March 30, 2022 at 12:14 PM
Hello BreachForums Community,
Today I have uploaded the Snapchat Database for you to download, thanks for reading and enjoy!
In January 2014 just one week after Gibson Security detailed vulnerabilities in the service, Snapchat had 4.6 million usernames and phone number exposed. The attack involved brute force enumeration of a large number of phone numbers against the Snapchat API in what appears to be a response to Snapchat's assertion that such an attack was "theoretical". Consequently, the breach enabled individual usernames (which are often used across other services) to be resolved to phone numbers which users usually wish to keep private.
Compromised data: Geographic locations, Phone numbers, Usernames
Today I have uploaded the Snapchat Database for you to download, thanks for reading and enjoy!
In January 2014 just one week after Gibson Security detailed vulnerabilities in the service, Snapchat had 4.6 million usernames and phone number exposed. The attack involved brute force enumeration of a large number of phone numbers against the Snapchat API in what appears to be a response to Snapchat's assertion that such an attack was "theoretical". Consequently, the breach enabled individual usernames (which are often used across other services) to be resolved to phone numbers which users usually wish to keep private.
Compromised data: Geographic locations, Phone numbers, Usernames
ContentsSpoiler
The .7z File's MD5 Hash is 221505971EBDBACFF2C5CF554591BF02. In total, there are 4609615 records. The file is 167.9MB uncompressed and 32.34MB compressed.


