2019, the forum for discussing "lolcows" (people who can be milked
for laughs) Kiwi Farms suffered a data breach. The disclosure notice advised
that email and IP addresses, dates of birth and content created by members were
all exposed in the incident.

Breach date: 10 September 2019
Date added to HIBP: 17 September 2019
Compromised accounts: 4,606
Compromised data: Avatars, Dates of birth, Email addresses, IP addresses,
Website activity
Permalink

--------------------------------------------------------------------------------


KM.RU

In February 2016, the Russian portal and email service KM.RU was the target of
an attack which was consequently detailed on Reddit. Allegedly protesting "the
foreign policy of Russia in regards to Ukraine", KM.RU was one of several
Russian sites in the breach and impacted almost 1.5M accounts including
sensitive personal information.

Breach date: 29 February 2016
Date added to HIBP: 3 March 2016
Compromised accounts: 1,476,783
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Recovery email addresses, Security questions and answers, Usernames
Permalink

--------------------------------------------------------------------------------


KNOWNCIRCLE

In approximately April 2016, the "marketing automation for agents and
professional service providers" company KnownCircle had a large volume of data
obtained by an external party. The data belonging to the now defunct service
appeared in JSON format and contained gigabytes of data related to the real
estate and insurance sectors. The personal data in the breach appears to have
primarily been used for marketing purposes, including logs of emails sent and
tracking of gift cards. A small number of passwords for KnownCircle staff were
also present and were stored as bcrypt hashes.

Breach date: 12 April 2016
Date added to HIBP: 17 November 2018
Compromised accounts: 1,957,600
Compromised data: Email addresses, Email messages, Genders, Names, Passwords,
Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


KNUDDELS

In September 2018, the German social media website Knuddels suffered a data
breach. The incident exposed 808k unique email addresses alongside usernames,
real names, the city of the person and their password in plain text. Knuddels
was subsequently fined €20k for the breach.

Breach date: 5 September 2018
Date added to HIBP: 8 April 2019
Compromised accounts: 808,330
Compromised data: Email addresses, Geographic locations, Names, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


KOMPLETTFRITID

In January 2023, the online Norwegian store KomplettFritid was reported as
having had a data breach dating back to February 2021. The incident exposed 140k
customer records including physical, email and IP addresses, names, phone
numbers and passwords. Most passwords were stored as bcrypt hashes with a small
number appearing in plain text.

Breach date: 1 February 2021
Date added to HIBP: 23 January 2023
Compromised accounts: 139,401
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


KREDITPLUS

In June 2020, the Indonesian credit service Kreditplus suffered a data breach
which exposed 896k records containing 769k unique email addresses. The breach
exposed extensive personal information including names, family makeup,
information on spouses, income and expenses, religions and employment
information. The data was provided to HIBP by breachbase.pw.

Breach date: 23 June 2020
Date added to HIBP: 3 August 2020
Compromised accounts: 768,890
Compromised data: Dates of birth, Email addresses, Employers, Family structure,
Genders, Income levels, Living costs, Marital statuses, Mothers maiden names,
Names, Phone numbers, Physical addresses, Places of birth, Religions, Spouses
names
Permalink

--------------------------------------------------------------------------------


LA POSTE MOBILE

In July 2022, the French telecommunications company La Poste Mobile was the
target of an attack by the LockBit ransomware which resulted in company data
being published publicly. The impacted data included 533k unique email addresses
along with names, physical addresses, phone numbers, dates of births, genders
and banking information. 10 days after the attack, the La Poste Mobile website
remained offline.

Breach date: 4 July 2022
Date added to HIBP: 14 July 2022
Compromised accounts: 533,886
Compromised data: Bank account numbers, Dates of birth, Email addresses,
Genders, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


LANWAR

In July 2018, staff of the Lanwar gaming site discovered a data breach they
believe dates back to sometime over the previous several months. The data
contained 45k names, email addresses, usernames and plain text passwords. A
Lanwar staff member self-submitted the breach to HIBP and has also contacted the
relevant authorities about the incident after identifying a phishing attempt to
extort Bitcoin from a user.

Breach date: 28 July 2018
Date added to HIBP: 8 August 2018
Compromised accounts: 45,120
Compromised data: Email addresses, Names, Passwords, Physical addresses,
Usernames
Permalink

--------------------------------------------------------------------------------


LAST.FM

In March 2012, the music website Last.fm was hacked and 43 million user accounts
were exposed. Whilst Last.fm knew of an incident back in 2012, the scale of the
hack was not known until the data was released publicly in September 2016. The
breach included 37 million unique email addresses, usernames and passwords
stored as unsalted MD5 hashes.

Breach date: 22 March 2012
Date added to HIBP: 20 September 2016
Compromised accounts: 37,217,682
Compromised data: Email addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


LAZADA REDMART

In October 2020, news broke of Lazada RedMart data breach containing records as
recent as July 2020 and being sold via an online marketplace. In all, the data
contained 1.1 million customer email addresses alongside names, phone numbers,
physical addresses, partial credit card numbers and passwords stored as SHA-1
hashes.

Breach date: 30 July 2020
Date added to HIBP: 10 November 2020
Compromised accounts: 1,107,789
Compromised data: Email addresses, Names, Partial credit card data, Passwords,
Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


LBB

In August 2022, customer data of the Indian shopping site "LBB" (Little Black
Book) was posted to a popular hacking forum. The data contained over 3M records
with 39k unique email addresses alongside IP and physical addresses, names and
device information with the most recent data dating back to early 2019. LBB
advised they believe the data was exposed by a third party service and whilst it
contained information they retain on their customers, it had also been enriched
with additional data attributes.

Breach date: 14 February 2019
Date added to HIBP: 5 March 2023
Compromised accounts: 39,288
Compromised data: Browser user agent details, Email addresses, IP addresses,
Names, Physical addresses
Permalink

--------------------------------------------------------------------------------


LEAD HUNTER

In March 2020, a massive trove of personal information referred to as "Lead
Hunter" was provided to HIBP after being found left exposed on a publicly facing
Elasticsearch server. The data contained 69 million unique email addresses
across 110 million rows of data accompanied by additional personal information
including names, phone numbers, genders and physical addresses. At the time of
publishing, the breach could not be attributed to those responsible for
obtaining and exposing it. The data was provided to HIBP by dehashed.com.

Breach date: 4 March 2020
Date added to HIBP: 3 June 2020
Compromised accounts: 68,693,853
Compromised data: Email addresses, Genders, IP addresses, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


LEAGUE OF LEGENDS

In June 2012, the multiplayer online game League of Legends suffered a data
breach. At the time, the service had more than 32 million registered accounts
and the breach affected various personal data attributes including "encrypted"
passwords. In 2018, a 339k record subset of the data emerged with email
addresses, usernames and plain text passwords, likely cracked from the original
cryptographically protected ones.

Breach date: 11 June 2012
Date added to HIBP: 28 July 2018
Compromised accounts: 339,487
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LEAKED REALITY

In January 2022, the now defunct uncensored video website Leaked Reality
suffered a data breach that exposed 115k unique email addresses. The data also
included usernames, IP addresses and passwords stored as either MD5 or phpass
hashes.

Breach date: 31 January 2022
Date added to HIBP: 31 March 2023
Compromised accounts: 114,907
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LEDGER

In June 2020, the hardware crypto wallet manufacturer Ledger suffered a data
breach that exposed over 1 million email addresses. The data was initially sold
before being dumped publicly in December 2020 and included names, physical
addresses and phone numbers. The data was provided to HIBP by Alon Gal, CTO of
cybercrime intelligence firm Hudson Rock.

Breach date: 25 June 2020
Date added to HIBP: 20 December 2020
Compromised accounts: 1,075,241
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


LEET

In August 2016, the service for creating and running Pocket Minecraft edition
servers known as Leet was reported as having suffered a data breach that
impacted 6 million subscribers. The incident reported by Softpedia had allegedly
taken place earlier in the year, although the data set sent to HIBP was dated as
recently as early September but contained only 2 million subscribers. The data
included usernames, email and IP addresses and SHA512 hashes. A further 3
million accounts were obtained and added to HIBP several days after the initial
data was loaded bringing the total to over 5 million.

Breach date: 10 September 2016
Date added to HIBP: 30 September 2016
Compromised accounts: 5,081,689
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


LEGENDAS.TV

In October 2017, the now defunct Brazilian service for retrieving subtitles in
Portuguese Legendas.TV suffered a data breach that exposed nearly 4M customer
records. The impacted data included names, usernames, email and IP addresses and
unsalted SHA-1 hashes.

Breach date: 1 October 2017
Date added to HIBP: 4 January 2024
Compromised accounts: 3,869,181
Compromised data: Email addresses, IP addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LIFEBEAR

In early 2019, the Japanese schedule app Lifebear appeared for sale on a dark
web marketplace amongst a raft of other hacked websites. The breach exposed
almost 3.7M unique email addresses, usernames and passwords stored as salted MD5
hashes. The data was provided to HIBP by a source who requested it be attributed
to "nano@databases.pw".

Breach date: 28 February 2019
Date added to HIBP: 25 May 2020
Compromised accounts: 3,670,561
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LIFEBOAT

In January 2016, the Minecraft community known as Lifeboat was hacked and more
than 7 million accounts leaked. Lifeboat knew of the incident for three months
before the breach was made public but elected not to advise customers. The
leaked data included usernames, email addresses and passwords stored as straight
MD5 hashes.

Breach date: 1 January 2016
Date added to HIBP: 25 April 2016
Compromised accounts: 7,089,395
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LIGHT'S HOPE

In June 2018, the World of Warcraft service Light's Hope suffered a data breach
which they subsequently self-submitted to HIBP. Over 30K unique users were
impacted and their exposed data included email addresses, dates of birth,
private messages and passwords stored as bcrypt hashes.

Breach date: 25 June 2018
Date added to HIBP: 4 July 2018
Compromised accounts: 30,484
Compromised data: Dates of birth, Email addresses, Geographic locations, IP
addresses, Passwords, Private messages, Usernames
Permalink

--------------------------------------------------------------------------------


LIKER

In March 2021, the self-proclaimed "kinder, smarter social network" Liker
suffered a data breach, allegedly in retaliation for the Gab data breach and
scraping of data from Parler. The site remained offline after the breach which
exposed 465k email addresses in addition to names, dates of birth, education
levels, private messages, security questions and answers in plain text,
passwords stored as bcrypt hashes and other personal data attributes. Liker did
not respond when contacted about the breach.

Breach date: 8 March 2021
Date added to HIBP: 13 March 2021
Compromised accounts: 465,141
Compromised data: Auth tokens, Dates of birth, Education levels, Email
addresses, Geographic locations, IP addresses, Names, Passwords, Phone numbers,
Private messages, Security questions and answers, Social media profiles,
Usernames
Permalink

--------------------------------------------------------------------------------


LIMEVPN

In October 2020, the VPN provider LimeVPN suffered a data breach that exposed
the personal information of tens of thousands of customers. The data included
email, IP and physical addresses, names, phone numbers, purchase histories and
passwords stored as salted MD5 hashes.

Breach date: 8 October 2020
Date added to HIBP: 6 February 2023
Compromised accounts: 23,348
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone
numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


LINKEDIN

In May 2016, LinkedIn had 164 million email addresses and passwords exposed.
Originally hacked in 2012, the data remained out of sight until being offered
for sale on a dark market site 4 years later. The passwords in the breach were
stored as SHA1 hashes without salt, the vast majority of which were quickly
cracked in the days following the release of the data.

Breach date: 5 May 2012
Date added to HIBP: 21 May 2016
Compromised accounts: 164,611,595
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


LINKEDIN SCRAPED AND FAKED DATA (2023)

In November 2023, a post to a popular hacking forum alleged that millions of
LinkedIn records had been scraped and leaked. On investigation, the data turned
out to be a combination of legitimate data scraped from LinkedIn and email
addresses constructed from impacted individuals' names.

Breach date: 4 November 2023
Date added to HIBP: 7 November 2023
Compromised accounts: 19,788,753
Compromised data: Email addresses, Genders, Geographic locations, Job titles,
Names, Professional skills, Social media profiles
Permalink

--------------------------------------------------------------------------------


LINKEDIN SCRAPED DATA (2021)

During the first half of 2021, LinkedIn was targeted by attackers who scraped
data from hundreds of millions of public profiles and later sold them online.
Whilst the scraping did not constitute a data breach nor did it access any
personal data not intended to be publicly accessible, the data was still
monetised and later broadly circulated in hacking circles. The scraped data
contains approximately 400M records with 125M unique email addresses, as well as
names, geographic locations, genders and job titles. LinkedIn specifically
addresses the incident in their post on An update on report of scraped data.

Breach date: 8 April 2021
Date added to HIBP: 2 October 2021
Compromised accounts: 125,698,496
Compromised data: Education levels, Email addresses, Genders, Geographic
locations, Job titles, Names, Social media profiles
Permalink

--------------------------------------------------------------------------------


LINUX FORUMS

In May 2018, the Linux Forums website suffered a data breach which resulted in
the disclosure of 276k unique email addresses. Running on an old version of
vBulletin, the breach also disclosed usernames, IP addresses and salted MD5
password hashes. Linux Forums did not respond to multiple attempts to contact
them about the breach.

Breach date: 1 May 2018
Date added to HIBP: 7 June 2018
Compromised accounts: 275,785
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LINUX MINT

In February 2016, the website for the Linux distro known as Linux Mint was
hacked and the ISO infected with a backdoor. The site also ran a phpBB forum
which was subsequently put up for sale complete with almost 145k email
addresses, passwords and other personal subscriber information.

Breach date: 21 February 2016
Date added to HIBP: 22 February 2016
Compromised accounts: 144,989
Compromised data: Avatars, Dates of birth, Email addresses, Geographic
locations, IP addresses, Passwords, Time zones, Website activity
Permalink

--------------------------------------------------------------------------------


LITTLE MONSTERS

In approximately January 2017, the Lady Gaga fan site known as "Little Monsters"
suffered a data breach that impacted 1 million accounts. The data contained
usernames, email addresses, dates of birth and bcrypt hashes of passwords.

Breach date: 1 January 2017
Date added to HIBP: 7 March 2017
Compromised accounts: 995,698
Compromised data: Dates of birth, Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LIVEAUCTIONEERS

In June 2020, the online antiques marketplace LiveAuctioneers suffered a data
breach which was subsequently sold online then extensively redistributed in the
hacking community. The data contained 3.4 million records including names, email
and IP addresses, physical addresses, phones numbers and passwords stored as
unsalted MD5 hashes. The data was provided to HIBP by breachbase.pw.

Breach date: 19 June 2020
Date added to HIBP: 22 August 2020
Compromised accounts: 3,385,862
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone
numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


LIVEJOURNAL

In mid-2019, news broke of an alleged LiveJournal data breach. This followed
multiple reports of credential abuse against Dreamwidth beginning in 2018, a
fork of LiveJournal with a significant crossover in user base. The breach
allegedly dates back to 2017 and contains 26M unique usernames and email
addresses (both of which have been confirmed to exist on LiveJournal) alongside
plain text passwords. An archive of the data was subsequently shared on a
popular hacking forum in May 2020 and redistributed broadly. The data was
provided to HIBP by a source who requested it be attributed to
"nano@databases.pw".

Breach date: 1 January 2017
Date added to HIBP: 26 May 2020
Compromised accounts: 26,372,781
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LIVPURE

In August 2020, the Indian retailer Livpure suffered a data breach which exposed
over 1 million customer purchases with 270 thousand unique email addresses. The
data also included names, phone numbers, physical addresses and details of
purchased items. The data was provided to HIBP by a source who requested it be
attributed to "white_peacock@riseup.net".

Breach date: 29 August 2020
Date added to HIBP: 22 May 2021
Compromised accounts: 269,552
Compromised data: Email addresses, Names, Phone numbers, Physical addresses,
Purchases, Salutations
Permalink

--------------------------------------------------------------------------------


LIZARD SQUAD

In January 2015, the hacker collective known as "Lizard Squad" created a DDoS
service by the name of "Lizard Stresser" which could be procured to mount
attacks against online targets. Shortly thereafter, the service suffered a data
breach which resulted in the public disclosure of over 13k user accounts
including passwords stored in plain text.

Breach date: 16 January 2015
Date added to HIBP: 18 January 2015
Compromised accounts: 13,451
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


LOCALLY

In October 2022, "The Industry's Leading Online-to-Offline Shopping Solution"
Locally suffered a data breach. Whilst Locally acknowledged the breach
privately, it's unknown whether impacted customers were subsequently notified of
the incident which exposed over 362k names, phone numbers, email and physical
addresses, purchases, credit card type and last four digits and bcrypt password
hashes.

Breach date: 1 October 2022
Date added to HIBP: 10 July 2023
Compromised accounts: 362,619
Compromised data: Email addresses, Partial credit card data, Passwords, Phone
numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


LOLZTEAM

In May 2018, the Russian hacking forum Lolzteam suffered a data breach that
exposed 400k members. The impacted data included usernames and email addresses
which were later redistributed via another hacking forum. The data was provided
to HIBP by a source who requested it be attributed to "ZAN @ BF".

Breach date: 13 May 2018
Date added to HIBP: 6 November 2022
Compromised accounts: 398,011
Compromised data: Email addresses, Usernames
Permalink

--------------------------------------------------------------------------------


LOOKBOOK

In August 2012, the fashion site Lookbook suffered a data breach. The data later
appeared listed for sale in June 2016 and included 1.1 million usernames, email
and IP addresses, birth dates and plain text passwords.

Breach date: 24 August 2012
Date added to HIBP: 8 November 2016
Compromised accounts: 1,074,948
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


LORD OF THE RINGS ONLINE

In August 2013, the interactive video game Lord of the Rings Online suffered a
data breach that exposed over 1.1M players' accounts. The data was being
actively traded on underground forums and included email addresses, birth dates
and password hashes.

Breach date: 1 August 2013
Date added to HIBP: 12 March 2016
Compromised accounts: 1,141,278
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


LOUNGE BOARD

At some point in 2013, 45k accounts were breached from the Lounge Board "General
Discussion Forum" and then dumped publicly. Lounge Board was a MyBB forum
launched in 2012 and discontinued in mid 2013 (the last activity in the logs was
from August 2013).

Breach date: 1 August 2013
Date added to HIBP: 6 July 2014
Compromised accounts: 45,018
Compromised data: Email addresses, IP addresses, Names, Passwords, Private
messages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


LUMIN PDF

In April 2019, the PDF management service Lumin PDF suffered a data breach. The
breach wasn't publicly disclosed until September when 15.5M records of user data
appeared for download on a popular hacking forum. The data had been left
publicly exposed in a MongoDB instance after which Lumin PDF was allegedly been
"contacted multiple times, but ignored all the queries". The exposed data
included names, email addresses, genders, spoken language and either a bcrypt
password hash or Google auth token. The data was provided to HIBP by a source
who requested it be attributed to "JimScott.Sec@protonmail.com".

Breach date: 1 April 2019
Date added to HIBP: 18 September 2019
Compromised accounts: 15,453,048
Compromised data: Auth tokens, Email addresses, Genders, Names, Passwords,
Spoken languages, Usernames
Permalink

--------------------------------------------------------------------------------


LUXOTTICA

In March 2021, the world's largest eyewear company Luxoticca suffered a data
breach via one of their partners that exposed the personal information of more
than 70M people. The data was subsequently sold via a popular hacking forum in
late 2022 and included email and physical addresses, names, genders, dates of
birth and phone numbers. In a statement from Luxottica, they advised they were
aware of the incident and are currently "considering other notification
obligations".

Breach date: 16 March 2021
Date added to HIBP: 19 May 2023
Compromised accounts: 77,093,812
Compromised data: Dates of birth, Email addresses, Genders, Names, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


LYRICS MANIA

In December 2017, the song lyrics website known as Lyrics Mania suffered a data
breach. The data in the breach included 109k usernames, email addresses and
plain text passwords. Numerous attempts were made to contact Lyrics Mania about
the incident, however no responses were received.

Breach date: 21 December 2017
Date added to HIBP: 15 January 2018
Compromised accounts: 109,202
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MAC FORUMS

In July 2016, the self-proclaimed "Ultimate Source For Your Mac" website Mac
Forums suffered a data breach. The vBulletin-based system exposed over 326k
usernames, email and IP addresses, dates of birth and passwords stored as salted
MD5 hashes. The data was later discovered being traded on a popular hacking
forum. Mac Forums did not respond when contacted about the incident via their
contact us form.

Breach date: 3 July 2016
Date added to HIBP: 29 October 2018
Compromised accounts: 326,714
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


MACGENERATION

In January 2022, the French Apple news website MacGeneration suffered a data
breach. The incident exposed over 100k usernames, email addresses and passwords
stored as salted SHA-512 hashes. After discovering the incident, MacGeneration
self-submitted data to HIBP.

Breach date: 29 January 2022
Date added to HIBP: 3 March 2022
Compromised accounts: 101,004
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MAC-TORRENTS

In October 2015, the torrent site Mac-Torrents was hacked and almost 94k
usernames, email addresses and passwords were leaked. The passwords were hashed
with MD5 and no salt.

Breach date: 31 October 2015
Date added to HIBP: 31 October 2015
Compromised accounts: 93,992
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MAGICDUEL

In August 2023, the MagicDuel Adventure website suffered a data breach that
exposed 138k user records. The data included player names, email and IP
addresses and bcrypt password hashes.

Breach date: 2 August 2023
Date added to HIBP: 2 August 2023
Compromised accounts: 138,443
Compromised data: Email addresses, IP addresses, Nicknames, Passwords
Permalink

--------------------------------------------------------------------------------


MAIL.RU DUMP

In September 2014, several large dumps of user accounts appeared on the Russian
Bitcoin Security Forum including one with nearly 5M email addresses and
passwords, predominantly on the mail.ru domain. Whilst unlikely to be the result
of a direct attack against mail.ru, the credentials were confirmed by many as
legitimate for other services they had subscribed to. Further data allegedly
valid for mail.ru and containing email addresses and plain text passwords was
added in January 2018 bringing to total to more than 16M records. The incident
was also then flagged as "unverified", a concept that was introduced after the
initial data load in 2014.

Breach date: 10 September 2014
Date added to HIBP: 12 September 2014
Compromised accounts: 16,630,988
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


MAJORGEEKS

In November 2015, almost 270k accounts from the MajorGeeks support forum were
breached. The accounts were being actively sold and traded online and included
email addresses, salted password hashes and IP addresses.

Breach date: 15 November 2015
Date added to HIBP: 3 March 2016
Compromised accounts: 269,548
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MALINDOAIR

In early 2019, the Malaysian airline Malindo Air suffered a data breach that
exposed tens of millions of customer records. Containing 4.3M unique email
addresses, the breach also exposed extensive personal information including
names, dates of birth, genders, physical addresses, phone numbers and passport
details. The data was later extensively shared on popular hacking forums.

Breach date: 1 March 2019
Date added to HIBP: 14 September 2023
Compromised accounts: 4,328,232
Compromised data: Dates of birth, Email addresses, Genders, Loyalty program
details, Names, Nationalities, Passport numbers, Phone numbers, Physical
addresses, Salutations
Permalink

--------------------------------------------------------------------------------


MALL.CZ

In July 2017, the Czech Republic e-commerce site MALL.cz suffered a data breach
after which 735k unique accounts including email addresses, names, phone numbers
and passwords were later posted online. Whilst passwords were stored as hashes,
a number of different algorithms of varying strength were used over time. All
passwords included in the publicly distributed data were in plain text and were
likely just those that had been successfully cracked (members with strong
passwords don't appear to be included). According to MALL.cz, the breach only
impacted accounts created before 2015.

Breach date: 27 July 2017
Date added to HIBP: 4 September 2017
Compromised accounts: 735,405
Compromised data: Email addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


MALWAREBYTES

In November 2014, the Malwarebytes forum was hacked and 111k member records were
exposed. The IP.Board forum included email and IP addresses, birth dates and
passwords stored as salted hashes using a weak implementation enabling many to
be rapidly cracked.

Breach date: 15 November 2014
Date added to HIBP: 9 March 2016
Compromised accounts: 111,623
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


MANGA TRADERS

In June 2014, the Manga trading website Mangatraders.com had the usernames and
passwords of over 900k users leaked on the internet (approximately 855k of the
emails were unique). The passwords were weakly hashed with a single iteration of
MD5 leaving them vulnerable to being easily cracked.

Breach date: 9 June 2014
Date added to HIBP: 10 June 2014
Compromised accounts: 855,249
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


MANGADEX

In March 2021, the manga fan site MangaDex suffered a data breach that resulted
in the exposure of almost 3 million subscribers. The data included email and IP
addresses, usernames and passwords stored as bcrypt hashes. The data was
subsequently circulated within hacking groups.

Breach date: 22 March 2021
Date added to HIBP: 25 April 2021
Compromised accounts: 2,987,329
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MANGAFOX.ME

In approximately July 2016, the manga website known as mangafox.me suffered a
data breach. The vBulletin based forum exposed 1.3 million accounts including
usernames, email and IP addresses, dates of birth and salted MD5 password
hashes.

Breach date: 1 June 2016
Date added to HIBP: 17 March 2018
Compromised accounts: 1,311,610
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


MANGATOON

In May 2022, the Hong Kong based Manga service Mangatoon suffered a data breach
that exposed 23M subscriber records. The breach exposed names, email addresses,
genders, social media account identities, auth tokens from social logins and
passwords stored as salted MD5 hashes. Mangatoon did not respond to multiple
attempts to make contact regarding the breach.

Breach date: 13 May 2022
Date added to HIBP: 6 July 2022
Compromised accounts: 23,040,238
Compromised data: Auth tokens, Avatars, Email addresses, Genders, Names,
Passwords, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


MANIPULATED CAIMAN

In July 2023, Perception Point reported on a phishing operation dubbed
"Manipulated Caiman". Targeting primarily the citizens of Mexico, the campaign
attempted to gain access to victims' bank accounts via spear phishing attacks
using malicious attachments. Researchers obtained almost 40M email addresses
targeted in the campaign and provided the data to HIBP to alert potential
victims.

Breach date: 16 July 2023
Date added to HIBP: 15 August 2023
Compromised accounts: 39,901,389
Compromised data: Email addresses
Permalink

--------------------------------------------------------------------------------


MAPPERY

In December 2018, the mapping website Mappery suffered a data breach that
exposed over 205k unique email addresses. The incident also exposed usernames,
the geographic location of the user and passwords stored as unsalted SHA-1
hashes. No response was received from Mappery when contacted about the incident.

Breach date: 11 December 2018
Date added to HIBP: 18 December 2018
Compromised accounts: 205,242
Compromised data: Email addresses, Geographic locations, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MASHABLE

In approximately mid-2020, Mashable suffered a data breach that subsequently
turned up publicly in November 2020. The data included 1.4 million unique email
addresses along with names, genders, expired auth tokens, physical locations,
links to social media profiles and days and months of birth. The data was
provided to HIBP by dehashed.com.

Breach date: 1 June 2020
Date added to HIBP: 10 November 2020
Compromised accounts: 1,414,677
Compromised data: Auth tokens, Email addresses, Genders, Geographic locations,
IP addresses, Names, Partial dates of birth, Social media profiles
Permalink

--------------------------------------------------------------------------------


MASTER DEEDS

In March 2017, a 27GB database backup file named "Master Deeds" was sent to HIBP
by a supporter of the project. Upon detailed analysis later that year, the file
was found to contain the personal data of tens of millions of living and
deceased South African residents. The data included extensive personal
attributes such as names, addresses, ethnicities, genders, birth dates,
government issued personal identification numbers and 2.2 million email
addresses. At the time of publishing, it's alleged the data was sourced from
Dracore Data Sciences (Dracore is yet to publicly confirm or deny the data was
sourced from their systems). On 18 October 2017, the file was found to have been
published to a publicly accessible web server where it was located at the root
of an IP address with directory listing enabled. The file was dated 8 April
2015.

Breach date: 14 March 2017
Date added to HIBP: 18 October 2017
Compromised accounts: 2,257,930
Compromised data: Dates of birth, Deceased statuses, Email addresses, Employers,
Ethnicities, Genders, Government issued IDs, Home ownership statuses, Job
titles, Names, Nationalities, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


MASTERCARD PRICELESS SPECIALS

In August 2019, the German Mastercard bonus program "Priceless Specials"
suffered a data breach. Personal data on almost 90k program members was
subsequently extensively circulated online and included names, email and IP
addresses, phone numbers and partial credit card data. Following the incident,
the program was subsequently suspended.

Breach date: 20 August 2019
Date added to HIBP: 1 September 2019
Compromised accounts: 89,388
Compromised data: Email addresses, IP addresses, Names, Partial credit card
data, Phone numbers, Salutations
Permalink

--------------------------------------------------------------------------------


MATE1.COM

In February 2016, the dating site mate1.com suffered a huge data breach
resulting in the disclosure of over 27 million subscribers' information. The
data included deeply personal information about their private lives including
drug and alcohol habits, incomes levels and sexual fetishes as well as passwords
stored in plain text.

Breach date: 29 February 2016
Date added to HIBP: 14 April 2016
Compromised accounts: 27,393,015
Compromised data: Astrological signs, Dates of birth, Drinking habits, Drug
habits, Education levels, Email addresses, Ethnicities, Fitness levels, Genders,
Geographic locations, Income levels, Job titles, Names, Parenting plans,
Passwords, Personal descriptions, Physical attributes, Political views,
Relationship statuses, Religions, Sexual fetishes, Travel habits, Usernames,
Website activity, Work habits
Permalink

--------------------------------------------------------------------------------


MATHWAY

In January 2020, the math solving website Mathway suffered a data breach that
exposed over 25M records. The data was subsequently sold on a dark web
marketplace and included names, Google and Facebook IDs, email addresses and
salted password hashes.

Breach date: 13 January 2020
Date added to HIBP: 5 June 2020
Compromised accounts: 25,692,862
Compromised data: Device information, Email addresses, Names, Passwords, Social
media profiles
Permalink

--------------------------------------------------------------------------------


MCBANS

In October 2016, the Minecraft banning service known as MCBans suffered a data
breach resulting in the exposure of 120k unique user records. The data contained
email and IP addresses, usernames and password hashes of unknown format. The
site was previously reported as compromised on the Vigilante.pw breached
database directory.

Breach date: 27 October 2016
Date added to HIBP: 23 July 2017
Compromised accounts: 119,948
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


MDPI

In August 2016, the Swiss scholarly open access publisher known as MDPI had
17.5GB of data obtained from an unprotected Mongo DB instance. The data
contained email exchanges between MDPI and their authors and reviewers which
included 845k unique email addresses. MDPI have confirmed that the system has
since been protected and that no data of a sensitive nature was impacted. As
such, they concluded that notification to their subscribers was not necessary
due to the fact that all their authors and reviewers are available online on
their website.

Breach date: 30 August 2016
Date added to HIBP: 25 March 2018
Compromised accounts: 845,012
Compromised data: Email addresses, Email messages, IP addresses, Names
Permalink

--------------------------------------------------------------------------------


MECHO DOWNLOAD

In October 2013, the (now defunct) downloads website "Mecho Download" suffered a
data breach that exposed 438k records. Data from the vBulletin based website
included email and IP addresses, usernames and passwords stored as salted MD5
hashes.

Breach date: 31 October 2013
Date added to HIBP: 2 August 2022
Compromised accounts: 437,928
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MEETMINDFUL

In early 2020, the online dating service MeetMindful suffered a data breach that
exposed 1.4 million unique customer email addresses. Included in the data was an
extensive array of personal information used to find romantic matches including
physical attributes, use of alcohol, drugs and cigarettes, marital statuses,
birthdates, genders and the gender being sought. Additional personal information
such as names, geographical locations and IP addresses were also exposed, along
with passwords stored as bcrypt hashes.

Breach date: 26 January 2020
Date added to HIBP: 31 January 2021
Compromised accounts: 1,422,717
Compromised data: Dates of birth, Drinking habits, Drug habits, Email addresses,
Genders, Geographic locations, IP addresses, Marital statuses, Names, Passwords,
Physical attributes, Religions, Sexual orientations, Smoking habits, Social
media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


MEMECHAT

In mid-2022, "the ultimate hub of memes" MemeChat suffered a data breach that
exposed 7.4M records. Alleged to be due to a misconfigured Elasticsearch
instance, the data contained 4.3M unique email addresses alongside usernames.

Breach date: 1 June 2022
Date added to HIBP: 29 October 2023
Compromised accounts: 4,348,570
Compromised data: Email addresses, Usernames
Permalink

--------------------------------------------------------------------------------


MEO

In early 2023, a corpus of data sourced from the New Zealand based face mask
company MEO was discovered. Dating back to December 2020, the data contained
over 8k customer records including names, addresses, phone numbers and passwords
stored as MD5 Wordpress hashes. MEO did not respond to multiple attempts to
report the breach.

Breach date: 24 December 2020
Date added to HIBP: 24 April 2023
Compromised accounts: 8,227
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses, Purchases, Usernames
Permalink

--------------------------------------------------------------------------------


MGM RESORTS

In July 2019, MGM Resorts discovered a data breach of one of their cloud
services. The breach included 10.6M guest records with 3.1M unique email
addresses stemming back to 2017. The exposed data included email and physical
addresses, names, phone numbers and dates of birth and was subsequently shared
on a popular hacking forum in February 2020 where it was extensively
redistributed. The data was provided to HIBP by Under The Breach.

Breach date: 25 July 2019
Date added to HIBP: 20 February 2020
Compromised accounts: 3,081,321
Compromised data: Dates of birth, Email addresses, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


MGM RESORTS (2022 UPDATE)

In July 2019, MGM Resorts discovered a data breach of one of their cloud
services. The breach included 10.6M guest records with 3.1M unique email
addresses stemming back to 2017. In May 2022, a superset of the data totalling
almost 25M unique email addresses across 142M rows was extensively shared on
Telegram. On analysis, it's highly likely the data stems from the same incident
with 142M records having been discovered for sale on a dark web marketplace in
mid-2020. The exposed data included email and physical addresses, names, phone
numbers and dates of birth.

Breach date: 25 July 2019
Date added to HIBP: 29 May 2022
Compromised accounts: 24,842,001
Compromised data: Dates of birth, Email addresses, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


MINDJOLT

In March 2019, the online gaming website MindJolt suffered a data breach that
exposed 28M unique email addresses. Also impacted were names and dates of birth,
but no passwords. The data was provided to HIBP by a source who requested it be
attributed to "JimScott.Sec@protonmail.com".

Breach date: 18 March 2019
Date added to HIBP: 13 July 2019
Compromised accounts: 28,364,826
Compromised data: Dates of birth, Email addresses, Names
Permalink

--------------------------------------------------------------------------------


MINECRAFT POCKET EDITION FORUM

In May 2015, the Minecraft Pocket Edition forum was hacked and over 16k accounts
were dumped public. Allegedly hacked by @rmsg0d, the forum data included
numerous personal pieces of data for each user. The forum has subsequently been
decommissioned.

Breach date: 24 May 2015
Date added to HIBP: 30 June 2015
Compromised accounts: 16,034
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MINECRAFT WORLD MAP

In approximately January 2016, the Minecraft World Map site designed for sharing
maps created for the game was hacked and over 71k user accounts were exposed.
The data included usernames, email and IP addresses along with salted and hashed
passwords.

Breach date: 15 January 2016
Date added to HIBP: 29 August 2016
Compromised accounts: 71,081
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MINEFIELD

In June 2015, the French Minecraft server known as Minefield was hacked and 188k
member records were exposed. The IP.Board forum included email and IP addresses,
birth dates and passwords stored as salted hashes using a weak implementation
enabling many to be rapidly cracked.

Breach date: 28 June 2015
Date added to HIBP: 9 March 2016
Compromised accounts: 188,343
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


MINEHUT

In May 2019, the Minecraft server website Minehut suffered a data breach. The
company advised a database backup had been obtained after which they
subsequently notified all impacted users. 397k email addresses from the incident
were provided to HIBP. A data set with both email addresses and bcrypt password
hashes was also later provided to HIBP.

Breach date: 17 May 2019
Date added to HIBP: 17 September 2019
Compromised accounts: 396,533
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


MINTED

In May 2020, the online marketplace for independent artists Minted suffered a
data breach that exposed 4.4M unique customer records subsequently sold on a
dark web marketplace. Exposed data also included names, physical addresses,
phone numbers and passwords stored as bcrypt hashes. The data was provided to
HIBP by dehashed.com.

Breach date: 6 May 2020
Date added to HIBP: 3 November 2020
Compromised accounts: 4,418,182
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


MMG FUSION

In December 2020, the dental practice management service MMG Fusion was the
victim of a data breach which exposed 2.6M unique email addresses. The data also
included patient appointments, names, phone numbers, dates of birth, genders and
physical addresses. A small number of records also included passwords stored as
bcrypt hashes.

Breach date: 20 December 2020
Date added to HIBP: 7 August 2021
Compromised accounts: 2,660,295
Compromised data: Appointments, Dates of birth, Email addresses, Genders,
Marital statuses, Names, Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


MOBIFRIENDS

In January 2020, the Barcelona-based dating app MobiFriends suffered a data
breach that exposed 3.5 million unique email addresses. The data also included
usernames, genders, dates of birth and MD5 password hashes. The data was
provided to HIBP by a source who requested it be attributed to
"white_peacock@riseup.net".

Breach date: 6 January 2020
Date added to HIBP: 23 May 2021
Compromised accounts: 3,512,952
Compromised data: Dates of birth, Email addresses, Genders, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MODACO

In approximately January 2016, the UK based Android community known as MoDaCo
suffered a data breach which exposed 880k subscriber identities. The data
included email and IP addresses, usernames and passwords stored as salted MD5
hashes.

Breach date: 1 January 2016
Date added to HIBP: 20 September 2016
Compromised accounts: 879,703
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MODERN BUSINESS SOLUTIONS

In October 2016, a large Mongo DB file containing tens of millions of accounts
was shared publicly on Twitter (the file has since been removed). The database
contained over 58M unique email addresses along with IP addresses, names, home
addresses, genders, job titles, dates of birth and phone numbers. The data was
subsequently attributed to "Modern Business Solutions", a company that provides
data storage and database hosting solutions. They've yet to acknowledge the
incident or explain how they came to be in possession of the data.

Breach date: 8 October 2016
Date added to HIBP: 12 October 2016
Compromised accounts: 58,843,488
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Job
titles, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


MONEY BOOKERS

Sometime in 2009, the e-wallet service known as Money Bookers suffered a data
breach which exposed almost 4.5M customers. Now called Skrill, the breach was
not discovered until October 2015 and included names, email addresses, home
addresses and IP addresses.

Breach date: 1 January 2009
Date added to HIBP: 30 November 2015
Compromised accounts: 4,483,605
Compromised data: Dates of birth, Email addresses, IP addresses, Names, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


MONEYCONTROL

In April 2021, hackers posted data for sale originating from the online Indian
financial platform, Moneycontrol. The data included 763 thousand unique email
addresses (allegedly a subset of a larger 40 million account breach), alongside
geographic locations, phone numbers, genders, dates of birth and plain text
passwords. The date of the original breach is unclear, although the breached
data indicates the file was created in September 2017 and Moneycontrol has
stated that the breach is "an old data set".

Breach date: 7 September 2017
Date added to HIBP: 22 May 2021
Compromised accounts: 762,874
Compromised data: Email addresses, Genders, Geographic locations, Passwords,
Phone numbers
Permalink

--------------------------------------------------------------------------------


MORELE.NET

In October 2018, the Polish e-commerce website Morele.net suffered a data
breach. The incident exposed almost 2.5 million unique email addresses alongside
phone numbers, names and passwords stored as md5crypt hashes.

Breach date: 10 October 2018
Date added to HIBP: 20 April 2019
Compromised accounts: 2,467,304
Compromised data: Email addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


MORTAL ONLINE

In June 2018, the massively multiplayer online role-playing game (MMORPG) Mortal
Online suffered a data breach. A file containing 570k email addresses and
cracked passwords was subsequently distributed online. A larger more complete
file containing 607k email addresses with original unsalted MD5 password hashes
along with names, usernames and physical addresses was later provided and the
original breach in HIBP was updated accordingly. The data was provided to HIBP
by whitehat security researcher and data analyst Adam Davies.

Breach date: 17 June 2018
Date added to HIBP: 31 August 2018
Compromised accounts: 606,637
Compromised data: Email addresses, Names, Passwords, Physical addresses,
Usernames
Permalink

--------------------------------------------------------------------------------


MOVIE FORUMS

In December 2022, the Movie Forums website suffered a data breach that affected
40k users. The breach exposed email and IP addresses, usernames, dates of birth
and passwords stored as easily crackable salted MD5 hashes. The data was
subsequently posted a popular clear web hacking forum.

Breach date: 24 November 2022
Date added to HIBP: 8 December 2023
Compromised accounts: 39,914
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


MPGH

In October 2015, the multiplayer game hacking website MPGH was hacked and 3.1
million user accounts disclosed. The vBulletin forum breach contained usernames,
email addresses, IP addresses and salted hashes of passwords.

Breach date: 22 October 2015
Date added to HIBP: 26 October 2015
Compromised accounts: 3,122,898
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MREXCEL

In December 2016, the forum for the Microsoft Excel tips and solutions site Mr
Excel suffered a data breach. The hack of the vBulletin forum led to the
exposure of over 366k accounts along with email and IP addresses, dates of birth
and salted passwords hashed with MD5. The owner of the MrExcel forum
subsequently self-submitted the data to HIBP.

Breach date: 5 December 2016
Date added to HIBP: 22 January 2017
Compromised accounts: 366,140
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Social connections, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


MSPY

In May 2015, the "monitoring" software known as mSpy suffered a major data
breach. The software (allegedly often used to spy on unsuspecting victims),
stored extensive personal information within their online service which after
being breached, was made freely available on the internet.

Breach date: 14 May 2015
Date added to HIBP: 28 May 2015
Compromised accounts: 699,793
Compromised data: Device usage tracking data
Permalink

--------------------------------------------------------------------------------


MUSLIM DIRECTORY

In February 2014, the UK guide to services and business known as the Muslim
Directory was attacked by the hacker known as @th3inf1d3l. The data was
consequently dumped publicly and included the web accounts of tens of thousands
of users which contained data including their names, home address, age group,
email, website activity and password in plain text.

Breach date: 17 February 2014
Date added to HIBP: 23 February 2014
Compromised accounts: 37,784
Compromised data: Age groups, Email addresses, Employers, Names, Passwords,
Phone numbers, Physical addresses, Website activity
Permalink

--------------------------------------------------------------------------------


MUSLIM MATCH

In June 2016, the Muslim Match dating website had 150k email addresses exposed.
The data included private chats and messages between relationship seekers and
numerous other personal attributes including passwords hashed with MD5.

Breach date: 24 June 2016
Date added to HIBP: 29 June 2016
Compromised accounts: 149,830
Compromised data: Chat logs, Email addresses, Geographic locations, IP
addresses, Passwords, Private messages, User statuses, Usernames
Permalink

--------------------------------------------------------------------------------


MYFHA

In approximately February 2015, the home financing website MyFHA suffered a data
breach which disclosed the personal information of nearly 1 million people. The
data included extensive personal information relating to home financing
including personal contact info, credit statuses, household incomes, loan
amounts and notes on personal circumstances, often referring to legal issues,
divorces and health conditions. Multiple parties contacted HIBP with the data
after which MyFHA was alerted in mid-July and acknowledged the legitimacy of the
breach then took the site offline.

Breach date: 18 February 2015
Date added to HIBP: 9 August 2018
Compromised accounts: 972,629
Compromised data: Credit status information, Email addresses, Income levels, IP
addresses, Loan information, Names, Passwords, Personal descriptions, Physical
addresses
Permalink

--------------------------------------------------------------------------------


MYFITNESSPAL

In February 2018, the diet and exercise service MyFitnessPal suffered a data
breach. The incident exposed 144 million unique email addresses alongside
usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes (the
former for earlier accounts, the latter for newer accounts). In 2019, the data
appeared listed for sale on a dark web marketplace (along with several other
large breaches) and subsequently began circulating more broadly. The data was
provided to HIBP by a source who requested it to be attributed to
"BenjaminBlue@exploit.im".

Breach date: 1 February 2018
Date added to HIBP: 21 February 2019
Compromised accounts: 143,606,147
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MYHERITAGE

In October 2017, the genealogy website MyHeritage suffered a data breach. The
incident was reported 7 months later after a security researcher discovered the
data and contacted MyHeritage. In total, more than 92M customer records were
exposed and included email addresses and salted SHA-1 password hashes. In 2019,
the data appeared listed for sale on a dark web marketplace (along with several
other large breaches) and subsequently began circulating more broadly. The data
was provided to HIBP by a source who requested it be attributed to
"BenjaminBlue@exploit.im".

Breach date: 26 October 2017
Date added to HIBP: 20 February 2019
Compromised accounts: 91,991,358
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


MYPERTAMINA

In November 2022, the Indonesian oil and gas company Pertamina suffered a data
breach of their MyPertamina service. The incident exposed 44M records with 6M
unique email addresses along with names, dates of birth, genders, physical
addresses and purchases.

Breach date: 1 November 2022
Date added to HIBP: 27 January 2024
Compromised accounts: 5,970,416
Compromised data: Dates of birth, Email addresses, Genders, Names, Phone
numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


MYREPOSPACE

In July 2015, the Cydia repository known as myRepoSpace was hacked and user data
leaked publicly. Cydia is designed to facilitate the installation of apps on
jailbroken iOS devices. The repository service was allegedly hacked by
@its_not_herpes and 0x8badfl00d in retaliation for the service refusing to
remove pirated tweaks.

Breach date: 6 July 2015
Date added to HIBP: 8 July 2015
Compromised accounts: 252,751
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MYSPACE

In approximately 2008, MySpace suffered a data breach that exposed almost 360
million accounts. In May 2016 the data was offered up for sale on the "Real
Deal" dark market website and included email addresses, usernames and SHA1
hashes of the first 10 characters of the password converted to lowercase and
stored without a salt. The exact breach date is unknown, but analysis of the
data suggests it was 8 years before being made public.

Breach date: 1 July 2008
Date added to HIBP: 31 May 2016
Compromised accounts: 359,420,698
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


MYVIDSTER

In August 2015, the social video sharing and bookmarking site MyVidster was
hacked and nearly 20,000 accounts were dumped online. The dump included
usernames, email addresses and hashed passwords.

Breach date: 15 August 2015
Date added to HIBP: 10 October 2015
Compromised accounts: 19,863
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


NAMELESS MALWARE

In January 2021, NordLocker provided HIBP 1.1 million email addresses collected
by nameless malware. The malware campaign ran between 2018 and 2020 and infected
3.25 million computers, stealing files, credentials and taking screenshots and
photos using the computer's webcam. Read more in NordLocker's writeup about the
Nameless malware that stole 1.2 TB of private data.

Breach date: 1 January 2020
Date added to HIBP: 9 June 2021
Compromised accounts: 1,121,484
Compromised data: Email addresses
Permalink

--------------------------------------------------------------------------------


NAPSGEAR

In October 2015, the anabolic steroids retailer NapsGear suffered a data breach.
An extensive amount of personal information on 287k customers was exposed
including email addresses, names, addresses, phone numbers, purchase histories
and salted MD5 password hashes.

Breach date: 21 October 2015
Date added to HIBP: 10 September 2018
Compromised accounts: 287,071
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


NAUGHTY AMERICA

In March 2016, the adult website Naughty America was hacked and the data
consequently sold online. The breach included data from numerous systems with
various personal identity attributes, the largest of which had passwords stored
as easily crackable MD5 hashes. There were 1.4 million unique email addresses in
the breach.

Breach date: 14 March 2016
Date added to HIBP: 24 April 2016
Compromised accounts: 1,398,630
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


NAZ.API

In September 2023, over 100GB of stealer logs and credential stuffing lists
titled "Naz.API" was posted to a popular hacking forum. The incident contained a
combination of email address and plain text password pairs alongside the service
they were entered into, and standalone credential pairs obtained from unnamed
sources. In total, the corpus of data included 71M unique email addresses and
100M unique passwords.

Breach date: 20 September 2023
Date added to HIBP: 17 January 2024
Compromised accounts: 70,840,771
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


NEMOWEB

In September 2016, almost 21GB of data from the French website used for
"standardised and decentralized means of exchange for publishing newsgroup
articles" NemoWeb was leaked from what appears to have been an unprotected Mongo
DB. The data consisted of a large volume of emails sent to the service and
included almost 3.5M unique addresses, albeit many of them auto-generated.
Multiple attempts were made to contact the operators of NemoWeb but no response
was received.

Breach date: 4 September 2016
Date added to HIBP: 19 September 2018
Compromised accounts: 3,472,916
Compromised data: Email addresses, Names
Permalink

--------------------------------------------------------------------------------


NEOPETS

In May 2016, a set of breached data originating from the virtual pet website
"Neopets" was found being traded online. Allegedly hacked "several years
earlier", the data contains sensitive personal information including birthdates,
genders and names as well as almost 27 million unique email addresses. Passwords
were stored in plain text and IP addresses were also present in the breach.

Breach date: 5 May 2013
Date added to HIBP: 7 July 2016
Compromised accounts: 26,892,897
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


NETEASE

In October 2015, the Chinese site known as NetEase (located at 163.com) was
reported as having suffered a data breach that impacted hundreds of millions of
subscribers. Whilst there is evidence that the data itself is legitimate
(multiple HIBP subscribers confirmed a password they use is in the data), due to
the difficulty of emphatically verifying the Chinese breach it has been flagged
as "unverified". The data in the breach contains email addresses and plain text
passwords. Read more about Chinese data breaches in Have I Been Pwned.

Breach date: 19 October 2015
Date added to HIBP: 9 October 2016
Compromised accounts: 234,842,089
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


NETELLER

In May 2010, the e-wallet service known as Neteller suffered a data breach which
exposed over 3.6M customers. The breach was not discovered until October 2015
and included names, email addresses, home addresses and account balances.

Breach date: 17 May 2010
Date added to HIBP: 30 November 2015
Compromised accounts: 3,619,948
Compromised data: Account balances, Dates of birth, Email addresses, Genders, IP
addresses, Names, Phone numbers, Physical addresses, Security questions and
answers, Website activity
Permalink

--------------------------------------------------------------------------------


NETGALLEY

In December 2020, the book promotion site NetGalley suffered a data breach. The
incident exposed 1.4 million unique email addresses alongside names, usernames,
physical and IP addresses, phone numbers, dates of birth and passwords stored as
salted SHA-1 hashes. The data was provided to HIBP by a source who requested it
be attributed to pom@pompur.in.

Breach date: 21 December 2020
Date added to HIBP: 23 February 2021
Compromised accounts: 1,436,435
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Phone numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


NETLOG

In July 2018, the Belgian social networking site Netlog identified a data breach
of their systems dating back to November 2012 (PDF). Although the service was
discontinued in 2015, the data breach still impacted 49 million subscribers for
whom email addresses and plain text passwords were exposed. The data was
provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 1 November 2012
Date added to HIBP: 15 July 2019
Compromised accounts: 49,038,354
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


NETPROSPEX

In 2016, a list of over 33 million individuals in corporate America sourced from
Dun & Bradstreet's NetProspex service was leaked online. D&B believe the
targeted marketing data was lost by a customer who purchased it from them. It
contained extensive personal and corporate information including names, email
addresses, job titles and general information about the employer.

Breach date: 1 September 2016
Date added to HIBP: 15 March 2017
Compromised accounts: 33,698,126
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


NETSHOES

In December 2017, the online Brazilian retailer known as Netshoes had half a
million records allegedly hacked from their system posted publicly. The company
was contacted by local Brazilian media outlet Tecmundo and subsequently advised
that no indications have been identified of an invasion of the company's
systems. However, Netshoes' own systems successfully confirm the presence of
matching identifiers and email addresses from the data set, indicating a high
likelihood that the data originated from them.

Breach date: 7 December 2017
Date added to HIBP: 10 December 2017
Compromised accounts: 499,836
Compromised data: Dates of birth, Email addresses, Names, Purchases
Permalink

--------------------------------------------------------------------------------


NEXTGENUPDATE

Early in 2014, the video game website NextGenUpdate reportedly suffered a data
breach that disclosed almost 1.2 million accounts. Amongst the data breach was
usernames, email addresses, IP addresses and salted and hashed passwords.

Breach date: 22 April 2014
Date added to HIBP: 5 June 2015
Compromised accounts: 1,194,597
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


NEXUS MODS

In December 2015, the game modding site Nexus Mods released a statement
notifying users that they had been hacked. They subsequently dated the hack as
having occurred in July 2013 although there is evidence to suggest the data was
being traded months in advance of that. The breach contained usernames, email
addresses and passwords stored as a salted hashes.

Breach date: 22 July 2013
Date added to HIBP: 17 January 2016
Compromised accounts: 5,915,013
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


NIHONOMARU

In late 2015, the anime community known as Nihonomaru had their vBulletin forum
hacked and 1.7 million accounts exposed. The compromised data included email and
IP addresses, usernames and salted hashes of passwords.

Breach date: 1 December 2015
Date added to HIBP: 30 August 2016
Compromised accounts: 1,697,282
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


NITRO

In September 2020, the Nitro PDF service suffered a massive data breach which
exposed over 70 million unique email addresses. The breach also exposed names,
bcrypt password hashes and the titles of converted documents. The data was
provided to HIBP by dehashed.com.

Breach date: 28 September 2020
Date added to HIBP: 19 January 2021
Compromised accounts: 77,159,696
Compromised data: Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


NIVAL

In February 2016, the Russian gaming company Nival was the target of an attack
which was consequently detailed on Reddit. Allegedly protesting "the foreign
policy of Russia in regards to Ukraine", Nival was one of several Russian sites
in the breach and impacted over 1.5M accounts including sensitive personal
information.

Breach date: 29 February 2016
Date added to HIBP: 3 March 2016
Compromised accounts: 1,535,473
Compromised data: Avatars, Dates of birth, Email addresses, Genders, Names,
Spoken languages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


NON NUDE GIRLS

In May 2013, the non-consensual voyeurism site "Non Nude Girls" suffered a data
breach. The hack of the vBulletin forum led to the exposure of over 75k accounts
along with email and IP addresses, names and plain text passwords.

Breach date: 21 May 2013
Date added to HIBP: 25 January 2017
Compromised accounts: 75,383
Compromised data: Email addresses, IP addresses, Names, Passwords, Usernames,
Website activity
Permalink

--------------------------------------------------------------------------------


NOT ACXIOM

In 2020, a corpus of data containing almost a quarter of a billion records
spanning over 400 different fields was misattributed to database marketing
company Acxiom and subsequently circulated within the hacking community. On
review, Acxiom concluded that "the claims are indeed false and that the data,
which has been readily available across multiple environments, does not come
from Acxiom and is in no way the subject of an Acxiom breach". The data
contained almost 52M unique email addresses.

Breach date: 21 June 2020
Date added to HIBP: 22 November 2022
Compromised accounts: 51,730,831
Compromised data: Email addresses, IP addresses, Names, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


NULLED.CH

In May 2020, the hacking forum Nulled.ch was breached and the data published to
a rival hacking forum. Over 43k records were compromised and included IP and
email addresses, usernames and passwords stored as salted MD5 hashes alongside
the private message history of the website's admin. The data was provided to
HIBP by a source who requested it be attributed to "Split10".

Breach date: 20 May 2020
Date added to HIBP: 24 May 2020
Compromised accounts: 43,491
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


NULLED.CR

In May 2016, the cracking community forum known as Nulled.cr was hacked and 599k
user accounts were leaked publicly. The compromised data included email and IP
addresses, weak salted MD5 password hashes and hundreds of thousands of private
messages between members.

Breach date: 6 May 2016
Date added to HIBP: 9 May 2016
Compromised accounts: 599,080
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Private messages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


NURSERYCAM

In February 2021, a series of egregiously bad security flaws were identified in
the NurseryCam system designed for parents to remotely monitor their children
whilst attending nursery. The flaws led to the exposure of over 10k parent
records before the service was shut down. The email addresses alone were
provided to Have I Been Pwned to ensure parents were properly notified of the
incident.

Breach date: 12 February 2021
Date added to HIBP: 23 February 2021
Compromised accounts: 10,585
Compromised data: Email addresses
Permalink

--------------------------------------------------------------------------------


NVIDIA

In February 2022, microchip company NVIDIA suffered a data breach that exposed
employee credentials and proprietary code. Impacted data included over 70k
employee email addresses and NTLM password hashes, many of which were
subsequently cracked and circulated within the hacking community.

Breach date: 23 February 2022
Date added to HIBP: 2 March 2022
Compromised accounts: 71,335
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


OGUSERS (2019 BREACH)

In May 2019, the account hijacking and SIM swapping forum OGusers suffered a
data breach. The breach exposed a database backup from December 2018 which was
published on a rival hacking forum. There were 161k unique email addresses
spread across 113k forum users and other tables in the database. The exposed
data also included usernames, IP addresses, private messages and passwords
stored as salted MD5 hashes.

Breach date: 26 December 2018
Date added to HIBP: 19 May 2019
Compromised accounts: 161,143
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


OGUSERS (2020 BREACH)

In April 2020, the account hijacking and SIM swapping forum OGUsers suffered
their second data breach in less than a year. As with the previous breach, the
exposed data included email and IP addresses, usernames, private messages and
passwords stored as salted MD5 hashes. A total of 263k email addresses across
user accounts and other tables were posted to a rival hacking forum.

Breach date: 2 April 2020
Date added to HIBP: 4 April 2020
Compromised accounts: 263,189
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


OGUSERS (2021 BREACH)

In April 2021, the account hijacking and SIM swapping forum OGusers suffered a
data breach, the fourth since December 2018. The breach was subsequently sold on
a rival hacking forum and contained usernames, email and IP addresses and
passwords stored as either salted MD5 or argon2 hashes. A total of 348k unique
email addresses appeared in the breach.

Breach date: 11 April 2021
Date added to HIBP: 16 May 2022
Compromised accounts: 348,302
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


OGUSERS (2022 BREACH)

In July 2022, the account hijacking and SIM swapping forum OGusers suffered a
data breach, the fifth since December 2018. The breach contained usernames,
email and IP addresses and passwords stored as argon2 hashes. A total of 529k
unique email addresses appeared in the breach.

Breach date: 13 July 2022
Date added to HIBP: 14 April 2023
Compromised accounts: 529,020
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


OMGPOP

In approximately 2013, the maker of the Draw Something game OMGPOP suffered a
data breach. Formerly known as i'minlikewithyou or iilwy and later purchased by
Zynga, the breach exposed over 7M email address and plain text password pairs
which were later leaked in 2019.

Breach date: 1 January 2013
Date added to HIBP: 20 November 2023
Compromised accounts: 7,071,293
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ONLINER SPAMBOT

In August 2017, a spambot by the name of Onliner Spambot was identified by
security researcher Benkow moʞuƎq. The malicious software contained a
server-based component located on an IP address in the Netherlands which exposed
a large number of files containing personal information. In total, there were
711 million unique email addresses, many of which were also accompanied by
corresponding passwords. A full write-up on what data was found is in the blog
post titled Inside the Massive 711 Million Record Onliner Spambot Dump.

Breach date: 28 August 2017
Date added to HIBP: 29 August 2017
Compromised accounts: 711,477,622
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ONVERSE

In January 2016, the online virtual world known as Onverse was hacked and 800k
accounts were exposed. Along with email and IP addresses, the site also exposed
salted MD5 password hashes.

Breach date: 1 January 2016
Date added to HIBP: 6 September 2016
Compromised accounts: 800,157
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


OPEN CS:GO

In December 2017, the website for purchasing Counter-Strike skins known as Open
CS:GO (Counter-Strike: Global Offensive) suffered a data breach (address since
redirects to dropgun.com). The 10GB file contained an extensive amount of
personal information including email and IP addresses, phone numbers, physical
addresses and purchase histories. Numerous attempts were made to contact Open
CS:GO about the incident, however no responses were received.

Breach date: 28 November 2017
Date added to HIBP: 15 January 2018
Compromised accounts: 512,311
Compromised data: Avatars, Email addresses, IP addresses, Phone numbers,
Physical addresses, Purchases, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


OPEN SUBTITLES

In August 2021, the subtitling website Open Subtitles suffered a data breach and
subsequent ransom demand. The breach exposed almost 7M subscribers' personal
data including email and IP addresses, usernames, the country of the user and
passwords stored as unsalted MD5 hashes.

Breach date: 1 August 2021
Date added to HIBP: 19 January 2022
Compromised accounts: 6,783,158
Compromised data: Email addresses, Geographic locations, IP addresses,
Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ORDERSNAPP

In June 2020, the restaurant solutions provider OrderSnapp suffered a data
breach which exposed 1.3M unique email addresses. Impacted data also included
names, phone numbers, dates of birth and passwords stored as bcrypt hashes. The
data was provided to HIBP by dehashed.com.

Breach date: 29 June 2020
Date added to HIBP: 8 August 2021
Compromised accounts: 1,304,447
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers
Permalink

--------------------------------------------------------------------------------


ORDINE AVVOCATI DI ROMA

In May 2019, the Lawyers Order of Rome suffered a data breach by a group
claiming to be Anonymous Italy. Data on tens of thousands of Roman lawyers was
taken from the breached system and redistributed online. The data included
contact information, email addresses and email messages themselves encompassing
tens of thousands of unique email addresses. A total of 42k unique addresses
appeared in the breach.

Breach date: 7 May 2019
Date added to HIBP: 26 May 2019
Compromised accounts: 41,960
Compromised data: Email addresses, Email messages, Geographic locations,
Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


OVH

In mid-2015, the forum for the hosting provider known as OVH suffered a data
breach. The vBulletin forum contained 453k accounts including usernames, email
and IP addresses and passwords stored as salted MD5 hashes.

Breach date: 1 May 2015
Date added to HIBP: 27 December 2016
Compromised accounts: 452,899
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


OWNEDCORE

In approximately August 2013, the World of Warcraft exploits forum known as
OwnedCore was hacked and more than 880k accounts were exposed. The vBulletin
forum included IP addresses and passwords stored as salted hashes using a weak
implementation enabling many to be rapidly cracked.

Breach date: 1 August 2013
Date added to HIBP: 6 February 2016
Compromised accounts: 880,331
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


OXFAM

In January 2021, Oxfam Australia was the victim of a data breach which exposed
1.8M unique email addresses of supporters of the charity. The data was put up
for sale on a popular hacking forum and also included names, phone numbers,
addresses, genders and dates of birth. A small number of people also had partial
credit card data exposed (the first 6 and last 3 digits of the card, plus card
type and expiry) and in some cases the bank name, account number and BSB were
also exposed. The data was subsequently made freely available on the hacking
forum later the following month.

Breach date: 20 January 2021
Date added to HIBP: 2 March 2021
Compromised accounts: 1,834,006
Compromised data: Bank account numbers, Dates of birth, Email addresses,
Genders, Names, Partial credit card data, Payment histories, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


PADDY POWER

In October 2010, the Irish bookmaker Paddy Power suffered a data breach that
exposed 750,000 customer records with nearly 600,000 unique email addresses. The
breach was not disclosed until July 2014 and contained extensive personal
information including names, addresses, phone numbers and plain text security
questions and answers.

Breach date: 25 October 2010
Date added to HIBP: 11 October 2015
Compromised accounts: 590,954
Compromised data: Account balances, Dates of birth, Email addresses, IP
addresses, Names, Phone numbers, Physical addresses, Security questions and
answers, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


PAMPLING

In January 2020, the online clothing retailer Pampling suffered a data breach
that exposed 383k unique customer email addresses. The data was later shared on
a popular hacking forum and also included names, usernames and unsalted MD5
password hashes.

Breach date: 4 January 2020
Date added to HIBP: 31 August 2023
Compromised accounts: 383,468
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PARAGON CHEATS

In May 2021, the Grand Theft Auto Online cheats website Paragon Cheats suffered
a data breach that lead to the shutdown of the service. The breach exposed 188k
customer records including usernames, email and IP addresses. The data was
provided to HIBP by a source who requested it be attributed to "VRAirhead and
xFueY".

Breach date: 22 May 2021
Date added to HIBP: 14 May 2022
Compromised accounts: 188,089
Compromised data: Browser user agent details, Email addresses, IP addresses,
Usernames
Permalink

--------------------------------------------------------------------------------


PARKMOBILE

In March 2021, the mobile parking app service ParkMobile suffered a data breach
which exposed 21 million customers' personal data. The impacted data included
email addresses, names, phone numbers, vehicle licence plates and passwords
stored as bcrypt hashes. The following month, the data appeared on a public
hacking forum where it was extensively redistributed.

Breach date: 21 March 2021
Date added to HIBP: 30 April 2021
Compromised accounts: 20,949,825
Compromised data: Email addresses, Licence plates, Names, Passwords, Phone
numbers
Permalink

--------------------------------------------------------------------------------


PATREON

In October 2015, the crowdfunding site Patreon was hacked and over 16GB of data
was released publicly. The dump included almost 14GB of database records with
more than 2.3M unique email addresses, millions of personal messages and
passwords stored as bcrypt hashes.

Breach date: 1 October 2015
Date added to HIBP: 2 October 2015
Compromised accounts: 2,330,382
Compromised data: Email addresses, Passwords, Payment histories, Physical
addresses, Private messages, Website activity
Permalink

--------------------------------------------------------------------------------


PAYASUGYM

In December 2016, an attacker breached PayAsUGym's website exposing over 400k
customers' personal data. The data was consequently leaked publicly and broadly
distributed via Twitter. The leaked data contained personal information
including email addresses and passwords hashed using MD5 without a salt.

Breach date: 15 December 2016
Date added to HIBP: 17 December 2016
Compromised accounts: 400,260
Compromised data: Browser user agent details, Email addresses, IP addresses,
Names, Partial credit card data, Passwords, Phone numbers, Website activity
Permalink

--------------------------------------------------------------------------------


PAYHERE

In late March 2022, the Sri Lankan payment gateway PayHere suffered a data
breach that exposed more than 65GB of payment records including over 1.5M unique
email addresses. The data also included IP and physical addresses, names, phone
numbers, purchase histories and partially obfuscated credit card data (card
type, first 6 and last 4 digits plus expiry date). A month later, PayHere
published a blog on the incident titled Ensuring Integrity on PayHere
Cybersecurity Incident.

Breach date: 27 March 2022
Date added to HIBP: 2 May 2022
Compromised accounts: 1,580,249
Compromised data: Email addresses, IP addresses, Names, Partial credit card
data, Phone numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


PAYSYSTEM.TECH

In mid-2022, data alleged to have been sourced from the Russian payment provider
PaySystem.tech appeared in hacking circles where it was made publicly available
for download. Consisting of 16M rows with 1.4M unique email addresses, the data
also included purchases and full credit card numbers and expiry dates. The data
could not be independently attributed back to PaySystem.tech and the breach has
been flagged as "unverified".

Breach date: 29 April 2022
Date added to HIBP: 8 October 2023
Compromised accounts: 1,410,764
Compromised data: Credit cards, Email addresses, Purchases
Permalink

--------------------------------------------------------------------------------


PAYTM

In August 2020, the Indian payment provider Paytm was reported as having
suffered a data breach and subsequent ransom demand, after which the data was
circulated publicly. Further investigation into the data concluded that the
breach was fabricated and did not originate from Paytm. The impacted data
covered 3.4M unique email addresses along with names, phone numbers, genders,
dates of birth, income levels and previous purchases.

Breach date: 30 August 2020
Date added to HIBP: 26 July 2022
Compromised accounts: 3,395,101
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Income levels, Names, Phone numbers, Purchases
Permalink

--------------------------------------------------------------------------------


PEATIX

In January 2019, the event organising platform Peatix suffered a data breach.
The incident exposed 4.2M email addresses, names and salted password hashes. The
data was provided to HIBP by dehashed.com.

Breach date: 20 January 2019
Date added to HIBP: 6 December 2020
Compromised accounts: 4,227,907
Compromised data: Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


PEMIBLANC

In April 2018, a credential stuffing list containing 111 million email addresses
and passwords known as Pemiblanc was discovered on a French server. The list
contained email addresses and passwords collated from different data breaches
and used to mount account takeover attacks against other services. Read more
about the incident.

Breach date: 2 April 2018
Date added to HIBP: 9 July 2018
Compromised accounts: 110,964,206
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


PEOPLE'S ENERGY

In December 2020, the UK power company People's Energy suffered a data breach.
The breach exposed almost 7GB of files containing 359k unique email addresses
along with names, phones numbers, physical addresses and dates of birth. The
incident also included People's Energy staff email addresses and bcrypt password
hashes (no customer passwords were exposed). The data was provided to HIBP by a
source who requested it be attributed to pom@pompur.in.

Breach date: 16 December 2020
Date added to HIBP: 23 February 2021
Compromised accounts: 358,822
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


PETFLOW

In December 2017, the pet care delivery service PetFlow suffered a data breach
which consequently appeared for sale on a dark web marketplace. Almost 1M
accounts were impacted and exposed email addresses and passwords stored as
unsalted MD5 hashes. The data was provided to HIBP by a source who requested it
be attributed to "nano@databases.pw".

Breach date: 9 December 2017
Date added to HIBP: 26 May 2020
Compromised accounts: 990,919
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


PHISHED DATA VIA CERT POLAND

In August 2023, CERT Poland observed a phishing campaign that collected
credentials from 68k victims. The campaign collected email addresses and
passwords via a phishing email masquerading as a purchase order confirmation.
CERT Poland identified a further 202 other phishing campaigns operating on the
same C2 server, which has now been dismantled.

Breach date: 25 February 2023
Date added to HIBP: 31 August 2023
Compromised accounts: 67,943
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


PHOENIX

In mid-2021, the "vintage messaging reborn" service Phoenix suffered a data
breach that exposed 75k unique email addresses. The breach also exposed IP
addresses, usernames and passwords.

Breach date: 5 June 2021
Date added to HIBP: 17 October 2023
Compromised accounts: 74,776
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PHONE HOUSE ESPAÑA

In April 2021, the Spanish retailer Phone House allegedly suffered a ransomware
attack that also exposed significant volumes of customer data. Attributed to the
Babuk ransomware, a collection of data alleged to be a subset of a larger corpus
was posted to a dark web site and contained 5.2M email addresses along with
names, nationalities, genders, dates of birth, phone numbers and physical
addresses. Phone House has been threatened with further releases if a ransom is
not paid.

Breach date: 8 April 2021
Date added to HIBP: 22 April 2021
Compromised accounts: 5,223,350
Compromised data: Dates of birth, Email addresses, Genders, Names,
Nationalities, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


PHP FREAKS

In October 2015, the PHP discussion board PHP Freaks was hacked and 173k user
accounts were publicly leaked. The breach included multiple personal data
attributes as well as salted and hashed passwords.

Breach date: 27 October 2015
Date added to HIBP: 30 October 2015
Compromised accounts: 173,891
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


PIXEL FEDERATION

In December 2013, a breach of the web-based game community based in Slovakia
exposed over 38,000 accounts which were promptly posted online. The breach
included email addresses and unsalted MD5 hashed passwords, many of which were
easily converted back to plain text.

Breach date: 4 December 2013
Date added to HIBP: 6 December 2013
Compromised accounts: 38,108
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


PIXLR

In October 2020, the online photo editing application Pixlr suffered a data
breach exposing 1.9 million subscribers. Impacted data included names, email
addresses, social media profiles, the country signed up from and passwords
stored as SHA-512 hashes. The data was provided to HIBP by dehashed.com.

Breach date: 7 October 2020
Date added to HIBP: 1 February 2021
Compromised accounts: 1,906,808
Compromised data: Email addresses, Geographic locations, Names, Passwords,
Social media profiles
Permalink

--------------------------------------------------------------------------------


PIZAP

In approximately December 2017, the online photo editing site piZap suffered a
data breach. The data was later placed up for sale on a dark web marketplace
along with a collection of other data breaches in February 2019. A total of 42
million unique email addresses were included in the breach alongside names,
genders and links to Facebook profiles when the social media platform was used
to authenticate to piZap. When accounts were created directly on piZap without
using Facebook for authentication, passwords stored as SHA-1 hashes were also
exposed. The data was provided to HIBP by a source who requested it be
attributed to "JimScott.Sec@protonmail.com".

Breach date: 7 December 2017
Date added to HIBP: 16 July 2019
Compromised accounts: 41,817,893
Compromised data: Email addresses, Genders, Geographic locations, Names,
Passwords, Social media profiles, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


PLANET CALYPSO

In approximately July 2019, the forums for the Planet Calypso game suffered a
data breach. The breach of the vBulletin based forum exposed email and IP
addresses, usernames and passwords stored as salted MD5 hashes.

Breach date: 1 July 2019
Date added to HIBP: 12 January 2020
Compromised accounts: 62,261
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PLANET ICE

In January 2023, the UK-based ice skating rink booking service Planet Ice
suffered a data breach. The incident exposed the personal data of 240k people
including email and physical addresses, phone numbers, genders, dates of birth
and passwords stored as MD5 hashes. The data also included the names, genders
and dates of birth of children having parties.

Breach date: 14 January 2023
Date added to HIBP: 31 January 2023
Compromised accounts: 240,488
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Passwords, Phone numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


PLAYBOOK

In September 2021, a publicly accessible PostgresSQL database belonging to the
Playbook service was identified. Run by VC firm Plug and Play Ventures, the
database had been exposed since October 2020 and contained more than 50 thousand
unique email addresses along with names, phone numbers, job titles and passwords
stored as PBKDF2 hashes. It took more than 2 weeks after being notified of the
exposed data to properly secure it. It's unknown whether Plug and Play Ventures
notified impacted individuals as they ceased responding to queries from the
press.

Breach date: 19 October 2020
Date added to HIBP: 11 October 2021
Compromised accounts: 50,538
Compromised data: Email addresses, Job titles, Names, Passwords, Phone numbers,
Social media profiles
Permalink

--------------------------------------------------------------------------------


PLAYCYBERGAMES

In August 2023, PlayCyberGames which "allows users to play any games with LAN
function or games using IP address" suffered a data breach which exposed 3.7M
customer records. The data included email addresses, usernames and MD5 password
hashes with a constant value in the "salt" field. PlayCyberGames did not respond
to multiple attempts to disclose the breach.

Breach date: 9 August 2023
Date added to HIBP: 31 August 2023
Compromised accounts: 3,681,753
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PLEX

In July 2015, the discussion forum for Plex media centre was hacked and over
327k accounts exposed. The IP.Board forum included IP addresses and passwords
stored as salted hashes using a weak implementation enabling many to be rapidly
cracked.

Breach date: 2 July 2015
Date added to HIBP: 8 February 2016
Compromised accounts: 327,314
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PLUTO TV

In October 2018, the internet television service Pluto TV suffered a data breach
which was then shared extensively in hacking communities. Pluto TV "decided not
to proactively inform users of the breach" which contained 3.2M unique email and
IP addresses, names, usernames, genders, dates of birth and passwords stored as
bcrypt hashes. The data was provided to HIBP by dehashed.com.

Breach date: 12 October 2018
Date added to HIBP: 5 December 2020
Compromised accounts: 3,225,080
Compromised data: Dates of birth, Device information, Email addresses, Genders,
IP addresses, Names, Passwords, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


POKÉBIP

In July 2015, the French Pokémon site Pokébip suffered a data breach which
exposed 657k subscriber identities. The data included email and IP addresses,
usernames and passwords stored as unsalted MD5 hashes.

Breach date: 28 July 2015
Date added to HIBP: 9 September 2016
Compromised accounts: 657,001
Compromised data: Email addresses, IP addresses, Passwords, Time zones,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


POKÉMON CREED

In August 2014, the Pokémon RPG website Pokémon Creed was hacked after a dispute
with rival site, Pokémon Dusk. In a post on Facebook, "Cruz Dusk" announced the
hack then pasted the dumped MySQL database on pkmndusk.in. The breached data
included over 116k usernames, email addresses and plain text passwords.

Breach date: 8 August 2014
Date added to HIBP: 10 August 2014
Compromised accounts: 116,465
Compromised data: Email addresses, Genders, IP addresses, Passwords, Usernames,
Website activity
Permalink

--------------------------------------------------------------------------------


POKÉMON NEGRO

In approximately October 2016, the Spanish Pokémon site Pokémon Negro suffered a
data breach. The attack resulted in the disclosure of 830k accounts including
email and IP addresses along with plain text passwords. Pokémon Negro did not
respond when contacted about the breach.

Breach date: 1 October 2016
Date added to HIBP: 3 January 2017
Compromised accounts: 830,155
Compromised data: Email addresses, IP addresses, Passwords
Permalink

--------------------------------------------------------------------------------


POLICEONE

In February 2017, the law enforcement website PoliceOne confirmed they'd
suffered a data breach. The breach contained over 700k accounts which appeared
for sale by a data broker and included email and IP addresses, usernames and
salted MD5 password hashes. The file the data was contained in indicated the
original breach dated back to July 2014.

Breach date: 1 July 2014
Date added to HIBP: 15 November 2017
Compromised accounts: 709,926
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


POLISH CREDENTIALS

In May 2023, a credential stuffing list of 6.3M Polish email address and
password pairs appeared on a local forum. Likely obtained by malware running on
victims' machines, each record included an email address and plain text password
alongside the website the credentials were used on. The data included 1.2M
unique email addresses.

Breach date: 29 May 2023
Date added to HIBP: 30 May 2023
Compromised accounts: 1,204,870
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


POSHMARK

In mid-2018, social commerce marketplace Poshmark suffered a data breach that
exposed 36M user accounts. The compromised data included email addresses, names,
usernames, genders, locations and passwords stored as bcrypt hashes. The data
was provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 16 May 2018
Date added to HIBP: 2 September 2019
Compromised accounts: 36,395,491
Compromised data: Email addresses, Genders, Geographic locations, Names,
Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


POWERBOT

In approximately September 2014, the RuneScape bot website Powerbot suffered a
data breach resulting in the exposure of over half a million unique user
records. The data contained email and IP addresses, usernames and salted MD5
hashes of passwords. The site was previously reported as compromised on the
Vigilante.pw breached database directory.

Breach date: 1 September 2014
Date added to HIBP: 1 July 2017
Compromised accounts: 503,501
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PPCGEEKS

In August 2016, the pocket PC fan site forum PPCGeeks suffered a data breach
that exposed over 490k records. The breach of the vBulletin forum exposed email
and IP addresses, usernames, dates of birth and passwords stored as salted MD5
hashes. The data was provided to HIBP by a source who requested it be attributed
to "fall1984@protonmail.com".

Breach date: 19 August 2016
Date added to HIBP: 18 July 2022
Compromised accounts: 492,518
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


PREEN.ME

In May 2020, social media marketing company Preen.Me was the target of a ransom
attack that resulted in hundreds of thousands of records being publicly posted.
Over 236k unique email addresses were exposed in the attack alongside names,
usernames and links to social media profiles.

Breach date: 25 May 2020
Date added to HIBP: 26 May 2022
Compromised accounts: 236,105
Compromised data: Email addresses, Names, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


PROCTORU

In June 2020, the online exam service ProctorU suffered a data breach which was
subsequently shared extensively across online hacking communities. The breach
contained 444k user records including names, email and physical addresses,
phones numbers and passwords stored as bcrypt hashes. The data was provided to
HIBP by breachbase.pw.

Breach date: 26 June 2020
Date added to HIBP: 6 August 2020
Compromised accounts: 444,453
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses, Usernames
Permalink

--------------------------------------------------------------------------------


PROGRAMMING FORUMS

In approximately late 2015, the programming forum at programmingforums.org
suffered a data breach resulting in the exposure of 707k unique user records.
The data contained email and IP addresses, usernames and salted MD5 hashes of
passwords. The site was previously reported as compromised on the Vigilante.pw
breached database directory.

Breach date: 1 December 2015
Date added to HIBP: 1 July 2017
Compromised accounts: 707,432
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PROMO

In July 2020, the self-proclaimed "World's #1 Marketing Video Maker" Promo
suffered a data breach which was then shared extensively on a hacking forum. The
incident exposed 22 million records containing almost 15 million unique email
addresses alongside IP addresses, genders, names and salted SHA-256 password
hashes. The data was provided to HIBP by dehashed.com.

Breach date: 22 June 2020
Date added to HIBP: 26 July 2020
Compromised accounts: 14,610,585
Compromised data: Email addresses, Genders, IP addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


PROMOFARMA

In August 2019, a data breach from the Spanish online pharmacy Promofarma
appeared for sale on a dark web marketplace. The breach exposed over 2.7M
records and contained almost 1.3M unique customer email addresses. The data also
included customer names and was provided to HIBP by dehashed.com.

Breach date: 3 August 2019
Date added to HIBP: 1 November 2020
Compromised accounts: 1,277,761
Compromised data: Email addresses, Names
Permalink

--------------------------------------------------------------------------------


PROPTIGER

In January 2018, the Indian property website PropTiger suffered a data breach
which resulted in a 3.46GB database file being exposed and subsequently shared
extensively on a popular hacking forum 2 years later. The exposed data contained
both user records and login histories with over 2M unique customer email
addresses. Exposed data also included additional personal attributes such as
names, dates of birth, genders, IP addresses and passwords stored as MD5 hashes.
PropTiger advised they believe the usability of the data is "limited" due to how
certain data attributes were generated and stored. The data was provided to HIBP
by dehashed.com.

Breach date: 30 January 2018
Date added to HIBP: 24 March 2020
Compromised accounts: 2,156,921
Compromised data: Dates of birth, Device information, Email addresses, Genders,
IP addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


PROTEMPS

In October 2021, the Singaporean recruitment website Protemps suffered a data
breach that exposed almost 50,000 unique email addresses. The impacted data
includes names, email and physical addresses, phone numbers, passport numbers
and passwords stored as unsalted MD5 hashes, among troves of other jobseeker
data. The data was provided to HIBP by a source who requested it be attributed
to "white_peacock@riseup.net".

Breach date: 4 October 2021
Date added to HIBP: 20 December 2021
Compromised accounts: 49,591
Compromised data: Email addresses, Genders, Job applications, Marital statuses,
Names, Nationalities, Passport numbers, Passwords, Phone numbers, Physical
addresses, Religions, Salutations
Permalink

--------------------------------------------------------------------------------


PS3HAX

In approximately July 2015, the Sony Playstation hacks and mods forum known as
PS3Hax was hacked and more than 447k accounts were exposed. The vBulletin forum
included IP addresses and passwords stored as salted hashes using a weak
implementation enabling many to be rapidly cracked.

Breach date: 1 July 2015
Date added to HIBP: 7 February 2016
Compromised accounts: 447,410
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PSP ISO

In approximately September 2015, the PlayStation PSP forum known as PSP ISO was
hacked and almost 1.3 million accounts were exposed. Along with email and IP
addresses, the vBulletin forum also exposed salted MD5 password hashes.

Breach date: 25 September 2015
Date added to HIBP: 29 January 2017
Compromised accounts: 1,274,070
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PSX-SCENE

In approximately February 2015, the Sony Playstation forum known as PSX-Scene
was hacked and more than 340k accounts were exposed. The vBulletin forum
included IP addresses and passwords stored as salted hashes using a weak
implementation enabling many to be rapidly cracked.

Breach date: 1 February 2015
Date added to HIBP: 7 February 2016
Compromised accounts: 341,118
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


PUBLIC BUSINESS DATA

In approximately August 2021, hundreds of gigabytes of business data collated
from public sources was obtained and later published to a popular hacking forum.
Sourced from a customer of Bureau van Dijk's (BvD) "Orbis" product, the corpus
of data released contained hundreds of millions of lines about corporations and
individuals, including personal information such as names and dates of birth.
The data also included 28M unique email addresses along with physical addresses
(presumedly corporate locations), phone numbers and job titles. There was no
unauthorised access to BvD's systems, nor did the incident expose any of their
or parent company's Moody's clients.

Breach date: 19 August 2021
Date added to HIBP: 9 October 2023
Compromised accounts: 27,917,714
Compromised data: Dates of birth, Email addresses, Job titles, Names, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


QAKBOT

In August 2023, the US Justice Department announced a multinational operation
involving actions in the United States, France, Germany, the Netherlands, and
the United Kingdom to disrupt the botnet and malware known as Qakbot and take
down its infrastructure. After the takedown, 6.43M email addresses were provided
to HIBP to help notify victims of the malware.

Breach date: 29 August 2023
Date added to HIBP: 29 August 2023
Compromised accounts: 6,431,319
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


QATAR NATIONAL BANK

In July 2015, the Qatar National Bank suffered a data breach which exposed 15k
documents totalling 1.4GB and detailing more than 100k accounts with passwords
and PINs. The incident was made public some 9 months later in April 2016 when
the documents appeared publicly on a file sharing site. Analysis of the breached
data suggests the attack began by exploiting a SQL injection flaw in the bank's
website.

Breach date: 1 July 2015
Date added to HIBP: 1 May 2016
Compromised accounts: 88,678
Compromised data: Bank account numbers, Customer feedback, Dates of birth,
Financial transactions, Genders, Geographic locations, Government issued IDs, IP
addresses, Marital statuses, Names, Passwords, Phone numbers, Physical
addresses, PINs, Security questions and answers, Spoken languages
Permalink

--------------------------------------------------------------------------------


QIP

In mid-2011, the Russian instant messaging service known as QIP (Quiet Internet
Pager) suffered a data breach. The attack resulted in the disclosure of over 26
million unique accounts including email addresses and passwords with the data
eventually appearing in public years later.

Breach date: 1 June 2011
Date added to HIBP: 8 January 2017
Compromised accounts: 26,183,992
Compromised data: Email addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


QUANTUM BOOTER

In March 2014, the booter service Quantum Booter (also referred to as Quantum
Stresser) suffered a breach which lead to the disclosure of their internal
database. The leaked data included private discussions relating to malicious
activity Quantum Booter users were performing against online adversaries,
including the IP addresses of those using the service to mount DDoS attacks.

Breach date: 18 March 2014
Date added to HIBP: 4 April 2015
Compromised accounts: 48,592
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


QUESTIONPRO

In May 2022, the survey website QuestionPro was the target of an extortion
attempt relating to an alleged data breach. Over 100GB of data containing 22M
unique email addresses (some of which appear to be generated by the platform),
are alleged to have been extracted from the service along with IP addresses,
browser user agents and results relating to surveys. QuestionPro would not
confirm whether a breach had occurred (although they did confirm they were the
target of an extortion attempt), so the data was initially flagged as
"unverified". Subsequent verification by impacted HIBP subscribers later led to
the removal of the unverified flag.

Breach date: 21 May 2022
Date added to HIBP: 5 August 2022
Compromised accounts: 22,229,637
Compromised data: Browser user agent details, Email addresses, IP addresses,
Survey results
Permalink

--------------------------------------------------------------------------------


QUIDD

In 2019, online marketplace for trading stickers, cards, toys, and other
collectibles Quidd suffered a data breach. The breach exposed almost 4 million
users' email addresses, usernames and passwords stored as bcrypt hashes. The
data was subsequently sold then redistributed extensively via hacking forums.

Breach date: 1 July 2019
Date added to HIBP: 24 June 2020
Compromised accounts: 3,805,863
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


QUINSTREET

In approximately late 2015, the maker of "performance marketing products"
QuinStreet had a number of their online assets compromised. The attack impacted
28 separate sites, predominantly technology forums such as flashkit.com,
codeguru.com and webdeveloper.com (view a full list of sites). QuinStreet
advised that impacted users have been notified and passwords reset. The data
contained details on over 4.9 million people and included email addresses, dates
of birth and salted MD5 hashes.

Breach date: 14 December 2015
Date added to HIBP: 17 December 2016
Compromised accounts: 4,907,802
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


R2 (2017 FORUM BREACH)

In early 2017, the forum for the gaming website R2 Games was hacked. R2 had
previously appeared on HIBP in 2015 after a prior incident. This one exposed
over 1 million unique user accounts and corresponding MD5 password hashes with
no salt.

Breach date: 1 January 2017
Date added to HIBP: 25 April 2017
Compromised accounts: 1,023,466
Compromised data: Email addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


R2GAMES

In late 2015, the gaming website R2Games was hacked and more than 2.1M personal
records disclosed. The vBulletin forum included IP addresses and passwords
stored as salted hashes using a weak implementation enabling many to be rapidly
cracked. A further 11M accounts were added to "Have I Been Pwned" in March 2016
and another 9M in July 2016 bringing the total to over 22M.

Breach date: 1 November 2015
Date added to HIBP: 9 February 2016
Compromised accounts: 22,281,337
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


RAIDFORUMS

In May 2023, 478k user records from the now defunct hacking forum known as
"RaidForums" was posted to another hacking forum. The data dated back to
September 2020 and included email addresses, usernames, dates of birth, IP
addresses and passwords stored as Argon2 hashes. The data was provided to HIBP
by a source who requested it be attributed to "white_peacock@riseup.net".

Breach date: 24 September 2020
Date added to HIBP: 31 May 2023
Compromised accounts: 478,604
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


RAILYATRI

In December 2022, India’s government-approved online travel agency RailYatri
suffered a data breach. The incident impacted over 31M customers and exposed 23M
unique email addresses. Also impacted were names, genders, phone numbers and
tickets purchased, including travel information and fares.

Breach date: 26 December 2022
Date added to HIBP: 5 December 2023
Compromised accounts: 23,209,732
Compromised data: Email addresses, Genders, Names, Phone numbers, Purchases
Permalink

--------------------------------------------------------------------------------


RAMBLER

In late 2016, a data dump of almost 100M accounts from Rambler, sometimes
referred to as "The Russian Yahoo", was discovered being traded online. The data
set provided to Have I Been Pwned included 91M unique usernames (which also form
part of Rambler email addresses) and plain text passwords. According to Rambler,
the data dates back to March 2014.

Breach date: 1 March 2014
Date added to HIBP: 1 November 2016
Compromised accounts: 91,436,280
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


RANKWATCH

In approximately November 2016, the search engine optimisation management
company RankWatch exposed a Mongo DB with no password publicly whereupon their
data was exfiltrated and posted to an online forum. The data contained 7.4
million unique email addresses along with names, employers, phone numbers and
job titles in a table called "us_emails". When contacted and advised of the
incident, RankWatch would not reveal the purpose of the data, where it had been
acquired from and whether the data owners had consented to its collection. The
forum which originally posted the data explained it as being "in the same vein
as the modbsolutions leak", a large list of corporate data allegedly used for
spam purposes.

Breach date: 19 November 2016
Date added to HIBP: 3 November 2017
Compromised accounts: 7,445,067
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers
Permalink

--------------------------------------------------------------------------------


RAYCHAT

In January 2021, the now defunct Iranian social media platform Raychat suffered
a data breach that exposed 939 thousand unique email addresses. The data
included names, IP addresses, browser user agent strings and passwords stored as
bcrypt hashes. The data was provided to HIBP by dehashed.com.

Breach date: 31 January 2021
Date added to HIBP: 4 July 2021
Compromised accounts: 938,981
Compromised data: Browser user agent details, Email addresses, IP addresses,
Names, Passwords
Permalink

--------------------------------------------------------------------------------


RBX.ROCKS

In August 2018, the Roblox trading site Rbx.Rocks suffered a data breach. Almost
25k records were sent to HIBP in November and included names, email addresses
and passwords stored as bcrypt hashes. In July 2019, a further 125k records
emerged bringing the total size of the incident to 150k. The website has since
gone offline with a message stating that "Rbx.Rocks v2.0 is currently under
construction".

Breach date: 6 August 2018
Date added to HIBP: 7 November 2018
Compromised accounts: 149,958
Compromised data: Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


READ NOVEL

In May 2019, the Chinese literature website Read Novel allegedly suffered a data
breach that exposed 22M unique email addresses. Data also included usernames,
genders, phone numbers and passwords stored as salted MD5 hashes. The data was
provided to HIBP by a source who requested it be attributed to
"white_peacock@riseup.net". Read more about Chinese data breaches in Have I Been
Pwned.

Breach date: 1 May 2019
Date added to HIBP: 16 May 2022
Compromised accounts: 22,424,472
Compromised data: Email addresses, Genders, Passwords, Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


REAL ESTATE MOGUL

In September 2016, the real estate investment site Real Estate Mogul had a Mongo
DB instance compromised and 5GB of data downloaded by an unauthorised party. The
data contained real estate listings including addresses and the names, phone
numbers and 308k unique email addresses of the sellers. Real Estate Mogul was
advised of the incident in September 2018 and stated that they "found no
instance of user account credentials like usernames and passwords nor billing
information within this file".

Breach date: 6 September 2016
Date added to HIBP: 24 September 2018
Compromised accounts: 307,768
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


REALDUDESINC

In October 2022, the GTA mod menu provider RealDudesInc suffered a data breach
that exposed over 100k email addresses (many of which are temporary guest
account addresses). The breach also included usernames and bcrypt password
hashes.

Breach date: 22 October 2022
Date added to HIBP: 19 February 2023
Compromised accounts: 101,543
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


REDDOORZ

In September 2020, the hotel management & booking platform RedDoorz suffered a
data breach that exposed over 5.8M user accounts. The breached data included
names, email addresses, phone numbers, genders, dates of birth and passwords
stored as bcrypt hashes. The data was provided to HIBP by a source who requested
it be attributed to "white_peacock@riseup.net".

Breach date: 4 September 2020
Date added to HIBP: 28 January 2022
Compromised accounts: 5,890,277
Compromised data: Dates of birth, Email addresses, Genders, Names, Occupations,
Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


REDLINE STEALER

In December 2021, logs from the RedLine Stealer malware were left publicly
exposed and were then obtained by security researcher Bob Diachenko. The data
included 441 thousand unique email addresses, usernames and plain text
passwords.

Breach date: 5 December 2021
Date added to HIBP: 30 December 2021
Compromised accounts: 441,657
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


REGPACK

In July 2016, a tweet was posted with a link to an alleged data breach of
BlueSnap, a global payment gateway and merchant account provider. The data
contained 324k payment records across 105k unique email addresses and included
personal attributes such as name, home address and phone number. The data was
verified with multiple Have I Been Pwned subscribers who confirmed it also
contained valid transactions, partial credit card numbers, expiry dates and
CVVs. A downstream consumer of BlueSnap services known as Regpack was
subsequently identified as the source of the data after they identified human
error had left the transactions exposed on a publicly facing server. A full
investigation of the data and statement by Regpack is detailed in the post
titled Someone just lost 324k payment records, complete with CVVs.

Breach date: 20 May 2016
Date added to HIBP: 13 September 2016
Compromised accounts: 104,977
Compromised data: Browser user agent details, Credit card CVV, Email addresses,
IP addresses, Names, Partial credit card data, Phone numbers, Physical
addresses, Purchases
Permalink

--------------------------------------------------------------------------------


REINCUBATE

In October 2020, the app data company Reincubate suffered a data breach which
exposed a backup from November 2017 (the newest record in the data appeared
several months earlier). The data included over 616k unique email addresses,
names and passwords stored as PBKDF2 hashes.

Breach date: 11 May 2017
Date added to HIBP: 29 October 2020
Compromised accounts: 616,146
Compromised data: Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


RENTOMOJO

In April 2023, the Indian rental service RentoMojo suffered a data breach. The
breach exposed over 2M unique email addresses along with names, phone, passport
and Aadhaar numbers, genders, dates of birth, purchases and bcrypt password
hashes.

Breach date: 15 April 2023
Date added to HIBP: 10 May 2023
Compromised accounts: 2,185,697
Compromised data: Dates of birth, Email addresses, Genders, Government issued
IDs, Names, Passport numbers, Passwords, Phone numbers, Purchases, Social media
profiles
Permalink

--------------------------------------------------------------------------------


REPUBLICAN PARTY OF TEXAS

In September 2021, the Republican Party of Texas was hacked by a group claiming
to be "Anonymous" in retaliation for the state's controversial abortion ban. The
September defacement was followed by a leak of data and documents which included
material from the hosting provider Epik. Impacted data included over 72 thousand
unique email addresses across various tables, some also including names,
geographic location data, IP addresses and browser user agents.

Breach date: 11 September 2021
Date added to HIBP: 6 October 2021
Compromised accounts: 72,596
Compromised data: Browser user agent details, Email addresses, Geographic
locations, IP addresses, Names
Permalink

--------------------------------------------------------------------------------


RETINA-X

In February 2017, the mobile device monitoring software developer Retina-X was
hacked and customer data downloaded before being wiped from their servers. The
incident was covered in the Motherboard article titled Inside the 'Stalkerware'
Surveillance Market, Where Ordinary People Tap Each Other's Phones. The service,
used to monitor mobile devices, had 71k email addresses and MD5 hashes with no
salt exposed. Retina-X disclosed the incident in a blog post on April 27, 2017.

Breach date: 23 February 2017
Date added to HIBP: 30 April 2017
Compromised accounts: 71,153
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


REVERBNATION

In January 2014, the online service for assisting musicians to build their
careers ReverbNation suffered a data breach which wasn't identified until
September the following year. The breach contained over 7 million accounts with
unique email addresses and salted SHA1 passwords.

Breach date: 1 January 2014
Date added to HIBP: 5 October 2017
Compromised accounts: 7,040,725
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


RIGHTBIZ

In June 2023, data belonging to the "UK's No.1 Business Marketplace" Rightbiz
appeared on a popular hacking forum. Comprising of more than 18M rows of data,
the breach included 65k unique email addresses along with names, phone numbers
and physical address. Rightbiz didn't respond to mulitple attempts to disclose
the incident. The data was provided to HIBP by a source who requested it be
attributed to "https://discord.gg/gN9C9em".

Breach date: 9 July 2023
Date added to HIBP: 10 August 2023
Compromised accounts: 65,376
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


RIVER CITY MEDIA SPAM LIST

In January 2017, a massive trove of data from River City Media was found exposed
online. The data was found to contain almost 1.4 billion records including email
and IP addresses, names and physical addresses, all of which was used as part of
an enormous spam operation. Once de-duplicated, there were 393 million unique
email addresses within the exposed data.

Breach date: 1 January 2017
Date added to HIBP: 8 March 2017
Compromised accounts: 393,430,309
Compromised data: Email addresses, IP addresses, Names, Physical addresses
Permalink

--------------------------------------------------------------------------------


ROBINHOOD

In November 2021, the online trading platform Robinhood suffered a data breach
after a customer service representative was socially engineered. The incident
exposed over 5M customer email addresses and 2M customer names. The data was
provided to HIBP by a source who requested it be attributed to "Jarand Moen
Romtviet".

Breach date: 3 November 2021
Date added to HIBP: 3 March 2022
Compromised accounts: 5,003,937
Compromised data: Email addresses
Permalink

--------------------------------------------------------------------------------


ROBLOX

In August 2016, Roblox disclosed a data breach that affected over 50k users. The
security incident impacted email and IP addresses, usernames, purchases and
Robux balances which were left exposed on a test server.

Breach date: 31 July 2016
Date added to HIBP: 23 July 2023
Compromised accounts: 52,458
Compromised data: Account balances, Email addresses, IP addresses, Purchases,
Usernames
Permalink

--------------------------------------------------------------------------------


ROBLOX DEVELOPER CONFERENCE

In July 2023, a list of alleged attendees from the 2017-2020 Roblox Developers
Conferences was circulated on a forum. The data contained 4k unique email
addresses along with names, usernames, dates of birth, phone numbers, physical
and IP addresses and T-shirt sizes

Breach date: 18 December 2020
Date added to HIBP: 18 July 2023
Compromised accounts: 3,943
Compromised data: Clothing sizes, Dates of birth, Email addresses, IP addresses,
Names, Phone numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


ROLL20

In December 2018, the tabletop role-playing games website Roll20 suffered a data
breach. Almost 4 million customers were impacted by the breach and had email and
IP addresses, names, bcrypt hashes of passwords and the last 4 digits of credit
cards exposed. The data was provided to HIBP by a source who requested it be
attributed to "JimScott.Sec@protonmail.com".

Breach date: 26 December 2018
Date added to HIBP: 19 July 2019
Compromised accounts: 3,994,436
Compromised data: Email addresses, IP addresses, Names, Partial credit card
data, Passwords
Permalink

--------------------------------------------------------------------------------


ROMWE

In mid-2018, the Hong Kong-based retailer Romwe suffered a data breach which
exposed almost 20 million customers. The data was subsequently sold online and
includes names, phone numbers, email and IP addresses, customer geographic
locations and passwords stored as salted SHA-1 hashes. The data was provided to
HIBP by dehashed.com.

Breach date: 1 June 2018
Date added to HIBP: 18 January 2021
Compromised accounts: 19,531,820
Compromised data: Geographic locations, IP addresses, Names, Passwords, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


ROSEBUTT BOARD

Some time prior to May 2016, the forum known as "Rosebutt Board" was hacked and
107k accounts were exposed. The self-described "top one board for anal fisting,
prolapse, huge insertions and rosebutt fans" had email and IP addresses,
usernames and weakly stored salted MD5 password hashes hacked from the IP.Board
based forum.

Breach date: 9 May 2016
Date added to HIBP: 10 May 2016
Compromised accounts: 107,303
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ROYAL ENFIELD

In January 2020, motorcycle maker Royal Enfield left a database publicly exposed
that resulted in the inadvertent publication of over 400k customers. The
impacted data included email and physical addresses, names, motorcycle
information, social media profiles, passwords, and other personal information.
The data was provided to HIBP by a source who requested it be attributed to
"white_peacock@riseup.net".

Breach date: 1 January 2019
Date added to HIBP: 31 March 2022
Compromised accounts: 420,873
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Physical addresses, Social media profiles, Vehicle details
Permalink

--------------------------------------------------------------------------------


RUSSIAN AMERICA

In approximately 2017, the website for Russian speakers in America known as
Russian America suffered a data breach. The incident exposed 183k unique records
including names, email addresses, phone numbers and passwords stored in both
plain text and as MD5 hashes. Russian America was contacted about the breach but
did not respond.

Breach date: 1 January 2017
Date added to HIBP: 13 September 2018
Compromised accounts: 182,717
Compromised data: Email addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


SAVERSPY

In September 2018, security researcher Bob Diachenko discovered a massive
collection of personal details exposed in an unprotected Mongo DB instance. The
data appears to have been used in marketing campaigns (possibly for spam
purposes) but had little identifying data about it other than a description of
"Yahoo_090618_ SaverSpy". The data set provided to HIBP had almost 2.5M unique
email addresses (all of which were from Yahoo!) alongside names, genders and
physical addresses.

Breach date: 18 September 2018
Date added to HIBP: 25 September 2018
Compromised accounts: 2,457,420
Compromised data: Email addresses, Genders, Names, Physical addresses
Permalink

--------------------------------------------------------------------------------


SC DAILY PHONE SPAM LIST

In early 2015, a spam list known as SC Daily Phone emerged containing almost 33M
identities. The data includes personal attributes such as names, physical and IP
addresses, genders, birth dates and phone numbers. Read more about spam lists in
HIBP.

Breach date: 14 April 2015
Date added to HIBP: 24 November 2016
Compromised accounts: 32,939,105
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Physical addresses
Permalink

--------------------------------------------------------------------------------


SCENTBIRD

In June 2020, the online fragrance service Scentbird suffered a data breach that
exposed the personal information of over 5.8 million customers. Personal
information including names, email addresses, genders, dates of birth, passwords
stored as bcrypt hashes and indicators of password strength were all exposed.
The data was provided to HIBP by breachbase.pw.

Breach date: 22 June 2020
Date added to HIBP: 30 July 2020
Compromised accounts: 5,814,988
Compromised data: Dates of birth, Email addresses, Genders, Names, Password
strengths, Passwords
Permalink

--------------------------------------------------------------------------------


SCHOOL DISTRICT 42

In January 2023, Pitt Meadows School District 42 in British Columbia suffered a
data breach. The incident exposed the names and email addresses of approximately
19k students and staff which were consequently redistributed on a popular
hacking forum.

Breach date: 15 January 2023
Date added to HIBP: 2 February 2023
Compromised accounts: 18,850
Compromised data: Email addresses, Names
Permalink

--------------------------------------------------------------------------------


SEEDPEER

In July 2015, the torrent site Seedpeer was hacked and 282k member records were
exposed. The data included usernames, email addresses and passwords stored as
weak MD5 hashes.

Breach date: 12 July 2015
Date added to HIBP: 9 March 2016
Compromised accounts: 281,924
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SEPHORA

In approximately January 2017, the beauty store Sephora suffered a data breach.
Impacting customers in South East Asia, Australia and New Zealand, 780k unique
email addresses were included in the breach alongside names, genders, dates of
birth, ethnicities and other personal information. The data was provided to HIBP
by a source who requested it be attributed to "JimScott.Sec@protonmail.com".

Breach date: 9 January 2017
Date added to HIBP: 6 October 2019
Compromised accounts: 780,073
Compromised data: Dates of birth, Email addresses, Ethnicities, Genders, Names,
Physical attributes
Permalink

--------------------------------------------------------------------------------


SERVERPACT

In mid-2015, the Dutch Minecraft site ServerPact was hacked and 73k accounts
were exposed. Along with birth dates, email and IP addresses, the site also
exposed SHA1 password hashes with the username as the salt.

Breach date: 1 January 2016
Date added to HIBP: 6 September 2016
Compromised accounts: 73,587
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


SEVENROOMS

In December 2022, over 400GB of data belonging to restaurant customer management
platform SevenRooms was posted for sale to a popular hacking forum. The data
included 1.2M unique email addresses alongside names and purchases. SevenRooms
advised that the breach was due to unauthorised access of "a file transfer
interface of a third-party vendor".

Breach date: 11 December 2022
Date added to HIBP: 24 August 2023
Compromised accounts: 1,205,385
Compromised data: Email addresses, Names, Purchases
Permalink

--------------------------------------------------------------------------------


SHADI.COM

In July 2016, the Muslim dating site Shadi.com suffered a data breach that
exposed over 2M members' email addresses. The breach also exposed passwords
stored as MD5 hashes alongside their plain text equivalents. The data was
provided to HIBP by a source who requested it be attributed to
"fall1984@protonmail.com".

Breach date: 9 July 2016
Date added to HIBP: 20 July 2022
Compromised accounts: 2,021,984
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


SHARETHIS

In July 2018, the social bookmarking and sharing service ShareThis suffered a
data breach. The incident exposed 41 million unique email addresses alongside
names and in some cases, dates of birth and password hashes. In 2019, the data
appeared listed for sale on a dark web marketplace (along with several other
large breaches) and subsequently began circulating more broadly. The data was
provided to HIBP by dehashed.com.

Breach date: 9 July 2018
Date added to HIBP: 3 March 2019
Compromised accounts: 40,960,499
Compromised data: Dates of birth, Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


SHEIN

In June 2018, online fashion retailer SHEIN suffered a data breach. The company
discovered the breach 2 months later in August then disclosed the incident
another month after that. A total of 39 million unique email addresses were
found in the breach alongside MD5 password hashes. The data was provided to HIBP
by a source who requested it be attributed to "JimScott.Sec@protonmail.com".

Breach date: 1 June 2018
Date added to HIBP: 17 July 2019
Compromised accounts: 39,086,762
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


SHITEXPRESS

In August 2022, the online faeces delivery service Shitexpress suffered a data
breach that exposed 24k unique email addresses. The addresses spanned invoices,
gift cards, promotions and PayPal records. The breach also exposed the IP and
email addresses of senders, physical addresses of recipients and messages
accompanying the shit delivery.

Breach date: 8 August 2022
Date added to HIBP: 16 August 2022
Compromised accounts: 23,817
Compromised data: Email addresses, IP addresses, Names, Physical addresses,
Private messages, Purchases
Permalink

--------------------------------------------------------------------------------


SHOCKGORE

In August 2020, the website for sharing graphic videos and images of gore and
animal cruelty suffered a data breach. The breach exposed 74k unique email
addresses alongside usernames, IP addresses, genders and unsalted SHA-1 password
hashes. Private messages were also exposed, many containing requests for
material of a depraved nature. The data was provided to HIBP by a source who
requested it be attributed to "white_peacock@riseup.net".

Breach date: 11 August 2020
Date added to HIBP: 20 January 2022
Compromised accounts: 73,944
Compromised data: Email addresses, Genders, IP addresses, Passwords, Private
messages, Usernames
Permalink

--------------------------------------------------------------------------------


SHOPBACK

In September 2020, the cashback reward program ShopBack suffered a data breach.
The incident exposed over 20 million unique email addresses along with names,
phone numbers, country of residence and passwords stored as salted SHA-1 hashes.
The data was provided to HIBP by dehashed.com.

Breach date: 17 September 2020
Date added to HIBP: 25 April 2021
Compromised accounts: 20,529,819
Compromised data: Email addresses, Geographic locations, Names, Passwords, Phone
numbers
Permalink

--------------------------------------------------------------------------------


SHOPPER+

In March 2023, "Canada's online shopping mall" Shopper+ disclosed a data breach
discovered on a public hacking forum. The breach dated back to September 2020
and included 878k customer records with email and physical addresses, names,
phone numbers and in some cases, genders and dates of birth.

Breach date: 14 September 2020
Date added to HIBP: 11 March 2023
Compromised accounts: 878,290
Compromised data: Dates of birth, Email addresses, Genders, Names, Phone
numbers, Physical addresses, Spoken languages
Permalink

--------------------------------------------------------------------------------


SHORT ÉDITION

In June 2021, the French publishing house of short literature Short Édition
suffered a data breach that exposed 505k records. Impacted data included email
and physical addresses, names, usernames, phone numbers, dates of birth, genders
and passwords stored as either salted SHA-1 or salted SHA-512 hashes. Short
Édition self-submitted the impacted data to HIBP.

Breach date: 26 June 2021
Date added to HIBP: 19 July 2021
Compromised accounts: 505,466
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Physical addresses, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


SHOTBOW

In May 2016, the multiplayer server for Minecraft service Shotbow announced
they'd suffered a data breach. The incident resulted in the exposure of over 1
million unique email addresses, usernames and salted SHA-256 password hashes.

Breach date: 9 May 2016
Date added to HIBP: 29 October 2017
Compromised accounts: 1,052,753
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SIRHURT

In April 2021, the the Roblox cheats website SirHurt suffered a data breach that
exposed over 90k customer records. The exposed data included email and IP
addresses, usernames and passwords stored as MD5 hashes.

Breach date: 23 April 2021
Date added to HIBP: 24 May 2022
Compromised accounts: 90,655
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SITEPOINT

In June 2020, the web development site SitePoint suffered a data breach that
exposed over 1M customer records. Impacted data included email and IP addresses,
names, usernames, bios and passwords stored as bcrypt hashes.

Breach date: 20 June 2020
Date added to HIBP: 17 August 2022
Compromised accounts: 1,021,790
Compromised data: Bios, Email addresses, IP addresses, Names, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


SKTORRENT

In February 2016, the Slovak torrent tracking site SkTorrent was hacked and over
117k records leaked online. The data dump included usernames, email addresses
and passwords stored in plain text.

Breach date: 19 February 2016
Date added to HIBP: 23 February 2016
Compromised accounts: 117,070
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SLICKWRAPS

In February 2020, the online store for consumer electronics wraps Slickwraps
suffered a data breach. The incident resulted in the exposure of 858k unique
email addresses across customer records and newsletter subscribers. Additional
impacted data included names, physical addresses, phone numbers and purchase
histories.

Breach date: 16 February 2020
Date added to HIBP: 22 February 2020
Compromised accounts: 857,611
Compromised data: Email addresses, Names, Phone numbers, Physical addresses,
Purchases
Permalink

--------------------------------------------------------------------------------


SLIDETEAM

In April 2021, the "world’s largest collection of pre-designed presentation
slides" SlideTeam had 1.4M records breached and later published to a popular
hacking forum the following year. Allegedly sourced from a compromised Magento
instance, the data included names, email addresses and passwords stored as
salted hashes.

Breach date: 6 April 2021
Date added to HIBP: 7 January 2023
Compromised accounts: 1,464,271
Compromised data: Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


SMOGON

In April 2018, the Pokémon website known as Smogon announced they'd suffered a
data breach. The breach dated back to September 2017 and affected their XenForo
based forum. The exposed data included usernames, email addresses, genders and
both bcrypt and MD5 password hashes.

Breach date: 10 September 2017
Date added to HIBP: 11 April 2018
Compromised accounts: 386,489
Compromised data: Email addresses, Genders, Geographic locations, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


SNAIL

In March 2015, the gaming website Snail suffered a data breach that impacted 1.4
million subscribers. The impacted data included usernames, IP and email
addresses and passwords stored as unsalted MD5 hashes. The data was provided to
HIBP by dehashed.com.

Breach date: 14 March 2015
Date added to HIBP: 27 July 2019
Compromised accounts: 1,410,899
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SNAPCHAT

In January 2014 just one week after Gibson Security detailed vulnerabilities in
the service, Snapchat had 4.6 million usernames and phone number exposed. The
attack involved brute force enumeration of a large number of phone numbers
against the Snapchat API in what appears to be a response to Snapchat's
assertion that such an attack was "theoretical". Consequently, the breach
enabled individual usernames (which are often used across other services) to be
resolved to phone numbers which users usually wish to keep private.

Breach date: 1 January 2014
Date added to HIBP: 2 January 2014
Compromised accounts: 4,609,615
Compromised data: Geographic locations, Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


SOARGAMES

In December 2019, the now defunct gaming website SoarGames suffered a data
breach that exposed 4.8M unique email addresses. The impacted data included
usernames, email and IP addresses and salted MD5 password hashes. A significant
number of the email addresses appeared to have been generated as opposed to
organically provided by the user.

Breach date: 16 December 2019
Date added to HIBP: 3 December 2023
Compromised accounts: 4,774,445
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SOCIAL ENGINEERED

In June 2019, the "Art of Human Hacking" site Social Engineered suffered a data
breach. The breach of the MyBB forum was published on a rival hacking forum and
included 89k unique email addresses spread across 55k forum users and other
tables in the database. The exposed data also included usernames, IP addresses,
private messages and passwords stored as salted MD5 hashes.

Breach date: 13 June 2019
Date added to HIBP: 23 June 2019
Compromised accounts: 89,392
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


SOCIETÀ ITALIANA DEGLI AUTORI ED EDITORI

In November 2018, the Società Italiana degli Autori ed Editori (Italian Society
of Authors and Publishers, or SIAE) was hacked, defaced and almost 4GB of data
leaked publicly via Twitter. The data included over 14k registered users' names,
email addresses and passwords.

Breach date: 3 November 2018
Date added to HIBP: 7 November 2018
Compromised accounts: 14,609
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


SONICBIDS

In December 2019, the booking website Sonicbids suffered a data breach which
they attributed to "a data privacy event involving our third-party cloud hosting
services". The breach contained 752k user records including names and usernames,
email addresses and passwords stored as PBKDF2 hashes. The data was provided to
HIBP by breachbase.pw.

Breach date: 30 December 2019
Date added to HIBP: 18 August 2020
Compromised accounts: 751,700
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SONY

In 2011, Sony suffered breach after breach after breach — it was a very bad year
for them. The breaches spanned various areas of the business ranging from the
PlayStation network all the way through to the motion picture arm, Sony
Pictures. A SQL Injection vulnerability in sonypictures.com lead to tens of
thousands of accounts across multiple systems being exposed complete with plain
text passwords.

Breach date: 2 June 2011
Date added to HIBP: 4 December 2013
Compromised accounts: 37,103
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


SOUNDWAVE

In approximately mid 2015, the music tracking app Soundwave suffered a data
breach. The breach stemmed from an incident whereby "production data had been
used to populate the test database" and was then inadvertently exposed in a
MongoDB. The data contained 130k records and included email addresses, dates of
birth, genders and MD5 hashes of passwords without a salt.

Breach date: 16 July 2015
Date added to HIBP: 17 March 2017
Compromised accounts: 130,705
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Names, Passwords, Social connections
Permalink

--------------------------------------------------------------------------------


SPECIAL K DATA FEED SPAM LIST

In mid to late 2015, a spam list known as the Special K Data Feed was discovered
containing almost 31M identities. The data includes personal attributes such as
names, physical and IP addresses, genders, birth dates and phone numbers. Read
more about spam lists in HIBP.

Breach date: 7 October 2015
Date added to HIBP: 24 November 2016
Compromised accounts: 30,741,620
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names,
Physical addresses
Permalink

--------------------------------------------------------------------------------


SPHERO

In September 2023, over 1M rows of data from the educational robots company
Sphero was posted to a popular hacking forum. The data contained 832k unique
email addresses alongside names, usernames, dates of birth and geographic
locations.

Breach date: 9 September 2023
Date added to HIBP: 20 October 2023
Compromised accounts: 832,255
Compromised data: Dates of birth, Email addresses, Geographic locations, Names,
Usernames
Permalink

--------------------------------------------------------------------------------


SPIROL

In February 2014, Connecticut based Spirol Fastening Solutions suffered a data
breach that exposed over 70,000 customer records. The attack was allegedly
mounted by exploiting a SQL injection vulnerability which yielded data from
Spirol’s CRM system ranging from customers’ names, companies, contact
information and over 55,000 unique email addresses.

Breach date: 22 February 2014
Date added to HIBP: 22 February 2014
Compromised accounts: 55,622
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


SPOUTIBLE

In January 2024, Spoutible had 207k records scraped from a misconfigured API
that inadvertently returned excessive personal information. The data included
names, usernames, email and IP addresses, phone numbers (where provided to the
platform), genders and bcrypt password hashes. The incident also exposed 2FA
secrets and backup codes along with password reset tokens.

Breach date: 31 January 2024
Date added to HIBP: 5 February 2024
Compromised accounts: 207,114
Compromised data: Email addresses, Genders, IP addresses, Names, Passwords,
Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


SPYFONE

In August 2018, the spyware company SpyFone left terabytes of data publicly
exposed. Collected surreptitiously whilst the targets were using their devices,
the data included photos, audio recordings, text messages and browsing history
which were then exposed via a number of misconfigurations within SpyFone's
systems. The data belonged the thousands of SpyFone customers and included 44k
unique email addresses, many likely belonging to people the targeted phones had
contact with.

Breach date: 16 August 2018
Date added to HIBP: 24 August 2018
Compromised accounts: 44,109
Compromised data: Audio recordings, Browsing histories, Device information,
Email addresses, Geographic locations, IMEI numbers, IP addresses, Names,
Passwords, Photos, SMS messages
Permalink

--------------------------------------------------------------------------------


STAMINUS

In March 2016, the DDoS protection service Staminus was "massively hacked"
resulting in an outage of more than 20 hours and the disclosure of customer
credentials (with unsalted MD5 hashes), support tickets, credit card numbers and
other sensitive data. 27k unique email addresses were found in the data which
was subsequently released to the public. Staminus is no longer in operation.

Breach date: 11 March 2016
Date added to HIBP: 5 October 2017
Compromised accounts: 26,815
Compromised data: Credit cards, Email addresses, IP addresses, Passwords,
Support tickets, Usernames
Permalink

--------------------------------------------------------------------------------


STARNET

In February 2015, the Moldavian ISP "StarNet" had it's database published
online. The dump included nearly 140k email addresses, many with personal
details including contact information, usage patterns of the ISP and even
passport numbers.

Breach date: 26 February 2015
Date added to HIBP: 11 April 2015
Compromised accounts: 139,395
Compromised data: Customer interactions, Dates of birth, Email addresses,
Genders, IP addresses, MAC addresses, Names, Passport numbers, Passwords, Phone
numbers
Permalink

--------------------------------------------------------------------------------


START

In August 2022, news broke of an attack against the Russian streaming service
"START". The incident led to the exposure of 44M records containing 7.4M unique
email addresses. The impacted data also included the subscriber's country and
password hash. START subsequently acknowledged the incident in a Telegram post
and stated that the data dated back to 2021.

Breach date: 1 June 2021
Date added to HIBP: 30 August 2022
Compromised accounts: 7,455,386
Compromised data: Email addresses, Geographic locations, Names, Passwords
Permalink

--------------------------------------------------------------------------------


STARTRIBUNE

In October 2019, the Minnesota-based news service StarTribune suffered a data
breach which was subsequently sold on the dark web. The breach exposed over 2
million unique email addresses alongside names, usernames, physical addresses,
dates of birth, genders and passwords stored as bcrypt hashes. The data was
provided to HIBP by dehashed.com.

Breach date: 10 October 2019
Date added to HIBP: 30 October 2020
Compromised accounts: 2,192,857
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


STER-KINEKOR

In 2016, the South African cinema company Ster-Kinekor had a security flaw which
leaked a large amount of customer data via an enumeration vulnerability in the
API of their old website. Whilst more than 6 million accounts were leaked by the
flaw, the exposed data only contained 1.6 million unique email addresses. The
data also included extensive personal information such as names, addresses,
birthdates, genders and plain text passwords.

Breach date: 9 March 2017
Date added to HIBP: 13 March 2017
Compromised accounts: 1,619,544
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords,
Phone numbers, Physical addresses, Spoken languages
Permalink

--------------------------------------------------------------------------------


STOCKX

In July 2019, the fashion and sneaker trading platform StockX suffered a data
breach which was subsequently sold via a dark webmarketplace. The exposed data
included 6.8 million unique email addresses, names, physical addresses,
purchases and passwords stored as salted MD5 hashes. The data was provided to
HIBP by dehashed.com.

Breach date: 26 July 2019
Date added to HIBP: 10 August 2019
Compromised accounts: 6,840,339
Compromised data: Email addresses, Names, Passwords, Physical addresses,
Purchases, Usernames
Permalink

--------------------------------------------------------------------------------


STORYBIRD

In August 2015, the storytelling service StoryBird suffered a data breach
exposing 4 million records with 1 million unique email addresses. Impacted data
also included names, usernames and passwords stored as PBKDF2 hashes. The data
was provided to HIBP by dehashed.com.

Breach date: 7 August 2015
Date added to HIBP: 2 February 2021
Compromised accounts: 1,047,200
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


STRAFFIC

In February 2020, Israeli marketing company Straffic exposed a database with
140GB of personal data. The publicly accessible Elasticsearch database contained
over 300M rows with 49M unique email addresses. Exposed data also included
names, phone numbers, physical addresses and genders. In their breach disclosure
message, Straffic stated that "it is impossible to create a totally immune
system, and these things can occur".

Breach date: 14 February 2020
Date added to HIBP: 27 February 2020
Compromised accounts: 48,580,249
Compromised data: Email addresses, Genders, Names, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


STRATFOR

In December 2011, "Anonymous" attacked the global intelligence company known as
"Stratfor" and consequently disclosed a veritable treasure trove of data
including hundreds of gigabytes of email and tens of thousands of credit card
details which were promptly used by the attackers to make charitable donations
(among other uses). The breach also included 860,000 user accounts complete with
email address, time zone, some internal system data and MD5 hashed passwords
with no salt.

Breach date: 24 December 2011
Date added to HIBP: 4 December 2013
Compromised accounts: 859,777
Compromised data: Credit cards, Email addresses, Names, Passwords, Phone
numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


STREETEASY

In approximately June 2016, the real estate website StreetEasy suffered a data
breach. In total, 988k unique email addresses were included in the breach
alongside names, usernames and SHA-1 hashes of passwords, all of which appeared
for sale on a dark web marketplace in February 2019. The data was provided to
HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 28 June 2016
Date added to HIBP: 6 October 2019
Compromised accounts: 988,230
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


STRIPCHAT

In November 2021, the live sex cams and adult chat website Stripchat left
several databases exposed and unsecured. In June the following year, over 10M
Stripchat records appeared on a popular hacking forum. The exposed data included
usernames, email addresses and IP addresses.

Breach date: 5 November 2021
Date added to HIBP: 31 August 2022
Compromised accounts: 10,001,355
Compromised data: Email addresses, IP addresses, Usernames
Permalink

--------------------------------------------------------------------------------


STRONGHOLD KINGDOMS

In July 2018, the massive multiplayer online game Stronghold Kingdoms suffered a
data breach. Almost 5.2 million accounts were impacted by the incident which
exposed emails addresses, usernames and passwords stored as salted SHA-1 hashes.
The data was provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 4 July 2018
Date added to HIBP: 21 July 2019
Compromised accounts: 5,187,305
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SUBAGAMES

In November 2016, the game developer Suba Games suffered a data breach which led
to the exposure of 6.1M unique email addresses. Impacted data also included
usernames and passwords, most of which appeared circulating in the breached file
in plain text after being cracked from salted MD5 hashes. The data was provided
to HIBP by dehashed.com.

Breach date: 1 November 2016
Date added to HIBP: 25 August 2021
Compromised accounts: 6,137,666
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SUMO TORRENT

In June 2014, the torrent site Sumo Torrent was hacked and 285k member records
were exposed. The data included IP addresses, email addresses and passwords
stored as weak MD5 hashes.

Breach date: 21 June 2014
Date added to HIBP: 9 March 2016
Compromised accounts: 285,191
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


SUNDRY FILES

In January 2022, the now defunct file upload service Sundry Files suffered a
data breach that exposed 274k unique email addresses. The data also included
usernames, IP addresses and passwords stored as salted SHA-256 hashes.

Breach date: 21 January 2022
Date added to HIBP: 31 March 2023
Compromised accounts: 274,461
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SUPERVPN & GECKOVPN

In February 2021, a series of "free" VPN services were breached including
SuperVPN and GeckoVPN, exposing over 20M records. The data appeared together in
a single file with a small number of records also included from FlashVPN,
suggesting that all three brands may share the same platform. Impacted data also
included email addresses, the country logged in from and the date and time each
login occurred alongside device information including the make and model, IMSI
number and serial number. The data was provided to HIBP by a source who
requested it be attributed to redredred@riseup.net.

Breach date: 25 February 2021
Date added to HIBP: 28 February 2021
Compromised accounts: 20,339,937
Compromised data: Device information, Device serial numbers, Email addresses,
Geographic locations, IMSI numbers, Login histories
Permalink

--------------------------------------------------------------------------------


SVENSKAMAGIC

Sometime in 2015, the Swedish magic website SvenskaMagic suffered a data breach
that exposed over 30k records. The compromised data included usernames, email
addresses and MD5 password hashes. The data was self-submitted to HIBP by
SvenskaMagic.

Breach date: 1 July 2015
Date added to HIBP: 30 August 2018
Compromised accounts: 30,327
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SWECLOCKERS.COM

In early 2015, the Swedish tech news site SweClockers was hacked and 255k
accounts were exposed. The attack led to the exposure of usernames, email
addresses and salted hashes of passwords stored with a combination of MD5 and
SHA512.

Breach date: 1 April 2015
Date added to HIBP: 22 March 2017
Compromised accounts: 254,867
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


SWVL

In June 2020, the Egyptian bus operator Swvl suffered a data breach which
impacted over 4 million members of the service. The exposed data included names,
email addresses, phone numbers, profile photos, partial credit card data (type
and last 4 digits) and passwords stored as bcrypt hashes, all of which was
subsequently shared extensively throughout online hacking communities. The data
was provided to HIBP by breachbase.pw.

Breach date: 23 June 2020
Date added to HIBP: 31 July 2020
Compromised accounts: 4,195,918
Compromised data: Email addresses, Names, Partial credit card data, Passwords,
Phone numbers, Profile photos
Permalink

--------------------------------------------------------------------------------


TAILIEU

In November 2019, the Vietnamese education website TaiLieu allegedly suffered a
data breach exposing 7.3M customer records. Impacted data included names and
usernames, email addresses, dates of birth, genders and passwords stored as
unsalted MD5 hashes. The data was provided to HIBP by dehashed.com after being
shared on a popular hacking forum. TaiLieu did not respond when contacted about
the incident.

Breach date: 24 November 2019
Date added to HIBP: 3 May 2020
Compromised accounts: 7,327,477
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, Names, Passwords, Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


TAMODO

In February 2020, the affiliate marketing network Tamodo suffered a data breach
which was subsequently shared on a popular hacking forum. The incident exposed
almost 500k accounts including names, email addresses, dates of birth and
passwords stored as bcrypt hashes. Tamodo failed to respond to multiple attempts
to report the breach via published communication channels.

Breach date: 28 February 2020
Date added to HIBP: 24 March 2020
Compromised accounts: 494,945
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


TANGERINE

In February 2024, the Australian Telco Tangerine suffered a data breach that
exposed over 200k customer records. Attributed to a legacy customer database,
the data included physical and email addresses, names, phone numbers and dates
of birth. Whilst the Tangerine login process involves sending a one-time
password after entering an email address and phone number, it previously used a
traditional password which was also exposed as a bcrypt hash.

Breach date: 18 February 2024
Date added to HIBP: 28 February 2024
Compromised accounts: 243,462
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Physical addresses, Salutations
Permalink

--------------------------------------------------------------------------------


TAOBAO

In approximately 2012, it's alleged that the Chinese shopping site known as
Taobao suffered a data breach that impacted over 21 million subscribers. Whilst
there is evidence that the data is legitimate, due to the difficulty of
emphatically verifying the Chinese breach it has been flagged as "unverified".
The data in the breach contains email addresses and plain text passwords. Read
more about Chinese data breaches in Have I Been Pwned.

Breach date: 1 January 2012
Date added to HIBP: 8 October 2016
Compromised accounts: 21,149,008
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


TAP AIR PORTUGAL

In August 2022, the Portuguese airline TAP Air Portugal was the target of a
ransomware attack perpetrated by the Ragnar Locker gang who later leaked the
compromised data via a public dark web site. Over 5M unique email addresses were
exposed alongside other personal data including names, genders, DoBs, phone
numbers and physical addresses.

Breach date: 25 August 2022
Date added to HIBP: 23 September 2022
Compromised accounts: 6,083,479
Compromised data: Dates of birth, Email addresses, Genders, Names,
Nationalities, Phone numbers, Physical addresses, Salutations, Spoken languages
Permalink

--------------------------------------------------------------------------------


TARINGA

In September 2017, news broke that Taringa had suffered a data breach exposing
28 million records. Known as "The Latin American Reddit", Taringa's breach
disclosure notice indicated the incident dated back to August that year. The
exposed data included usernames, email addresses and weak MD5 hashes of
passwords.

Breach date: 1 August 2017
Date added to HIBP: 19 April 2018
Compromised accounts: 27,971,100
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TEAM SOLOMID

In December 2014, the electronic sports organisation known as Team SoloMid was
hacked and 442k members accounts were leaked. The accounts included email and IP
addresses, usernames and salted hashes of passwords.

Breach date: 22 December 2014
Date added to HIBP: 9 March 2016
Compromised accounts: 442,166
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TECHNIC

In November 2018, the Minecraft modpack platform known as Technic suffered a
data breach. Technic promptly disclosed the breach and advised that the impacted
data included over 265k unique users' email and IP addresses, chat logs, private
messages and passwords stored as bcrypt hashes with a work factor of 13. Technic
self-submitted the breach to HIBP.

Breach date: 30 November 2018
Date added to HIBP: 4 December 2018
Compromised accounts: 265,410
Compromised data: Chat logs, Email addresses, IP addresses, Passwords, Private
messages, Time zones
Permalink

--------------------------------------------------------------------------------


TEESPRING

In April 2020, the custom printed apparel website Teespring suffered a data
breach that exposed 8.2 million customer records. The data included email
addresses, names, geographic locations and social media IDs.

Breach date: 1 April 2020
Date added to HIBP: 25 June 2021
Compromised accounts: 8,234,193
Compromised data: Email addresses, Geographic locations, Names, Social media
profiles
Permalink

--------------------------------------------------------------------------------


TELECOM REGULATORY AUTHORITY OF INDIA

In April 2015, the Telecom Regulatory Authority of India (TRAI) published tens
of thousand of emails sent by Indian citizens supporting net neutrality as part
of the SaveTheInternet campaign. The published data included lists of emails
including the sender's name and email address as well as the contents of the
email as well, often with signatures including other personal data.

Breach date: 27 April 2015
Date added to HIBP: 27 April 2015
Compromised accounts: 107,776
Compromised data: Email addresses, Email messages
Permalink

--------------------------------------------------------------------------------


TERACOD

In May 2015, almost 100k user records were extracted from the Hungarian torrent
site known as Teracod. The data was later discovered being torrented itself and
included email addresses, passwords, private messages between members and the
peering history of IP addresses using the service.

Breach date: 28 May 2016
Date added to HIBP: 22 August 2016
Compromised accounts: 97,151
Compromised data: Avatars, Email addresses, IP addresses, Passwords, Payment
histories, Private messages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


TERRAVISION

In February 2023, the European airport transfers service Terravision suffered a
data breach. The breach exposed over 2M records of customer data including
names, phone numbers, email addresses, salted password hashes and in some cases,
date of birth and country of origin. Terravision did not respond to multiple
attempts by individuals period over a period of months to report the incident.

Breach date: 1 February 2023
Date added to HIBP: 23 April 2023
Compromised accounts: 2,075,625
Compromised data: Dates of birth, Email addresses, Geographic locations, Names,
Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


TESCO

In February 2014, over 2,000 Tesco accounts with usernames, passwords and
loyalty card balances appeared on Pastebin. Whilst the source of the breach is
not clear, many confirmed the credentials were valid for Tesco and indeed they
have a history of poor online security.

Breach date: 12 February 2014
Date added to HIBP: 13 February 2014
Compromised accounts: 2,239
Compromised data: Email addresses, Passwords, Reward program balances
Permalink

--------------------------------------------------------------------------------


TGBUS

In approximately 2017, it's alleged that the Chinese gaming site known as TGBUS
suffered a data breach that impacted over 10 million unique subscribers. Whilst
there is evidence that the data is legitimate, due to the difficulty of
emphatically verifying the Chinese breach it has been flagged as "unverified".
The data in the breach contains usernames, email addresses and salted MD5
password hashes and was provided with support from dehashed.com. Read more about
Chinese data breaches in Have I Been Pwned.

Breach date: 1 September 2017
Date added to HIBP: 28 April 2018
Compromised accounts: 10,371,766
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


THE CANDID BOARD

In September 2015, the non-consensual voyeurism site "The Candid Board" suffered
a data breach. The hack of the vBulletin forum led to the exposure of over 178k
accounts along with email and IP addresses, dates of birth and salted passwords
hashed with MD5.

Breach date: 3 September 2015
Date added to HIBP: 22 January 2017
Compromised accounts: 178,201
Compromised data: Dates of birth, Email addresses, Geographic locations, IP
addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


THE FAPPENING

In December 2015, the forum for discussing naked celebrity photos known as "The
Fappening" (named after the iCloud leaks of 2014) was compromised and 179k
accounts were leaked. Exposed member data included usernames, email addresses
and salted hashes of passwords.

Breach date: 1 December 2015
Date added to HIBP: 13 April 2016
Compromised accounts: 179,030
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


THE FLY ON THE WALL

In December 2017, the stock market news website The Fly on the Wall suffered a
data breach. The data in the breach included 84k unique email addresses as well
as purchase histories and credit card data. Numerous attempts were made to
contact The Fly on the Wall about the incident, however no responses were
received.

Breach date: 31 December 2017
Date added to HIBP: 15 January 2018
Compromised accounts: 84,011
Compromised data: Age groups, Credit cards, Email addresses, Genders, Names,
Passwords, Phone numbers, Physical addresses, Purchases, Usernames
Permalink

--------------------------------------------------------------------------------


THE HALLOWEEN SPOT

In September 2019, the Halloween costume store The Halloween Spot suffered a
data breach. Originally misattributed to fancy dress store Smiffys, the breach
contained 13GB of data with over 10k unique email addresses alongside names,
physical and IP addresses, phone numbers and order histories. The Halloween Spot
advised customers the breach was traced back to "an old shipping information
database".

Breach date: 27 September 2019
Date added to HIBP: 16 March 2020
Compromised accounts: 10,653
Compromised data: Email addresses, IP addresses, Names, Phone numbers, Physical
addresses, Purchases
Permalink

--------------------------------------------------------------------------------


THE KODI FOUNDATION

In February 2023, The Kodi Foundation suffered a data breach that exposed more
than 400k user records. Attributed to an account belonging to "a trusted but
currently inactive member of the forum admin team", the breach involved the
administrator account creating a database backup that was subsequently
downloaded before being sold on a hacking forum. The breach exposed email and IP
addresses, usernames, genders and passwords stored as MyBB salted hashes. The
Kodi Foundation elected to self-submit impacted email addresses to HIBP.

Breach date: 16 February 2023
Date added to HIBP: 13 April 2023
Compromised accounts: 400,635
Compromised data: Browser user agent details, Dates of birth, Email addresses,
IP addresses, Passwords, Private messages, Usernames
Permalink

--------------------------------------------------------------------------------


THEGRADCAFE

In February 2023, the grad school admissions search website TheGradCafe suffered
a data breach that disclosed the personal records of 310k users. The data
included email addresses, names and usernames, genders, geographic locations and
passwords stored as bcrypt hashes. Some records also included physical address,
phone number and date of birth. TheGradCafe did not respond to multiple attempts
to disclose the breach.

Breach date: 26 February 2023
Date added to HIBP: 24 March 2023
Compromised accounts: 310,975
Compromised data: Email addresses, Genders, Geographic locations, IP addresses,
Names, Passwords, Phone numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


THETVDB.COM

In November 2017, the open television database known as TheTVDB.com suffered a
data breach. The breached data was posted to a hacking forum and included 182k
records with usernames, email addresses and MySQL password hashes.

Breach date: 21 November 2017
Date added to HIBP: 29 January 2018
Compromised accounts: 181,871
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


THINGIVERSE

In October 2021, a database backup taken from the 3D model sharing service
Thingiverse began extensively circulating within the hacking community. Dating
back to October 2020, the 36GB file contained 228 thousand unique email
addresses, mostly alongside comments left on 3D models. The data also included
usernames, IP addresses, full names and passwords stored as either unsalted
SHA-1 or bcrypt hashes. In some cases, physical addresses was also exposed.
Thingiverse's owner, MakerBot, is aware of the incident but at the time of
writing, is yet to issue a disclosure statement. The data was provided to HIBP
by dehashed.com.

Breach date: 13 October 2020
Date added to HIBP: 14 October 2021
Compromised accounts: 228,102
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


THISHABBO FORUM

In 2014, the ThisHabbo forum (a fan site for Habbo.com, a Finnish social
networking site) appeared among a list of compromised sites which has
subsequently been removed from the internet. Whilst the actual date of the
exploit is not clear, the breached data includes usernames, email addresses, IP
addresses and salted hashes of passwords. A further 584k records were added from
a more comprehensive breach file provided in October 2016.

Breach date: 1 January 2014
Date added to HIBP: 28 March 2015
Compromised accounts: 612,414
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TIANYA

In December 2011, China's largest online forum known as Tianya was hacked and
tens of millions of accounts were obtained by the attacker. The leaked data
included names, usernames and email addresses.

Breach date: 26 December 2011
Date added to HIBP: 30 June 2016
Compromised accounts: 29,020,808
Compromised data: Email addresses, Names, Usernames
Permalink

--------------------------------------------------------------------------------


TICKETCOUNTER

In August 2020, the Dutch ticketing service Ticketcounter inadvertently
published a database backup to a publicly accessible location where it was then
found and downloaded in February 2021. The data contained 1.9M unique email
addresses which were offered for sale on a hacking forum and in some cases
included names, physical and IP addresses, genders, dates of birth, payment
histories and bank account numbers. Ticketcounter was later held to ransom with
the threat of the breached being released publicly. The data was provided to
HIBP by a source who requested it be attributed to redredred@riseup.net.

Breach date: 22 February 2021
Date added to HIBP: 1 March 2021
Compromised accounts: 1,921,722
Compromised data: Bank account numbers, Dates of birth, Email addresses,
Genders, IP addresses, Names, Payment histories, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


TICKETFLY

In May 2018, the website for the ticket distribution service Ticketfly was
defaced by an attacker and was subsequently taken offline. The attacker
allegedly requested a ransom to share details of the vulnerability with
Ticketfly but did not receive a reply and subsequently posted the breached data
online to a publicly accessible location. The data included over 26 million
unique email addresses along with names, physical addresses and phone numbers.
Whilst there were no passwords in the publicly leaked data, Ticketfly later
issued an incident update and stated that "It is possible, however, that hashed
values of password credentials could have been accessed".

Breach date: 31 May 2018
Date added to HIBP: 3 June 2018
Compromised accounts: 26,151,608
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


TIGO

In Mid-2023, 300GB of data containing over 100M records from the Chinese video
chat platform "Tigo" dating back to March that year was discovered. The data
contained over 700k unique names, usernames, email and IP addresses, genders,
profile photos and private messages. Tigo did not respond to multiple attempts
to disclose the incident.

Breach date: 31 March 2023
Date added to HIBP: 24 July 2023
Compromised accounts: 700,394
Compromised data: Device information, Email addresses, Genders, Geographic
locations, IP addresses, Names, Private messages, Profile photos, Usernames
Permalink

--------------------------------------------------------------------------------


TOKOPEDIA

In April 2020, Indonesia's largest online store Tokopedia suffered a data
breach. The incident resulted in 15M rows of data being posted to a popular
hacking forum. An additional 76M rows were later provided to HIBP in July 2020.
In total, the data included over 71M unique email addresses alongside names,
genders, birth dates and passwords stored as SHA2-384 hashes.

Breach date: 17 April 2020
Date added to HIBP: 2 May 2020
Compromised accounts: 71,443,698
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords
Permalink

--------------------------------------------------------------------------------


TOONDOO

In August 2019, the comic strip creation website ToonDoo suffered a data breach.
The data was subsequently redistributed on a popular hacking forum in November
where the personal information of over 6M subscribers was shared. Impacted data
included email and IP addresses, usernames, genders, the location of the
individual and salted password hashes.

Breach date: 21 August 2019
Date added to HIBP: 11 November 2019
Compromised accounts: 6,002,694
Compromised data: Email addresses, Genders, Geographic locations, IP addresses,
Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TORRENT INVITES

In December 2013, the torrent site Torrent Invites was hacked and over 352k
accounts were exposed. The vBulletin forum contained usernames, email and IP
addresses, birth dates and salted MD5 hashes of passwords.

Breach date: 12 December 2013
Date added to HIBP: 22 March 2017
Compromised accounts: 352,120
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


TOUMEI

In October 2023, the Japanese consultancy firm Toumei suffered a data breach.
The breach exposed over 100M lines and 10GB of data including 77k unique email
addresses along with names, phone numbers and physical addresses.

Breach date: 18 October 2023
Date added to HIBP: 27 October 2023
Compromised accounts: 76,682
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


TOUT

In approximately September 2014, the now defunct social networking service Tout
suffered a data breach. The breach subsequently appeared years later and
included 653k unique email addresses, names, IP addresses, the location of the
user, their bio and passwords stored as bcrypt hashes. The data was provided to
HIBP by a source who requested it to be attributed to "nmapthis@protonmail.com".

Breach date: 11 September 2014
Date added to HIBP: 25 January 2020
Compromised accounts: 652,683
Compromised data: Bios, Email addresses, Geographic locations, IP addresses,
Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TRAVEL OKLAHOMA

In December 2020, the Oklahoma state Tourism and Recreation Department suffered
a data breach. The incident exposed 637k email addresses across a variety of
tables including age ranges against brochure orders and dates of birth against
contest entries. Genders, names and physical addresses were also exposed. The
data was provided to HIBP by a source who requested it be attributed to
"badhou3a".

Breach date: 17 December 2020
Date added to HIBP: 10 March 2021
Compromised accounts: 637,279
Compromised data: Age groups, Dates of birth, Email addresses, Genders, Names,
Physical addresses
Permalink

--------------------------------------------------------------------------------


TRAVELIO

In November 2021, the Indonesian real estate website Travelio suffered a data
breach that exposed over 470k customer accounts. The data included email
addresses, names, password hashes, phone numbers and for some accounts, dates of
birth, physical address and Facebook auth tokens. The data was provided to HIBP
by a source who requested it be attributed to "white_peacock@riseup.net".

Breach date: 23 November 2021
Date added to HIBP: 8 April 2022
Compromised accounts: 471,376
Compromised data: Auth tokens, Dates of birth, Email addresses, Names,
Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


TRELLO

In January 2024, data was scraped from Trello and posted for sale on a popular
hacking forum. Containing over 15M email addresses, names and usernames, the
data was obtained by enumerating a publicly accessible resource using email
addresses from previous breach corpuses. Trello advised that no unauthorised
access had occurred.

Breach date: 16 January 2024
Date added to HIBP: 22 January 2024
Compromised accounts: 15,111,945
Compromised data: Email addresses, Names, Usernames
Permalink

--------------------------------------------------------------------------------


TRIK SPAM BOTNET

In June 2018, the command and control server of a malicious botnet known as the
"Trik Spam Botnet" was misconfigured such that it exposed the email addresses of
more than 43 million people. The researchers who discovered the exposed Russian
server believe the list of addresses was used to distribute various malware
strains via malspam campaigns (emails designed to deliver malware).

Breach date: 12 June 2018
Date added to HIBP: 14 June 2018
Compromised accounts: 43,432,346
Compromised data: Email addresses
Permalink

--------------------------------------------------------------------------------


TRILLIAN

In December 2015, the instant messaging application Trillian suffered a data
breach. The breach became known in July 2016 and exposed various personal data
attributes including names, email addresses and passwords stored as salted MD5
hashes.

Breach date: 27 December 2015
Date added to HIBP: 15 July 2016
Compromised accounts: 3,827,238
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TRUCKERSMP

In February 2016, the online trucking simulator mod TruckersMP suffered a data
breach which exposed 84k user accounts. In a first for "Have I Been Pwned", the
breached data was self-submitted directly by the organisation that was breached
itself.

Breach date: 25 February 2016
Date added to HIBP: 24 April 2016
Compromised accounts: 83,957
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TRUEFIRE

In February 2020, the guitar tuition website TrueFire suffered a data breach
which impacted 600k members. The breach exposed extensive personal information
including names, email and physical addresses, account balances and unsalted MD5
password hashes. The data was provided to HIBP by dehashed.com.

Breach date: 21 February 2020
Date added to HIBP: 2 August 2020
Compromised accounts: 599,667
Compromised data: Account balances, Dates of birth, Email addresses, Names,
Passwords, Phone numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


TRUTH FINDER

In 2019, the public records search service TruthFinder suffered a data breach
that later came to light in early 2023. The data included over 8M unique
customer email addresses, names, phone numbers and passwords stored as scrypt
hashes.

Breach date: 12 April 2019
Date added to HIBP: 4 February 2023
Compromised accounts: 8,159,573
Compromised data: Email addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


TUMBLR

In early 2013, tumblr suffered a data breach which resulted in the exposure of
over 65 million accounts. The data was later put up for sale on a dark market
website and included email addresses and passwords stored as salted SHA1 hashes.

Breach date: 28 February 2013
Date added to HIBP: 29 May 2016
Compromised accounts: 65,469,298
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


TUNED GLOBAL

In January 2021, data from a number of breached services including Tuned Global
were released to a public hacking forum. The breach appears to date back to 2016
and includes 985k records containing email addresses, names, a small number of
physical addresses and phone numbers and passwords stored in plain text.

Breach date: 16 March 2016
Date added to HIBP: 3 August 2022
Compromised accounts: 985,586
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


TUNNGLE

In 2016, the now defunct global LAN gaming network Tunngle suffered a data
breach that exposed 8.2M unique email addresses. The compromised data also
included usernames, IP addresses and passwords stored as salted MD5 hashes.

Breach date: 1 July 2016
Date added to HIBP: 21 October 2023
Compromised accounts: 8,192,928
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


TWITTER

In January 2022, a vulnerability in Twitter's platform allowed an attacker to
build a database of the email addresses and phone numbers of millions of users
of the social platform. In a disclosure notice later shared in August 2022,
Twitter advised that the vulnerability was related to a bug introduced in June
2021 and that they are directly notifying impacted customers. The impacted data
included either email address or phone number alongside other public information
including the username, display name, bio, location and profile photo. The data
included 6.7M unique email addresses across both active and suspended accounts,
the latter appearing in a separate list of 1.4M addresses.

Breach date: 1 January 2022
Date added to HIBP: 13 August 2022
Compromised accounts: 6,682,453
Compromised data: Bios, Email addresses, Geographic locations, Names, Phone
numbers, Profile photos, Usernames
Permalink

--------------------------------------------------------------------------------


TWITTER (200M)

In early 2023, over 200M records scraped from Twitter appeared on a popular
hacking forum. The data was obtained sometime in 2021 by abusing an API that
enabled email addresses to be resolved to Twitter profiles. The subsequent
results were then composed into a corpus of data containing email addresses
alongside public Twitter profile information including names, usernames and
follower counts.

Breach date: 1 January 2021
Date added to HIBP: 5 January 2023
Compromised accounts: 211,524,284
Compromised data: Email addresses, Names, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


UIGGY

In June 2016, the Facebook application known as Uiggy was hacked and 4.3M
accounts were exposed, 2.7M of which had email addresses against them. The
leaked accounts also exposed names, genders and the Facebook ID of the owners.

Breach date: 1 June 2016
Date added to HIBP: 27 June 2016
Compromised accounts: 2,682,650
Compromised data: Email addresses, Genders, Names, Social connections, Website
activity
Permalink

--------------------------------------------------------------------------------


ULMON

In January 2020, the travel app creator Ulmon suffered a data breach. The
service had almost 1.3M records with 777k unique email addresses, names,
passwords stored as bcrypt hashes and in some cases, social media profile IDs,
telephone numbers and bios. The data was subsequently posted to a popular
hacking forum.

Breach date: 26 January 2020
Date added to HIBP: 8 May 2020
Compromised accounts: 777,769
Compromised data: Bios, Email addresses, Names, Passwords, Phone numbers, Social
media profiles
Permalink

--------------------------------------------------------------------------------


UN INTERNET GOVERNANCE FORUM

In February 2014, the Internet Governance Forum (formed by the United Nations
for policy dialogue on issues of internet governance) was attacked by hacker
collective known as Deletesec. Although tasked with "ensuring the security and
stability of the Internet", the IGF’s website was still breached and resulted in
the leak of 3,200 email addresses, names, usernames and cryptographically stored
passwords.

Breach date: 20 February 2014
Date added to HIBP: 23 February 2014
Compromised accounts: 3,200
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


UNDERWORLD EMPIRE

In April 2017, the vBulletin forum for the Underworld Empire game suffered a
data breach that exposed 429k accounts. The data was then posted to a hacking
forum in mid-February 2018 where it was made available to download. The source
data contained IP and email addresses, usernames and salted MD5 hashes.

Breach date: 25 April 2017
Date added to HIBP: 19 February 2018
Compromised accounts: 428,779
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


UNICO CAMPANIA

In August 2020, the Neapolitan public transport website Unico Campania was
hacked and the data extensively circulated. The breach contained 166k user
records with email addresses and plain text passwords.

Breach date: 19 August 2020
Date added to HIBP: 19 August 2020
Compromised accounts: 166,031
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


UNIVERSARIUM

In approximately November 2019, the Russian "Remote preparatory faculty for IT
specialties" Universarium suffered a data breach. The incident exposed 565k
email addresses and passwords in plain text. Universarium did not respond to
multiple attempts to make contact over a period of many weeks. The data was
provided to HIBP by dehashed.com.

Breach date: 1 November 2019
Date added to HIBP: 3 January 2020
Compromised accounts: 564,962
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


UNIVERSITY OF CALIFORNIA

In December 2020, the University of California suffered a data breach due to
vulnerability in in a third-party provider, Accellion. The breach exposed
extensive personal data on both students and staff including 547 thousand unique
email addresses, names, dates of birth, genders, social security numbers,
ethnicities and other academic related data attributes. Further analysis is
available in Exploring the Impact of the UC Data Breach. The data was provided
to HIBP courtesy of Cyril Gorlla.

Breach date: 24 December 2020
Date added to HIBP: 20 June 2021
Compromised accounts: 547,422
Compromised data: Dates of birth, Education levels, Email addresses,
Ethnicities, Genders, Job titles, Names, Phone numbers, Physical addresses,
Social security numbers
Permalink

--------------------------------------------------------------------------------


UNREAL ENGINE

In August 2016, the Unreal Engine Forum suffered a data breach, allegedly due to
a SQL injection vulnerability in vBulletin. The attack resulted in the exposure
of 530k accounts including usernames, email addresses and salted MD5 hashes of
passwords.

Breach date: 11 August 2016
Date added to HIBP: 7 November 2016
Compromised accounts: 530,147
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


UNVERIFIED DATA SOURCE

In January 2021, over 11M unique email addresses were discovered by Night Lion
Security alongside an extensive amount of personal information including names,
physical and IP addresses, phone numbers and dates of birth. Some records also
contained social security numbers, driver's license details, personal financial
information and health-related data, depending on where the information was
sourced from. Initially attributed to Astoria Company, they subsequently
investigated the incident and confirmed the data did not originate from their
services.

Breach date: 26 January 2021
Date added to HIBP: 24 March 2021
Compromised accounts: 11,498,146
Compromised data: Bank account numbers, Credit status information, Dates of
birth, Email addresses, Employers, Health insurance information, Income levels,
IP addresses, Names, Personal health data, Phone numbers, Physical addresses,
Smoking habits, Social security numbers
Permalink

--------------------------------------------------------------------------------


UPSTOX

In April 2021, Indian brokerage firm Upstox suffered a data breach. The incident
exposed extensive personal information on over 100k customers including names,
genders, dates of birth, physical addresses, banking information and passwords
stored as bcrypt hashes. Extensive "know your customer" information was also
exposed including scans of bank statements, cheques and identity documents
complete with Aadhaar numbers. The data was provided to HIBP by a source who
requested it be attributed to "white_peacock@riseup.net".

Breach date: 8 April 2021
Date added to HIBP: 19 January 2022
Compromised accounts: 111,002
Compromised data: Bank account numbers, Dates of birth, Email addresses, Family
members' names, Genders, Government issued IDs, Income levels, Marital statuses,
Nationalities, Occupations, Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


UTAH GUN EXCHANGE

In July 2020, the Utah Gun Exchange website suffered a data breach which
included several other associated websites. In total, 235k unique email
addresses were exposed before being traded online alongside names, usernames,
genders, IP addresses and password hashes. The data was provided to HIBP by
breachbase.pw.

Breach date: 17 July 2020
Date added to HIBP: 19 August 2020
Compromised accounts: 235,233
Compromised data: Email addresses, Genders, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


UTORRENT

In early 2016, the forum for the uTorrent BitTorrent client suffered a data
breach which came to light later in the year. The database from the IP.Board
based forum contained 395k accounts including usernames, email addresses and MD5
password hashes without a salt.

Breach date: 14 January 2016
Date added to HIBP: 5 November 2016
Compromised accounts: 395,044
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


UUU9

In September 2016, data was allegedly obtained from the Chinese website known as
uuu9.com and contained 7.5M accounts. Whilst there is evidence that the data is
legitimate, due to the difficulty of emphatically verifying the Chinese breach
it has been flagged as "unverified". The data in the breach contains email
addresses and user names. Read more about Chinese data breaches in Have I Been
Pwned.

Breach date: 6 September 2016
Date added to HIBP: 27 December 2016
Compromised accounts: 7,485,802
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


VAKINHA

In June 2020, the Brazilian fund raising service Vakinha suffered a data breach
which impacted almost 4.8 million members. The exposed data included email
addresses, names, phone numbers, geographic locations and passwords stored as
bcrypt hashes, all of which was subsequently shared extensively throughout
online hacking communities. The data was provided to HIBP by dehashed.com.

Breach date: 22 June 2020
Date added to HIBP: 1 August 2020
Compromised accounts: 4,775,203
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


VASTAAMO

In October 2020, the Finnish psychotherapy service Vastaamo was the subject of a
ransomware attack targeting first the company itself, followed by their patients
directly. The original security incident dates back to a period between late
2018 and early 2019 and exposed data including 30k unique email addresses,
names, social security numbers and notes on individuals' psychotherapy sessions.
This breach has been flagged as "sensitive" and is only searchable by owners of
the email addresses and domains exposed in the incident.

Breach date: 31 March 2019
Date added to HIBP: 17 July 2021
Compromised accounts: 30,433
Compromised data: Email addresses, Names, Personal health data, Social security
numbers
Permalink

--------------------------------------------------------------------------------


VBULLETIN

In November 2015, the forum software maker vBulletin suffered a serious data
breach. The attack lead to the release of both forum user and customer accounts
totalling almost 519k records. The breach included email addresses, birth dates,
security questions and answers for customers and salted hashes of passwords for
both sources.

Breach date: 3 November 2015
Date added to HIBP: 24 January 2016
Compromised accounts: 518,966
Compromised data: Dates of birth, Email addresses, Homepage URLs, Instant
messenger identities, IP addresses, Passwords, Security questions and answers,
Spoken languages, Website activity
Permalink

--------------------------------------------------------------------------------


VEDANTU

In mid-2019, the Indian interactive online tutoring platform Vedantu suffered a
data breach which exposed the personal data of 687k users. The JSON formatted
database dump exposed extensive personal information including email and IP
address, names, phone numbers, genders and passwords stored as bcrypt hashes.
When contacted about the incident, Vedantu advised that they were aware of the
breach and were in the process of informing their customers.

Breach date: 8 July 2019
Date added to HIBP: 1 November 2019
Compromised accounts: 686,899
Compromised data: Browser user agent details, Email addresses, Genders, IP
addresses, Names, Passwords, Phone numbers, Spoken languages, Time zones,
Website activity
Permalink

--------------------------------------------------------------------------------


VERIFICATIONS.IO

In February 2019, the email address validation service verifications.io suffered
a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due
to the data being stored in a MongoDB instance left publicly facing without a
password and resulted in 763 million unique email addresses being exposed. Many
records within the data also included additional personal attributes such as
names, phone numbers, IP addresses, dates of birth and genders. No passwords
were included in the data. The Verifications.io website went offline during the
disclosure process, although an archived copy remains viewable.

Breach date: 25 February 2019
Date added to HIBP: 9 March 2019
Compromised accounts: 763,117,241
Compromised data: Dates of birth, Email addresses, Employers, Genders,
Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


VERIFIED

In January 2014, one of the largest communities of Eastern Europe cybercriminals
known as "Verified" was hacked. The breach exposed nearly 17k users of the
vBulletin forum including their personal messages and other potentially
personally identifiable information.

Breach date: 10 January 2014
Date added to HIBP: 6 July 2014
Compromised accounts: 16,919
Compromised data: Email addresses, Historical passwords, IP addresses,
Passwords, Private messages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


VERMILLION

In August 2014, the Roblox hacking forum Vermillion suffered a data breach that
exposed over 8k subscriber records. The breach of the MyBB forum exposed email
and IP addresses, usernames, dates of birth and salted password hashes.

Breach date: 30 August 2014
Date added to HIBP: 11 July 2023
Compromised accounts: 8,106
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


VIANET

In April 2020, the Nepalese internet service provider Vianet suffered a data
breach. The attack on the ISP led to the exposure of 177k customer records
including 94k unique email addresses. Also exposed were names, phone numbers and
physical addresses.

Breach date: 8 April 2020
Date added to HIBP: 22 April 2020
Compromised accounts: 94,353
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


VICTORY PHONES

In January 2017, the automated telephony services company Victory Phones left a
Mongo DB database publicly facing without a password. Subsequently, 213GB of
data was downloaded by an unauthorised party including names, addresses, phone
numbers and over 166k unique email addresses.

Breach date: 1 January 2017
Date added to HIBP: 11 October 2017
Compromised accounts: 166,046
Compromised data: Dates of birth, Email addresses, IP addresses, Names, Phone
numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


VIEWFINES

In May 2018, the South African website for viewing traffic fines online known as
ViewFines suffered a data breach. Over 934k records containing 778k unique email
addresses were exposed and included names, phone numbers, government issued IDs
and passwords stored in plain text.

Breach date: 7 May 2018
Date added to HIBP: 24 May 2018
Compromised accounts: 777,649
Compromised data: Email addresses, Government issued IDs, Names, Passwords,
Phone numbers
Permalink

--------------------------------------------------------------------------------


VIVA AIR

In March 2022, the now defunct Columbian airline Viva Air suffered a data breach
and subsequent ransomware attack. Among a trove of other ransomed data, the
incident exposed a log of 2.6M transactions with 932k unique email addresses,
physical and IP addresses, names, phone numbers and partial credit card data
(last 4 digits).

Breach date: 14 March 2022
Date added to HIBP: 11 September 2023
Compromised accounts: 932,232
Compromised data: Email addresses, IP addresses, Names, Partial credit card
data, Phone numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


VK

In approximately 2012, the Russian social media site known as VK was hacked and
almost 100 million accounts were exposed. The data emerged in June 2016 where it
was being sold via a dark market website and included names, phone numbers email
addresses and plain text passwords.

Breach date: 1 January 2012
Date added to HIBP: 9 June 2016
Compromised accounts: 93,338,602
Compromised data: Email addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


VNG

In April 2018, news broke of a massive data breach impacting the Vietnamese
company known as VNG after data was discovered being traded on a popular hacking
forum where it was extensively redistributed. The breach dated back to an
incident in May of 2015 and included of over 163 million customers. The data in
the breach contained a wide range of personal attributes including usernames,
birth dates, genders and home addresses along with unsalted MD5 hashes and 25
million unique email addresses. The data was provided to HIBP by dehashed.com.

Breach date: 19 May 2015
Date added to HIBP: 28 April 2018
Compromised accounts: 24,853,850
Compromised data: Dates of birth, Email addresses, Genders, IP addresses,
Marital statuses, Names, Occupations, Passwords, Phone numbers, Physical
addresses, Usernames
Permalink

--------------------------------------------------------------------------------


VODAFONE

In November 2013, Vodafone in Iceland suffered an attack attributed to the
Turkish hacker collective "Maxn3y". The data was consequently publicly exposed
and included user names, email addresses, social security numbers, SMS message,
server logs and passwords from a variety of different internal sources.

Breach date: 30 November 2013
Date added to HIBP: 30 November 2013
Compromised accounts: 56,021
Compromised data: Credit cards, Email addresses, Government issued IDs, IP
addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases, SMS
messages, Usernames
Permalink

--------------------------------------------------------------------------------


VOID.TO

In June 2019, the hacking website Void.to suffered a data breach. There were 95k
unique email addresses spread across 86k forum users and other tables in the
database. A rival hacking website claimed responsibility for breaching the MyBB
based forum which disclosed email and IP addresses, usernames, private messages
and passwords stored as either salted MD5 or bcrypt hashes.

Breach date: 13 June 2019
Date added to HIBP: 11 September 2019
Compromised accounts: 95,431
Compromised data: Email addresses, IP addresses, Passwords, Private messages,
Usernames
Permalink

--------------------------------------------------------------------------------


VTECH

In November 2015, hackers extracted more than 4.8 million parents' and 227k
children's accounts from VTech's Learning Lodge website. The Hong Kong company
produces learning products for children including software sold via the
compromised website. The data breach exposed extensive personal details
including home addresses, security questions and answers and passwords stored as
weak MD5 hashes. Furthermore, children's details including names, ages, genders
and associations to their parents' records were also exposed.

Breach date: 13 November 2015
Date added to HIBP: 25 November 2015
Compromised accounts: 4,833,678
Compromised data: Dates of birth, Email addresses, Family members' names,
Genders, IP addresses, Names, Passwords, Physical addresses, Security questions
and answers, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


V-TIGHT GEL

In approximately February 2016, data surfaced which was allegedly obtained from
V-Tight Gel (vaginal tightening gel). Whilst the data set was titled V-Tight,
within there were 50 other (predominantly wellness-related) domain names, most
owned by the same entity. Multiple HIBP subscribers confirmed that although they
couldn't recall providing data specifically to V-Tight, their personal
information including name, phone and physical address was accurate. V-Tight Gel
did not reply to multiple requests for comment.

Breach date: 13 February 2016
Date added to HIBP: 17 November 2017
Compromised accounts: 2,013,164
Compromised data: Email addresses, IP addresses, Names, Phone numbers, Physical
addresses
Permalink

--------------------------------------------------------------------------------


WAKANIM

In August 2022, the European streaming service Wakanim suffered a data breach
which was subsequently advertised and sold on a popular hacking forum. The
breach exposed 6.7M customer records including email, IP and physical addresses,
names and usernames.

Breach date: 28 August 2022
Date added to HIBP: 6 October 2022
Compromised accounts: 6,706,951
Compromised data: Browser user agent details, Email addresses, IP addresses,
Names, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


WANELO

In approximately December 2018, the digital mall Wanelo suffered a data breach.
The data was later placed up for sale on a dark web marketplace along with a
collection of other data breaches in April 2019. A total of 23 million unique
email addresses were included in the breach alongside passwords stored as either
MD5 or bcrypt hashes. After the initial HIBP load, further data containing
names, shipping addresses and IP addresses were also provided to HIBP, albeit
without direct association to the email addresses and passwords. The data was
provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 13 December 2018
Date added to HIBP: 30 September 2019
Compromised accounts: 23,165,793
Compromised data: Email addresses, IP addresses, Names, Passwords, Physical
addresses
Permalink

--------------------------------------------------------------------------------


WAR INC.

In mid-2012, the real-time strategy game War Inc. suffered a data breach. The
attack resulted in the exposure of over 1 million accounts including usernames,
email addresses and salted MD5 hashes of passwords.

Breach date: 4 July 2012
Date added to HIBP: 7 November 2016
Compromised accounts: 1,020,136
Compromised data: Email addresses, Passwords, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


WARFRAME

In November 2014, the online game Warframe was hacked and 819k unique email
addresses were exposed. Allegedly due to a SQL injection flaw in Drupal, the
attack exposed usernames, email addresses and data in a "pass" column which
adheres to the salted SHA12 password hashing pattern used by Drupal 7. Digital
Extremes (the developers of Warframe), asserts the salted hashes are of "alias
names" rather than passwords.

Breach date: 24 November 2014
Date added to HIBP: 21 July 2016
Compromised accounts: 819,478
Compromised data: Email addresses, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


WARMANE

In approximately December 2016, the online service for World of Warcraft private
servers Warmane suffered a data breach. The incident exposed over 1.1M accounts
including usernames, email addresses, dates of birth and salted MD5 password
hashes. The data was subsequently extensively circulated online and was later
provided to HIBP by whitehat security researcher and data analyst Adam Davies.

Breach date: 1 December 2016
Date added to HIBP: 8 September 2018
Compromised accounts: 1,116,256
Compromised data: Dates of birth, Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


WATTPAD

In June 2020, the user-generated stories website Wattpad suffered a huge data
breach that exposed almost 270 million records. The data was initially sold then
published on a public hacking forum where it was broadly shared. The incident
exposed extensive personal information including names and usernames, email and
IP addresses, genders, birth dates and passwords stored as bcrypt hashes.

Breach date: 29 June 2020
Date added to HIBP: 19 July 2020
Compromised accounts: 268,765,495
Compromised data: Bios, Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Names, Passwords, Social media profiles, User website
URLs, Usernames
Permalink

--------------------------------------------------------------------------------


WE HEART IT

In November 2013, the image-based social network We Heart It suffered a data
breach. The incident wasn't discovered until October 2017 when 8.6 million user
records were sent to HIBP. The data contained user names, email addresses and
password hashes, 80% of which were salted SHA-256 with the remainder being MD5
with no salt.

Breach date: 3 November 2013
Date added to HIBP: 14 October 2017
Compromised accounts: 8,600,635
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


WEDMEGOOD

In January 2021, the Indian wedding planning platform WedMeGood suffered a data
breach that exposed 1.3 million customers. The breach exposed 41.5GB of data
including email and physical addresses, names, genders, phone numbers and
password hashes. The data was provided to HIBP by dehashed.com.

Breach date: 6 January 2021
Date added to HIBP: 13 May 2021
Compromised accounts: 1,306,723
Compromised data: Email addresses, Genders, Names, Passwords, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


WEEE

In February 2023, data belonging to the Asian and Hispanic food delivery service
Weee appeared on a popular hacking forum. Dating back to mid-2022, the data
included 1.1M unique email addresses from 11M rows of orders containing names,
phone numbers and delivery instructions.

Breach date: 11 July 2022
Date added to HIBP: 8 February 2023
Compromised accounts: 1,117,405
Compromised data: Delivery instructions, Email addresses, Names, Phone numbers,
Purchases
Permalink

--------------------------------------------------------------------------------


WELEAKINFO

In March 2021, the Stripe account of the now-defunct WeLeakInfo service was
taken over by "pompompurin" after acquiring an expired domain name with an email
address used to manage the account. Access to Stripe then exposed almost 12k
unique email addresses from customers who'd made credit card payments in order
to obtain breached data hosted by WeLeakInfo. The data was subsequently leaked
publicly and also included names, payment histories, IP addresses, billing
addresses, partial credit card data and the organisation making the purchase.

Breach date: 8 March 2021
Date added to HIBP: 15 March 2021
Compromised accounts: 11,788
Compromised data: Browser user agent details, Email addresses, Employers, IP
addresses, Names, Partial credit card data, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


WENDY'S

In March 2018, Wendy's in the Philippines suffered a data breach which impacted
over 52k customers and job applicants. The breach exposed extensive personal
information including names, email and IP addresses, physical addresses, phone
numbers and passwords stored as MD5 hashes.

Breach date: 31 March 2018
Date added to HIBP: 24 May 2022
Compromised accounts: 52,485
Compromised data: Education levels, Email addresses, IP addresses, Job
applications, Names, Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


WHITEPAGES

In mid-2016, the telephone and address directory service Whitepages was among a
raft of sites that were breached and their data then sold in early-2019. The
data included over 11 million unique email addresses alongside names and
passwords stored as either a SHA-1 or bcrypt hash. The data was provided to HIBP
by a source who requested it to be attributed to "BenjaminBlue@exploit.im".

Breach date: 27 June 2016
Date added to HIBP: 27 March 2019
Compromised accounts: 11,657,763
Compromised data: Email addresses, Names, Passwords
Permalink

--------------------------------------------------------------------------------


WHMCS

In May 2012, the web hosting, billing and automation company WHMCS suffered a
data breach that exposed 134k email addresses. The breach included extensive
information about customers and payment histories including partial credit card
numbers.

Breach date: 21 May 2012
Date added to HIBP: 28 June 2016
Compromised accounts: 134,047
Compromised data: Email addresses, Email messages, Employers, IP addresses,
Names, Partial credit card data, Passwords, Payment histories, Physical
addresses, Website activity
Permalink

--------------------------------------------------------------------------------


WIENER BÜCHEREIEN

In June 2019, the library of Vienna (Wiener Büchereien) suffered a data breach.
The compromised data included 224k unique email addresses, names, physical
addresses, phone numbers and dates of birth. The breached data was subsequently
posted to Twitter by the alleged perpetrator of the breach.

Breach date: 10 June 2019
Date added to HIBP: 28 June 2019
Compromised accounts: 224,119
Compromised data: Dates of birth, Email addresses, Names, Phone numbers,
Physical addresses
Permalink

--------------------------------------------------------------------------------


WIFE LOVERS

In October 2018, the site dedicated to posting naked photos and other erotica of
wives Wife Lovers suffered a data breach. The underlying database supported a
total of 8 different adult websites and contained over 1.2M unique email
addresses. Wife Lovers acknowledged the breach which impacted names, usernames,
email and IP addresses and passwords hashed using the weak DEScrypt algorithm.
The breach has been marked as "sensitive" due to the nature of the site.

Breach date: 7 October 2018
Date added to HIBP: 20 October 2018
Compromised accounts: 1,274,051
Compromised data: Email addresses, IP addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


WIIU ISO

In September 2015, the Nintendo Wii U forum known as WIIU ISO was hacked and
458k accounts were exposed. Along with email and IP addresses, the vBulletin
forum also exposed salted MD5 password hashes.

Breach date: 25 September 2015
Date added to HIBP: 6 September 2016
Compromised accounts: 458,155
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


WILDSTAR

In July 2015, the IP.Board forum for the gaming website WildStar suffered a data
breach that exposed over 738k forum members' accounts. The data was being
actively traded on underground forums and included email addresses, birth dates
and passwords.

Breach date: 11 July 2015
Date added to HIBP: 6 March 2016
Compromised accounts: 738,556
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


WIN7VISTA FORUM

In September 2013, the Win7Vista Windows forum (since renamed to the "Beyond
Windows 9" forum) was hacked and later had its internal database dumped. The
dump included over 200k members’ personal information and other internal data
extracted from the forum.

Breach date: 3 September 2013
Date added to HIBP: 1 June 2014
Compromised accounts: 202,683
Compromised data: Email addresses, Instant messenger identities, IP addresses,
Names, Passwords, Private messages, Usernames, Website activity
Permalink

--------------------------------------------------------------------------------


WISHBONE (2016)

In August 2016, the mobile app to "compare anything" known as Wishbone suffered
a data breach. The data contained 9.4 million records with 2.2 million unique
email addresses and was allegedly a subset of the complete data set. The exposed
data included genders, birthdates, email addresses and phone numbers for an
audience predominantly composed of teenagers and young adults.

Breach date: 7 August 2016
Date added to HIBP: 15 March 2017
Compromised accounts: 2,247,314
Compromised data: Auth tokens, Dates of birth, Email addresses, Genders, Names,
Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


WISHBONE (2020)

In January 2020, the mobile app to "compare anything" Wishbone suffered another
data breach which followed their breach from 2016. An extensive amount of
personal information including almost 10M unique email addresses alongside
names, phone numbers geographic locations and other personal attributes were
leaked online and extensively redistributed. Passwords stored as unsalted MD5
hashes were also included in the breach. The data was provided to HIBP by a
source who requested it be attributed to "All3in".

Breach date: 27 January 2020
Date added to HIBP: 28 May 2020
Compromised accounts: 9,705,172
Compromised data: Auth tokens, Dates of birth, Email addresses, Genders,
Geographic locations, IP addresses, Names, Passwords, Phone numbers, Profile
photos, Social media profiles, Usernames
Permalink

--------------------------------------------------------------------------------


WIZISHOP

In July 2020, the French e-commerce platform WiziShop suffered a data breach.
The breach exposed 18GB worth of data including names, phone numbers, dates of
birth, physical and IP addresses, SHA-1 password hashes and almost 3 million
unique email addresses. The data was provided to HIBP by a source who requested
it be attributed to "pom@pompur.in".

Breach date: 14 July 2020
Date added to HIBP: 5 October 2020
Compromised accounts: 2,856,769
Compromised data: Dates of birth, Email addresses, IP addresses, Names,
Passwords, Phone numbers, Physical addresses
Permalink

--------------------------------------------------------------------------------


WONGNAI

In October 2020, 17 previously undisclosed data breaches appeared for sale
including the Thai restaurant, hotel and attraction finding service, Wongnai.
The breach exposed almost 4M unique customer records from some time during 2020
along with names, phone numbers, links to social media profiles and passwords
stored as MD5 hashes. The data was self-submitted to HIBP by Wongnai.

Breach date: 28 October 2020
Date added to HIBP: 4 November 2020
Compromised accounts: 3,924,454
Compromised data: Dates of birth, Email addresses, Geographic locations, IP
addresses, Names, Passwords, Phone numbers, Social media profiles
Permalink

--------------------------------------------------------------------------------


WPSANDBOX

In November 2018, the WordPress sandboxing service that allows people to create
temporary websites WP Sandbox discovered their service was being used to host a
phishing site attempting to collect Microsoft OneDrive accounts. After
identifying the malicious site, WP Sandbox took it offline, contacted the 858
people who provided information to it then self-submitted their addresses to
HIBP. The phishing page requested both email addresses and passwords.

Breach date: 4 November 2018
Date added to HIBP: 6 November 2018
Compromised accounts: 858
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


WPT AMATEUR POKER LEAGUE

In January 2014, the World Poker Tour (WPT) Amateur Poker League website was
hacked by the Twitter user @smitt3nz. The attack resulted in the public
disclosure of 175,000 accounts including 148,000 email addresses. The plain text
password for each account was also included in the breach.

Breach date: 4 January 2014
Date added to HIBP: 1 February 2014
Compromised accounts: 148,366
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


XAT

In November 2015, the online chatroom known as "xat" was hacked and 6 million
user accounts were exposed. Used as a chat engine on websites, the leaked data
included usernames, email and IP addresses along with hashed passwords.

Breach date: 4 November 2015
Date added to HIBP: 5 August 2016
Compromised accounts: 5,968,783
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website
activity
Permalink

--------------------------------------------------------------------------------


XBOX 360 ISO

In approximately September 2015, the XBOX 360 forum known as XBOX360 ISO was
hacked and 1.2 million accounts were exposed. Along with email and IP addresses,
the vBulletin forum also exposed salted MD5 password hashes.

Breach date: 25 September 2015
Date added to HIBP: 29 January 2017
Compromised accounts: 1,296,959
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


XBOX-SCENE

In approximately February 2015, the Xbox forum known as Xbox-Scene was hacked
and more than 432k accounts were exposed. The IP.Board forum included IP
addresses and passwords stored as salted hashes using a weak implementation
enabling many to be rapidly cracked.

Breach date: 1 February 2015
Date added to HIBP: 7 February 2016
Compromised accounts: 432,552
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


XHAMSTER

In November 2016, news broke that hackers were trading hundreds of thousands of
xHamster porn account details. In total, the data contained almost 380k unique
user records including email addresses, usernames and unsalted MD5 password
hashes.

Breach date: 28 November 2016
Date added to HIBP: 8 March 2018
Compromised accounts: 377,377
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


XIAOMI

In August 2012, the Xiaomi user forum website suffered a data breach. In all, 7
million email addresses appeared in the breach although a significant portion of
them were numeric aliases on the bbs_ml_as_uid.xiaomi.com domain. Usernames, IP
addresses and passwords stored as salted MD5 hashes were also exposed. The data
was provided with support from dehashed.com. Read more about Chinese data
breaches in Have I Been Pwned.

Breach date: 1 August 2012
Date added to HIBP: 21 July 2019
Compromised accounts: 7,088,010
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


XKCD

In July 2019, the forum for webcomic XKCD suffered a data breach that impacted
562k subscribers. The breached phpBB forum leaked usernames, email and IP
addresses and passwords stored in MD5 phpBB3 format. The data was provided to
HIBP by white hat security researcher and data analyst Adam Davies.

Breach date: 1 July 2019
Date added to HIBP: 1 September 2019
Compromised accounts: 561,991
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


XPG

In approximately early 2016, the gaming website Xpgamesaves (XPG) suffered a
data breach resulting in the exposure of 890k unique user records. The data
contained email and IP addresses, usernames and salted MD5 hashes of passwords.
The site was previously reported as compromised on the Vigilante.pw breached
database directory. This data was provided by security researcher and data
analyst, Adam Davies.

Breach date: 1 January 2016
Date added to HIBP: 1 July 2017
Compromised accounts: 890,341
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


XSPLIT

In November 2013, the makers of gaming live streaming and recording software
XSplit was compromised in an online attack. The data breach leaked almost 3M
names, email addresses, usernames and hashed passwords.

Breach date: 7 November 2013
Date added to HIBP: 8 August 2015
Compromised accounts: 2,983,472
Compromised data: Email addresses, Names, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


YAHOO

In July 2012, Yahoo! had their online publishing service "Voices" compromised
via a SQL injection attack. The breach resulted in the disclosure of nearly half
a million usernames and passwords stored in plain text. The breach showed that
of the compromised accounts, a staggering 59% of people who also had accounts in
the Sony breach reused their passwords across both services.

Breach date: 11 July 2012
Date added to HIBP: 4 December 2013
Compromised accounts: 453,427
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


YAM

In June 2013, the Taiwanese website Yam.com suffered a data breach which was
shared to a popular hacking forum in 2021. The data included 13 million unique
email addresses alongside names, usernames, phone numbers, physical addresses,
dates of birth and unsalted MD5 password hashes.

Breach date: 2 June 2013
Date added to HIBP: 22 May 2021
Compromised accounts: 13,258,797
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Physical addresses, Usernames
Permalink

--------------------------------------------------------------------------------


YANDEX DUMP

In September 2014, news broke of a massive leak of accounts from Yandex, the
Russian search engine giants who also provides email services. The purported
million "breached" accounts were disclosed at the same time as nearly 5M mail.ru
accounts with both companies claiming the credentials were acquired via phishing
scams rather than being obtained as a result of direct attacks against their
services.

Breach date: 7 September 2014
Date added to HIBP: 12 September 2014
Compromised accounts: 1,186,564
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


YATRA

In September 2013, the Indian bookings website known as Yatra had 5 million
records exposed in a data breach. The data contained email and physical
addresses, dates of birth and phone numbers along with both PINs and passwords
stored in plain text. The site was previously reported as compromised on the
Vigilante.pw breached database directory.

Breach date: 1 September 2013
Date added to HIBP: 4 July 2018
Compromised accounts: 5,033,997
Compromised data: Dates of birth, Email addresses, Names, Passwords, Phone
numbers, Physical addresses, PINs
Permalink

--------------------------------------------------------------------------------


YOTEPRESTO.COM

In June 2020, the Mexican lending platform yotepresto.com suffered a data
breach. Over 1.4 million customers were impacted by the breach which disclosed
email and IP addresses, usernames and passwords stored as bcrypt hashes. The
data was provided to HIBP by dehashed.com.

Breach date: 22 June 2020
Date added to HIBP: 25 June 2021
Compromised accounts: 1,444,629
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


YOUKU

In late 2016, the online Chinese video service Youku suffered a data breach. The
incident exposed 92 million unique user accounts and corresponding MD5 password
hashes. The data was contributed to Have I Been Pwned courtesy of rip@creep.im.

Breach date: 1 December 2016
Date added to HIBP: 15 April 2017
Compromised accounts: 91,890,110
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


YOUNOW

In February 2019, data from the live broadcasting service YouNow appeared for
sale on a dark web marketplace. Whilst it's not clear what date the actual
breach occurred on, the impacted data included 18M unique email addresses, IP
addresses, names, usernames and links to social media profiles. As
authentication is performed via social providers, no passwords were exposed in
the breach. Many records didn't have associated email addresses thus the unique
number is lower than the reported total number of accounts. The data was
provided to HIBP by a source who requested it be attributed to
"JimScott.Sec@protonmail.com".

Breach date: 15 February 2019
Date added to HIBP: 18 July 2019
Compromised accounts: 18,241,518
Compromised data: Email addresses, IP addresses, Names, Social media profiles,
Usernames
Permalink

--------------------------------------------------------------------------------


YOUPORN

In February 2012, the adult website YouPorn had over 1.3M user accounts exposed
in a data breach. The publicly released data included both email addresses and
plain text passwords.

Breach date: 21 February 2012
Date added to HIBP: 30 July 2015
Compromised accounts: 1,327,567
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


YOU'VE BEEN SCRAPED

In October and November 2018, security researcher Bob Diachenko identified
several unprotected MongoDB instances believed to be hosted by a data
aggregator. Containing a total of over 66M records, the owner of the data
couldn't be identified but it is believed to have been scraped from LinkedIn
hence the title "You've Been Scraped". The exposed records included names, both
work and personal email addresses, job titles and links to the individuals'
LinkedIn profiles.

Breach date: 5 October 2018
Date added to HIBP: 6 December 2018
Compromised accounts: 66,147,869
Compromised data: Email addresses, Employers, Geographic locations, Job titles,
Names, Social media profiles
Permalink

--------------------------------------------------------------------------------


ZACKS

In December 2022, the investment research company Zacks announced a data breach.
The following month, reports emerged of the incident impacting 820k customers.
However, in June 2023, a corpus of data with almost 9M Zacks customers appeared
before being broadly circulated on a popular hacking forum. The most recent data
was dated May 2020 and included names, usernames, email and physical addresses,
phone numbers and passwords stored as unsalted SHA-256 hashes. On disclosure of
the larger breach, Zacks advised that in addition to their original report "the
unauthorised third parties also gained access to encrypted [sic] passwords of
zacks.com customers, but only in the encrypted [sic] format".

Breach date: 10 May 2020
Date added to HIBP: 10 June 2023
Compromised accounts: 8,929,503
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical
addresses, Usernames
Permalink

--------------------------------------------------------------------------------


ZAP-HOSTING

In November 2021, web host ZAP-Hosting suffered a data breach that exposed over
60GB of data containing 746k unique email addresses. The breach also contained
support chat logs, IP addresses, names, purchases, physical addresses and phone
numbers.

Breach date: 22 November 2021
Date added to HIBP: 19 March 2022
Compromised accounts: 746,682
Compromised data: Browser user agent details, Chat logs, Email addresses, IP
addresses, Names, Phone numbers, Physical addresses, Purchases
Permalink

--------------------------------------------------------------------------------


ZHENAI.COM

In December 2011, the Chinese dating site known as Zhenai.com suffered a data
breach that impacted 5 million subscribers. Whilst there is evidence that the
data is legitimate, due to the difficulty of emphatically verifying the Chinese
breach it has been flagged as "unverified". The data in the breach contains
email addresses and plain text passwords. Read more about Chinese data breaches
in Have I Been Pwned.

Breach date: 21 December 2011
Date added to HIBP: 11 July 2019
Compromised accounts: 5,024,908
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ZOMATO

In May 2017, the restaurant guide website Zomato was hacked resulting in the
exposure of almost 17 million accounts. The data was consequently redistributed
online and contains email addresses, usernames and salted MD5 hashes of
passwords (the password hash was not present on all accounts). This data was
provided to HIBP by whitehat security researcher and data analyst Adam Davies.

Breach date: 17 May 2017
Date added to HIBP: 4 September 2017
Compromised accounts: 16,472,873
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


ZOOMCAR

In July 2018, the Indian self-drive car rental company Zoomcar suffered a data
breach which was subsequently sold on a dark web marketplace in 2020. The breach
exposed over 3.5M records including names, email and IP addresses, phone numbers
and passwords stored as bcrypt hashes. The data was provided to HIBP by
dehashed.com.

Breach date: 1 July 2018
Date added to HIBP: 5 June 2020
Compromised accounts: 3,589,795
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone numbers
Permalink

--------------------------------------------------------------------------------


ZOOSK (2011)

In approximately 2011, an alleged breach of the dating website Zoosk began
circulating. Comprised of almost 53 million records, the data contained email
addresses and plain text passwords. However, during extensive verification in
May 2016 no evidence could be found that the data was indeed sourced from the
dating service. This breach has consequently been flagged as fabricated; it's
highly unlikely the data was sourced from Zoosk.

Breach date: 1 January 2011
Date added to HIBP: 8 February 2017
Compromised accounts: 52,578,183
Compromised data: Email addresses, Passwords
Permalink

--------------------------------------------------------------------------------


ZOOSK (2020)

In January 2020, the online dating service Zoosk suffered a data breach which
was subsequently shared extensively across online hacking communities. The
breach contained 24 million unique email addresses alongside extensive personal
information including genders, sexualities, dates of birth, physical attributes
such as height and weight, religions, ethnicities and political views. The
breach also allegedly exposed MD5 password hashes, although the data circulating
in hacking circles had this field nulled out. The breach was provided to HIBP by
breachbase.pw.

Breach date: 12 January 2020
Date added to HIBP: 7 August 2020
Compromised accounts: 23,927,853
Compromised data: Dates of birth, Drinking habits, Education levels, Email
addresses, Ethnicities, Family structure, Genders, Geographic locations, Income
levels, Names, Nicknames, Physical attributes, Political views, Relationship
statuses, Religions, Sexual orientations, Smoking habits
Permalink

--------------------------------------------------------------------------------


ZOOVILLE

In September 2019, the zoophilia and bestiality forum Zooville suffered a data
breach. The usernames and email addresses of 71k members were accessed via an
unpatched vulnerability in the vBulletin forum software then subsequently
distributed online. A second data set was later provided to HIBP which contained
a complete vBulletin database dump including IP addresses, dates of birth and
passwords stored as bcrypt hashes. The site administrator advised that following
the breach, all data had been deleted from the forum and a new one had been
stood up on the XenForo platform. The data was provided to HIBP by a source who
requested it be attributed to "burger vault".

Breach date: 27 September 2019
Date added to HIBP: 19 October 2019
Compromised accounts: 71,407
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords,
Usernames
Permalink

--------------------------------------------------------------------------------


ZURICH

In January 2023, the Japanese arm of Zurich insurance suffered a data breach
that exposed 2.6M customer records with over 756k unique email addresses. The
data was subsequently posted to a popular hacking forum and also included names,
genders, dates of birth and details of insured vehicles. The data was provided
to HIBP by a source who requested it be attributed to "IntelBroker".

Breach date: 8 January 2023
Date added to HIBP: 22 January 2023
Compromised accounts: 756,737
Compromised data: Dates of birth, Email addresses, Genders, Names, Vehicle
details
Permalink

--------------------------------------------------------------------------------


ZYNGA

In September 2019, game developer Zynga (the creator of Words with Friends)
suffered a data breach. The incident exposed 173M unique email addresses
alongside usernames and passwords stored as salted SHA-1 hashes. The data was
provided to HIBP by dehashed.com.

Breach date: 1 September 2019
Date added to HIBP: 19 December 2019
Compromised accounts: 172,869,660
Compromised data: Email addresses, Passwords, Phone numbers, Usernames
Permalink

--------------------------------------------------------------------------------


ПАРА ПА

In August 2016, the Russian gaming site known as Пара Па (or parapa.mail.ru) was
hacked along with a number of other forums on the Russian mail provider,
mail.ru. The vBulletin forum contained 4.9 million accounts including usernames,
email addresses and passwords stored as salted MD5 hashes.

Breach date: 8 August 2016
Date added to HIBP: 28 December 2016
Compromised accounts: 4,946,850
Compromised data: Email addresses, Passwords, Usernames
Permalink

--------------------------------------------------------------------------------


СПРАШИВАЙ.РУ

In May 2015, Спрашивай.ру (a the Russian website for anonymous reviews) was
reported to have had 6.7 million user details exposed by a hacker known as
"w0rm". Intended to be a site for expressing anonymous opinions, the leaked data
included email addresses, birth dates and other personally identifiable data
about almost 3.5 million unique email addresses found in the leak.

Breach date: 11 May 2015
Date added to HIBP: 12 May 2015
Compromised accounts: 3,474,763
Compromised data: Dates of birth, Email addresses, Genders, Geographic
locations, IP addresses, Passwords, Spoken languages
Permalink

--------------------------------------------------------------------------------


집꾸미기

In March 2020, the Korean interior decoration website ???? (Decorating the
House) suffered a data breach which impacted almost 1.3 million members. Served
via the URL ggumim.co.kr, the exposed data included email addresses, names,
usernames and phone numbers, all of which was subsequently shared extensively
throughout online hacking communities. The data was provided to HIBP by
breachbase.pw.

Breach date: 27 March 2020
Date added to HIBP: 2 August 2020
Compromised accounts: 1,298,651
Compromised data: Email addresses, Names, Phone numbers, Usernames
Permalink

Sensitive breach, not publicly searchable

Retired breach, removed from system

Unverified breach, may be sourced from elsewhere

Fabricated breach, likely not legitimate

Spam List, used for spam marketing

×

NOTIFY ME

Get notified when future pwnage occurs and your account is compromised.




Using Have I Been Pwned is subject to the terms of use

 * 



You've just been sent a verification email, all you need to do now is confirm
your address by clicking on the link when it hits your mailbox and you'll be
automatically notified of future pwnage. In case it doesn't show up, check your
junk mail and if you still can't find it, you can always repeat this process.

--------------------------------------------------------------------------------

add another address

--------------------------------------------------------------------------------

Privacy policy | Terms of use