Money Bookers

21 Feb 2024 N/A 21-Feb-2024 Database
3,667,762 Records Affected
Database Source Structure
Darkweb Breach Location
Personal or account information exposed (non‑credential). Monitor for targeted phishing and account probing.

Breach Details

Domain N/A
Leaked Data Types Email Address, IP Address, Phone Number, First Name, Last Name, Birthday
Password Types No Passwords

Description

We noticed a resurfacing of older breach data, specifically targeting financial service platforms. While the volume wasn't the primary concern, the fact that the data from a 2009 breach of **Money Bookers** (now **Skrill**) is still circulating and potentially being used for credential stuffing and account takeover attacks caught our attention. The data, which includes personally identifiable information (**PII**) alongside email addresses and IP addresses, poses a risk to individuals who may have reused passwords or whose information can be used for social engineering. The age of the breach highlights the long-term risks associated with legacy data and the importance of continuous monitoring for compromised credentials.

Money Bookers Breach: 3.6M Accounts Exposed After Years of Dormancy

The breach, initially occurring in **2009**, impacted approximately **3,667,762** accounts. While the breach itself is not new, its continued presence in underground forums and potential use in modern attacks makes it relevant for enterprise security teams. The data appeared in various locations, including known breach aggregation sites and potentially private forums, observed from late 2015 onward.

The data exposed includes:

Key point: Total records exposed: 3,667,762

Key point: Types of data included: Email Address, IP Address, Phone Number, First Name, Last Name, Birthday

Key point: Sensitive content types: PII

Key point: Source structure: Database

The age of the data is a key factor. Individuals may have forgotten about accounts created in **2009**, making them less likely to monitor for suspicious activity. Furthermore, the exposed PII could be used in conjunction with more recent data breaches to create more complete profiles for targeted attacks. The breach was reported to include names, email addresses, home addresses, and IP addresses, went undetected until October 2015.

This breach echoes similar incidents where older data resurfaces years later to fuel new attacks. For example, older LinkedIn and MySpace breaches are still leveraged in credential stuffing campaigns. The persistence of this type of data underscores the need for organizations to implement robust password reset policies and monitor for compromised credentials across a wide range of sources.

Leaked Data Types

Email · Address · Ip · Phone · Number · First · Name · Last · Birthday

Breach Rank

#44

Ranked by number of affected users

Impact Score

Impact Score: 40.00

Based on data sensitivity, breach size, and recency

Estimated Financial Impact

$26.5M

This is an estimate based on potential fraud, phishing, and data misuse. Not all users will be affected.

Get Early Access to the Guardian Platform

HEROIC is close to launching our next-generation platform where you can search, secure, and monitor all of your identities. To be the first in line, simply insert your email and you'll be added to the list

Please correct the marked field(s) below.

Be the first to know when we launch

HEROIC is still under development, but we are well underway. We estimate launching in early 2024. Subscribing lets you know when we launch, and how you can be the first to reserve your HERO's (special currency specific to the platform).

Sign Up for Our Newsletter

Email marketing by Interspire

Scan to sign up

Scan to sign up instantly

24/7 Dark Web Monitoring
Instant Breach Alerts
Secure Data Protection
Your Data is at Risk

Your Personal Information is Exposed

We found your data exposed in multiple breaches. This includes:

  • Email addresses
  • Passwords
  • Phone numbers
  • Financial information
Secure My Information Now

Your information is protected by enterprise-grade security

Your Breach Details

Date:
Severity:
Records Exposed:

Your Exposed Information

Your Risk Level

How This Affects You

Full Breach Details

Premium Insights

Unlock Critical Security Information

Create a free account to access:

  • Full Breach Impact Analysis
  • Identity Theft Risk Score
  • Exposed Credentials Details
  • Personalized Security Recommendations
Create Free Account

Identity Theft Risk Score

Risk Score: 8.7/10 - Critical

Data Exposure Analysis

Passwords Critical
Financial High
Personal Medium
Social High
Security Critical

Breach Timeline Analysis

March 2024 Multiple credentials exposed in recent data breach
January 2024 Password found in dark web marketplace
December 2023 Personal information leaked in major security incident

Security Recommendations

High Priority
Password Security

Critical: Change compromised passwords immediately and enable 2FA on all accounts

Important
Financial Protection

Monitor credit reports and set up fraud alerts with major credit bureaus

Recommended
Identity Protection

Enable advanced identity monitoring and dark web surveillance