START Database - Leaked, Download!
by - Thursday, January 1, 1970 at 12:00 AM
(August 27, 2022, 03:17 PM)RuPeaceDa Wrote:
Hello BreachForums Community,
Today I have uploaded the START Database for you to download, thanks for reading and enjoy!



In August 2022, news broke of an attack against the Russian streaming service "START". The incident led to the exposure of 44M records containing 7.4M unique email addresses. The impacted data also included the subscriber's country and password hash. START subsequently acknowledged the incident in a Telegram post and stated that the data dated back to 2021.

I would like to warn users this leak is 77GB uncompressed and 6GB compressed.

Compromised data: Email addresses, Geographic locations, Names, Passwords
The .7z File's MD5 Hash is 29CDDC9E4579AF0E076D934B484975C3. In total, there are 43937127 records.


i am confused ,

how a file weight 966mb compressed all of the sudden weight 6gb compressed .

isnt it

"43.9 Million start.ru (CSV VERSION)

A dump of the database of registered users of the supposedly online cinema "START" (start.ru) was posted to the public.

? first name/surname (in Russian or English)
? email address mail (7,455,926 unique addresses)
? hashed (partially md5crypt) password
? IP address
? country (24.6 million from Russia, 2.3 million from Kazakhstan, 2.1 million from China, 1.7 million from Ukraine)
? subscription start/end date, last login, etc. (from 09/19/2017 to 09/22/2021)"

?
Reply
thanks a lot!
Reply
Woow nice
Reply
ur great bro
Reply
thanks
Reply
thank you for this
Reply
I'll post some code to parse the email and hash later. (change of heart)
Reply
I can't seem to figure out what the hash type is, that or these hashes are SUPER hard to crack.

I assumed it was md5crypt by the formatting, but I can't seem to even crack a single hash, and neither can hash cracking communities like hashmob.
Reply
(October 19, 2022, 12:02 AM)ANK1036Official Wrote: I'll post some code to parse the email and hash later. (change of heart)

This runs in Python 3.

Requirement: ijson [ pip install ijson ]

import ijson


def extract_users(json_filename):
    with open('start.ru_emailhash.txt', 'a') as output_file:
        with open(json_filename, 'rb') as input_file:
            data = ijson.items(input_file, 'item')
            for userinfo in data:
                try:
                    output_file.write(f"{userinfo['email']}:{userinfo['password']}
")
                except:
                    pass
            output_file.close()


extract_users('./users-full.json')

Simply put it into the same folder as the extracted data, and run it with Python. It'll output email:hash
Reply
Life saver! Thanks
Reply


 Users viewing this thread: START Database - Leaked, Download!: No users currently viewing.