Badoo.com was hacked
Preface Badoo.com was hacked. LeakedSource has obtained and added a copy of this data to its...
VK.com was hacked
Preface VK.com was hacked. LeakedSource has obtained and added a copy of this data to its...
Gaming company Evony was hacked for a total of 33,407,472 users from its main game database in June of 2016
Table of Contents Summary Passwords Emails More databases Summary Gaming company Evony was...
Nearly 100 million records have been leaked online in yet another “mega breach”, this time from the website Rambler.ru
Table of Contents Summary Passwords Misc Summary Nearly 100 million records have been leaked...
Well known San-Francisco based “drag-n-drop” website creator Weebly.com had information on 43,430,316 users leaked from its main database in February of 2016
Table of Contents Important Updates Summary Passwords Emails More databases Important Updates...
Mate1.com was hacked on October 17th, 2015 and a copy of profile data for 27,403,958 accounts has been obtained by LeakedSource.
Preface Mate1.com was hacked on October 17th, 2015 and a copy of profile data for 27,403,958...
Sexual secrets for hundreds of millions exposed in largest hack of 2016
Friend Finder Network Inc is a company that operates a wide range of 18+ services and was hacked in October of 2016 for over 400 million accounts representing 20 years of customer data which makes it by far the largest breach we have ever seen -- MySpace gets 2nd place at 360 million. This event also marks the second time Friend Finder has been breached in two years, the first being around May of 2015.
iMesh.com (now defunct) was hacked on September 22nd, 2013
Preface iMesh.com (now defunct) was hacked on September 22nd, 2013. LeakedSource has obtained...
MySpace.com was hacked on June 11th, 2013
Preface MySpace.com was hacked on June 11th, 2013. LeakedSource has obtained and added a copy...
Presidency University
In August 2018, Presidency University, a prestigious public state university in West Bengal, India, suffered a data breach that affected 38,046 users. The compromised data included email addresses and MD5 password hashes. Users should update passwords stored with outdated algorithms like MD5 and ensure they use services that adopt stronger, modern hashing standards.
Actu-Environnement
In June 2019, Actu-Environnement, a prominent French professional environmental news portal, launched in 2003 and based in Paris, and operated by Cogiterra, a privately held press company, suffered a data breach that affected 36,454 users. The compromised data included email addresses and plaintext passwords. Storing passwords in plaintext poses a serious security risk; users should change affected credentials immediately and prioritize platforms that use secure encryption and hashing methods.
Energizer Power Packs
In March 2019, Energizer Power Packs, a U.S.-based official online shop for Energizer PowerPacks, which are consumer-grade power banks, wireless chargers, power stations, and electronic accessories, suffered a data breach that affected 39,906 users. The compromised data included email addresses and plaintext passwords. Users should update reused passwords across accounts and choose services that enforce strong password protection standards.
Universite Marie & Louis Pasteur
In August 2018, the official portal for the Bibliothèques Universitaires (BU) at the Université de Franche‑Comté, now rebranded as Université Marie & Louis Pasteur, located in Besançon, France, suffered a data breach that affected 31,974 users. The compromised data included email addresses and MD5 password hashes. Users are encouraged to reset passwords and adopt secure authentication methods to reduce exposure in future breaches.
ROSprites
In August 2018, ROSprites, a German-based archival site for custom sprite art inspired by Ragnarok Online—shared by enthusiasts for creative and private fan use, suffered a data breach that affected 19,150 users. The compromised data included email addresses and MD5 password hashes. It's important to avoid password reuse and to choose platforms that use industry-standard encryption for stored credentials.
RebateMango
In August 2018, RebateMango, a Southeast Asia–focused digital rewards platform—specializing in cashback, air miles, and loyalty points—based in Malaysia & Singapore, suffered a data breach that affected 18,708 users. The compromised data included email addresses and MD5 password hashes. Users should monitor accounts for suspicious activity and consider enabling two-factor authentication wherever possible.
Pue7.ru
In August 2018, Pue7.ru, a now-defunct Russian information website on electrical installations and automation systems, suffered a data breach that affected 35,430 users. The compromised data included email addresses and MD5 password hashes. It is advisable to change passwords after such breaches and avoid reusing credentials across platforms.
RisingShare
In October 2017, RisingShare, a now-defunct Italian general forum, suffered a data breach that affected 18,675 users. The compromised data included email addresses and pHpass password hashes. Even when password hashes are present, users should change affected credentials and adopt secure password practices.
Rumble
In July 2025, Rumble, a video-sharing and cloud-services platform founded in 2013 by Canadian entrepreneur Chris Pavlovski, headquartered in Toronto, Canada, with significant operations and a corporate office in Longboat Key, Florida, USA, and branding itself as a free-speech–focused “alt-tech” alternative to YouTube, suffered a data breach that affected 189,011 users. The compromised data included email addresses and usernames. Even when passwords aren't leaked, users should remain cautious of phishing and impersonation attempts, and ensure their account settings are secured.
Ie_Cloud_Ie_Lgs. uploaded by Unknown
In October 2022, a telegram user uploaded a stealer log file that exposed 15 records of endpoints, email, API host and passwords.
B Wine Shop
In July 2022, B Wine Shop, an Italian ecommerce platform specializing in wine, suffered a data breach exposing nearly 12,000 unique records containing email addresses, full names, IP addresses, genders, birthdays, and bcrypt hashed passwords. The exposure of such sensitive information underscores the importance of implementing robust cybersecurity measures to protect personal data and prevent future breaches from escalating harm.
Imagewear
In June 2019, Imagewear, a now-defunct custom apparel company based in Macon, Georgia (USA), known for specializing in school spiritwear—designing and selling custom T‑shirts, hoodies, and accessories for schools and teams, suffered a data breach that affected 35,630 users. The compromised data included email addresses and plaintext passwords. Storing passwords in plaintext is a serious vulnerability; users should update their credentials and ensure the use of secure services that follow strong encryption standards.
Matroids Matheplanet
In October 2018, Matroids Matheplanet, a well-established, non-commercial German math community that offers peer-reviewed articles, active discussions, and valuable resources for math learners and enthusiasts, suffered a data breach that affected 34,100 users. The compromised data included email addresses and password hashes stored in an unknown format. Users should regularly update passwords and use services that employ modern, secure hashing algorithms.
DW infoServer
In August 2018, DW infoServer, an Australian mixed-content portal featuring stock information, online chat, forums, and virtual services, suffered a data breach affecting around 161 thousand records. The exposed data includes nearly 48,000 unique email addresses and plaintext passwords. Implementing strong encryption and cybersecurity measures is critical to protect sensitive information.
Vuilen Music
In August 2018, Vuilen Music, the subdomain music.vuilen.com and part of Vuilen.com—a Vietnamese entertainment portal offering a mix of online music streaming and casual gaming—suffered a data breach that affected 330,390 users. The compromised data included email addresses and MD5 password hashes. It is important to use complex, unique passwords and enable account alerts where possible.
DM Tools
In August 2018, DM Tools, a now defunct online platform that provided a suite of tools and information for dungeon masters of Dungeons and Dragons games, suffered a data breach affecting nearly 61 thousand unique records. The exposed data includes email addresses and passwords hashed with MD5 or PHPass. Maintaining strong cybersecurity practices is important to protect data, regardless of a platform’s current status.
MAXpci
In August 2018, MAXpci, a legitimate U.S.-oriented provider offering PCI compliance tools and support tailored to lower-tier merchants, suffered a data breach that affected 27,334 users. The compromised data included email addresses and MD5 password hashes. Given the weakness of MD5, users should reset affected passwords and ensure future storage uses stronger hashing methods like bcrypt or Argon2.
Do Sports Easy
In August 2018, Do Sports Easy, a US based recreation management system, suffered a data breach affecting nearly 55 thousand records. The exposed data includes around 53,500 unique email addresses and passwords hashed with either bcrypt or SHA1. Implementing consistent and modern encryption standards is essential to ensure strong cybersecurity and protect user data.
Dive Computer Training
In August 2018, Dive Computer Training, an online educational platform, suffered a data breach affecting around 213 thousand records. The exposed data includes over 94,000 unique email addresses and passwords hashed with PHPass or MD5. Strong cybersecurity practices are essential to ensure the safety of user information.
DreamCodes.biz
In August 2018, DreamCodes.biz, a German IT community news and forum, suffered a data breach affecting over 35 thousand records. The exposed data includes around 34,000 unique email addresses and passwords hashed with MD5. Upgrading encryption methods and enforcing strong cybersecurity practices are essential to protect user credentials.