DarkHive Breach Catalog

Records added to the database for November: 430,677,051
database National Association of Mutual Insurance Companies (NAMIC)

National Association of Mutual Insurance Companies (NAMIC)

Breached Records: 13,844

In October 2019, the National Association of Mutual Insurance Companies (NAMIC) suffered a data breach impacting 19,800 members. The exposed data included full names, email addresses, phone numbers, physical addresses, organization affiliations, and encrypted passwords. This incident highlights the importance of strong cybersecurity measures, particularly in organizations managing sensitive member information. Robust security protocols are essential to protect user privacy and maintain trust in handling confidential data.

Leaked Data Types: Email Address, Phone Number, First Name, Last Name, Password Hash

Added on November 13, 2024

database JDBBX

JDBBX

Breached Records: 3,628,073

In November 2016, the Chinese gaming site JDBBX was breached, impacting 4.8 million records. The breach contained 3.6 million unique email addresses, usernames, and passwords stored as MD5 hashes. This incident underscores the necessity for strong cybersecurity measures to safeguard sensitive data.

Leaked Data Types: Email Address, Password Hash, Username

Added on November 13, 2024

database KinoKong

KinoKong

Breached Records: 821,733

In March 2021, the piracy website KinoKong experienced a data breach impacting approximately 824,000 user records. The breach exposed 820 thousand unique email addresses, usernames,  ip addresses, and passwords stored as Bitrix hashes. This highlights the critical need for robust cybersecurity practices to protect user data on all platforms.

Leaked Data Types: Email Address, Password Hash, Username, IP Address

Added on November 13, 2024

database Jassume

Jassume

Breached Records: 764,725

Around May 2020, the French dating website Jassume suffered a data breach impacting 792,000 users. Compromised information included usernames, email addresses, dates of birth, and passwords stored in plaintext. This incident highlights the critical need for secure password storage and robust data protection practices to maintain user privacy and trust.

Leaked Data Types: Email Address, Plaintext Password, Username, Birthday

Added on November 12, 2024

database Namma11

Namma11

Breached Records: 44,964

In February 2022, the Indian fantasy sports website Namma11 experienced a data breach impacting 57,300 members. The compromised data included email addresses, usernames, full names, phone numbers, deposited amounts, and current balances. This incident highlights the importance of strong cybersecurity measures, especially for platforms handling sensitive financial information. Implementing robust security protocols is essential to protect user privacy, prevent unauthorized access, and maintain trust.

Leaked Data Types: Email Address, Username, First Name, Last Name, Phone Number

Added on November 12, 2024

database Jobringer

Jobringer

Breached Records: 232,966

In January 2022, the Indian job portal Jobringer experienced a data breach, compromising the information of 232,000 users. Exposed data included email addresses, full names, phone numbers, and passwords stored as bcrypt hashes. Strong cybersecurity practices are essential to safeguard sensitive data and protect user privacy.

Leaked Data Types: Email Address, Phone Number, Password Hash, First Name, Last Name

Added on November 12, 2024

database Katapult

Katapult

Breached Records: 2,229,055

In September 2020, the lease-planning platform Katapult experienced a data breach affecting 2.2 million users. The exposed data included email addresses, full names, and passwords stored as PBKDF2 hashes. Such incidents underscore the necessity of strong data protection measures to safeguard user information effectively.

Leaked Data Types: Email Address, Password Hash, First Name, Last Name

Added on November 12, 2024

database Nafham Education

Nafham Education

Breached Records: 415,744

In November 2021, the Egyptian learning platform Nafham Education experienced a data breach affecting 416,000 users. The compromised information included email addresses, full names, and passwords stored as bcrypt hashes. This incident underscores the importance of implementing robust cybersecurity measures, as breaches in educational platforms can compromise sensitive user information. Strong security protocols are essential to protect user privacy and prevent unauthorized access.

Leaked Data Types: Email Address, First Name, Last Name, Password Hash

Added on November 12, 2024

database K7Maths

K7Maths

Breached Records: 1,078,017

In October 2019, the Australian educational platform K7Maths experienced a data breach, affecting one million users. This incident exposed sensitive information such as full names, email addresses, educational institutions, and passwords, which were protected using Bcrypt hashing. Cybersecurity measures are crucial to prevent such breaches and protect user data from unauthorized access.

Leaked Data Types: Email Address, Password Hash, First Name, Last Name

Added on November 11, 2024

database People's Energy

People's Energy

Breached Records: 210,841

In December 2020, UK power company People's Energy experienced a data breach that exposed nearly 7GB of files containing 359,000 unique email addresses, along with names, phone numbers, physical addresses, and dates of birth. The incident also included email addresses and bcrypt password hashes of People's Energy staff, though no customer passwords were exposed. This breach underscores the critical importance of robust cybersecurity measures in protecting sensitive information, as even partial exposure of personal data can have serious implications for user privacy and security.

Leaked Data Types: Email Address, Phone Number, First Name, Last Name, Birthday, Password Hash

Added on November 11, 2024

stealer_log LeakBase 37M Lines Ulp by zinel94

LeakBase 37M Lines Ulp by zinel94

Breached Records: 6,541,944

On October 18, 2024, a stealer log named 37M Lines Ulp surfaced on a well-known hacking forum. The post references "Enjoy" and includes approximately 37,000,000 records. Out of the total records, 6,542,000 are unique. The data exposed consists of email addresses, URLs, and plaintext passwords. This incident underscores the critical importance of robust cybersecurity measures, as exposure to such personal information can have significant privacy implications.

Leaked Data Types: Email Address, HomePage URL, Plaintext Password

Added on November 11, 2024

database JetAudio

JetAudio

Breached Records: 17,542

In November 2008, the forum website for the audio company JetAudio, owned by electronics company COWON, experienced a data breach that compromised data of 17,500 users. The breach exposed usernames, email addresses, dates of birth, IP addresses, and passwords stored as vBulletin hashes. Maintaining robust cybersecurity is essential to protect sensitive user information and uphold trust.

Leaked Data Types: Email Address, Password Hash, Username, IP Address, Birthday

Added on November 11, 2024

database Central Tickets

Central Tickets

Breached Records: 687,732

In September 2024, data from the ticketing service Central Tickets was posted on a hacking forum, indicating a breach that likely occurred several months earlier. The compromised information included 723,000 unique email addresses, names, phone numbers, IP addresses, purchase history, and passwords stored as unsalted SHA-1 hashes. This incident underscores the critical importance of robust cybersecurity measures, as relying on weak encryption like unsalted SHA-1 makes user data more vulnerable. Implementing advanced encryption, regular audits, and proactive security measures are essential to protect sensitive information and ensure user privacy.

Leaked Data Types: Email Address, IP Address, Phone Number, First Name, Last Name, Password Hash

Added on November 11, 2024

stealer_log LeakBase RLREBORN 5.8M ULP by farmagol

LeakBase RLREBORN 5.8M ULP by farmagol

Breached Records: 335,344

On July 1, 2024, a stealer log labeled RLREBORN 5.8M ULP surfaced on a well-known hacking forum, containing approximately 5.8 million records. The leak contained approximately 340 thousand unique email addresses, along with plaintext passwords, and homepage URLs. Such incidents highlight the ongoing need for robust cybersecurity measures to protect user data from unauthorized access and distribution.

Leaked Data Types: Email Address, Plaintext Password, HomePage URL

Added on November 11, 2024

stealer_log LeakBase 1.3M ULP by Styles20

LeakBase 1.3M ULP by Styles20

Breached Records: 157,403

On July 1, 2024, a stealer log titled 1.3M ULP was posted on a prominent hacking forum, containing approximately 1.3 million records. The log leaked 160 thousand unique email addresses, as well as plaintext passwords, and homepage URLs. The poster described the data as fresh, underscoring the persistent challenges in cybersecurity and the importance of safeguarding personal information from exploitation.

Leaked Data Types: Email Address, Plaintext Password, HomePage URL

Added on November 11, 2024

stealer_log LeakBase 64.6M ULP by farmagol

LeakBase 64.6M ULP by farmagol

Breached Records: 0

Around July 23, 2024, a stealer log named 64647738 Lines Ulp (Not Own) surfaced on a well-known hacking forum. The post references "Good Luck" and includes approximately 64,647,738 records. Out of the total records, 10,250,000 are unique. The data exposed consists of email addresses, URLs, and plaintext passwords. This incident underscores the critical importance of robust cybersecurity measures, as exposure of such personal information can have significant privacy implications.

Leaked Data Types: Email Address, HomePage URL, Plaintext Password

Added on November 11, 2024

stealer_log LeakBase 5,7Kk ULP by firegoon

LeakBase 5,7Kk ULP by firegoon

Breached Records: 1,197,751

On October 30, 2024, a stealer log named 5,7Kk Url:log:pass surfaced on a well-known hacking forum, exposing approximately 5.7 million records. Out of the total records, 1,198,000 are unique. The data exposed consists of email addresses, URLs, and plaintext passwords. This incident underscores the critical importance of robust cybersecurity measures, as exposure to such personal information can have significant privacy implications.

Leaked Data Types: Email Address, HomePage URL, Plaintext Password

Added on November 11, 2024

database InnoGames

InnoGames

Breached Records: 600,042

In approximately June 2016, the gaming forum InnoGames experienced a data breach that affected 652,000 customer records. The compromised data included usernames, email addresses, IP addresses, and passwords stored as MD5 hashes. This incident underscores the need for stronger encryption standards to safeguard user data.

Leaked Data Types: Email Address, Password Hash, Username, IP Address, Salt

Added on November 11, 2024

stealer_log LeakBase 1M ULP 3 by TheKuntess

LeakBase 1M ULP 3 by TheKuntess

Breached Records: 522,945

On July 4, 2024, a stealer log labeled 1M ULP 3 was posted on a prominent hacking forum, comprised of approximately 1 million records. The leak exposed approximately 520 thousand unique email addresses, plaintext passwords, and homepage URLs. This was the third stealer log in a series of three posts from the same user, underscoring persistent vulnerabilities and the importance of cybersecurity defenses.

Leaked Data Types: Email Address, Plaintext Password, HomePage URL

Added on November 8, 2024

stealer_log LeakBase 13,4Kk Ulp by firegoon

LeakBase 13,4Kk Ulp by firegoon

Breached Records: 678,540

On October 30, 2024, a stealer log named 13,4Kk Url:log:pass surfaced on a well-known hacking forum, exposing approximately 13.4 million records. Out of the total records, 678,540 are unique. The data exposed consists of email addresses, URLs, and plaintext passwords. This incident underscores the critical importance of robust cybersecurity measures, as exposure of such personal information can have significant privacy implications.

Leaked Data Types: Email Address, HomePage URL, Plaintext Password

Added on November 8, 2024

Get invited to the HEROIC Platform

Joining HEROIC is by invite only while we are still in beta. To join, you'll need an invitation from someone who's already on the platform. The quicker you join, the more HEROES you can claim!

Step by Step Early Access

name
This field is for validation purposes and should be left unchanged.

Be the first to know when we launch

HEROIC is still under development, but we are well underway. We estimate launching in early 2024. Subscribing lets you know when we launch, and how you can be the first to reserve your HERO's (special currency specific to the platform).

Sign Up for Our Newsletter

Email marketing by Interspire