Has Your Email Been Compromised?
Check and see if your email has been involved in a databreach
Maison Gannac
In October 2024, the French e-commerce food website Maison Gannac experienced a data breach that affected 23,308 users. The exposed data included email addresses, full names, addresses, and payment details. This breach highlights the critical importance of implementing robust cybersecurity measures to protect sensitive customer information and ensure the safety of online transactions.
Predige
In August 2024, the French e-commerce website for luxury goods, Predige, experienced a data breach that exposed 3,117,140 records. The compromised data included email addresses, names, password hashes stored using bcrypt, and birthdates. This incident emphasizes the crucial importance of enforcing strong cybersecurity measures to protect sensitive user information and uphold the integrity of online platforms.
TruckerSucker
In March 2023, TruckerSucker, a U.S.-based social networking and dating platform designed for "truckers and masculine men," experienced a data breach that compromised approximately 40,000 user records. The exposed information included email addresses, usernames, full names, genders, birthdays, IP addresses, physical addresses, and passwords stored in either MD5 hashes or in plain text. This breach highlights the critical need for platforms to implement strong cybersecurity measures to protect sensitive user data.
HeatGames
In approximately June 2021, the online gaming platform HeatGames experienced a data breach affecting 1.1 million users. Compromised information included email addresses, IP addresses, usernames, phone numbers, countries, and passwords stored as MD5 hashes. This incident underscores the critical need for strong encryption methods and proactive cybersecurity strategies to safeguard user information.
HKGolden (高登讨论区)
In August 2019, the computer hardware and software forum HKGolden experienced a data breach that affected 297,000 users. The exposed data included email addresses, usernames, phone numbers, IP addresses, genders, dates of birth, and passwords stored in plaintext. This breach highlights the importance of encrypting sensitive data and implementing robust cybersecurity measures to protect user information.
LeakBase 14Kk ULP by farmagol
On December 21, 2024, a stealer log titled 14Kk Ulp was posted on a popular hacking forum. The stealer log, which contained 14 million records, exposed 3.53 million unique email addresses, homepage URLs, and passwords stored in plain text. This breach underscores the critical importance of strengthening cybersecurity defenses to safeguard sensitive personal data from large-scale compromises.
LeakBase 10Kk ULP by farmagol
On December 21, 2024, a stealer log titled 10Kk Ulp (Not Own) was posted on a popular hacking forum. The stealer log, which contained 10 million records, exposed 2.38 million unique email addresses, homepage URLs, and passwords stored in plain text. This breach underscores the critical importance of strengthening cybersecurity defenses to safeguard sensitive personal data from large-scale compromises.
ThinkSafe
In December 2022, ThinkSafe, an Italian e-commerce platform specializing in workplace safety gear, experienced a data breach compromising approximately 41,000 user records. The exposed data included email addresses, full names, IP addresses, and bcrypt-hashed passwords. This incident underscores the vital importance of robust cybersecurity practices to safeguard user information in the face of growing cyber threats.
BreachForums Private Satanic 10M ULP Part 2 Sept #9 by Satanic
On September 12, 2024, a stealer log titled Private Satanic Cloud 10M ULP Part 2 Sept #9 was uploaded to a popular hacking forum, containing approximately 10 million records. The log revealed around 2.9 million unique email addresses, plaintext passwords, and homepage URLs. This release was the ninth entry in a ten-part series, following a similar set of ten logs posted by the same individual the previous week. Such incidents highlight the growing threat of stealer logs in the digital landscape and the necessity for robust cybersecurity measures to protect sensitive data.
Asistencias Cispalc
In November 2024, Asistencias Cispalc, a Latin American resource and advocacy platform dedicated to improving palliative care for individuals with life-limiting illnesses, suffered a data breach affecting 108,896 users. The exposed data included email addresses, full names, phone numbers, and dates of birth. This breach emphasizes the importance of implementing stringent cybersecurity measures, including data encryption, access controls, and continuous monitoring, to protect sensitive personal information and uphold user trust in healthcare-related services.
BitView
In December 2024, BitView, a video-sharing community platform, experienced a data breach exposing 63,000 customer records. The breach, linked to a backup created by a former administrator earlier in the year, revealed email addresses, IP addresses, bcrypt password hashes, usernames, bios, private messages, video comments, and, in some cases, gender, date of birth, and country of location. This incident highlights the critical need for stringent cybersecurity measures, including secure data management practices, to safeguard user information and maintain trust in online communities.
BreachForums Private Satanic 10M ULP Part 2 Sept #7 by Satanic
On September 12, 2024, a stealer log titled Private Satanic 10M ULP Part 2 Sept #7 was uploaded to a popular hacking forum, containing approximately 10 million records. The log exposed around 2.6 million unique email addresses, plaintext passwords, and homepage URLs. This release was the seventh entry in a ten-part series, following a separate set of ten logs shared by the same individual just a week earlier. Such incidents highlight the pressing need for organizations and individuals to adopt proactive cybersecurity practices to reduce vulnerabilities and prevent data misuse.
LeakBase NewDatabase 18M ULP by farmagol
On December 19, 2024, a stealer log titled18Kk Ulp (Not Own) was posted on a popular hacking forum, containing approximately 18 million records. The log exposed 771,397 unique email addresses, homepage URLs, and plaintext passwords. This breach highlights the persistent threat posed by stealer malware and emphasizes the need for heightened cybersecurity measures to protect sensitive user data.
Get Revenge On Your Ex
Sometime in September 2022, the revenge website Get Revenge On Your Ex experienced a data breach affecting 79,100 users. The compromised information included email addresses, usernames, geographical locations, IP addresses, phone numbers and passwords stored in plaintext. This breach underscores the critical need for strong cybersecurity practices to safeguard sensitive user data and prevent such extensive exposures.
Expandia
In April 2024, Expandia, a Spanish company offering various household services through Expandia.com.es, suffered a data breach that exposed data from over 3 million clients. The breach included more than 303,000 unique email addresses, along with names, phone numbers, and physical addresses, and bcrypt hashed passwords. This incident underscores the critical need for robust cybersecurity protocols to safeguard sensitive customer information.
Sitrans
In December 2024, Sistrans, a Colombian logistics and transportation company, experienced a data breach affecting 291,772 users. The compromised data included email addresses, phone numbers, full names, birthdates, and registration dates. This incident underscores the critical need for robust cybersecurity measures, such as encrypting sensitive data, implementing strong access controls, and regularly updating security protocols, to safeguard user information and maintain trust in logistics and transportation services.
VPBet
In August 2024, the online betting platform VPbet suffered a data breach compromising approximately 2.7 million records. The exposed information included email addresses, phone numbers, usernames, and plaintext passwords. This incident highlights the importance of implementing robust cybersecurity measures to protect user data from unauthorized access.
Lazarus Group
In December 2024, Lazarus Group, an American company specializing in internet services, design, printing, and consulting, experienced a data breach that impacted 504 individuals. The breach led to the exposure of sensitive user information, including email addresses, first names, last names, and phone numbers. This incident underscores the critical importance of implementing robust cybersecurity measures to protect sensitive customer data from unauthorized access and breaches.
BreachForums Private Satanic 10M ULP Part 2 Sept #8 by Satanic
On September 12, 2024, a stealer log titled Private Satanic 10M ULP Part 2 Sept #8 was uploaded to a popular hacking forum, containing approximately 10 million records. The log exposed around 2.9 million unique email addresses, plaintext passwords, and homepage URLs. This release was the eighth entry in a ten-part series, following a separate set of ten logs shared by the same individual just a week earlier. This incident underscores the importance of robust cybersecurity measures to mitigate the risks posed by recurring data breaches and malicious actors.
Zillas Top Swap
In August 2024, Top Swap, a cryptocurrency exchange platform for Zillas tokens, experienced a data breach compromising over 700,000 records. The exposed data included email addresses, usernames, phone numbers, password hashes, IP addresses, and geographical locations. This incident underscores the critical need for robust cybersecurity protocols to safeguard sensitive user information in the cryptocurrency sector.
Unique fingerprints of over 15 billion email addresses
The Worlds Largest Breach Database
Over 15 Billion Records
Our Data Collection Process
Our lives rely on technology. We use it to do our jobs, entertain ourselves and stay connected. As technology continues to grow, our reliance on that technology does as well.
An organization’s employee and/or customer databases are either stolen or leaked by a malicious party
The compromised data is placed on the dark web where malicious threats and attackers obtain the data
HEROIC threat analysts discover the leaked and compromised data in hacker forums, paste bins, etc.
The data is then verified, cleaned and uploaded into HEROIC DarkHiveâ„¢ for search and reporting
Users and organizations using HEROIC receive account alerts and other remediation actions