Yippiweb Database - Leaked, Download!
by - Thursday, January 1, 1970 at 12:00 AM
Hello BreachForums Community,
Today I have uploaded the Yippiweb Database for you to download, thanks for reading and enjoy!



In April 2022, the Social media & Messaging Yippiweb suffered a data breach that impacted 578k members. The breach included Email addresses, Usernames, Phone numbers and Passwords stored as MD5 hashes.

Compromised data: Email addresses, Usernames, Phone numbers, Passwords
The .7z File's MD5 Hash is 7CC9B425060D5D1386E91B58026DACA8. In total, there are 578409 records. The file is 485.46MB uncompressed and 67.16MB compressed.
Hidden Content
You must register or login to view this content.
Reply
Samples please



我们向中国低头,钱钱钱


Reply
(June 21, 2022, 10:36 PM)Toxin Wrote: Samples please

Add users sample.
Reply
(June 22, 2022, 06:32 AM)Toster Wrote:
(June 21, 2022, 10:36 PM)Toxin Wrote: Samples please

Add users sample.


How many users are missing emails? O.o no emails were in the sample you posted



我们向中国低头,钱钱钱


Reply
(June 22, 2022, 06:41 AM)Toxin Wrote:
(June 22, 2022, 06:32 AM)Toster Wrote:
(June 21, 2022, 10:36 PM)Toxin Wrote: Samples please

Add users sample.


How many users are missing emails? O.o no emails were in the sample you posted

Very few lines have an email. Almost all NULL
Reply
how 2 get credits?
Reply
what fields in db? Email? Password?
Reply
(June 21, 2022, 07:03 PM)Toster Wrote:
Hello BreachForums Community,
Today I have uploaded the Yippiweb Database for you to download for free, thanks for reading and enjoy!



In April 2022, the Social media & Messaging Yippiweb suffered a data breach that impacted 578k members. The breach included Email addresses, Usernames, Phone numbers and Passwords stored as MD5 hashes.

Compromised data: Email addresses, Usernames, Phone numbers, Passwords
The .7z File's MD5 Hash is 7CC9B425060D5D1386E91B58026DACA8. In total, there are 578409 records.
Reply
Greaaat !! Thank you for your post ..
Reply


 Users viewing this thread: Yippiweb Database - Leaked, Download!: No users currently viewing.