July 9, 2022 at 6:36 AM
Hello BreachForums Community,
Today I have uploaded the Vincefiles Database for you to download, thanks for reading and enjoy!
In approximately July 2022, the filehosting service Vincefiles owned by @vince suffered a data breach that impacted 28 users. The breach included Usernames, IP Addresses (Just Cloudflare IPs as @vince never figured out how to Restore visitor IPs) and Passwords stored as bcrypt hashes. The threat actor behind this attack goes by the name Muffin and supposedly social engineered his way into the production servers of the website where he was able to download and backdoor the running lolisafe instance.
Before you unlock this Thread please understand that there is only 28 Entries. Do not complain after unlocking.
Today I have uploaded the Vincefiles Database for you to download, thanks for reading and enjoy!
In approximately July 2022, the filehosting service Vincefiles owned by @vince suffered a data breach that impacted 28 users. The breach included Usernames, IP Addresses (Just Cloudflare IPs as @vince never figured out how to Restore visitor IPs) and Passwords stored as bcrypt hashes. The threat actor behind this attack goes by the name Muffin and supposedly social engineered his way into the production servers of the website where he was able to download and backdoor the running lolisafe instance.
Before you unlock this Thread please understand that there is only 28 Entries. Do not complain after unlocking.
Compromised data: Usernames, Passwords[/align]
ContentsSpoiler
The .7z File's MD5 Hash is B180F113EDB7105645F8C1F441B16E2D. In total, there are 28 records. The file is 48.36KB uncompressed and 9.71KB compressed.




