goregrish.com
by - Thursday, January 1, 1970 at 12:00 AM
Name of the requested database: goregrish.com
Date of data breach: 17th or 18th July 2021
Amount of compromised users: Approx 300,000 (including ex and banned members)
Article(s) regarding the data breach: https://goregrish.com/threads/issue-resulting-from-the-recent-ddos.80236/

That last link is on their own site, but you can't read it unless you're a member and logged in so this is a screenshot of the first post;


That shot was taken on the 23rd July, and they'd been offline for about a week previously.

Other info
They were the target of DDoS attacks in the month(s) leading up to the breach. In the screenshot, you can see the admin say that during one attack, a 'dump of data' had been stolen.
Well it turned out to be more than just a dump, as the clone site he also mentioned was basically an exact copy of goregrish.

About the clone
I only ever saw one moderator/admin when I visited the site, and he went by the name Солярис (Solaris). He'd unbanned all the banned members, and old deleted posts/threads were now un-deleted. He also opened up the staff & VIP chatroom archives and the staff forums, making it all public.

Every attachment uploaded to the main site was on this clone. Videos, pictures, avatars, reactions etc, including whatever had been posted in PMs.
That's a huge amount of data as goregrish had been online over 10 years at the time of this breach.

The clone has gone now. As far as I'm aware, it was online for at least 6 months at a few domains before before they expired.
These are the one's I know about but there could have been more, and they all redirected to the same place.
https://goregri.sh/
https://reallygore.com/
https://wargrish.com/
https://ashleymurderedmadison.com/
https://goregrish.top/

I think, if it can be found, the database would compliment the shockgore breach as the user base will be very similar, but I haven't found a thing.
That's about it, and thanks in advance.
Reply


 Users viewing this thread: goregrish.com: No users currently viewing.