Database Requests
by - Thursday, January 1, 1970 at 12:00 AM
onlinerspambot
Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump.

Compromised data: Email addresses, Passwords

===========================================================================================

Lead Hunter: In March 2020, a massive trove of personal information referred to as "Lead Hunter" was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. The data contained 69 million unique email addresses across 110 million rows of data accompanied by additional personal information including names, phone numbers, genders and physical addresses. At the time of publishing, the breach could not be attributed to those responsible for obtaining and exposing it. The data was provided to HIBP by dehashed.com.

Compromised data: Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses

===========================================================================================

Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data.

Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles

===========================================================================================

email2name
Date Indexed: 2018-03-27
Total Records: 64,475,902

===========================================================================================
Reply
Name of the requested database(s): Masterdeeds.sql.gz
Date of data breach: Late 2017
Amount of compromised users: 50mil
Article(s) regarding the data breach: https://www.naschenweng.info/2017/10/19/south-african-master-deeds-data-leaked-via-mysql-data-dump/

Extra information: 2017 breach from south african database containing property and personal records of almost all citizens
Reply
Name of the requested database(s): Iberdrola (Spain)
Date of data breach: March 2022
Amount of compromised users: 1.3 million customers
Article regarding the data breach: https://spanishnewstoday.com/iberdrola-cyber-attack-compromises-data-of-millions-of-customers-in-spain_1758410-a.html


(May 13, 2022, 09:20 PM)wanless Wrote: Anyone have the db8151dd Covve database -


Covve: In February 2020, a massive trove of personal information referred to as "db8151dd" was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. Later identified as originating from the Covve contacts app, the exposed data included extensive personal information and interactions between Covve users and their contacts. The data was provided to HIBP by dehashed.com.

Compromised data: Email addresses, Job titles, Names, Phone numbers, Physical addresses, Social media profiles


Interested in this as well
Reply
Name of the requested database(s): Quest diagnostics
Date of data breach: 2019
Amount of compromised users: 11.9million

https://www.google.com/search?client=safari&rls=en&q=quest+diagnostics+leak&ie=UTF-8&oe=UTF-8
Reply
Name of the requested database(s): Brazilian Citizen Database 223 million
Date of data breach: 2020
Amount of compromised users: 223 million

sample:

14815758484|Joao Vitor Dias Santos|M - Masculino|06/12/2004
14815758646|Beatriz Ferreira Candido|F - Feminino|14/06/1998
14815758727|Marlon Vitor Bento Goncalves|M - Masculino|09/12/1990

I saw it on the forum before, but now I don't know why I can't find it
Reply
(May 2, 2022, 07:26 AM)fastfire Wrote: Name of requested breach : Covve

Breach date: 20 February 2020

Compromised accounts: 22,802,117

Compromised data: Email addresses, Job titles, Names, Phone numbers, Physical addresses, Social media profiles

Article regarding the breach:
https://www.troyhunt.com/the-unattributable-db8151dd-data-breach/


I am looking for this one also.
Reply
Name of the requested database(s): DeliveryClub
Date of data breach: May 2022

Rumors are circulating about a data leak from deliveryclub.ru , but forum search for "deliveryclub" and for "delivery-club" finds nothing. Does anyone have a download link?




Staff edit: Leaked; https://breached.co/Thread-Delivery-Club--7420
Reply
(April 2, 2022, 10:16 PM)Agcash6 Wrote: hi need thailand 30m 2021 was posted on rf earlier sep 2021.

source:- https://www.theeleader.com/news-enterprise/some-pages-reported-thailand-30m-people-data-records-was-leaked/attachment/some-pages-reported-thailand-30m-people-data-was-leaked-2/


https://breached.co/Thread-Selling-Citizent-Thailand-30M
My address Telegram: https://t.me/johnhanaa
Reply
Name of the requested database(s): Wiener Büchereien
Date of data breach: 13. June 2019
Amount of compromised users: 713k
Article(s) regarding the data breach:
https://futurezone.at/digital-life/wiener-buechereien-gehackt-daten-von-77000-nutzern-im-netz/400524190
https://www.techniknews.net/en/news/data-leak-at-viennese-libraries-data-from-over-700-users-in-the-network/
Extra information:
Original leak: https://web.archive.org/web/20190616071246/https://twitter.com/NaHabedere/status/1139238885555412993
hibp: https://haveibeenpwned.com/PwnedWebsites#WienerBuchereien
Anonfiles link(taken down): https://anonfiles.com/E3H8j0vene
File name: bibwien.tar.xz
Reply
(May 2, 2022, 01:04 AM)loversanml Wrote: Name of requested breach: T-Mobile data breach

Date of data breach: August 2021
Amount of compromised users: 47M

Article(s) regarding the data breach:
https://www.theverge.com/2022/4/23/23038570/lapsus-hackers-target-t-mobile-source-code-multiple-breaches-cybersecurity
https://www.wired.com/story/t-mobile-hack-data-phishing/

Extra information: -


Came across the release sometime ago file date matched Aug 21 tho it's less than the 47M believed it was shared on RF

use zstd to decompress

https://anonfiles.com/3ep8Dei8yc/T-Mobile.csv_zst
Reply


 Users viewing this thread: Database Requests: No users currently viewing.