Trillian.im leak db | Messanger
by - Thursday, January 1, 1970 at 12:00 AM
Request thread https://breached.to/Thread-REQUEST-Looking-for-any-of-these-databases
79k lines Username Email Hash. Sample:


rjcucina:[email protected]:e29c1c0f0ff7d55aa2e8ab150059c425
XtSchon:[email protected]:af4deab79ae3080a9ceb5bffb084da70
Jaimythornton:[email protected]:786a556611db461a431629c79efdb77a
kenderbard:[email protected]:293866ab582a11da3fec42fb3e5704b9
sonssj4:[email protected]:57f81d5f3ba07526f637cdd81d82da76
roopyfoo:[email protected]:10dfbea5d619fb68b33ec8ea350649c0
Hidden Content
You must register or login to view this content.
Reply
What's with all these parsed versions do you not have the original copy? This one seems like it's missing data.
Reply
(September 23, 2022, 02:31 PM)MysteriousHacka Wrote: What's with all these parsed versions do you not have the original copy? This one seems like it's missing data.


I have the same version. Vigilante.pw has this 79k version, however on HIBP it's reported having 3,5 million users.
This should probably be their blog, considering it's m 0 and 400.

"The information included salted MD5 hashed passwords for both our Wordpress blog and vBulletin forums but not for Trillian itself" , quote from their website.
Reply
(September 23, 2022, 04:47 PM)Scone Wrote:
(September 23, 2022, 02:31 PM)MysteriousHacka Wrote: What's with all these parsed versions do you not have the original copy? This one seems like it's missing data.


I have the same version. Vigilante.pw has this 79k version, however on HIBP it's reported having 3,5 million users.
This should probably be their blog, considering it's m 0 and 400.

"The information included salted MD5 hashed passwords for both our Wordpress blog and vBulletin forums but not for Trillian itself" , quote from their website.

I know it's definitely missing IP's because Vbulletin stores those by default.
Reply
(September 23, 2022, 04:51 PM)MysteriousHacka Wrote:
(September 23, 2022, 04:47 PM)Scone Wrote:
(September 23, 2022, 02:31 PM)MysteriousHacka Wrote: What's with all these parsed versions do you not have the original copy? This one seems like it's missing data.


I have the same version. Vigilante.pw has this 79k version, however on HIBP it's reported having 3,5 million users.
This should probably be their blog, considering it's m 0 and 400.

"The information included salted MD5 hashed passwords for both our Wordpress blog and vBulletin forums but not for Trillian itself" , quote from their website.

I know it's definitely missing IP's because Vbulletin stores those by default.

I'm not sure if this is their vbulletin forums. I think it's just blog since hashes are m 0 and 400.
Considering breach year, vbulletin hashes are most likely to be 2611

https://haveibeenpwned.com/PwnedWebsites#Trillian
Compromised data: Dates of birth, Email addresses, IP addresses, Names, Passwords, Usernames

Anyway, I agree with you. This isn't full for sure.
Reply
Have never seen the full Trillian leak

https://pompur.in
Reply
bumping
Reply
(September 23, 2022, 09:30 PM)pompompurin Wrote: Have never seen the full Trillian leak


Me neither, those three million records will most-likely never be public.  

LOL, HIBP is the only website which has the full breach. Most websites only have the ~79k one, although HackNotice has three versions, two of which have about one million records *each one* and were given around the same time (by the same person) in 2017, within a month or so. 

My wild guess is that both those datasets are combolists entitled trilliam.im. If those were really part of the original breach, I bet we would have seen them circulating on forums, eventually (at least, I speak for myself here, I have never heard of those files).  

Tthanks @Scone for being helpful. I really enjoy reading your posts. I quite agree with you about this breach being taken from their blog.

Data Viper [dataviper.io] breaches.csv:Trillian.im  (Jul 2016),79047,dataviper.io
LeakBase [leakbase.pw] breaches.csv:Trillian.im,2016-07,"79,047",,
Vigilante [vigilante.pw] breaches.csv:"79046",Trillian.im,MD5(Wordpress),Instant Messaging,2016-07,Yes
WeLeakInfo #1 [weleakinfo.com] breaches.csv:Trillian.im 1-2016 Website,01/2016,05/11/2019,Verified
HackNotice [hacknotice.com] breaches.csv:,"2017-08-01T05:00:00.000Z","trillian.im","Anon",1480198,"leakreport"
HackNotice [hacknotice.com] breaches.csv:,"2017-07-01T05:00:00.000Z","trillian.im","Anon",1257773,"leakreport"
HackNotice [hacknotice.com] breaches.csv:,"2017-02-01T06:00:00.000Z","trillian.im","Catz",79028,"leakreport"
Hacked Emails [hacked-emails.com] breaches.csv:Sep - 2016,"trillian.im",anon,"77,793",5.6 MB
Do not trust anyone.
Reach me @ [email protected].


Reply
Thanks boss for sharing


A very bad network disk, the ads can be forgiven, the download is html
D E T E C T I V E S A M

Reply
The link in this thread is dead. Please reply to the PM you were sent to get your thread moved back to the Databases section.
Reply


 Users viewing this thread: Trillian.im leak db | Messanger: No users currently viewing.