Aha! Data Breach Exposes Over 26,000 Customers: Here’s What We Know
Breach Date: October 1, 2024 Publish Date: March 1, 2025 Industry: eCommerce, IT Services...
Jan 7, 2025 | 0
Verticalscope.com and all of their domains were hacked in February of 2016
Preface Verticalscope.com and all of their domains were hacked in February of 2016....
Jul 30, 2024 | 0
Socialblade.com was hacked in August of 2016
Table of Contents Summary Passwords Leafyishere sub botting controversy Summary Socialblade.com...
Jul 30, 2024 | 0
WebHostingTalk.com, Mac-Forums.com, DbForums.com and ABestWeb.com all owned by Penton were hacked on July 4th, 2016
Preface WebHostingTalk.com, Mac-Forums.com, DbForums.com and ABestWeb.com all owned by Penton...
Jul 30, 2024 | 0
Shadi.com another dating site was hacked around July 10th, 2016
Preface Shortly after the hack of MuslimMatch.com, Shadi.com another dating site was hacked...
Jul 30, 2024 | 0
Dota2 official forums was hacked on July 10th, 2016
Table of Contents Summary Passwords Emails Summary Dota2 official forums was hacked on July...
Jul 30, 2024 | 0
Twitter credentials are being traded in the tens of millions on the dark web
Preface Twitter credentials are being traded in the tens of millions on the dark web....
Jul 30, 2024 | 0
Subdomains belonging to mail.ru were hacked in August of 2016
Table of Contents About Us Summary Passwords About us LeakedSource is already the best data...
Jul 30, 2024 | 0
LinkedIn.com was hacked in June 2012 and a copy of data for 167,370,910 accounts has been obtained by LeakedSource
Preface LinkedIn.com was hacked in June 2012 and a copy of data for 167,370,910 accounts has...
Jul 30, 2024 | 0
Two Bitcoin related websites were hacked, namely Btc-E.com and Bitcointalk.org
Summary Two Bitcoin related websites were hacked, namely Btc-E.com (a Bitcoin exchange acting...
Jul 30, 2024 | 0
MGPH Limited
In April 2022, MGPH Limited—a longstanding UK-based construction and property development firm registered in Cambridge since 1978—suffered a data breach that affected 2.2 million users. The compromised data included email addresses and plaintext passwords. This incident highlights the critical need for robust cybersecurity measures in traditional industries like construction, where digital systems increasingly handle sensitive client and business information.
PLM Connections
In August 2018, PLM Connections, a now-defunct German user conference series focused on Product Lifecycle Management (PLM), especially around Siemens PLM software, suffered a data breach that affected 186,610 users. The compromised data included email addresses and plaintext passwords. Users should assume account compromise and change all reused credentials immediately.
PRODO Group
In August 2018, PRODO Group, one of Russia’s largest meat and poultry producers headquartered in Moscow, suffered a data breach that affected 100,836 users. The compromised data included email addresses and plaintext passwords. This underscores the importance of secure password storage even in non-digital-first industries—users should take caution and change credentials.
Ipobar
In August 2018, Ipobar (愛PO吧), a now-defunct Taiwanese-language bulletin board–style community forum, suffered a data breach that affected 166,125 users. The compromised data included email addresses and MD5 password hashes. Users are urged to reset any shared passwords due to the vulnerability of MD5.
BharatPay
In August 2022, BharatPay, an Indian payment platform, experienced a data breach exposing approximately 47,000 unique records containing email addresses, phone numbers, usernames, full names, birthdays, genders, physical addresses, and MD5 hashed passwords. Proper cybersecurity measures are essential to protect such sensitive information from future breaches, ensuring the safety of users' personal details and maintaining trust in digital platforms.
TabCrawler
In April 2018, TabCrawler, a U.S.-hosted online archive of over 2 million user-submitted guitar, bass, and drum tabs along with song lyrics, suffered a data breach that affected 291,868 users. The compromised data included email addresses and MD5 password hashes. Users should assume their credentials are at risk and update passwords accordingly.
Switch My Debt
In May 2020, Switch My Debt, a U.S.-based financial services site, suffered a data breach that affected 386,821 users. The compromised data included email addresses and MD5 password hashes. Users are advised to update any passwords associated with this breach and avoid reusing credentials elsewhere.
Russian America
In August 2018, Russian America, a Russian-language website featuring news, media, and forums focused on U.S.-related topics, suffered a data breach that affected 100,097 users. The compromised data included email addresses and plaintext passwords. The exposure of unencrypted passwords represents a critical security failure—affected users must change passwords immediately and avoid credential reuse across services.
Elevation Church
In August 2018, Elevation Church, the official hub of the modern, multi-site evangelical megachurch headquartered in Charlotte–Matthews, North Carolina (USA) and led by Pastors Steven and Holly Furtick, suffered a data breach that affected 52,685 users. The compromised data included email addresses and MD5 password hashes. As MD5 is a deprecated hashing algorithm vulnerable to attacks, users should change any reused passwords immediately.
Shenyang Water Group
In April 2018, Shenyang Water Group, the now-defunct official Chinese website for the municipal utility provider and its general information portal, suffered a data breach that affected 76,264 users. The compromised data included email addresses and MD5 password hashes. Users should be cautious and change passwords due to the weak nature of MD5 encryption.
MyTeamStats
In April 2018, MyTeamStats, a U.S.-hosted platform popular among amateur and youth sports teams for stat tracking and league coordination, suffered a data breach that affected 227,552 users. The compromised data included email addresses and MD5 password hashes. Affected users should change their passwords and monitor related accounts.
Supras Unisono
In April 2018, Supras Unisono, a now-defunct small Czech/Slovak fan merchandise provider known since the late 1990s for producing scarves, flags, tifos, and supporter gear for ultras and football clubs across Central and Eastern Europe, suffered a data breach that affected 78,419 users. The compromised data included email addresses and MD5 password hashes. Given MD5’s vulnerability, users should immediately change any reused passwords.
TarvijeQuran
In April 2018, TarvijeQuran, an Iranian religious education organization focused on Quranic instruction, competitions, and cultural programs, suffered a data breach that affected 86,559 users. The compromised data included email addresses and plaintext passwords. Due to the exposure of unencrypted passwords, affected users should change their credentials immediately and avoid reusing them elsewhere.
KeyTrack
In August 2018, KeyTrack, a New Zealand based platform for real estate professionals, suffered a data breach affecting over 108 thousand records. The exposed data includes email addresses. Implementing comprehensive cybersecurity measures is essential to protect user information and uphold platform trust.
Sunrose Consulting
In August 2018, Sunrose Consulting, a Nigeria-based HR consulting and training firm headquartered in Lagos, suffered a data breach that affected 89,581 users. The compromised data included email addresses and plaintext passwords. Users should treat the breach as highly sensitive and change any affected passwords immediately.
Juve Poland
In August 2018, Juve Poland, a Polish news platform dedicated to sports and the Juventus Football Club, suffered a data breach affecting approximately 45 thousand unique records. The exposed data includes email addresses and MD5 hashed passwords. Adopting stronger encryption standards is essential to ensure user data security and platform integrity.
Patron.ws
In August 2018, Patron.ws, a now-defunct U.S.-based informational website that allowed members to post articles, upload content, and edit pages, suffered a data breach that affected 50,033 users. The compromised data included email addresses and plaintext passwords. Users should immediately change any reused credentials, as plaintext storage presents a serious security risk.
CellulariShop
In January 2023, CellulariShop, an Italian e-commerce platform, suffered a data breach exposing approximately 2.8 million records containing over 100,000 unique email addresses, full names, IP addresses, birthdays, and MD5 or bcrypt hashed passwords. Protecting user data through robust cybersecurity measures is crucial to safeguard against future breaches, maintain customer trust, and ensure the safety of sensitive information in today's digital environment.
Papel e Companhia
In August 2018, Papel e Companhia, the temporary website of a Brazilian office and school supplies retailer operating in Curitiba, Paraná, and other cities, suffered a data breach that affected 23,292 users. The compromised data included email addresses and MD5 password hashes. Since MD5 is an outdated and insecure hashing method, affected users should promptly update their passwords.
Stöhlker AG
In August 2018, Stöhlker AG, a leading public relations and communications agency based in Zollikon–Zurich, Switzerland, suffered a data breach that affected 61,582 users. The compromised data included email addresses and password hashes stored in an unknown format. Users are advised to reset their passwords out of caution due to the uncertainty of the hash security.
MGPH Limited
In April 2022, MGPH Limited—a longstanding UK-based construction and property development firm registered in Cambridge since 1978—suffered a data breach that affected 2.2 million users. The compromised data included email addresses and plaintext passwords. This incident highlights the critical need for robust cybersecurity measures in traditional industries like construction, where digital systems increasingly handle sensitive client and business information.
PLM Connections
In August 2018, PLM Connections, a now-defunct German user conference series focused on Product Lifecycle Management (PLM), especially around Siemens PLM software, suffered a data breach that affected 186,610 users. The compromised data included email addresses and plaintext passwords. Users should assume account compromise and change all reused credentials immediately.
PRODO Group
In August 2018, PRODO Group, one of Russia’s largest meat and poultry producers headquartered in Moscow, suffered a data breach that affected 100,836 users. The compromised data included email addresses and plaintext passwords. This underscores the importance of secure password storage even in non-digital-first industries—users should take caution and change credentials.
Ipobar
In August 2018, Ipobar (愛PO吧), a now-defunct Taiwanese-language bulletin board–style community forum, suffered a data breach that affected 166,125 users. The compromised data included email addresses and MD5 password hashes. Users are urged to reset any shared passwords due to the vulnerability of MD5.
BharatPay
In August 2022, BharatPay, an Indian payment platform, experienced a data breach exposing approximately 47,000 unique records containing email addresses, phone numbers, usernames, full names, birthdays, genders, physical addresses, and MD5 hashed passwords. Proper cybersecurity measures are essential to protect such sensitive information from future breaches, ensuring the safety of users' personal details and maintaining trust in digital platforms.
TabCrawler
In April 2018, TabCrawler, a U.S.-hosted online archive of over 2 million user-submitted guitar, bass, and drum tabs along with song lyrics, suffered a data breach that affected 291,868 users. The compromised data included email addresses and MD5 password hashes. Users should assume their credentials are at risk and update passwords accordingly.
Switch My Debt
In May 2020, Switch My Debt, a U.S.-based financial services site, suffered a data breach that affected 386,821 users. The compromised data included email addresses and MD5 password hashes. Users are advised to update any passwords associated with this breach and avoid reusing credentials elsewhere.
Russian America
In August 2018, Russian America, a Russian-language website featuring news, media, and forums focused on U.S.-related topics, suffered a data breach that affected 100,097 users. The compromised data included email addresses and plaintext passwords. The exposure of unencrypted passwords represents a critical security failure—affected users must change passwords immediately and avoid credential reuse across services.
Elevation Church
In August 2018, Elevation Church, the official hub of the modern, multi-site evangelical megachurch headquartered in Charlotte–Matthews, North Carolina (USA) and led by Pastors Steven and Holly Furtick, suffered a data breach that affected 52,685 users. The compromised data included email addresses and MD5 password hashes. As MD5 is a deprecated hashing algorithm vulnerable to attacks, users should change any reused passwords immediately.
Shenyang Water Group
In April 2018, Shenyang Water Group, the now-defunct official Chinese website for the municipal utility provider and its general information portal, suffered a data breach that affected 76,264 users. The compromised data included email addresses and MD5 password hashes. Users should be cautious and change passwords due to the weak nature of MD5 encryption.
MyTeamStats
In April 2018, MyTeamStats, a U.S.-hosted platform popular among amateur and youth sports teams for stat tracking and league coordination, suffered a data breach that affected 227,552 users. The compromised data included email addresses and MD5 password hashes. Affected users should change their passwords and monitor related accounts.
Supras Unisono
In April 2018, Supras Unisono, a now-defunct small Czech/Slovak fan merchandise provider known since the late 1990s for producing scarves, flags, tifos, and supporter gear for ultras and football clubs across Central and Eastern Europe, suffered a data breach that affected 78,419 users. The compromised data included email addresses and MD5 password hashes. Given MD5’s vulnerability, users should immediately change any reused passwords.
TarvijeQuran
In April 2018, TarvijeQuran, an Iranian religious education organization focused on Quranic instruction, competitions, and cultural programs, suffered a data breach that affected 86,559 users. The compromised data included email addresses and plaintext passwords. Due to the exposure of unencrypted passwords, affected users should change their credentials immediately and avoid reusing them elsewhere.
KeyTrack
In August 2018, KeyTrack, a New Zealand based platform for real estate professionals, suffered a data breach affecting over 108 thousand records. The exposed data includes email addresses. Implementing comprehensive cybersecurity measures is essential to protect user information and uphold platform trust.
Sunrose Consulting
In August 2018, Sunrose Consulting, a Nigeria-based HR consulting and training firm headquartered in Lagos, suffered a data breach that affected 89,581 users. The compromised data included email addresses and plaintext passwords. Users should treat the breach as highly sensitive and change any affected passwords immediately.
Juve Poland
In August 2018, Juve Poland, a Polish news platform dedicated to sports and the Juventus Football Club, suffered a data breach affecting approximately 45 thousand unique records. The exposed data includes email addresses and MD5 hashed passwords. Adopting stronger encryption standards is essential to ensure user data security and platform integrity.
Patron.ws
In August 2018, Patron.ws, a now-defunct U.S.-based informational website that allowed members to post articles, upload content, and edit pages, suffered a data breach that affected 50,033 users. The compromised data included email addresses and plaintext passwords. Users should immediately change any reused credentials, as plaintext storage presents a serious security risk.
CellulariShop
In January 2023, CellulariShop, an Italian e-commerce platform, suffered a data breach exposing approximately 2.8 million records containing over 100,000 unique email addresses, full names, IP addresses, birthdays, and MD5 or bcrypt hashed passwords. Protecting user data through robust cybersecurity measures is crucial to safeguard against future breaches, maintain customer trust, and ensure the safety of sensitive information in today's digital environment.
Papel e Companhia
In August 2018, Papel e Companhia, the temporary website of a Brazilian office and school supplies retailer operating in Curitiba, Paraná, and other cities, suffered a data breach that affected 23,292 users. The compromised data included email addresses and MD5 password hashes. Since MD5 is an outdated and insecure hashing method, affected users should promptly update their passwords.
Stöhlker AG
In August 2018, Stöhlker AG, a leading public relations and communications agency based in Zollikon–Zurich, Switzerland, suffered a data breach that affected 61,582 users. The compromised data included email addresses and password hashes stored in an unknown format. Users are advised to reset their passwords out of caution due to the uncertainty of the hash security.
MGPH Limited
In April 2022, MGPH Limited—a longstanding UK-based construction and property development firm registered in Cambridge since 1978—suffered a data breach that affected 2.2 million users. The compromised data included email addresses and plaintext passwords. This incident highlights the critical need for robust cybersecurity measures in traditional industries like construction, where digital systems increasingly handle sensitive client and business information.
PLM Connections
In August 2018, PLM Connections, a now-defunct German user conference series focused on Product Lifecycle Management (PLM), especially around Siemens PLM software, suffered a data breach that affected 186,610 users. The compromised data included email addresses and plaintext passwords. Users should assume account compromise and change all reused credentials immediately.
PRODO Group
In August 2018, PRODO Group, one of Russia’s largest meat and poultry producers headquartered in Moscow, suffered a data breach that affected 100,836 users. The compromised data included email addresses and plaintext passwords. This underscores the importance of secure password storage even in non-digital-first industries—users should take caution and change credentials.
Ipobar
In August 2018, Ipobar (愛PO吧), a now-defunct Taiwanese-language bulletin board–style community forum, suffered a data breach that affected 166,125 users. The compromised data included email addresses and MD5 password hashes. Users are urged to reset any shared passwords due to the vulnerability of MD5.
BharatPay
In August 2022, BharatPay, an Indian payment platform, experienced a data breach exposing approximately 47,000 unique records containing email addresses, phone numbers, usernames, full names, birthdays, genders, physical addresses, and MD5 hashed passwords. Proper cybersecurity measures are essential to protect such sensitive information from future breaches, ensuring the safety of users' personal details and maintaining trust in digital platforms.