Registered : true
Registered : true
Registered : true
Breach : true
Name : MyHeritage
Website : myheritage.com
Bio : In October 2017, the genealogy website <a href="https://blog.myheritage.com/2018/06/myheritage-statement-about-a-cybersecurity-incident/" target="_blank" rel="noopener">MyHeritage suffered a data breach</a>. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it be attributed to "BenjaminBlue@exploit.im".
Creation Date : 2017-10-26T00:00:00

Registered : true
Breach : true
Name : Verifications.io
Website : verifications.io
Bio : In February 2019, the email address validation service <a href="https://securitydiscovery.com/800-million-emails-leaked-online-by-email-verification-service" target="_blank" rel="noopener">verifications.io suffered a data breach</a>. Discovered by <a href="https://twitter.com/mayhemdayone" target="_blank" rel="noopener">Bob Diachenko</a> and <a href="https://twitter.com/vinnytroia" target="_blank" rel="noopener">Vinny Troia</a>, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although <a href="https://web.archive.org/web/20190227230352/https://verifications.io/" target="_blank" rel="noopener">an archived copy remains viewable</a>.
Creation Date : 2019-02-25T00:00:00

Registered : true
Breach : true
Name : Data Enrichment Exposure From PDL Customer
Bio : In October 2019, <a href="https://www.troyhunt.com/data-enrichment-people-data-labs-and-another-622m-email-addresses" target="_blank" rel="noopener">security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data</a>. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data.
Creation Date : 2019-10-16T00:00:00

Registered : true
Breach : true
Name : Straffic
Website : straffic.io
Bio : In February 2020, Israeli marketing company <a href="https://www.databreachtoday.com/israeli-marketing-company-exposes-contacts-database-a-13785" target="_blank" rel="noopener">Straffic exposed a database with 140GB of personal data</a>. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In <a href="https://straffic.io/updates.php" target="_blank" rel="noopener">their breach disclosure message</a>, Straffic stated that "it is impossible to create a totally immune system, and these things can occur".
Creation Date : 2020-02-14T00:00:00

Registered : true
Breach : true
Name : Aptoide
Website : aptoide.com
Bio : In April 2020, the independent Android app store <a href="https://blog.aptoide.com/aptoide-credentials-information/" target="_blank" rel="noopener">Aptoide suffered a data breach</a>. The incident resulted in the exposure of 20M customer records which were subsequently shared online via a popular hacking forum. Impacted data included email and IP addresses, names, IP addresses and passwords stored as SHA-1 hashes without a salt.
Creation Date : 2020-04-13T00:00:00

Registered : true
Breach : true
Name : ZAP-Hosting
Website : zap-hosting.com
Bio : In November 2021, web host <a href="https://twitter.com/zaphosting/status/1503346593591873543" target="_blank" rel="noopener">ZAP-Hosting suffered a data breach</a> that exposed over 60GB of data containing 746k unique email addresses. The breach also contained support chat logs, IP addresses, names, purchases, physical addresses and phone numbers.
Creation Date : 2021-11-22T00:00:00

Registered : true
Breach : true
Name : ApexSMS
Bio : In May 2019, <a href="https://techcrunch.com/2019/05/09/sms-spammers-doxxed/?guccounter=1" target="_blank" rel="noopener">news broke of a massive SMS spam operation known as "ApexSMS" which was discovered after a MongoDB instance of the same name was found exposed without a password</a>. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and IP addresses.
Creation Date : 2019-04-15T00:00:00

Registered : true
Breach : true
Name : Combolists Posted to Telegram
Bio : In May 2024, <a href="https://troyhunt.com/telegram-combolists-and-361m-email-addresses" target="_blank" rel="noopener">2B rows of data with 361M unique email addresses were collated from malicious Telegram channels</a>. The data contained 122GB across 1.7k files with email addresses, usernames, passwords and in many cases, the website they were entered into. The data appears to have been sourced from a combination of existing combolists and info stealer malware.
Creation Date : 2024-05-28T00:00:00

Registered : true
Breach : true
Name : Stealer Logs Posted to Telegram
Bio : In July 2024, <a href="https://troyhunt.com/begging-for-bounties-and-more-info-stealer-logs" target="_blank" rel="noopener">info stealer logs with 26M unique email addresses were collated from malicious Telegram channels</a>. The data contained 22GB of logs consisting of email addresses, passwords and the websites they were used on, all obtained by malware running on infected machines.
Creation Date : 2024-07-18T00:00:00

Registered : true
Breach : true
Name : Stealer Logs, Jan 2025
Bio : In January 2025, <a href="https://troyhunt.com/experimenting-with-stealer-logs-in-have-i-been-pwned/" target="_blank" rel="noopener">stealer logs with 71M email addresses were added to HIBP</a>. Consisting of email address, password and the website the credentials were entered against, this breach marks the launch of a new HIBP feature enabling the retrieval of the specific websites the logs were collected against. The incident also resulted in 106M more passwords being added to the <a href="https://haveibeenpwned.com/Passwords" rel="noopener">Pwned Passwords service</a>.
Creation Date : 2025-01-13T00:00:00

Registered : true
Breach : true
Name : ALIEN TXTBASE Stealer Logs
Bio : In February 2025, <a href="https://www.troyhunt.com/processing-23-billion-rows-of-alien-txtbase-stealer-logs" target="_blank" rel="noopener">23 billion rows of stealer logs were obtained from a Telegram channel known as ALIEN TXTBASE</a>. The data contained 284M unique email addresses alongside the websites they were entered into and the passwords used. This data is now searchable in HIBP by both email domain and the domain of the target website.
Creation Date : 2025-02-15T00:00:00

Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Registered : true
Phone Hint : (***) ***-**84
Registered : true
Registered : true
Name : Vincent
Username : im12yearold
Profile Url : https://data.typeracer.com/pit/profile?user=im12yearold

Registered : true
Registered : true
Id : 1450342401
Username : evapspades
Profile Url : https://www.smule.com/evapspades
Verified : false

Registered : true
Id : 4afb99ad-ec5e-4759-b989-629e631694af
Name : Va1idate
Username : piecek
Followers : 0
Following : 0
Verified : false
Private : false
Creation Date : 2023-01-11T23:22:33+00:00
Registered : true
Id : 5307AD6F607F6D67
Name : vincent scaglione
Location : US
Email Hint : ki *** @gmail.com
Phone Hint : ********84
Last Seen : 2025-03-22T12:17:16.027000+00:00
Creation Date : 2016-06-05T15:28:25.317000+00:00
Registered : true
Id : dbid:AADA1K5f6QOZr_nvy2v65y85L9CDKh3duv0
Name : Evap Spades
First Name : Evap
Last Name : Spades
Verified : true
Registered : true
Content: Breached on MyHeritage
Date/Year: 2017-10-26T00:00:00
Content: Breached on Verifications.io
Date/Year: 2019-02-25T00:00:00
Content: Breached on Data Enrichment Exposure From PDL Customer
Date/Year: 2019-10-16T00:00:00
Content: Breached on Straffic
Date/Year: 2020-02-14T00:00:00
Content: Breached on Aptoide
Date/Year: 2020-04-13T00:00:00
Content: Breached on ZAP-Hosting
Date/Year: 2021-11-22T00:00:00
Content: Breached on ApexSMS
Date/Year: 2019-04-15T00:00:00
Content: Breached on Combolists Posted to Telegram
Date/Year: 2024-05-28T00:00:00
Content: Breached on Stealer Logs Posted to Telegram
Date/Year: 2024-07-18T00:00:00
Content: Breached on Stealer Logs, Jan 2025
Date/Year: 2025-01-13T00:00:00
Content: Breached on ALIEN TXTBASE Stealer Logs
Date/Year: 2025-02-15T00:00:00
Content: Created Account (Bandlab)
Date/Year: 2023-01-11T23:22:33+00:00
Content: Last Active (Microsoft)
Date/Year: 2025-03-22T12:17:16.027000+00:00
Content: Created Account (Microsoft)
Date/Year: 2016-06-05T15:28:25.317000+00:00