Breach Intelligence

2,850

Total breached databases

In December 2018, the online advertising platform BannerBit reportedly suffered a data breach. The incident exposed data from 213,000 unique users, including email addresses and plain text passwords.
  • Data: Email Addresses Passwords
  • Imported:
  • Passwords: Plaintext
In October 2018, the North Carolina voter database was made available on an illegal forum. This database holds records pertaining to the voter registration list of North Carolina, USA. It includes data on approximately 8.1 million individuals. Among the compromised data were voter IDs, full names, physical locations, previous physical addresses, dates of birth, genders, voter statuses, voter histories, and phone numbers.
  • Date: Oct 2018
  • Domain: nc.gov
  • Country: United States
  • Category: Government
  • Records Announced: 8,114,703
  • Data: Names Phone Numbers Physical Locations Government IDs Genders Birthdates Political Affiliation
  • Imported:
  • Passwords: No

There is no official description for the Irins.org 2023 data breach at this time. However, this record will allow future verification once the breach is processed. For now, you can use our search tool to see if your personal information appears in other breaches.

  • Data: The specific records exposed in the Irins.org 2023 breach have not yet been identified. We will update this section with details when they are confirmed.
  • Imported:
  • Number of lines: 5,619,833
  • Size: 1.39 GB
  • Passwords: ?
The goods for the military store is located at Sadovaya str. 26, across from Gostiny Dvor shopping center. The website voentorgspb.ru was hacked. In total, 60k users were impacted.
  • Domain: voentorgspb.ru
  • Country: Russia
  • Category: Weapons
  • Records Announced: 60,000
  • Data: It is unclear which categories of data were compromised in the voentorgspb.ru breach. This page will be revised as information becomes available.
  • Imported:
  • Number of lines: 19,457
  • Size: 516.29 MB
  • Passwords: ?
In December 2021, Gomodus, a US-based professional services company specializing in enterprise digital sales enablement software, was reportedly affected by a data breach. The breach exposed approximately 288,993 records containing personal and professional information from various businesses. Among the compromised data were email addresses, names, phone numbers, physical locations, job information, and company details.
  • Date: Dec 2021
  • Domain: gomodus.com
  • Threat Actor: ily pom
  • Country: United States
  • Category: Professional & Corporate
  • Records Announced: 288,993
  • Data: Email Addresses Names Phone Numbers Physical Locations Job Information Company Information
  • Imported:
  • Passwords: No
In November 2015, the dating website Beautiful People was hacked and over 1.1M accounts were leaked. The data was being traded in underground circles and included a huge amount of personal information related to dating.
  • Data: Birthdates Consumption Habits Education Email Addresses Financial Information Genders Geographic Locations IP Addresses Job Information Names Passwords Personal Interests Physical Descriptions Real Estate Information Sexual Orientations Site Activity Vehicle Information
  • Imported:
  • Passwords: Unknown
In November 2018, the Società Italiana degli Autori ed Editori (Italian Society of Authors and Publishers, or SIAE) was hacked, defaced and almost 4GB of data leaked publicly via Twitter. The data included over 14k registered users' names, email addresses and passwords.
  • Data: Email Addresses IP Addresses Names Passwords Phone Numbers
  • Imported:
  • Passwords: Unknown

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.