#DataBreaches

Largest Data Breaches in The World [Updated 2026]

January 31, 2024
Top-100-data-breaches

In the digital age, data breaches have become a frequent and troubling occurrence. Understanding these breaches is crucial for enhancing our cybersecurity measures and protecting sensitive information.

This comprehensive review of the top 100 data breaches offers insights into the magnitude of each incident and its impact on various industries.

From exposed personal details to compromised corporate data, each breach presents unique challenges and learning opportunities.

Let’s delve into these breaches to better grasp the current cybersecurity landscape.

Breach #1: 1.4BillionRecords

ComboList
Breach Date March 2017
Domain Not-Applicable
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 1,114,303,554
Industry Entertainment
Password Risk unknown
Searchable Yes
Sensitive No
Verified Yes

In December 2017, a significant data breach was discovered by 4iQ, revealing 1.4 billion user credentials on the dark web. This breach, consisting of a 41-gigabyte file, was not just a list but an interactive database that allowed for quick searches of usernames and passwords in plaintext. It was the largest known aggregation of personal data breaches at the time, containing almost twice as many records as the previous largest exposure.

The database compiled data from 252 previous data breaches, including major incidents like LinkedIn and MySpace breaches. It was organized alphabetically, making it easier to analyze trends in password usage and changes over time. This incident highlighted the severe risks of password reuse and the importance of strong cybersecurity practices for protecting personal and organizational data 

Breach #2: Collection-1

ComboList
Breach Date January 2019
Domain Not-Applicable
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 790,803,860
Industry Information Technology
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes

In January 2019, the online world was shaken by the discovery of “Collection #1,” a massive data breach that exposed a staggering 2.7 billion email address and password combinations. This colossal compilation, discovered by security researchers was not merely a random collection of data but a well-organized aggregation of breached credentials from numerous sources. Weighing in at over 87GB of data, Collection #1 was hosted on a popular cloud service, making it easily accessible to malicious actors.

This breach stood out for its sheer volume and the way it amalgamated data from over 2000 previous breaches, effectively creating a one-stop shop for cybercriminals. Unlike typical breaches that impact one organization, Collection #1 combined data from various sources, dramatically increasing the risk for individuals who reuse passwords across multiple platforms.

Breach #3: Verifications

Verificationsio
Breach Date February 2019
Domain verifications.io
Exposed Data 📬 Email addresses, 📛 Names, 📅 Dates of birth, 🚹🚺 Genders, 🌍 Geographic locations, 📱 Phone numbers, 🏠 Physical addresses
Exposed Records 762,579,945
Industry Information Technology
Password Risk unknown
Searchable Yes
Sensitive No
Verified Yes

In February 2019, the cybersecurity world was rocked by one of the largest and most unique data breaches in history, involving the email validation service, Verifications.io. This breach was notable not for the exposure of passwords or sensitive financial information, but for leaking an enormous trove of over 763 million unique email addresses. What set this breach apart was its focus on email validation – a critical aspect of digital marketing and communication strategies.

Verifications.io’s database, inadvertently left unsecured and accessible to anyone, contained detailed information including not just email addresses but also phone numbers, physical addresses, and even personal financial details in some cases.

Breach #4: ExploitIN

ComboList
Breach Date October 2016
Domain exploit.in
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 592,919,058
Industry Information Technology
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified No

In a significant cyber incident that came to light in late 2016, the hacker forum Exploit.in found itself at the center of a massive data breach. This breach was particularly alarming due to the nature of the forum – a known hub for cybercriminal activities, including the buying and selling of stolen data, hacking tools, and zero-day exploits. The breach resulted in the exposure of over 800,000 user accounts, which included not just email addresses but also highly sensitive and encrypted passwords.

It also highlighted the risks associated with participating in illicit online forums. The exposed data provided a unique insight into the underworld of cybercrime, revealing not only user identities but also the dynamics of the cybercriminal community.

Breach #5: AntiPublicCombo

ComboList
Breach Date December 2016
Domain Not-Applicable
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 457,399,902
Industry Education
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified No

In a striking revelation during December 2016, the cyber world was confronted with the AntiPublic Combo List breach. This wasn’t just a typical data leak; it was a profound invasion of personal privacy, affecting over 457 million personal records. What made this breach deeply unsettling was its composition – a compilation of previous data leaks from various sources, all bundled into one massive list.

The AntiPublic Combo List highlighted the increasingly interconnected nature of data breaches. It wasn’t merely a technical failure, but a human-centric disaster. Real people, with their emails and passwords laid bare, found their digital lives exposed and vulnerable to exploitation. This breach was a poignant reminder of the cascading effects of cybersecurity lapses.

Breach #6: Alleged-SOCRadar

ComboList
Breach Date August 2024
Domain Not Applicable
Exposed Data 📧 Email addresses
Exposed Records 282,977,267
Industry Information Technology
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

SOCRadar, a well-known cyber threat intelligence platform trusted by organizations worldwide, found itself at the center of an unusual security incident in August 2024. A notorious threat actor called USDoD claimed to have scraped over 330 million email addresses from the platform. The irony was hard to miss: a company built to protect others from cyber threats had its own tools turned against it. USDoD, who had previously targeted the FBI’s InfraGard platform and leaked CrowdStrike data, initially tried to sell the 14GB dataset for $7,000. Within days, another actor named Dominatrix released it for free, exposing nearly 283 million unique email addresses to the public.

SOCRadar conducted a thorough investigation and confirmed that their internal systems were never actually breached. What happened was far more subtle. The threat actor had purchased legitimate access to SOCRadar’s Dark Web monitoring platform using a real company account. From there, they used the platform’s own capabilities to identify public Telegram channels and crawl them for email addresses that were already floating around in stealer logs and combolists. While the exposed data contained only email addresses and no passwords, the sheer volume creates real risks. Cybercriminals can use such massive lists to launch large-scale phishing campaigns and credential-stuffing attacks. This incident highlights an uncomfortable truth: even security tools designed to protect can become weapons when they fall into the wrong hands.

Breach #7: Wattpad

Wattpad
Breach Date June 2020
Domain wattpad.com
Exposed Data 📛 Names, 👤 Usernames, 📅 Dates of birth, 🔑 Passwords, 🌐 IP addresses, 🚹🚺 Genders, 🌐 Social media profiles, 🌍 Geographic locations
Exposed Records 268,113,400
Industry Entertainment
Password Risk 🛡️ Secure
Searchable Yes
Sensitive No
Verified Yes
In June 2020, Wattpad, a popular online platform for writers to publish new user-generated stories, faced a significant data breach that impacted millions of its users. This breach was not just about the numbers — over 270 million user accounts were affected — but about the personal narratives and creative expressions that were compromised. Wattpad was more than just a website; it was a vibrant community where individuals shared their most intimate stories and ideas. The breach exposed user names, email addresses, and hashed passwords, but the true impact was much deeper. For many Wattpad users, the platform was a safe haven, a place to express themselves without fear. The breach shattered this sense of security, leaving users feeling vulnerable and exposed. It was a harsh reminder of the fragility of digital spaces, even those that feel like close-knit communities.

Breach #8: Deezer

Deezer
Breach Date April 2019
Domain deezer.com
Exposed Data 👤 Usernames, 📛 Names, 📬 Email addresses, 📅 Dates of birth
Exposed Records 244,007,616
Industry Music
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

In the world of digital music streaming, the Deezer breach in 2019 struck a particularly discordant note. Deezer, known for its vast library of songs and personalized playlists, experienced a data breach that compromised the personal details of millions of its users. This breach was not just a technical glitch in a system; it was an intrusion into the personal musical worlds of individuals who relied on Deezer to soundtrack their lives.

The compromised data included email addresses, usernames, and hashed passwords. For many, Deezer was more than just a platform to stream music; it was a personal archive of musical preferences, memories, and moments. This breach did more than expose user data; it disrupted the personal connection users had with their music, casting a shadow of vulnerability over what many considered a safe, personal space.

Breach #9: NetEase

Breach Date October 2015
Domain 163.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 232,857,074
Industry Information Technology
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive Yes
Verified No

In October 2015, Netease, a prominent Chinese internet technology company, experienced a significant data breach that impacted millions of its users. This breach was more than just an unfortunate cybersecurity incident; it was a stark intrusion into the digital lives of a vast user base that relied on Netease for a variety of online services, including email and gaming.

The breach resulted in the exposure of over 235 million user accounts, including email addresses, usernames, and passwords. For many of Netease’s users, this breach was not merely a loss of data but a violation of their digital identities. Netease’s platforms are integral to the daily digital interactions of its users, and the breach disrupted this routine, creating a ripple effect of vulnerability and mistrust.

Breach #10: Cit0day

ComboList
Breach Date November 2020
Domain cit0day.in
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 226,803,683
Industry Information Technology
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified No

The Cit0Day breach, unfolding in September 2020, marked a concerning trend in cyber incidents involving massive data leaks. Cit0Day, a website notorious for collecting and selling access to breached data, became the victim of its own game when its entire database was leaked online. This ironic twist in the tale of cyber vulnerabilities exposed a staggering amount of data – including millions of personal records from various sources.

This breach was not just about the sheer volume of data leaked; it was about the layered complexities of data breaches in the cyber world. Cit0Day had been aggregating data from numerous smaller breaches, creating a vast repository of personal information. When this repository was leaked, it underscored the multiplying effect of data breaches, where one platform’s compromise could lead to widespread repercussions across the internet.

Breach #11: Twitter-Scraped

Twitter
Breach Date January 2021
Domain twitter.com
Exposed Data 👤 Usernames, 📬 Email addresses, 📛 Names, 🌍 Geographic locations, 📷 Profile photos, 📱 Phone numbers
Exposed Records 208,918,735
Industry Information Technology
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The Twitter-Scape breach, an alarming cyber incident that occurred in 2020, brought to light significant security vulnerabilities within one of the world’s most influential social media platforms. This breach wasn’t just a technical lapse; it represented a significant threat to the digital discourse and public opinion shaping that Twitter is known for. High-profile accounts, including those of celebrities, politicians, and business leaders, were compromised, demonstrating the potential for widespread misinformation and manipulation.

This breach involved sophisticated social engineering tactics, where attackers gained access to Twitter’s internal systems and tools. They hijacked prominent accounts to execute a cryptocurrency scam, but the implications were far-reaching, raising concerns about the security of online identities and the potential for more damaging exploits. The Twitter-Scape incident was a jarring reminder of the fragility of digital platforms and the potential consequences when they are compromised.

Breach #12: Zynga

Zynga
Breach Date September 2019
Domain zynga.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords, 📱 Phone numbers
Exposed Records 172,817,913
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Zynga breach, which came to light in September 2019, marked a significant moment in mobile application security. Zynga, a powerhouse in the world of mobile gaming with popular titles like Words With Friends and Draw Something, faced a massive data breach impacting over 200 million users. This incident exposed a wide array of personal information, including names, email addresses, login IDs, and hashed passwords.

This breach was particularly impactful due to Zynga’s popularity and the casual, often security-lax nature of mobile game users. It brought to the forefront the vulnerabilities in mobile app data security and the importance of protecting user data in even the most seemingly innocuous of digital spaces. The Zynga breach was a wake-up call to the gaming industry and app developers worldwide, emphasizing the need for stringent security measures and responsible data handling practices.

Breach #13: AdultFriendFinder

Breach Date October 2016
Domain adultfriendfinder.com
Exposed Data 📬 Email addresses, 👤 Usernames, 📛 Names, 💕 Sexual preferences, 🚹🚺 Genders, 🌍 Geographic locations, 🌐 IP addresses, 📅 Dates of birth
Exposed Records 169,745,941
Industry Entertainment
Password Risk 🔍 Assessment Needed
Searchable No
Sensitive Yes
Verified Yes

The AdultFriendFinder breach, one of the largest of its kind, was revealed in November 2016 and had a profound impact on personal privacy. The breach affected more than 412 million accounts, making it one of the most significant data security incidents ever recorded. AdultFriendFinder, a site known for adult dating and entertainment services, saw the exposure of highly sensitive personal information, including email addresses, passwords, and in some cases, private sexual preferences and intentions.

This breach was not just a violation of digital security; it was an unprecedented invasion of personal and intimate details of millions of individuals. The AdultFriendFinder incident served as a stark reminder of the risks associated with entrusting personal and sensitive information to online platforms.

Breach #14: Dubsmash

Dubsmash
Breach Date December 2018
Domain dubsmash.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 161,835,382
Industry Entertainment
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes

The Dubsmash breach, which emerged in December 2018, represented a significant security setback for social media applications. Dubsmash, a popular video messaging app known for its lip-syncing features, experienced a massive data breach impacting over 162 million user accounts. This incident exposed a wide range of personal data, including email addresses, usernames, and hashed passwords, along with other personal details.

The breach’s impact was amplified by the app’s young and active user base, highlighting the vulnerability of social media platforms to cyber-attacks and the potential risks to user privacy. This incident was particularly concerning due to the personal nature of the content shared on the app – videos often featuring users in personal or humorous moments.

Breach #15: LinkedIn

Linkedin
Breach Date May 2012
Domain linkedin.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 160,042,644
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The LinkedIn breach, which surfaced in 2012, marked a critical moment in the realm of professional network security. LinkedIn, the world’s largest professional networking platform, faced a massive data breach that compromised the passwords of over 6.5 million users. The breach gained notoriety not only for the number of affected accounts but also for the platform’s prominence in professional circles.

This breach was particularly significant due to LinkedIn’s role as a hub for professional networking and career development. The exposed data included encrypted passwords, which were later cracked and made available on various online platforms.

Breach #16: Adobe

Breach Date October 2013
Domain adobe.com
Exposed Data 👤 Usernames, 🔑 Passwords, 📬 Email addresses
Exposed Records 152,403,035
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Adobe breach, which came to light in October 2013, was a significant disruption in the digital creative industry. Adobe, known for its extensive suite of creative software, including Photoshop, Illustrator, and Acrobat, experienced a massive security breach that compromised the data of approximately 153 million user accounts. The breach involved the exposure of user names, email addresses, encrypted passwords, and information related to customer orders.

This incident was particularly alarming given Adobe’s position as a leading software provider for professionals in creative fields.

Breach #17: MyFitnessPal

Breach Date February 2018
Domain myfitnesspal.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords, 🌐 IP addresses
Exposed Records 143,570,814
Industry Health Care
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The MyFitnessPal breach, which became public in March 2018, posed a critical challenge in the realm of health and fitness app security. MyFitnessPal, a popular fitness tracking and diet monitoring app owned by Under Armour, experienced a significant data breach affecting approximately 150 million users. The breach exposed a wide array of user information, including usernames, email addresses, and hashed passwords.

This incident was particularly impactful due to MyFitnessPal’s role in the daily health routines of millions. Users rely on the app not just for tracking physical activity and dietary intake, but also as a motivational tool for maintaining a healthy lifestyle.

Breach #18: Canva

Canva
Breach Date May 2019
Domain canva.com
Exposed Data 📬 Email addresses, 📛 Names, 👤 Usernames
Exposed Records 137,504,762
Industry Information Technology
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes
The Canva breach, which occurred in May 2019, represented a significant challenge in the realm of online design and multimedia platforms. Canva, an Australian graphic design tool website, became the target of a cyberattack that compromised the data of nearly 139 million users. The breach involved unauthorized access to a variety of user data including usernames, email addresses, and encrypted passwords. In some cases, details from user profiles and geographic information were also exposed. This incident was particularly notable given Canva’s popularity among both professional designers and casual users for creating graphics, presentations, and other visual content.

Breach #19: DemandScience

Demandscience
Breach Date February 2024
Domain demandscience.com
Exposed Data 📧 Email addresses, 📛 Names, 🏠 Physical addresses, 📞 Phone numbers, 🌐 Social media profiles
Exposed Records 121,865,345
Industry Information Technology
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

DemandScience, formerly known as Pure Incubation, is a B2B demand generation company that aggregates business contact information for marketing purposes. In February 2024, a threat actor named KryptonZambie put up a massive dataset for sale on a hacking forum. The company initially denied any breach. They claimed their systems were fully operational and found no evidence of compromise. But the truth eventually surfaced. DemandScience finally admitted the breach, revealing that the data came from a legacy system that had been decommissioned for nearly two years. By August 2024, the dataset was made available for just a few dollars, essentially leaking it for free.

The breach exposed 122 million unique corporate email addresses along with names, physical addresses, phone numbers, job titles, employer information, and LinkedIn profile links. This was not consumer data. It was professional information aggregated from public sources and used for B2B marketing.

Breach #20: Pemiblanc

ComboList
Breach Date April 2018
Domain pemiblanc.com
Exposed Data 📧 Email addresses, 🔑 Passwords
Exposed Records 114,015,423
Industry Miscellaneous
Password Risk ⚠️ Plaintext
Searchable Yes
Sensitive No
Verified No

Pemiblanc is a massive credential stuffing list discovered on a French web server in April 2018. It contained 111 million email address and password pairs stored in plaintext. The list was organized in a folder called “USA” with several files, though the email domains suggest the data actually came from users all over the world. This was not a single breach from one company. Instead, it was a compilation cobbled together from multiple different data breaches over time.

Credential stuffing lists like Pemiblanc serve a specific purpose for attackers. They use automated tools to try these email and password combinations across various online services, hoping users have reused the same credentials elsewhere. The Pemiblanc list contained 6.8 million email addresses that had never appeared in any known breach before, making it a valuable addition to understanding the scope of exposed credentials. With over 114 million records and passwords in plaintext, this list remains one of the larger credential compilations to surface publicly.

Breach #21: Badoo

Badoo
Breach Date June 2013
Domain badoo.com
Exposed Data 📛 Names, 👤 Usernames, 🔑 Passwords, 📬 Email addresses, 📅 Dates of birth
Exposed Records 112,083,678
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable No
Sensitive Yes
Verified No

The Badoo breach, surfacing in 2019, marked a significant moment in the security landscape of online dating platforms. Badoo, a well-known dating-focused social network, experienced a data breach that impacted the privacy of millions of its users. The breach exposed a range of personal information, including names, email addresses, dates of birth, location data, and website activity.

This breach was particularly sensitive due to the nature of Badoo’s service. As a platform for personal and romantic connections, the exposure of user data was not just a privacy violation but also a potential threat to personal safety.

Breach #22: 1Win

1win
Breach Date November 2024
Domain 1win.com
Exposed Data 📧 Email addresses, 📅 Dates of birth, 🔑 Passwords, 📞 Phone numbers, 🌐 IP addresses, 🌍 Geographic locations
Exposed Records 96,394,096
Industry Entertainment
Password Risk 🛡️ Hard to crack
Searchable Yes
Sensitive No
Verified Yes

1Win, a popular online betting platform, suffered a massive data breach in November 2024 that exposed 96 million user records. The breach first came to light when a hacker using the alias “fe0dor” uploaded the stolen database to a hacking forum. That same day, an official 1Win Telegram channel, reportedly managed by the company’s CEO, confirmed the incident and acknowledged that approximately 100 million users were affected. The leaked data totaled 28GB and came from multiple internal tables, including user databases and affiliate partner records containing over 418 million entries.

The breach exposed email addresses, phone numbers, IP addresses, dates of birth, geographic locations, and SHA-256 hashed passwords. Investigators believe the attackers gained access through misconfigured ElasticSearch and ClickHouse analytics clusters that were left exposed without authentication. Once inside, they reportedly escalated privileges using legacy service accounts that still had write access to production backups.

Breach #23: MyHeritage

Myheritage
Breach Date October 2017
Domain myheritage.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 91,997,033
Industry Miscellaneous
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The MyHeritage breach, disclosed in June 2018, represented a significant incident in the security of genealogical and familial history data. MyHeritage, a platform offering services like DNA analysis and family tree tracking, reported a breach affecting over 92 million users. This breach involved the exposure of email addresses and hashed passwords of users who had signed up to the site up to October 2017.

This incident was particularly concerning due to the nature of MyHeritage’s services. Users of genealogical platforms often share sensitive personal and family history information, expecting high levels of confidentiality and security.

Breach #24: Youku

Breach Date December 2016
Domain youku.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 91,891,665
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Youku breach, which came to public attention in 2016, highlighted a significant vulnerability in the realm of digital entertainment and streaming services. Youku, often referred to as the “Chinese YouTube”, is a leading video hosting and streaming platform in China. The breach compromised the data of over 100 million users, including usernames, email addresses, and encrypted passwords.

This breach was particularly significant due to Youku’s vast user base and its status as a primary source of entertainment content in China.

Breach #25: VK

Breach Date January 2012
Domain vk.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 90,679,566
Industry Entertainment
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes

The VK breach, which became widely known in June 2016, was a significant event in the landscape of social networking security. VKontakte (VK), often referred to as Russia’s answer to Facebook, is one of the largest social networks in Europe, particularly popular in Russia and neighboring countries. The breach compromised the security of nearly 100 million user accounts, involving the exposure of personal details such as names, email addresses, and plaintext passwords.

This breach was especially alarming due to VK’s status as a major social networking platform, where users share a wealth of personal information, communicate privately, and form social and professional networks. The leak of plaintext passwords was particularly concerning, as it posed an immediate risk of unauthorized account access and potential misuse of personal information.

Breach #26: Dailymotion

Breach Date October 2016
Domain dailymotion.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 85,277,547
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Dailymotion breach, which came to light in December 2016, was a significant setback in the security of online video platforms. Dailymotion, a popular video-sharing website akin to YouTube, experienced a data breach affecting more than 85 million user accounts. The compromised data included email addresses, usernames, and hashed passwords.

This breach was particularly impactful due to Dailymotion’s status as a major platform for sharing and viewing videos across the world. The exposure of user data raised serious concerns about the security practices of video platforms, especially those hosting large volumes of user-generated content.

Breach #27: JD

JDGroup
Breach Date January 2013
Domain jd.com
Exposed Data 📛 Names, 📧 Email addresses, 🏠 Physical addresses, 🪪 Government IDs, 📞 Phone numbers
Exposed Records 78,171,293
Industry Retail
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

JD.com, also known as Jingdong, is one of China’s largest e-commerce platforms, often compared to Amazon. With revenue exceeding $150 billion and over 620,000 employees, it operates across retail, logistics, technology, and healthcare sectors. In 2013, the platform suffered a significant data breach that exposed 78 million user records. The breach remained relatively unknown until 2016 when the data surfaced publicly. JD attributed the incident to a security vulnerability in Apache Struts 2, an open-source web application framework widely used by internet companies at the time.

The exposed data included email addresses, passwords, phone numbers, usernames, and for some users, government-issued ID numbers. JD publicly apologized for the breach and stated they had enhanced their security measures to prevent future incidents. The sheer scale of this breach made it one of the largest e-commerce data exposures in China’s history.

Breach #28: Nitro

NitroPDF
Breach Date September 2020
Domain gonitro.com
Exposed Data 📛 Names, 🔑 Passwords, 📬 Email addresses
Exposed Records 77,165,608
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Nitro breach, which emerged in October 2020, was a notable incident in the realm of document management and PDF software services. Nitro Software, Inc., known for its Nitro PDF Reader and Nitro Cloud services, faced a breach that potentially impacted millions of user data records. The breach exposed user data including email addresses, full names, bcrypt-hashed passwords, titles, company names, and IP addresses.

This breach was significant due to Nitro’s widespread use in both individual and corporate contexts for creating, editing, and sharing PDF documents.

Breach #29: Luxottica

Breach Date March 2021
Domain luxottica.com
Exposed Data 📛 Names, 🏠 Physical addresses, 📬 Email addresses, 📱 Phone numbers
Exposed Records 74,411,022
Industry Retail
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The Luxottica breach, a critical security incident that unfolded in the latter half of 2020, marked a disruptive moment in the retail and eyewear industry. Luxottica, the world’s largest eyewear company, owner of brands like Ray-Ban and Oakley, and operator of EyeMed, Sunglass Hut, and other retail outlets, faced a significant data breach. This breach led to the exposure of personal and prescription information of customers, along with other sensitive data.

Luxottica’s incident was more than just a loss of data; it was a breach of trust between the company and its vast clientele who depend on it for their eyewear needs. The exposure of prescription details, in particular, added a layer of concern due to the sensitive nature of personal health information involved.

Breach #30: Tumblr

Breach Date January 2013
Domain tumblr.com
Exposed Data 📧 Email addresses, 🔑 Passwords
Exposed Records 73,524,878
Industry Entertainment
Password Risk ⚠️ Easy to crack
Searchable Yes
Sensitive No
Verified Yes

Tumblr, the popular microblogging and social networking platform, suffered a data breach in early 2013 that remained hidden for over three years. The company only disclosed the incident in May 2016 after the stolen data surfaced on underground forums. Over 65 million unique email addresses and passwords were compromised. The breach occurred before Yahoo acquired Tumblr, and at the time of discovery, it ranked as one of the largest data breaches ever recorded, sitting behind only LinkedIn and Adobe in terms of scale.

The stolen data was put up for sale on a darknet marketplace called The Real Deal by a hacker known as “Peace,” the same individual behind the sale of stolen LinkedIn, Fling, and MySpace credentials.

Breach #31: Tokopedia

Breach Date April 2020
Domain tokopedia.com
Exposed Data 📬 Email addresses, 📛 Names, 📅 Dates of birth, 🚹🚺 Genders, 🔑 Passwords
Exposed Records 71,443,767
Industry Retail
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In May 2020, Tokopedia, one of Indonesia’s largest e-commerce platforms, faced a severe security breach that shook the foundations of online retail security. This breach resulted in the data of over 91 million users being compromised. The leaked information included names, emails, hashed passwords, and other personal user details.

Tokopedia’s breach was not just a technical failure; it was a breach of the implicit trust millions of users placed in the platform for their online shopping needs. Given the platform’s prominence in Indonesia’s burgeoning e-commerce sector, the breach had significant implications for consumer confidence in online shopping security. 

How secure is your email 👉

Breach #32: Naz.API

ComboList
Breach Date September 2023
Domain Not Applicable
Exposed Data 📧 Email addresses, 🔑 Passwords
Exposed Records 71,064,705
Industry Miscellaneous
Password Risk ⚠️ Plaintext
Searchable Yes
Sensitive No
Verified Yes

Naz.API is a massive credential stuffing dataset that surfaced on a popular hacking forum in September 2023. It contained over 100GB of data spread across 319 files. The collection included 71 million unique email addresses and 100 million unique passwords, totaling more than 343 million individual records. Each record typically contained an email address, a plaintext password, and the URL of the service where the credentials were used. The dataset gained notoriety after it was used to power an OSINT platform called illicit.services, which allowed anyone to search through stolen personal information. That service shut down in July 2023 amid concerns it was being used for doxxing and SIM-swapping attacks.

 

Breach #33: Dropbox

Dropbox
Breach Date July 2012
Domain dropbox.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 68,760,320
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

Dropbox, a leader in cloud storage and file synchronization services, faced a significant security challenge when it suffered a data breach in 2012. This incident led to the exposure of email addresses and passwords of nearly 68 million users. The breach was a result of hackers exploiting a Dropbox employee’s stolen password, which provided them access to a document containing user email addresses and hashed passwords.

The breach at Dropbox was more than a mere leak of user credentials; it represented a crucial vulnerability in the safeguarding of digital assets in the cloud. Dropbox, being a repository for personal and professional documents for millions, the breach raised serious concerns about the safety of cloud storage services and the potential risks of storing sensitive data online.

Breach #34: ModernBusinessSolutions

Modernbusinesssolutions
Breach Date October 2016
Domain modbsolutions.com
Exposed Data 📬 Email addresses, 🚹🚺 Genders, 🏠 Physical addresses, 📛 Names, 🌐 IP addresses, 📅 Dates of birth
Exposed Records 58,843,480
Industry Information Technology
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes
The breach at Modern Business Solutions, a data management and storage firm, in October 2016, marked a significant episode in the realm of corporate data security. This breach resulted in the exposure of over 58 million records, including personal information like names, email addresses, job titles, and even vehicle data. The incident occurred due to a misconfigured MongoDB database, which left the data unprotected and accessible on the internet.

Breach #35: Evite

Breach Date April 2019
Domain evite.com
Exposed Data 📛 Names, 🔑 Passwords, 📧 Email addresses, 📅 Dates of birth, 📞 Phone numbers, 🏠 Physical addresses
Exposed Records 58,773,935
Industry Miscellaneous
Password Risk ⚠️ Plaintext
Searchable Yes
Sensitive No
Verified Yes

Evite, the popular online invitation and social planning service, disclosed a data breach in May 2019 after discovering unauthorized access to their servers. The intrusion began on February 22, 2019, and was traced back to a hacker known as “Gnosticplayers.” The attacker gained access to an inactive database archive dating back to 2013. By April 15, 2019, nearly 10 million Evite user records appeared for sale on the Dream Market darknet marketplace. The total breach ultimately affected over 100 million unique email addresses, though the majority belonged to invitation recipients rather than registered members.

The exposed data included names, email addresses, phone numbers, physical addresses, dates of birth, genders, and passwords stored in plaintext. No financial information or social security numbers were compromised.

Breach #36: Apollo

Apollo
Breach Date July 2018
Domain apollo.io
Exposed Data 📛 Names, 📧 Email addresses, 📞 Phone numbers, 🌍 Geographic locations, 🌐 Social media profiles
Exposed Records 56,478,358
Industry Information Technology
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Apollo, a sales engagement and intelligence startup, left a massive database publicly exposed without a password in July 2018. Security researcher Vinny Troia discovered the breach and initially thought it was a LinkedIn leak due to the sheer volume and detail of the data. The exposed database contained 212 million contact listings and 9 billion data points related to companies and organizations. Apollo had aggregated this information from various sources including public profiles, LinkedIn, Twitter, and data imported by their own clients. The company reported the incident to law enforcement on July 23, 2018.

 

The breach exposed names, email addresses, phone numbers, employers, job titles, and geographic locations. No passwords, social security numbers, or financial data were included. Over 125 million unique email addresses were affected. Apollo claimed most of the data came from publicly available sources, but the incident raised serious concerns about data aggregation practices.

Breach #37: Acxiom

ComboList
Breach Date June 2020
Domain Not-Applicable
Exposed Data 📛 Names, 📬 Email addresses, 📱 Phone numbers, 🌐 IP addresses, 🏠 Physical addresses
Exposed Records 51,681,368
Industry Miscellaneous
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified No

A dataset consisting of nearly a quarter of a billion records spanning over 400 different fields was initially and wrongly attributed to the database marketing company Acxiom. The data, which was being circulated within hacking communities, led to claims of a breach at Acxiom. However, upon inspection, Acxiom confirmed that “the claims are indeed false” and the data, which was available across various platforms, did not originate from Acxiom. This data contained almost 52M unique email addresses

Breach #38: Imesh

imesh
Breach Date September 2013
Domain imesh.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 👤 Usernames, 🌐 IP addresses
Exposed Records 49,594,661
Industry Music
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The iMesh breach, which came to public attention in 2016, was a significant event in the realm of peer-to-peer (P2P) file sharing and social networking. iMesh, once a popular P2P file sharing service, experienced a breach that resulted in the exposure of approximately 50 million user accounts. The compromised data included usernames, passwords, email addresses, and in some cases, IP addresses and physical locations.

This breach was particularly notable due to the nature of iMesh as a file-sharing platform. Users of iMesh not only shared music and video files but also engaged in social networking through the service. The breach raised serious concerns about the security practices of P2P networks, where personal and often sensitive data is frequently exchanged.

Breach #39: ATT-Speculated

ComboList
Breach Date August 2021
Domain Not applicabe
Exposed Data 📧 Email addresses, 📅 Dates of birth, 📛 Names, 📞 Phone numbers, 🏠 Physical addresses
Exposed Records 49,102,843
Industry Telecommunication
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes
AT&T, one of the largest telecommunications companies in the United States, became the subject of a disputed data breach in August 2021. A hacking group called ShinyHunters claimed to have stolen data on 70 million AT&T customers and put it up for sale on a cybercrime forum. The asking price was $1 million for the entire database or $200,000 for partial access. AT&T denied the data came from their systems. The company maintained this position for nearly three years, stating there was no evidence of a breach in their infrastructure.

The situation changed in March 2024 when a hacker named MajorNelson released a 5GB archive containing the same data for free. The dump included names, email addresses, phone numbers, dates of birth, physical addresses, and in some cases Social Security numbers. AT&T finally confirmed that 73 million current and former customers were affected.

Breach #40: Netlog

Breach Date November 2012
Domain netlog.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 49,026,690
Industry Entertainment
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes
The Netlog breach, which became known in 2018, marked a significant security incident in the world of social networking. Netlog, once a popular social networking platform based in Belgium, especially among European youth, experienced a data breach that compromised the personal information of over 49 million users. The exposed data included usernames, email addresses, passwords, and some cases, additional personal details like gender, birth dates, and geographic locations. This breach was significant due to Netlog’s position as a social networking site where young people connected and shared personal experiences. The exposure of such a large amount of personal data not only breached user privacy but also posed risks of identity theft and phishing attacks targeting vulnerable users.

Breach #41: Houzz

Houzz
Breach Date May 2018
Domain houzz.com
Exposed Data 👤 Usernames, 📬 Email addresses, 🌍 Geographic locations, 🌐 IP addresses, 📛 Names, 🌐 Social media profiles
Exposed Records 48,851,647
Industry Retail
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The Houzz breach, which came to light in early 2019, was a notable security incident in the online home design and renovation industry. Houzz, a popular platform for home remodeling and design, offering a unique mix of content, community, and commerce, experienced a data breach that affected millions of its users. The compromised information included user names, email addresses, city, state, country, profile descriptions, and, in some cases, encrypted passwords.

This breach was significant for several reasons. Houzz is not just a shopping platform but also a community where people share ideas, experiences, and personal tastes in home design and renovation.

Breach #42: SpecialKDataFeedSpamList

ComboList
Breach Date June 2015
Domain data4marketers.com
Exposed Data 📧 Email addresses, 📛 Names, 🏠 Physical addresses, 🌐 IP addresses, 📅 Dates of birth
Exposed Records 45,084,900
Industry Miscellaneous
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Special K Data Feed Spam List is a large collection of personal data discovered in mid-2015. The list was associated with the domain data4marketers.com and contained over 45 million records. Unlike typical data breaches that target a single company, this was a spam list compiled for marketing and potentially malicious purposes. The data was added to breach notification services in November 2016 after it was discovered circulating online.

The exposed information included email addresses, names, physical addresses, IP addresses, genders, dates of birth, and phone numbers. No passwords were part of this leak.

Breach #43: Edmodo

Edmodo
Breach Date May 2017
Domain edmodo.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 43,415,654
Industry Music
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Edmodo breach, which came into the spotlight in May 2017, was a significant event in the realm of educational technology and digital learning platforms. Edmodo, a widely used educational platform that connects teachers, students, and parents, experienced a data breach compromising the information of nearly 77 million users. The leaked data included usernames, email addresses, and hashed passwords.

This breach was particularly concerning due to the nature of Edmodo’s user base – primarily educators and school-aged students. The platform is utilized for a range of educational purposes, from homework assignments to classroom discussions, making it a repository of not only personal information but also of sensitive educational data.

Breach #44: PiZap

Pizap
Breach Date December 2017
Domain pizap.com
Exposed Data 📬 Email addresses, 🚹🚺 Genders, 📛 Names, 🌍 Geographic locations, 🌐 Social media profiles
Exposed Records 41,779,112
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The online photo editing platform, piZap, faced a security breach in December 2017. Later, in February 2019, this compromised data appeared for sale on a dark web marketplace alongside other datasets. This breach exposed 42 million unique email addresses, as well as names, genders, and links to Facebook profiles for those who authenticated through Facebook. Furthermore, for accounts on piZap created without Facebook’s authentication, passwords stored as SHA-1 hashes were also disclosed.

Breach #45: ShareThis

Breach Date July 2018
Domain sharethis.com
Exposed Data 📛 Names, 👤 Usernames, 📬 Email addresses, 🔑 Passwords
Exposed Records 40,952,354
Industry Information Technology
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

ShareThis, a widely used social bookmarking and sharing service, suffered a substantial data breach in 2018 leading to the leakage of user information. Exposed data included essential details like email addresses, hashed passwords, and in some instances, usernames.

 

Breach #46: Fling

Fling
Breach Date March 2011
Domain fling.com
Exposed Data 👤 Usernames, 🔑 Passwords, 🌍 Geographic locations, 🌐 IP addresses, 🚹🚺 Genders, 📅 Dates of birth, 💕 Sexual preferences
Exposed Records 40,743,414
Industry Miscellaneous
Password Risk ⚠️ Weak Security
Searchable No
Sensitive Yes
Verified Yes

The Fling data breach, which was publicly revealed in 2016, was a significant event in the realm of online dating and adult content. Fling, a website known for adult dating and casual hookup services, suffered a breach that led to the exposure of personal information for millions of its users. The exposed data included email addresses, usernames, passwords, birthdates, and sexual preferences.

This breach was notable not just for the volume of data exposed, but also for the nature of the content and the potential implications for the privacy and personal lives of the users. Given the adult-oriented services of Fling, the breach raised serious concerns about personal privacy and the risks associated with the exposure of sensitive and intimate information.

Breach #47: Chegg

Breach Date April 2018
Domain chegg.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 39,736,948
Industry Education
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Chegg data breach, revealed in September 2018, was a significant security incident in the field of educational technology. Chegg, a widely used educational technology company offering textbook rentals, homework help, online tutoring, and other student services, reported a data breach that affected approximately 40 million users. The breached information included names, email addresses, shipping addresses, and hashed passwords. For some users, it also included data such as date of birth and the last four digits of their social security number.

This breach was particularly concerning due to Chegg’s large user base, primarily composed of students. The compromised information posed risks such as identity theft, phishing attacks, and other forms of fraud. Additionally, for students who rely on Chegg’s services for their academic pursuits, the breach was a significant intrusion into their personal and academic lives.

Breach #48: Last.fm

Lastfm
Breach Date March 2012
Domain last.fm
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 37,240,736
Industry Music
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Last.fm breach, which was publicly disclosed in 2012, represented a significant security incident in the realm of online music services. Last.fm, a popular music streaming and recommendation service, experienced a data breach that resulted in the exposure of over 43 million user accounts. The compromised data included usernames, email addresses, and passwords.

This breach was particularly impactful due to Last.fm’s role in the daily lives of music enthusiasts. The platform not only provided music streaming but also personalized music recommendations, creating a tailored experience for users based on their listening habits. The breach of user data, including passwords, raised concerns not only about the security of personal information but also about the potential unauthorized access to users’ music preferences and listening histories.

Breach #49: Poshmark

Breach Date May 2018
Domain poshmark.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 36,758,793
Industry Retail
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Poshmark breach, revealed in August 2019, was a notable incident in the world of online retail and fashion platforms. Poshmark, a popular social commerce marketplace for buying and selling fashion items, experienced a data breach that impacted a large number of users. The compromised data included full names, usernames, email addresses, gender, city, and clothing size preferences. Importantly, the breach did not involve any financial or password data.

This breach was significant because Poshmark is more than just a sales platform; it’s a community where users often develop personal connections based on style and fashion preferences. The exposure of personal details like clothing sizes and city locations, along with names and email addresses, made this breach particularly sensitive due to the personal nature of the shopping experience on Poshmark.

Breach #50: NeimanMarcus

NeimanMarcus
Breach Date May 2024
Domain neimanmarcus.com
Exposed Data 📧 Email addresses, 📛 Names, 🌐 IP addresses, 📞 Phone numbers, 🏠 Physical addresses, 💳 Partial credit card data
Exposed Records 30,409,093
Industry Retail
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Neiman Marcus, the American luxury department store chain, confirmed a data breach in May 2024 after hackers gained unauthorized access to their Snowflake cloud database. The intrusion began around April 14, 2024, and went undetected until May 24. This breach was part of a larger campaign by a threat actor known as UNC5537, who targeted at least 165 organizations using stolen credentials to access Snowflake accounts that lacked multi-factor authentication. Other companies affected in this wave of attacks included Ticketmaster, Santander, Pure Storage, and Advance Auto Parts.

The company initially reported to regulators that only 64,472 people were affected. However, analysis of the stolen data revealed over 31 million unique email addresses. The exposed information included names, phone numbers, dates of birth, physical addresses, and partial credit card numbers. Gift card information, transaction data, and in some cases Social Security numbers and employee identification numbers were also compromised.

Breach #51: Tianya

Breach Date December 2011
Domain tianya.cn
Exposed Data 📛 Names, 👤 Usernames, 📬 Email addresses
Exposed Records 28,936,872
Industry News Media
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The Tianya breach, which came to public attention in 2011, was a significant security event in the realm of online forums and social networking in China. Tianya, one of China’s largest online community platforms, experienced a data breach that compromised the personal information of approximately 28 million users. This incident involved the exposure of user IDs, usernames, passwords, and email addresses.

This breach was notable due to Tianya’s popularity and its role as a major forum for public discussion and social interaction in China. The platform serves not just as a space for social networking, but also as a significant forum for public discourse, making the breach particularly concerning in terms of privacy and the potential for misuse of user information.

Breach #52: HauteLook

Breach Date August 2018
Domain hautelook.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 📛 Names, 🌍 Geographic locations, 📅 Dates of birth, 🚹🚺 Genders
Exposed Records 28,509,466
Industry Retail
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

HauteLook, an online shopping website, suffered a data breach in 2018 exposing more than 28 million users. The compromised data included passwords, email addresses, dates of birth, genders, geographic locations, and names of the users.

Breach #53: MindJolt

Mindjolt
Breach Date March 2019
Domain mindjolt.com
Exposed Data 📬 Email addresses, 📛 Names, 📅 Dates of birth
Exposed Records 28,364,844
Industry Entertainment
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

MindJolt, a popular social gaming platform, suffered a data breach in 2019 that exposed the personal information of over 28 million users.

Breach #54: Taringa

Taringa
Breach Date August 2017
Domain taringa.net
Exposed Data 👤 Usernames, 📬 Email addresses, 🔑 Passwords
Exposed Records 28,001,047
Industry Non-Profit/Charities
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Taringa breach, which came to light in 2017, was a significant security incident in the social networking domain, particularly affecting the Latin American online community. Taringa, often referred to as the “Latin American Reddit,” is a popular social networking site in Spanish-speaking countries. The breach led to the exposure of almost 28 million user accounts. Compromised data included usernames, email addresses, and hashed passwords.

This breach was particularly impactful due to Taringa’s large user base and its status as a key platform for online discussions, content sharing, and community building in the Spanish-speaking world. The exposure of such a large amount of user data not only breached privacy but also raised concerns about potential identity theft and phishing attacks targeting users.

Breach #55: BureauvanDijk

BureauvanDijk
Breach Date August 2021
Domain bvdinfo.com
Exposed Data 📧 Email addresses, 📛 Names, 🏠 Physical addresses, 📞 Phone numbers, 📅 Dates of birth
Exposed Records 27,916,711
Industry Retail
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Bureau van Dijk, a Moody’s Analytics company specializing in private company data and business intelligence, had hundreds of gigabytes of data from its Orbis product published on a hacking forum in August 2021. Orbis is their flagship database containing comprehensive information on corporations and individuals worldwide. The breach exposed data originally compiled from public sources. In September 2021, hackers put the database up for sale on an underground forum and later confirmed its authenticity. The dataset totaled 462GB of business information.

The exposed data included 28 million unique email addresses along with names, dates of birth, physical addresses, phone numbers, and job titles. Bureau van Dijk clarified that there was no unauthorized access to their internal systems. The breach did not directly expose client data from BvD or Moody’s. Instead, the data originated from a customer’s use of the Orbis product.

Breach #56: Shein

Breach Date June 2018
Domain shein.com
Exposed Data 📧 Email addresses, 🔑 Passwords
Exposed Records 27,718,171
Industry Retail
Password Risk ⚠️ Plaintext
Searchable Yes
Sensitive No
Verified Yes

SHEIN, the global fast-fashion e-commerce giant, suffered a data breach in June 2018 when hackers gained unauthorized access to their payment systems. The breach was discovered after SHEIN’s payment processor was contacted by a credit card network that found customer payment details for sale on a hacking forum. Zoetop, the parent company that owns both SHEIN and ROMWE, had 39 million SHEIN accounts and 7 million ROMWE accounts compromised in the attack. The stolen data included email addresses, names, and passwords hashed using MD5, an algorithm already known to be weak at the time. Some credit card information was also exposed after the company misconfigured its systems to store payment data in plain text within debug log files.

Zoetop’s response to the breach drew significant criticism. The company initially claimed only 6.42 million customers were affected. In reality, over 32.5 million account holders were never notified that their credentials had been stolen. Passwords were not reset and accounts were left unprotected. In 2022, the New York Attorney General fined Zoetop $1.9 million for failing to maintain reasonable security measures and for misleading customers about the scope of the breach.

Breach #57: Mate1

Mate1
Breach Date February 2016
Domain mate1.com
Exposed Data 👤 Usernames, 📛 Names, 📅 Dates of birth, 📬 Email addresses, 🔑 Passwords
Exposed Records 27,391,395
Industry Entertainment
Password Risk 🔥 Plain Text
Searchable No
Sensitive Yes
Verified Yes

The Mate1 breach, which became public knowledge in early 2016, was a significant security incident in the world of online dating. Mate1, a popular dating website, experienced a data breach that led to the exposure of personal information from over 27 million user accounts. The compromised data included user names, email addresses, and most notably, unencrypted plaintext passwords, as well as some phone numbers and dating information.

This breach was particularly alarming due to the nature of the data involved. In the context of online dating, users share intimate details and personal information with the expectation of privacy and security. The exposure of plaintext passwords, along with personal details, posed severe risks to users, including potential identity theft, financial fraud, and personal safety concerns.

Breach #58: PostMillennial

PostMillennial
Breach Date May 2024
Domain thepostmillennial.com
Exposed Data 📧 Email addresses, 📛 Names, 🔑 Passwords, 📞 Phone numbers, 🌐 IP addresses, 🏠 Physical addresses
Exposed Records 26,929,396
Industry News Media
Password Risk ⚠️ Plaintext
Searchable Yes
Sensitive No
Verified Yes

The Post Millennial, a conservative Canadian news website, was hacked on May 2, 2024. The attackers took the site and its sister publication Human Events offline, then defaced the homepage with a fake message purportedly from senior editor Andy Ngo. Three databases were leaked during the attack: mailing lists, subscriber information, and personal details of writers and editors. The breach exposed over 26 million individuals. The stolen data was posted to BreachForums before the FBI seized that site on May 15, 2024.

The leaked data included names, email addresses, usernames, phone numbers, IP addresses, physical addresses, and passwords stored in plaintext. Hundreds of writers and editors had their personal details exposed. Tens of thousands of subscribers had their full account information compromised. The mailing lists contained tens of millions of email addresses from various campaigns, some not directly run by The Post Millennial. A notable portion of the compromised email accounts belonged to US government and law enforcement personnel.

Breach #59: Neopets

Breach Date May 2013
Domain neopets.com
Exposed Data 📬 Email addresses, 📛 Names, 🔑 Passwords, 📅 Dates of birth, 🚹🚺 Genders, 🌍 Geographic locations
Exposed Records 26,893,291
Industry Entertainment
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes

The Neopets breach, which came to light in 2016, was a significant incident in the realm of online gaming and virtual communities. Neopets, a popular virtual pet website where users could care for and play with virtual pets, suffered a data breach that compromised a large number of user accounts. The exact number of affected accounts wasn’t officially disclosed, but it’s believed to have impacted a substantial portion of the site’s user base. The compromised data included usernames, email addresses, and passwords. This breach was particularly impactful given Neopets’ popularity, especially among younger internet users.

Breach #60: Livejournal

Livejournal
Breach Date January 2017
Domain livejournal.com
Exposed Data 📬 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 26,368,201
Industry Entertainment
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes

The LiveJournal breach, which became widely known in 2020, was a significant event in the realm of online blogging and social networking. LiveJournal, a popular platform for personal blogging and journaling, experienced a data breach that reportedly affected around 26 million accounts. This breach involved the exposure of usernames, email addresses, and plaintext passwords.

This incident was particularly notable due to LiveJournal’s status as a platform for personal expression and community building. Users of LiveJournal often shared intimate details of their lives, thoughts, and experiences, making the platform a repository of personal and sometimes sensitive content.

Breach #61: Mathway

Breach Date January 2020
Domain mathway.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 📛 Names, 🌐 Social media profiles
Exposed Records 25,694,866
Industry Education
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The Mathway breach, which came to light in May 2020, was a significant incident in the field of educational technology. Mathway, a popular online mathematical problem-solving tool widely used by students, educators, and parents, experienced a data breach that reportedly affected over 25 million user accounts. The compromised information included email addresses and hashed password data.

This breach was of particular concern due to Mathway’s extensive use in the educational sector. Students, who form a significant portion of Mathway’s user base, trust the platform with their academic information, making the breach not just a loss of data but also a potential threat to their academic integrity and privacy.

Breach #62: VNG

Breach Date May 2015
Domain zing.vn
Exposed Data 👤 Usernames, 📧 Email addresses, 🏠 Physical addresses, 📅 Dates of birth, 🌐 IP addresses, 📛 Names, 🔑 Passwords, 📞 Phone numbers
Exposed Records 24,848,112
Industry Entertainment
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

VNG Corporation, Vietnam’s largest technology company, suffered a data breach in May 2015 affecting its Zing.vn multimedia platform. The breach remained largely unknown until April 2018 when the stolen data appeared on hacking forums. VNG issued an apology and acknowledged they had been informed of the data leak risk back in 2015. The company claimed the breach mostly involved game accounts and did not affect their other services like Zalo, Vietnam’s largest social media platform, or their mobile payment service ZaloPay. Vietnam’s Ministry of Public Security later cited this incident as a notable case of data exposure involving over 163 million customer accounts.

The compromised data included usernames, email addresses, phone numbers, dates of birth, IP addresses, home addresses, genders, and passwords stored as unsalted MD5 hashes. About 25 million unique email addresses were part of the leak. The breach resurfaced in 2024 when the same records appeared in a massive 12-terabyte data dump considered one of the largest in history. VNG confirmed the 2024 leak contained the same data originally stolen in 2015 and subsequently posted on Raidforums in 2018.

Breach #63: RailYatri

Railyatri
Breach Date December 2022
Domain railyatri.in
Exposed Data 📧 Email addresses, 📞 Phone numbers, 🚹🚺 Genders, 🏠 Physical addresses
Exposed Records 24,549,032
Industry Transport
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

RailYatri, an Indian government-approved train ticketing platform serving approximately 24 million passengers daily, suffered a data breach in late December 2022. The company acknowledged the security incident on December 28, 2022, and claimed to have fixed the issue within hours. However, the problems had roots going back to February 2020 when cybersecurity researcher Anurag Sen discovered a misconfigured Elasticsearch server exposed to the public without any password protection. RailYatri initially denied the server belonged to them and later claimed it contained only test data. The Indian Computer Emergency Response Team (CERT-In) eventually intervened to help secure the data. In February 2023, a threat actor leaked the stolen database on BreachForums.

The breach exposed over 31 million customer records including 23 million unique email addresses. The 12GB data dump contained names, genders, phone numbers, locations, ticket purchase details, travel information, and fares. About 37,000 invoices were also leaked. The exposed location data was particularly concerning as RailYatri’s integrated GPS functionality allowed users to track their journeys, meaning hackers could potentially identify users’ travel patterns and whereabouts. This was not the company’s first incident. RailYatri had suffered a similar breach in 2020 that affected 700,000 users.

Breach #64: BigBasket

bigbasket
Breach Date October 2020
Domain bigbasket.com
Exposed Data 📛 Names, 📅 Dates of birth, 🌐 IP addresses, 📬 Email addresses, 🏠 Physical addresses, 🔑 Passwords, 📱 Phone numbers
Exposed Records 24,498,022
Industry Retail
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The BigBasket breach, which was reported in November 2020, marked a significant cybersecurity incident in the online grocery shopping sector. BigBasket, a leading online grocery and food delivery service in India, faced a data breach affecting over 20 million users. The exposed data included personal information such as full names, email addresses, hashed passwords, residential addresses, phone numbers, and the last four digits of credit card numbers.

This breach was particularly alarming due to the nature of BigBasket’s service. As an online grocery provider, the platform had access to not only the personal and contact details of its users but also their shopping habits and preferences.

Breach #65: Justdate

Justdate
Breach Date September 2016
Domain justdate.com
Exposed Data 📛 Names, 📬 Email addresses, 📅 Dates of birth, 🌍 Geographic locations
Exposed Records 24,455,121
Industry Entertainment
Password Risk 🔍 Assessment Needed
Searchable No
Sensitive Yes
Verified Yes
JustDate.com, an online dating platform designed for casual connections, was allegedly breached in September 2016. A dataset containing over 24 million user records began circulating on hacking forums shortly after. The data included email addresses, usernames, dates of birth, geographic locations, and passwords reportedly hashed using SHA-1, a weak algorithm known to be vulnerable to cracking. The breach was added to various breach notification databases in early 2017.

Breach #66: ApexSMS

ComboList
Breach Date April 2019
Domain Not-Applicable
Exposed Data 📬 Email addresses, 📛 Names, 📱 Phone numbers, 🌍 Geographic locations, 🚹🚺 Genders
Exposed Records 23,246,400
Industry Miscellaneous
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The ApexSMS data breach occurred on 2019, but only came to light only in 20231​. The breach was initially discovered following the exposure of a MongoDB database instance named “ApexSMS” which was found unprotected without a password​3. This unprotected database belonged to ApexSMS Inc., a company also known as Mobile Drip that specializes in SMS text marketing​.In the breach, a total of about 80 million records were exposed, including 23.2 million specific breached accounts. The data compromised included IP addresses, phone numbers, and email addresses.

Breach #67: Cafepress

Cafepress
Breach Date February 2019
Domain cafepress.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 23,212,395
Industry Retail
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The custom merchandise retailer, CafePress, faced a significant data breach in February 2019. This incident led to the exposure of 23 million unique email addresses. Some of the compromised records also included details such as names, physical addresses, phone numbers, and passwords, which were encrypted as SHA-1 hashes.

Breach #68: Wanelo

Wanelo
Breach Date December 2018
Domain wanelo.com
Exposed Data 📬 Email addresses, 🔑 Passwords
Exposed Records 23,165,483
Industry Retail
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Wanelo breach, which came to public attention in April 2019, was a significant incident in the online retail and social shopping space. Wanelo (“Want, Need, Love”), a popular social media e-commerce platform where users can discover, share, and buy products, experienced a data breach that affected almost 23 million users. This breach involved the exposure of user data including email addresses, usernames, and hashed passwords. For some users, other personal details like city and phone number were also compromised.

This breach was particularly impactful due to Wanelo’s unique blend of social media and e-commerce, creating a community where users not only shop but also share personal tastes and styles. The exposure of such personal data raised concerns about user privacy and the potential for phishing attacks or other forms of identity theft.

Breach #69: GFAN

Gfan
Breach Date October 2016
Domain gfan.com
Exposed Data 👤 Username, 📬 Email addresses, 🔑 Passwords, 🌐 IP addresses
Exposed Records 22,456,012
Industry Electronics
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified No

The Gfan breach, which came to light in 2014, was a significant cybersecurity incident in the realm of mobile technology and online forums. Gfan, a popular Chinese forum and marketplace for Android users, suffered a data breach that led to the exposure of approximately 4.5 million user accounts. The compromised data included usernames, email addresses, and hashed passwords.

This breach was notable due to Gfan’s prominence in the Android community, especially among users interested in mobile technology, apps, and modifications. The platform not only served as a discussion forum but also as a repository for Android apps and updates, making it a valuable resource for tech enthusiasts.

Breach #70: Animoto

Breach Date July 2018
Domain animoto.com
Exposed Data 🔑 Passwords, 📬 Email addresses, 🌍 Geographic locations, 📅 Dates of birth, 📛 Names
Exposed Records 22,453,559
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In a striking reminder of the ever-present risks in the digital realm, Animoto, a cloud-based video creation service, experienced a significant data breach in 2018. This breach compromised the personal data of 22 million users, underscoring the vulnerabilities even in platforms dedicated to creativity and digital expression. The exposed information included users’ names, email addresses, and hashed and salted passwords. For some users, date of birth and gender information were also compromised.

Animoto’s platform, widely used for creating and sharing videos, meant that the breach had far-reaching implications. Not only did it raise concerns about personal data security, but it also highlighted the potential risks associated with cloud-based services, where users frequently upload and share personal content.

Breach #71: ReadNovel

Readnovel
Breach Date May 2019
Domain readnovel.com
Exposed Data 👤 Usernames, 🔑 Passwords, 📬 Email addresses, 🚹🚺 Genders, 📱 Phone numbers
Exposed Records 22,412,132
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified No

The breach at ReadNovel, a popular platform for literature enthusiasts, unfolded in 2021 and revealed the fragile nature of digital data security in online literary communities. With a substantial number of user accounts affected, the breach exposed sensitive information such as usernames, email addresses, and hashed passwords. This incident was particularly disconcerting for ReadNovel’s community, where members often engage deeply with the content, sharing personal reflections and forming bonds over shared literary interests.

ReadNovel’s breach was more than a data compromise; it was a violation of a trusted space for writers and readers. Such platforms are not just websites but sanctuaries for creativity and expression, making the breach a deeply personal issue for its users.

Breach #72: R2games

Breach Date November 2015
Domain r2games.com
Exposed Data 👤 Usernames, 📬 Email addresses, 🌐 IP addresses, 🔑 Passwords
Exposed Records 21,830,941
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

R2Games, a well-known publisher of browser and mobile games, experienced a significant security breach in 2016, marking a stark reminder of the cybersecurity risks in the online gaming industry. The breach resulted in the exposure of data from an estimated 22 million user accounts. This data included sensitive information such as email addresses, passwords, IP addresses, and even some instances of user names and gaming progress.

The breach’s impact was substantial due to R2Games’ status as a hub for avid gamers, with a variety of popular titles that fostered a dedicated user community. For these gamers, the breach meant not just a loss of data, but a potential threat to their online gaming identities and the progress they had made in games, which, for many, represented significant investments of time and effort.

Breach #73: Parkmobile

ParkMobile
Breach Date March 2021
Domain parkmobile.io
Exposed Data 📛 Names, 📬 Email addresses, 🔑 Passwords, 📱 Phone numbers, 🚹🚺 Genders, 🏠 Physical addresses, 🚗 Licence plates
Exposed Records 20,971,517
Industry Transport
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The ParkMobile breach, an incident in the domain of mobile parking and transportation services, occurred in March 2021, illustrating the vulnerabilities in modern app-based services. ParkMobile, a popular parking app used in many cities across the United States to pay for street and garage parking, experienced a data breach that affected 21 million users. The breach exposed users’ personal data, including license plate numbers, email addresses, phone numbers, and in some cases, mailing addresses. Notably, no payment information was compromised in the breach.

ParkMobile’s breach was particularly concerning due to the app’s widespread use by individuals relying on it for daily parking needs. The exposed data posed risks like potential phishing attacks and identity theft. For many users, the breach was a significant concern, as license plate numbers and other personal information are considered sensitive data.

Breach #74: Hurb

Hurb
Breach Date March 2019
Domain hurb.com
Exposed Data 📛 Names, 📬 Email addresses, 🔑 Passwords, 🌐 IP addresses
Exposed Records 20,726,194
Industry Hospitality
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In August 2019, Hurb, formerly known as Hotel Urbano, a Brazilian online travel agency, experienced a significant data breach. This breach exposed sensitive information of over 20 million customers, showcasing the challenges and risks associated with cybersecurity in the travel and hospitality industry. The data compromised in this breach included personal details such as names, email addresses, and hashed passwords.

The Hurb breach was particularly impactful due to the nature of the exposed information, which is crucial in travel arrangements where trust and privacy are paramount. Customers of travel agencies like Hurb entrust the platform with not only their personal information but also details about their travel plans, preferences, and sometimes payment information.

Breach #75: Shopback

Breach Date September 2020
Domain shopback.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 📛 Names, 📱 Phone numbers, 🌍 Geographic locations, 🌐 IP addresses
Exposed Records 20,653,700
Industry Retail
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In September 2020, ShopBack, a prominent cashback reward program based in Singapore, experienced a significant data breach. This incident resulted in unauthorized access to a database containing personal information of an undisclosed number of users. The compromised data included names, email addresses, encrypted passwords, bank account details, and other information linked to users’ accounts.

The ShopBack breach was especially concerning because the platform operates at the intersection of e-commerce and financial transactions, where users accumulate cashback rewards for purchases made through the site. The exposure of such sensitive data, particularly bank account details, posed a serious risk of financial fraud and identity theft.

Breach #76: Indiamart

Breach Date May 2021
Domain indiamart.com
Exposed Data 📛 Name, 📬 Email addresses, 🏠 Physical addresses, 📱 Phone numbers
Exposed Records 20,159,951
Industry Retail
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes
In 2020, IndiaMART, one of India’s largest online B2B marketplaces, experienced a data breach that compromised the personal information of an estimated 40,000 of its suppliers. The incident involved unauthorized access to a database containing sensitive data, including names, email addresses, and phone numbers of sellers registered on the platform. The significance of the IndiaMART breach lies in the platform’s role as a critical link between suppliers and buyers in India’s vast B2B market. The exposure of supplier data not only raised concerns about privacy but also posed risks of potential phishing attacks and other forms of digital fraud.

Breach #77: CutoutPro

Cutout.pro
Breach Date February 2024
Domain cutout.pro
Exposed Data 📛 Names, 🔑 Passwords, 📧 Email addresses, 🌐 IP addresses
Exposed Records 20,021,813
Industry Information Technology
Password Risk ⚠️ Easy to crack
Searchable Yes
Sensitive No
Verified Yes

Cutout.Pro, an AI-powered visual design and photo editing platform, suffered a data breach in February 2024. A threat actor using the handle “KryptonZambie” disclosed the breach on BreachForums on February 27, 2024, claiming they still had active access to the compromised system at the time of posting. The hacker shared 5.93GB of stolen data via CSV files and also distributed the records across multiple Telegram channels to maximize reach. The database dump contained 41.4 million records with 20 million unique users affected.

The exposed data included email addresses, IP addresses, names, and passwords stored as salted MD5 hashes. When contacted for comment, Cutout.Pro’s marketing department denied any evidence of a breach and labeled the leak a “scam.”

Breach #78: Aptoide

Aptoide
Breach Date April 2020
Domain aptoide.com
Exposed Data 📬 Email addresses, 📛 Names, 🔑 Passwords, 🌐 IP addresses, 🌐 Browser user agent details
Exposed Records 20,011,680
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In April 2020, Aptoide, a popular alternative marketplace for Android apps, experienced a significant data breach. This incident led to the exposure of personal information of about 20 million users of the platform. The data compromised in the breach included email addresses, hashed passwords, real names, sign-up dates, device details, and IP addresses.

Aptoide’s breach was particularly impactful because of the platform’s large user base, offering an alternative to the standard Google Play Store for Android applications. The breach posed risks such as potential identity theft, phishing attacks, and unauthorized access to user accounts, given the nature of the exposed data.

Breach #79: CDEK

Cdek
Breach Date March 2022
Domain cdek.ru
Exposed Data 📛 Names, 📬 Email addresses, 📱 Phone numbers
Exposed Records 19,216,659
Industry Transport
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified No

In 2020, CDEK, a prominent Russian courier, logistics, and freight service company, experienced a significant data breach. This breach led to the unauthorized access and exposure of personal information belonging to a substantial number of its customers. The compromised data reportedly included customers’ names, phone numbers, email addresses, parcel tracking numbers, and shipping details.

The breach at CDEK was particularly concerning due to the nature of the compromised information. In the logistics and courier industry, where customer trust is paramount, the exposure of shipping details and personal contact information could lead to potential privacy violations and security concerns.

Breach #80: YouNow

Breach Date February 2019
Domain younow.com
Exposed Data 📛 Names, 🌐 IP addresses, 📬 Email addresses, 🌐 Social media profiles, 👤 Usernames
Exposed Records 18,240,691
Industry Retail
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

In 2019, YouNow, a live broadcasting service, experienced a data breach that impacted its user community. This breach led to the exposure of information from approximately 40 million user accounts. The compromised data included users’ names, usernames, email addresses, and social media profile information. Notably, passwords and financial data were not included in the breach, as YouNow does not store these details.

This breach was significant for YouNow’s user base, which primarily consists of content creators and viewers engaging in real-time video streaming and social interaction. The platform’s focus on live broadcasting meant that the breach had the potential to impact the digital identities and social media presences of its users.

Breach #81: 8tracks

8tracks
Breach Date June 2017
Domain 8tracks.com
Exposed Data 👤 Usernames, 🔑 Passwords, 📬 Email addresses
Exposed Records 17,978,503
Industry Finance
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In 2017, 8tracks, an internet music streaming service known for its user-curated playlists, experienced a data breach that significantly impacted its users. The breach resulted in the unauthorized access to and exposure of information from approximately 18 million user accounts. The data compromised in the breach included email addresses, usernames, and hashed passwords. It was reported that the breach occurred through an employee’s Github account, which did not have two-factor authentication and was linked to a repository containing a backup database of user data.

This breach was particularly impactful for 8tracks’ users, who valued the platform for its personalized music discovery and sharing experience. The exposure of user account details posed risks of unauthorized account access and potential phishing attacks.

Breach #82: EyeEm

Eyeem
Breach Date February 2018
Domain eyeem.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 📛 Names, 👤 Usernames
Exposed Records 17,723,930
Industry Entertainment
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

The EyeEm breach, surfacing in 2018, marked a concerning event in the world of online photography and digital content. EyeEm, a platform blending photography with a social networking community, faced a data breach that compromised the personal information of approximately 22 million users. The breach exposed a variety of user data, including email addresses, names, usernames, and hashed passwords.

For EyeEm’s community of photographers and enthusiasts, the breach was more than just a loss of data; it was a breach of the trust placed in a platform dedicated to creative expression and sharing. The platform’s focus on photography and its social networking aspect meant that the breach had the potential to impact the digital identities and creative content of its users.

Breach #83: Ticketek

Ticketek-Australia
Breach Date May 2024
Domain ticketek.com.au
Exposed Data 📧 Email addresses, 📛 Names, 🔑 Passwords, 📅 Dates of birth, 🚹🚺 Genders
Exposed Records 17,666,971
Industry Entertainment
Password Risk 🛡️ Hard to crack
Searchable Yes
Sensitive No
Verified Yes

Ticketek, Australia’s major event ticketing company, confirmed a data breach in May 2024 linked to a third-party cloud platform. The breach was part of a larger campaign targeting Snowflake cloud storage customers. A threat actor known as Sp1d3r began selling the stolen data on a hacking forum on June 20, 2024, claiming to have information on 30 million customers. Incident response firm Mandiant reported that approximately 165 companies using Snowflake environments may have been compromised through leaked credentials obtained from info-stealer malware, with accounts lacking multi-factor authentication being the primary targets.

The breach exposed nearly 30 million rows of data containing 17.6 million unique email addresses along with names, genders, dates of birth, and hashed passwords. Ticketek stated that its own password encryption systems and payment processing infrastructure were not directly compromised, as these operate separately with secure encryption. On June 28, 2024, the company obtained a court injunction to prevent further dissemination of the stolen data.s only discovered and disclosed in 2017.

Breach #84: Disqus

Breach Date July 2012
Domain disqus.com
Exposed Data 👤 Usernames, 📬 Email addresses, 🔑 Passwords
Exposed Records 17,557,543
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In 2017, Disqus, a widely-used blog comment hosting service for web sites and online communities, experienced a data breach that impacted approximately 17.5 million users. The breach exposed email addresses, usernames, sign-up dates, and last login dates in plain text; hashed passwords were also leaked. This incident dated back to a breach that occurred in 2012, but it was only discovered and disclosed in 2017.

For Disqus, which facilitates discussion on countless websites across the internet, the breach represented a significant intrusion into the digital identities of its users. The platform’s role as a tool for engaging in public discourse meant that the breach had implications not just for individual privacy, but also for the integrity of online discussions.

Breach #85: Ixigo

Ixigo
Breach Date January 2019
Domain ixigo.com
Exposed Data 📛 Names, 📬 Email addresses, 🆔 Government IDs, 🏠 Physical addresses, 📱 Device information, 🚹🚺 Genders, 🌐 Social media profiles, 🔑 Passwords
Exposed Records 17,198,751
Industry Transport
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In early 2018, Ixigo, a prominent travel and hotel booking app, found itself grappling with a significant data breach. The incident compromised the personal information of millions of its users, including names, email addresses, and hashed passwords. This breach was part of a larger cybersecurity incident that affected several popular travel apps, highlighting the broader vulnerabilities within the digital travel industry.
For Ixigo, a platform trusted by travelers for booking flights, trains, and hotels, the breach was a serious blow to user trust. It emphasized the critical need for enhanced security measures in safeguarding personal and travel-related information.

Breach #86: Zomato

Zomato
Breach Date May 2017
Domain zomato.com
Exposed Data 👤 Usernames, 📬 Email addresses, 🔑 Passwords
Exposed Records 16,475,717
Industry Education
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes
In a separate incident in 2017, Zomato, a popular online food delivery and restaurant discovery service, faced a significant data breach. This breach affected about 17 million user accounts, exposing email addresses and hashed passwords. Zomato was quick to respond, resetting the passwords of the affected users and enhancing their security measures.The breach at Zomato, which operates in a space where digital transactions are frequent, underscored the vulnerabilities of online food service platforms.

Breach #87: Eye4fraud

Eye4fraud
Breach Date January 2023
Domain eye4fraud.com
Exposed Data 📛 Names, 📞 Phone numbers, 🏠 Physical addresses, 📧 Email addresses, 🔑 Passwords, 💳 Partial credit card data, 🌐 IP addresses
Exposed Records 16,032,780
Industry Electronics
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Eye4Fraud, a fraud prevention service used by e-commerce merchants to protect online transactions, suffered a data breach in January 2023. Cybercriminals gained access to a poorly secured AWS S3 bucket and extracted 65GB of data spread across 147 database tables. The breach was publicly disclosed in February 2023 when the stolen data appeared for sale on a hacking forum. The incident affected approximately 16 million accounts, including both direct users of the Eye4Fraud service and individuals who had placed orders on websites using Eye4Fraud for transaction protection.

The exposed data included email addresses, names, phone numbers, physical addresses, IP addresses, bcrypt password hashes for account holders, and partial credit card information showing card types and last four digits. Eye4Fraud did not respond to multiple attempts to report the incident from security researchers and affected parties. After a month of silence, the company posted a brief statement on its website without providing detailed information.

Breach #88: LuminPDF

LuminPDF
Breach Date April 2019
Domain luminpdf.com
Exposed Data 📛 Names, 📬 Email addresses, 🚹🚺 Genders, 🔑 Passwords, 👤 Usernames, 🌐 Spoken languages
Exposed Records 15,453,070
Industry Information Technology
Password Risk 🔍 Assessment Needed
Searchable Yes
Sensitive No
Verified Yes

In a striking development in the world of online document management, Lumin PDF, known for its cloud-based PDF editing services, reported a significant data breach in September 2019. The breach affected about 24.3 million users, with exposed data including email addresses, names, genders, and both hashed and plaintext passwords. This incident, which gained attention after the data surfaced on a hacking forum, highlighted the vulnerabilities inherent in cloud storage, particularly for services handling potentially sensitive documents.

Breach #89: Epik

Epik
Breach Date September 2021
Domain epik.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 🌐 IP addresses
Exposed Records 15,389,296
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

The Epik data breach in September 2021 marked a significant cybersecurity crisis in the domain registration and web hosting industry. Affecting over 15 million users, the breach exposed a wide range of sensitive information, including email addresses, names, phone numbers, and physical addresses. This breach was particularly notable for the nature of Epik’s clientele, which included controversial and fringe elements of the web.

Breach #90: Trello

Trello
Breach Date January 2024
Domain trello.com
Exposed Data 📧 Email addresses, 📛 Names, 👤 Usernames
Exposed Records 15,115,458
Industry Information Technology
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Trello, the popular project management platform owned by Atlassian, had over 15 million user records scraped and posted for sale on a hacking forum in January 2024. A threat actor using the alias “emo” exploited an unsecured Trello REST API endpoint that allowed unauthenticated queries to return public user information based on email addresses. The attacker fed approximately 500 million email addresses from previous breach datasets into the API and successfully matched them to 15 million Trello accounts. The leaked data appeared on hacking forums in July 2024.

The exposed information included email addresses, full names, and usernames associated with Trello accounts. Atlassian clarified that no unauthorized system access occurred and that the API was functioning as designed to allow users to invite others to public boards via email. However, following the incident, Trello modified the API so that unauthenticated users can no longer request public information by email address.

Breach #91: ClearvoiceSurveys

clearvoice
Breach Date August 2015
Domain clearvoicesurveys.com
Exposed Data 📛 Names, 📬 Email addresses, 🔑 Passwords, 📅 Dates of birth, 🏠 Physical addresses, 🚹🚺 Genders, 📱 Phone numbers
Exposed Records 15,074,190
Industry Retail
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes

ClearVoiceSurveys, an online platform for surveys and market research, encountered a significant data breach, bringing into sharp focus the risks associated with data collection services. This breach exposed sensitive participant information, including names, email addresses, and other personal details that users had provided in the course of taking surveys.

Breach #92: 8fit

8fit
Breach Date July 2018
Domain 8fit.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 🚹🚺 Genders, 🌐 IP addresses, 📛 Names, 🌍 Geographic locations
Exposed Records 15,026,800
Industry Health Care
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

8fit, a popular health and fitness app known for personalized workout and meal plans, suffered a data breach. The breach compromised the personal data of its users, including email addresses and hashed passwords. Given the app’s focus on personal health and fitness, the breach raised concerns about the security of personal health-related information stored in mobile apps.

Breach #93: 000webhost

Breach Date March 2015
Domain 000webhost.com
Exposed Data 📬 Email addresses, 🔑 Passwords, 🌐 IP addresses
Exposed Records 14,936,538
Industry Information Technology
Password Risk 🔥 Plain Text
Searchable Yes
Sensitive No
Verified Yes

In 2015, 000Webhost, a free web hosting provider, experienced a major data breach, revealing the challenges in securing web hosting services. This significant breach compromised the personal details of 13.5 million users, including names, email addresses, and plaintext passwords. The breach was notable for the scale of the data loss and the fact that passwords were stored in plain text.

Breach #94: 500px

500px
Breach Date June 2018
Domain 500px.com
Exposed Data 👤 Username, 📬 Email addresses, 🔑 Passwords, 📛 Names, 📅 Dates of birth, 🚹🚺 Genders, 🌍 Geographic locations
Exposed Records 14,875,273
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

In 2019, 500px, a popular platform for photographers to share and sell their work, reported a security breach that impacted approximately 14.8 million users. This breach led to the unauthorized access of personal data such as names, email addresses, hashed passwords, birth dates, and location information.This breach at 500px was particularly impactful due to the platform’s large community of professional and amateur photographers.

Breach #95: Promo

Promofarma
Breach Date June 2020
Domain promo.com
Exposed Data 📛 Names, 📬 Email addresses, 🚹🚺 Genders, 🌐 IP addresses, 👤 Usernames, 🔑 Passwords, 🌍 Geographic locations
Exposed Records 14,610,177
Industry Information Technology
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

Promo, an online video creation and marketing platform, suffered a data breach in 2020 that affected 22 million users. The exposed data included names, email addresses, hashed passwords, and, in some cases, user data like location, gender, and phone numbers. The breach underscored the vulnerabilities present in digital marketing platforms, particularly those handling large volumes of user data.

Breach #96: Evony

Breach Date June 2016
Domain evony.com
Exposed Data 👤 Usernames, 📬 Email addresses, 🔑 Passwords, 🌐 IP addresses
Exposed Records 14,325,896
Industry Entertainment
Password Risk ⚠️ Weak Security
Searchable Yes
Sensitive No
Verified Yes

Evony, a popular multiplayer online strategy game, faced a significant data breach in 2016, highlighting the security challenges in the online gaming industry. This breach compromised the personal information of over 33 million players. The exposed data included email addresses, usernames, and hashed passwords.The breach at Evony was a critical reminder of the potential vulnerabilities in online gaming platforms, where users often spend considerable time and sometimes money.

Breach #97: Free

Free.fr
Breach Date October 2024
Domain free.fr
Exposed Data 📧 Email addresses, 📛 Names, 🚹🚺 Genders, 📞 Phone numbers, 🏠 Physical addresses, 📅 Dates of birth, 🏦 Bank account numbers (IBAN)
Exposed Records 14,247,989
Industry Information Technology
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Free, France’s second-largest internet service provider and a subsidiary of the Iliad Group, confirmed a data breach in October 2024. The attack occurred on October 17, 2024, when threat actors targeted an internal management tool to exfiltrate customer data. A hacker using the alias “drussellx” claimed responsibility and posted the stolen data for sale on BreachForums, stating it contained information on 19.2 million customers including 5.11 million IBAN bank account numbers. Free filed a criminal complaint with the public prosecutor and notified French authorities including CNIL and ANSSI.

The breach exposed 14.2 million unique email addresses along with names, physical addresses, phone numbers, genders, and dates of birth. For many Freebox subscribers, IBAN bank account numbers were also compromised. Free clarified that no passwords, bank card details, or communications were affected, and the attack had no operational impact on services.

Breach #98: Hiapk

ComboList
Breach Date January 2014
Domain hiapk.com
Exposed Data 📧 Email addresses, 👤 Usernames, 🔑 Passwords
Exposed Records 13,843,251
Industry Information Technology
Password Risk ⚠️ Easy to crack
Searchable Yes
Sensitive No
Verified No

HiAPK, a Chinese Android app store and community forum, suffered a data breach in approximately January 2014. The breach exposed 13.8 million user accounts. The stolen data was provided to Have I Been Pwned by white hat security researcher Adam Davies and was added to the database in April 2018, over four years after the incident occurred. HiAPK was a popular destination for Chinese Android users to download apps and discuss mobile technology.

The compromised data included usernames, email addresses, and passwords stored as salted MD5 hashes. MD5 is considered a weak hashing algorithm, making the passwords vulnerable to cracking attempts. While evidence suggests the data is legitimate, the breach has been flagged as “unverified” due to the difficulty of conclusively confirming breach details originating from within China.

Breach #99: Yam

Breach Date June 2013
Domain yam.com
Exposed Data 👤 Usernames, 🔑 Passwords, 📧 Email addresses, 📛 Names, 📞 Phone numbers
Exposed Records 13,259,767
Industry News Media
Password Risk ❓ Unknown
Searchable Yes
Sensitive No
Verified Yes

Yam, a social networking platform, experienced a data breach , compromising the personal details of its users. This breach exposed a range of sensitive information, including names, email addresses, and hashed passwords.

Breach #100: Hjedd

ComboList
Breach Date July 2022
Domain hjedd.com
Exposed Data 👤 Usernames, 📬 Email addresses, 🔑 Passwords, 🌐 IP addresses
Exposed Records 13,188,743
Industry Miscellaneous
Password Risk ⚠️ Weak Security
Searchable No
Sensitive Yes
Verified Yes

Hjed, an educational platform, reportedly experienced a data breach, although specific details about the incident, including the scale and nature of the data compromised, are not widely known. Educational platforms like Hjed often hold sensitive information, including student personal data, academic records, and sometimes financial information, making them potential targets for cyberattacks.

Discover more from Data Breach Insights

Subscribe now to keep reading and get access to the full archive.

Continue reading