Breaches

Here’s an overview of the various breaches consolidated on this site. Breach information is constantly being updated, so be sure to check back often.

Check all data breaches and protect your info.

  • Pemiblanc Logo

    Pemiblanc

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 110,964,206
    An anonymously posted credential stuffing list titled Pemblanc was posted on a public French servers. ces. It contained over a hundred million email addresses. The emails in the list were used by hackers to take over accounts on other sites due to credential reuse.
  • Zomato Logo

    Zomato

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 16,472,873
    Restaurant search engine Zomato was affected by a breach conducted by an unknown hacker or hacker collective. The attackers compromised the records of over 16 million individual user accounts.
  • Edmodo Logo

    Edmodo

    • Compromised Data: email addresses, passwords, usernames
    • Compromised Accounts: 43,423,561
    The education site Edmodo was hacked in May 2017, exposing 77 million confidential records. All of the data was posted to a public hacking forum.
  • Cross Fire Logo

    Cross Fire

    • Compromised Data: email addresses, passwords, usernames
    • Compromised Accounts: 12,865,609
    Russian gaming forum Cross Fire (cfire.mail.ru), along with other forums on the Russian mail provider mail.ru, were exposed to a data breach in August 2016.
  • No Logo Available

    Anti Public Combo List

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 457,962,538
    In December 2016, a massive data breach containing hundreds of millions of emails and password pairings appeared in a combo list Anti Public. The information contained data on 458 million unique email addresses, paired with passwords used on numerous online systems. The emails and password pairings were thoroughly inspected by attackers, who subsequently used them for credential stuffing attacks, then bragged about their exploits.
  • Youku Logo

    Youku

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 91,890,110
    Popular Chinese video service Yuoku was comrpomised in a cyber attack in late 2016. Data breaches from China cannot be independently verified.
  • No Logo Available

    Exploit.In

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 593,427,119
    An extensive list of email addresses and password pairs was discovered in a combo list named exploit.in in late 2016. Attackers used the compromised emails and passwords in subsequent credential stuffing attacks.
  • Justdate.com Logo

    Justdate.com

    • Compromised Data: dates of birth, email addresses, geographic locations, names
    • Compromised Accounts: 24,451,312
    Dating website Justdate.com apparently suffered a data breach in September 2016. Because much of the data released by hackers has been determined to be inconsistent and even inaccurate, many believe information about this breach to have been fabricated by a number of parties whether they were involved or not.
  • Leet Logo

    Leet

    • Compromised Data: email addresses, IP addresses, passwords, usernames, website activity
    • Compromised Accounts: 5,081,689
    Custom Minecraft server site Leet was the target of a data breach in August 2016.
  • uuu9 Logo

    uuu9

    • Compromised Data: email addresses, passwords, usernames
    • Compromised Accounts: 7,485,802
    Chinese gaming site uuu9 suffered a data breach that exposed account information in mid-2016. Data breaches from China cannot be independently verified.
  • ClixSense Logo

    ClixSense

    • Compromised Data: Account balances, Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Payment histories, Payment methods, Physical addresses, Usernames, Website activity
    • Compromised Accounts: 2,424,784
    ClixSense was targeted by hackers in a successful data breach which compromised almost 2.5 million user identities. The hackers posted all of the stolen data on a public domain, claiming that it was part of an even bigger data breach which affected up to 6.6 million people. The stolen information included payment histories, full names and real-world locations.
  • Пара Па Logo

    Пара Па

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 4,946,850
    Russian gaming site Пара Па (Para Pa) was hacked by an unknown entity, which compromised almost 5 million user accounts. This breach could be retaliation by Ukranian hackers due to Russian policy towards the Ukraine.
  • DLH.net Logo

    DLH.net

    • Compromised Data: dates of birth, email addresses, names, passwords, usernames, website activity
    • Compromised Accounts: 3,264,710
    Gaming news site DLH.net experienced a data breach in July 2016. Breached data included users's keys for accessing the Steam gaming platform.
  • i-Dressup Logo

    i-Dressup

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 2,191,565
    Teen social site i-Dressup was breached in 2016. The website's main audience is underage children.
  • AbuseWith.Us Logo

    AbuseWith.Us

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 1,372,550
    Abusewith.us was the target of multiple data breaches in 2016. The attackers compromised the personal information of over a million user accounts.
  • Funimation Logo

    Funimation

    • Compromised Data: dates of birth, email addresses, passwords, usernames
    • Compromised Accounts: 2,491,103
    Funimation, one of the most popular anime sites in the world, suffered a data breach in July 2016. The personal details about Funimation's mostly underage subscribers was shared openly on underground forums.
  • MangaFox.me Logo

    MangaFox.me

    • Compromised Data: dates of birth, email addresses, IP addresses, passwords, usernames
    • Compromised Accounts: 1,311,610
    Manga fan website mangafox.me was the target of a data breach in July 2016.
  • Evony Logo

    Evony

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 29,396,116
    Online multiplayer game Evony suffered a data breach in mid 2016 which resulted in the exposure of a total of tens of millions of user accounts. The leaked records included data ranging from usernames to unsalted MD5 password hashes.
  • Army Force Online Logo

    Army Force Online

    • Compromised Data: Avatars, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames, Website activity
    • Compromised Accounts: 1,531,235
    Army Force Online was hacked in 2016, and the stolen data was found being traded on underground forums and markets.
  • 17 Logo

    17

    • Compromised Data: Device information, Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 4,009,640
    Proof of a data breach targeting streaming app 17 was uncovered in 2016. The discovery was made on a Tor browser marketplace where the data was found for sale.
  • Mate1.com Logo

    Mate1.com

    • Compromised Data: astrological signs, dates of birth, drinking habits, drug habits, education levels, email addresses, ethnicities, fitness levels, genders, geographic locations, income levels, job titles, names, parenting plans, passwords, personal descrIPtions, physical attributes, political views, relationshIP statuses, religions, sexual fetishes, travel habits, usernames, website activity, work habits
    • Compromised Accounts: 27,393,015
    Popular dating site Mate1.com was the target of a large data breach. Private chat records included in the data breach revealed deeply personal information about the site's subscribers.
  • Flash Flash Revolution Logo

    Flash Flash Revolution

    • Compromised Data: email addresses, passwords, usernames
    • Compromised Accounts: 1,771,845
    The music-based game Flash Flash Revolution suffered a data breach on February 2016. The breached data was published in a discussion forum.
  • Nihonomaru Logo

    Nihonomaru

    • Compromised Data: email addresses, IP addresses, passwords, usernames
    • Compromised Accounts: 1,697,282
    Anime community Nihonomaru was the target of a data breach in late 2015. The source of the breach is yet to be confirmed and it is likely that the majority of the hacked accounts belonged to underage individuals.
  • xat Logo

    xat

    • Compromised Data: email addresses, IP addresses, passwords, usernames, website activity
    • Compromised Accounts: 5,968,783
    Online chat service Xat was attacked in November 2015, exposing data on over 17 million subscribers.
  • InterPals Logo

    InterPals

    • Compromised Data: dates of birth, email addresses, geographic locations, names, passwords, usernames
    • Compromised Accounts: 3,439,414
    Attackers seized 4,569,249 email addresses, as well as geographical locations, birthdates and salted hashes of passwords from online penpal site InterPals.
  • R2Games Logo

    R2Games

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 22,281,337
    Popular gaming website R2 games suffered a data breach at the hands of an unknown hacker(s). The breach affected over 20 million user accounts. The identity of the attacker(s) has not yet been determined.
  • MPGH Logo

    MPGH

    • Compromised Data: email addresses, IP addresses, passwords, usernames
    • Compromised Accounts: 3,122,898
    MPGH, a gaming site dedicated to hacking, cheating and modding multiplayer games was the target of a data breach in October 2015.
  • NetEase Logo

    NetEase

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 234,842,089
    NetEase, a Chinese site operating on the domain 135.com, suffered a data breach in 2015. While there is compelling evidence of the breach, data breaches from China cannot be independently verified.
  • Xbox 360 ISO Logo

    Xbox 360 ISO

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 1,296,959
    Almost 1.3 million Xbox360ISO.com accounts were compromised by a breach. The breach was conducted by an unidentified hacker or hacker collective.
  • PSP ISO Logo

    PSP ISO

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 1,274,070
    A forum named PSP ISO was the target of a data breach which was conducted by an unknown hacker (or possibly a hacker collective). The purpose of the infiltration was to extract as much data as possible, and successfully compromised the personal information of over a million user accounts.
  • Final Fantasy Shrine Logo

    Final Fantasy Shrine

    • Compromised Data: Email addresses, Passwords, Usernames, Website activity
    • Compromised Accounts: 620,677
    The Final Fantasy discussion forum FFShrine was breached which resulted in a public data dump. The breached data contained numerous records spanning from email addresses to passwords.
  • Experian Logo

    Experian

    • Compromised Data: Credit status information, Dates of birth, Email addresses, Ethnicities, Family structure, Genders, Home ownership statuses, Income levels, IP addresses, Names, Phone numbers, Physical addresses, Purchasing habits
    • Compromised Accounts: 7,196,890
    Experian was targeted by a hacker 2015 who were seeking the information of customers who signed up for financial consultations via the company's T-Mobile platform. The breached data was found circulating dark net marketplaces, and contained over 7 million data records tied to millions of individuals.
  • myRepoSpace Logo

    myRepoSpace

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 252,751
    Cydia repository myRepoSpace was hacked which lead to the data records of over 250,000 users being publicly leaked. The culprits behind the breach were likely to have been motivated by the service's refusal to remove pirated tweaks on iOS devices.
  • iPmart Logo

    iPmart

    • Compromised Data: dates of birth, email addresses, passwords, usernames
    • Compromised Accounts: 2,460,787
    Mobi NUKE, formerly iPmart, was hacked in 2015. Users's data was protected only by a weak hashing implementation, allowing the majority of accounts to be comporomised quickly.
  • Eroticy Logo

    Eroticy

    • Compromised Data: email addresses, IP addresses, names, passwords, payment histories, phone numbers, physical addresses, usernames, website activity
    • Compromised Accounts: 1,370,175
    Adult website Eroticy allegedly had its data breached in 2016, and evidence of the breached data uncovered later that same year in a number of trader forums.
  • Adult Friend Finder Logo

    Adult Friend Finder

    • Compromised Data: dates of birth, email addresses, genders, geographic locations, IP addresses, races, relationshIP statuses, sexual orientations, spoken languages, usernames
    • Compromised Accounts: 3,867,997
    Popular dating website Adult Friend Finder was breached in 2015, compromising the email addresses and domains of 3,594,037 user accounts, as well as 814,195 IP addresses, 1,064,930 passwords, 397,542 usernames and additional personal information.
  • Спрашивай.ру Logo

    Спрашивай.ру

    • Compromised Data: Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Spoken languages
    • Compromised Accounts: 3,474,763
    A hacker going by the moniker w0rm publicly released account records of millions of users subscribed to the Russian anonymous Q&A website Спрашивай.ру.
  • HongFire Logo

    HongFire

    • Compromised Data: dates of birth, email addresses, IP addresses, passwords, usernames
    • Compromised Accounts: 999,991
    The vBulletin-hosted anime and manga forum HongFire suffered a data breach in March 2015.
  • 000webhost Logo

    000webhost

    • Compromised Data: email addresses, IP addresses, names, passwords
    • Compromised Accounts: 14,936,670
    Free web hosting provider 000webhost experienced a large data breach; by the time they discovered, the breach the data had long since been sold and was being traded openly on the internet.
  • GameTuts Logo

    GameTuts

    • Compromised Data: email addresses, IP addresses, passwords, usernames
    • Compromised Accounts: 2,064,274
    The popular video game website GameTuts experienced a mass data breach as the result of an unauthorized infiltration in March 2015. The stolen data was displayed in black hat forums and communities. The website shut down a little over a year after the attack.
  • Acne.org Logo

    Acne.org

    • Compromised Data: Dates of birth, Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 432,943
    Acne.org was hacked in 2014. The breach compromised over 400,000 accounts. It was later found out that the breached data contained the records of an additional 270,000 accounts. Reportedly, stolen data has been traded on various underground dark net boards.
  • mail.ru Dump Logo

    mail.ru Dump

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 16,630,988
    Several data dumps of user information sourced from accounts on the domain [mail.ru] on the Russian Bitcoin Security Forum in September 2014. It's likely that [mail.ru] wasn't itself directly attacked, as the breached user accounts and emails were subscribers of other services.
  • diet.com Logo

    diet.com

    • Compromised Data: Dates of birth, Eating habits, Email addresses, IP addresses, Names, Passwords, Physical attributes, Usernames
    • Compromised Accounts: 1,383,759
    Diet.com was targeted by hackers and the attack exposed over a million user accounts. The breach data contained significant information on each user, including eating habits, BMI, physical attributes and so on.
  • NextGenUpdate Logo

    NextGenUpdate

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 1,194,597
    Video game website NextGenUpdate was targeted in a data breach that successfully compromised over one million user identities. The hackers behind the breach remain unknown.
  • Rambler Logo

    Rambler

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 91,436,280
    A data dump of approximately 100 million accounts from the Russian site Rambler was found circulating dark net boards. Both the entity behind the breach and the date at which the breach occurred are unknown.
  • Vodafone Logo

    Vodafone

    • Compromised Data: Credit cards, Email addresses, Government issued IDs, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases, SMS
    • Compromised Accounts: 56,021
    The Icelandic Vodafone website was compromised by the Turkish hacker collective Maxn3y. The attackers publicly exposed all the data they could procure from the attack, including server logs containing personal information.
  • Adobe Logo

    Adobe

    • Compromised Data: Email addresses, Password hints, Passwords, Usernames
    • Compromised Accounts: 152,445,165
    Adobe was hacked in 2013, which resulted in the exposure of hundreds of millions of user accounts. The breached data contained unencrypted password hints, which pose a risk of additional data breaches on Adobe users in the future.
  • iMesh Logo

    iMesh

    • Compromised Data: email addresses, IP addresses, passwords, usernames
    • Compromised Accounts: 49,467,477
    The media and file sharing site iMesh was hacked in September 2013. The data was offered for sale on a dark market site about three years later.
  • Nexus Mods Logo

    Nexus Mods

    • Compromised Data: email addresses, passwords, usernames.
    • Compromised Accounts: 5,915,013
    Game modding site Nexus Mods suffered a data breach, likely in July 2013. Nexus Mods released a statement declaring that its users had been hacked in late 2015.
  • Badoo Logo

    Badoo

    • Compromised Data: dates of birth, email addresses, genders, names, passwords, usernames
    • Compromised Accounts: 112,005,531
    A large data breach was uncovered in trading between black hat actors in June 2016. The data breach appears to have originated from social media site Badoo. While there is compelling evidence that a large data breach originated from Badoo, the data extracted is yet to be verified.
  • Neopets Logo

    Neopets

    • Compromised Data: dates of birth, email addresses, genders, geographic locations, IP addresses, names, passwords, usernames
    • Compromised Accounts: 26,892,897
    The Neopets breach likely occurred in 2013, though information related to the breach wasn't uncovered for several years. Because of the nature of the website and its attendant game(s), the majority of users affected by this breach were likely underage.
  • Dungeons & Dragons Online Logo

    Dungeons & Dragons Online

    • Compromised Data: Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity
    • Compromised Accounts: 1,580,933
    The game Dungeons & Dragons Online suffered a data breach which compromised the identities of over 1.5 million users. Evidence of this breach was originally discovered when the stolen data was found circulating several underground marketplaces and forums.
  • Tumblr Logo

    Tumblr

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 65,469,298
    A mass cyber attack on popular social site Tumblr resulted in the exposure of 65,469,298 accounts; the data was subsequently sold on dark net marketplaces.
  • Yahoo Logo

    Yahoo

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 453,427
    Voices, a publishing service of Yahoo, was breached via an SQL injection attack in July 2012. The breach compromised varying numbers of unique email addresses and domains, passwords and user names. Approximately 59% of the compromised accounts reused email addresses and passwords on additional websites, making them susceptible to credential stuffing attacks.
  • Dropbox Logo

    Dropbox

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 68,648,009
    Hackers attacked file storage service Dropbox some time in mid-2012, exposing data on over 68 million subscribers. Exposed passwords included salted hashes using SHA1 and bcrypt and were traded online. Dropbox issued a statement in August 2016 asking its subscribers to change their passwords.
  • Last.fm Logo

    Last.fm

    • Compromised Data: email addresses, passwords, usernames, website activity
    • Compromised Accounts: 37,217,682
    The music website Last.fm was hacked in 2012. Last.fm was aware of this incident in 2012, but the full scale of the breach remained unknown until the data was publicly released in September 2016.
  • Gamigo Logo

    Gamigo

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 8,243,604
    German game publisher Gamigo experienced a data breach in March 2012. All of the stolen information was publicly released.
  • YouPorn Logo

    YouPorn

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 1,327,567
    YouPorn.com was compromised in a data breach. The attacker published the information publicly, indicating a desire to make it easily accessible. The stolen records include account credentials and personal data. Due to the pornographic nature of the site and the personal information exposed in the breach, this breach is considered sensitive.
  • Taobao Logo

    Taobao

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 21,149,008
    Chinese ecommerce site Taobao was the target of an alleged data breach that took place sometime in 2012. Due to the foreign nature of this breach, it is impossible to verify the stolen data.
  • VK Logo

    VK

    • Compromised Data: email addresses, names, passwords, phone numbers
    • Compromised Accounts: 93,338,602
    Russian social media site VK suffered a data breach in 2012. Evidence regarding the breach was uncovered in June 2016 when data tracing back to the site was found circulating on dark net market sites.
  • 126 Logo

    126

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 6,414,191
    Chinese email services 126 suffered a data breach likely affecting about 7.2 million users. However, due to the foreign nature of this breach, it is impossible to verify the stolen data.
  • QIP Logo

    QIP

    • Compromised Data: Email addresses, Passwords, Usernames, Website activity
    • Compromised Accounts: 26,183,992
    QIP, a Russian instant messaging service, was subject to a data breach at the hands of unknown hackers. The breached data was pulled from over 26 million accounts.
  • Fling Logo

    Fling

    • Compromised Data: dates of birth, email addresses, genders, geographic locations, IP addresses, passwords, phone numbers, sexual fetishes, sexual orientations, usernames, website activity
    • Compromised Accounts: 40,767,652
    Popular adult social network Fling suffered a data breach in March 2011. Because the compromised data included sexual interests and fetishes, blackmail was a real concern for affected users.
  • Zoosk Logo

    Zoosk

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 52,578,183
    Dating service Zoosk was likely breached by hackers in 2011. Dating site accounts typically contain personal information about the individual including their sexual preferences, fetishes and so on, increasing the possibility of blackmail attempts against identified users.
  • 7k7k Logo

    7k7k

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 9,121,434
    Chinese gaming site 7k7k Chinese was breached by hackers. Due to the foreign nature of this breach, it is impossible to verify the stolen data.
  • Money Bookers Logo

    Money Bookers

    • Compromised Data: Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses
    • Compromised Accounts: 4,483,605
    Money Bookers, an e-wallet service, suffered a data breach which exposed almost 4.5M customers. The exact date of the breach, as well as those responsible, cannot be determined.
  • Elance Logo

    Elance

    • Compromised Data: Email addresses, Employers, Geographic locations, Passwords, Phone numbers, Usernames
    • Compromised Accounts: 1,291,178
    Elance was targeted in a data breach which dates back to 2009. The breached data contained records of over 1 million user accounts, including uncategorized personal data which could be used with in blackmail.
  • MySpace Logo

    MySpace

    • Compromised Data: email addresses, passwords, usernames
    • Compromised Accounts: 359,420,698
    Popular social media site MySpace was targeted by hackers in 2008. Stolen data was offered for sale on dark net marketplace the Real Deal in 2016, about eight years after the breach.2016. The data is somewhat unusual in the world of breaches because the exposed passwords were stored as unsalted SHA1 hashes of the first ten letters of each password, and converted to plain text.
  • gPotato Logo

    gPotato

    • Compromised Data: Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Physical addresses, Security questions and answers, Usernames, Website activity
    • Compromised Accounts: 2,136,520
    gPotato was targeted by hackers who managed to extract information on over 2 million user accounts. The stolen records included usernames, IP addresses and so on, and was stored in plain text format.
  • No Logo Available

    Shadi.com

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 2,035,017
    User data compromised in a data breach
  • No Logo Available

    Steam users

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 3,940,337
    User data compromised in a data breach
  • No Logo Available

    Classmates

    • Compromised Data: Email addresses, IP addresses, Names, Geographic locations, Physical addresses, Street
    • Compromised Accounts: 2,363,094
    User data compromised in a data breach
  • No Logo Available

    MOP.com

    • Compromised Data: Email addresses, Passwords
    User data compromised in a data breach
  • No Logo Available

    Bedstore.co.uk

    • Compromised Data: Email addresses, First name, Last name, City, Street
    • Compromised Accounts: 1,092,136
    User data compromised in a data breach
  • No Logo Available

    Mixed Emails & Passwords

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 10,492,765
    User data compromised in a data breach
  • No Logo Available

    TurkishCitizenship

    • Compromised Data: First name, Last name, Date of birth, Genders, City, Street
    User data compromised in a data breach
  • No Logo Available

    345W

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 3,263,457
    User data compromised in a data breach
  • No Logo Available

    DFB.de

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 3,315,366
    User data compromised in a data breach
  • No Logo Available

    Subagames.com

    • Compromised Data: Email addresses, Usernames, Email domains
    • Compromised Accounts: 3,414,234
    User data compromised in a data breach
  • No Logo Available

    USA Homeowners

    • Compromised Data: Email addresses, IP addresses, Names, City, Street
    • Compromised Accounts: 1,326,210
    User data compromised in a data breach
  • No Logo Available

    Alarabiya.cc

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 100,945
    User data compromised in a data breach
  • No Logo Available

    USA Consumer Database

    • Compromised Data: Email addresses, First name, Last name, City, Street
    • Compromised Accounts: 3,122,473
    User data compromised in a data breach
  • No Logo Available

    abraham-hicks

    • Compromised Data: Email addresses
    • Compromised Accounts: 199,565
    User data compromised in a data breach
  • No Logo Available

    Harvested Gmail Accounts 2015

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 21,756,441
    User data compromised in a data breach
  • No Logo Available

    facebook

    • Compromised Data: Email addresses, First name, Last name
    • Compromised Accounts: 1,432,396
    User data compromised in a data breach
  • No Logo Available

    GrinderScape

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames
    • Compromised Accounts: 1,352,116
    User data compromised in a data breach
  • No Logo Available

    Twitter

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 70,098,955
    User data compromised in a data breach
  • No Logo Available

    Russian Mails

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 51,387,593
    User data compromised in a data breach
  • No Logo Available

    Japanese Gaming Databases

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 7,655,247
    User data compromised in a data breach
  • No Logo Available

    Dota2.com

    • Compromised Data: Passwords, Usernames
    • Compromised Accounts: 1,618,072
    User data compromised in a data breach
  • No Logo Available

    Kaixin001.com

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 7,393,105
    User data compromised in a data breach
  • No Logo Available

    OneDrive

    • Compromised Data: Email addresses, IP addresses, First name, Last name, Date of birth, Genders, Geographic locations, City, Street
    • Compromised Accounts: 70,405,592
    User data compromised in a data breach
  • No Logo Available

    GameVN

    • Compromised Data: Email addresses, IP addresses, Usernames
    • Compromised Accounts: 1,367,497
    User data compromised in a data breach
  • No Logo Available

    USA Marketing Data

    • Compromised Data: Email addresses, IP addresses, First name, Last name, Geographic locations, City, Street, Email domains
    • Compromised Accounts: 81,537,296
    User data compromised in a data breach
  • No Logo Available

    Weibo

    • Compromised Data: Email addresses, Passwords
    • Compromised Accounts: 1,940,000
    User data compromised in a data breach
  • No Logo Available

    scam.com

    • Compromised Data: Email addresses, Usernames
    • Compromised Accounts: 472,926
    User data compromised in a data breach
  • No Logo Available

    Florida Voters

    • Compromised Data: First name, Last name, Geographic locations, City, Street
    User data compromised in a data breach
  • No Logo Available

    SharkSearch

    • Compromised Data: Email addresses, IP addresses, Passwords, Usernames, Date of birth, Genders
    • Compromised Accounts: 31,495,428
    User data compromised in a data breach
  • LOTRO.com Logo

    LOTRO.com

    • Compromised Data: Email addresses, Usernames
    • Compromised Accounts: 1,356,099
    User data compromised in a data breach
  • No Logo Available

    766.com

    • Compromised Data: Email addresses, Passwords, Usernames
    • Compromised Accounts: 6,875,077
    User data compromised in a data breach
  • No Logo Available

    USA Business Database

    • Compromised Data: Email addresses, Names, Organization, Phone numbers, Country, City, Street
    • Compromised Accounts: 9,550,105
    User data compromised in a data breach
  • No Logo Available

    Numbering Plan Areas

    • Compromised Data: Email addresses, First name, Last name, Geographic locations, Phone numbers, City, Street
    • Compromised Accounts: 143,090,373
    User data compromised in a data breach
  • LinkedIn Logo

    LinkedIn

    • Compromised Data: email addresses, passwords
    • Compromised Accounts: 160,379,384
    LinkedIn was compromised in early 2012. A few years later in 2016, the data surfaced and was available among various threat actors on deep web communities. The information in the breach included hashed passwords which could easily be cracked. This exposed users account information and was very concerning. LinkedIn has taken measures to protect the compromised accounts by resetting passwords.