August 30, 2022 at 9:19 AM
Hello BreachForums Community,
Today I have uploaded the Storagefront Database for you to download, thanks for reading and enjoy!
In approximately April 2020, the Service for "Local, Affordable and Friendly Storage" known as Storagefront suffered a data breach that impacted 136k customers. The breach included Email addresses, Full names and Passwords stored as PBKDF2 SHA256 hashes. The website was breahed by @donjuji - the attack vector was "aws s3 credentials were uploaded to a public git".
Compromised data: Email addresses, Full names, Passwords
Today I have uploaded the Storagefront Database for you to download, thanks for reading and enjoy!
In approximately April 2020, the Service for "Local, Affordable and Friendly Storage" known as Storagefront suffered a data breach that impacted 136k customers. The breach included Email addresses, Full names and Passwords stored as PBKDF2 SHA256 hashes. The website was breahed by @donjuji - the attack vector was "aws s3 credentials were uploaded to a public git".
Compromised data: Email addresses, Full names, Passwords
ContentsSpoiler
The .7z File's MD5 Hash is D0B11FCF660DF475F9D63B17A3AB7EAD. In total, there are 136087 records. The file is 27.75MB uncompressed and 12.16MB compressed.

