Breach Intelligence

2,850

Total breached databases

A Russian dating site experienced a data breach on October 10, 2021. As a result, the information of around 800.000 users was publicly accessible. Emails, usernames, hashes, IP addresses, and other data were leaked.
  • Date: 2021
  • Domain: fotostrana.ru
  • Country: Russia
  • Category: Dating
  • Records Announced: 800,000
  • Data: At present, the information about what data was leaked in the fotostrana.ru 2021 breach remains unavailable. Further updates will follow.
  • Imported:
  • Passwords: ?
In May 2020, the forums Comodo, Nusec, Itarian, and Nuwire experienced a data breach. These forums are known for discussions related to cybersecurity and technology. The breach occurred due to a publicly disclosed SQL injection vulnerability, which resulted in a server compromise and post-authentication remote code execution in the administrator control panel. Reports suggest a total of around 50,000 records were affected. Some of the leaked data includes email addresses, usernames, and passwords stored as vBulletin hashes.
  • Date: May 2020
  • Domain: forum.comodo.com
  • Category: Forums & Communities
  • Records Announced: 55,233
  • Data: Email Addresses Passwords Usernames
  • Imported:
  • Passwords: vBulletin
  • Cracked: 0%

There is no official description for the Sistemas.chubut.gov.ar 2020 data breach at this time. However, this record will allow future verification once the breach is processed. For now, you can use our search tool to see if your personal information appears in other breaches.

  • Data: The specific records exposed in the Sistemas.chubut.gov.ar 2020 breach have not yet been identified. We will update this section with details when they are confirmed.
  • Imported:
  • Number of lines: 67,070,836
  • Size: 5.18 GB
  • Passwords: ?
In March 2016, the Philippines Commission of Elections website (COMELEC) was attacked and defaced, allegedly by Anonymous Philippines. Shortly after, data on 55 million Filipino voters was leaked publicly and included sensitive information such as genders, marital statuses, height and weight and biometric fingerprint data. The breach only included 228k email addresses.
  • Data: Birthdates Email Addresses Family Members Genders Job Information Marital Statuses Names Passports Phone Numbers Physical Descriptions Physical Locations
  • Imported:
  • Number of lines: 123,381,969
  • Size: 43.94 GB
  • Passwords: No
In June 2019 the Ministry of Civil Services (MOCS) in Taiwan suffered a breach totaling in 590000 government servants including police force, soldiers and others. This data is here available for download.
  • Date: Jun 2019
  • Domain: eng.mocs.gov.tw
  • Country: Taiwan
  • Category: Government
  • Records Announced: 590,000
  • Data: Company Information Government IDs Job Information Site Activity Usernames
  • Imported:
  • Passwords: No
Sometime in 2023, the website ticanalyse.org, known for offering digital solutions such as application development, digital finance platforms, and content digitization services, experienced a data breach. The breach reportedly involved a 4.5GB SQL file containing approximately 5 million rows of data from the platform's user database. Among the compromised data were usernames, email addresses, hashed passwords, display names, registration dates, and user account statuses. The exact method of the breach and the party responsible remain unclear.
  • Data: Email Addresses Names Passwords Site Activity Usernames
  • Imported:
  • Number of lines: 4,657,935
  • Size: 4.25 GB
  • Passwords: ?
The online underwear store bust.net.ua suffered a data breach in 2022. At least 70K users from Ukraine and Russia were exposed as a result of the incident (email, password, mobile phone, address and orders).
  • Date: 2022
  • Domain: bust.net.ua
  • Category: E-commerce & Retail
  • Records Announced: 70,000
  • Data: The types of personal information exposed in the bust.net.ua 2022 breach are not yet confirmed. This entry will be updated once verified sources provide details.
  • Imported:
  • Number of lines: 883,521
  • Size: 107.7 MB
  • Passwords: ?

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.