June 9, 2022 at 2:25 AM
Hello BreachForums Community,
Today I have uploaded the DataCamp Database for you to download, thanks for reading and enjoy!
In December 2018, the data science website DataCamp suffered a data breach of records dating back to January 2017. The incident exposed 760k unique email and IP addresses along with names and passwords stored as bcrypt hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly.
Compromised data: Email addresses, Geographic locations, IP addresses, Names, Passwords
Today I have uploaded the DataCamp Database for you to download, thanks for reading and enjoy!
In December 2018, the data science website DataCamp suffered a data breach of records dating back to January 2017. The incident exposed 760k unique email and IP addresses along with names and passwords stored as bcrypt hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly.
Compromised data: Email addresses, Geographic locations, IP addresses, Names, Passwords
ContentsSpoiler
The .7z File's MD5 Hash is F0C67122CCE9BE969C051B84E894130C. In total, there are 760561 records. The file is 251.39MB uncompressed and 69.96MB compressed.



