Breach Intelligence

2,843

Total breached databases

In March 2024, the Russian chain of orthopedic centers ORTEKA suffered a data leak. ORTEKA is known for its orthopedic services and products. Reports suggest that the breach was carried out by an individual or group known as 'Sh4dow', affecting approximately 3.9 million users. Among the compromised data were email addresses, dates of birth, genders, phone numbers, physical locations, and order details. Passwords stored as salted MD5 hashes were also exposed.
  • Date: Mar 2024
  • Domain: orteka.ru
  • Threat Actor: Sh4dow
  • Country: Russia
  • Category: Healthcare
  • Records Announced: 3,949,761
  • Data: Email Addresses Passwords Birthdates Genders Phone Numbers Physical Locations Order Information
  • Imported:
  • Records Imported: 3,947,345
  • Number of lines: 3,949,762
  • Size: 2.36 GB
  • Passwords: MD5 Salted
  • Cracked:
In 2019, Mineland.net, the official website of Mineland Network, a prominent Minecraft server offering various game modes and experiences, suffered a data breach. Reports indicate that approximately 1.7 million records were exposed. Among the compromised data were email addresses, passwords, usernames, and IP addresses.
  • Data: Email Addresses Passwords Usernames IP Addresses
  • Imported:
  • Records Imported: 1,728,885
  • Number of lines: 1,733,618
  • Size: 226.03 MB
  • Passwords: SHA-384 Salted
  • Cracked:
In March 2020, the website Epicchannel.com, a platform reportedly associated with entertainment services in India, experienced a data breach. The breach exposed approximately 491,553 records. Among the compromised data were email addresses, phone numbers, birthdates, names, passwords (stored as bcrypt and MD5 hashes), geographic locations and genders.
  • Data: Email Addresses Passwords Names Phone Numbers Physical Locations Genders Birthdates
  • Imported:
  • Records Imported: 482,984
  • Number of lines: 491,553
  • Size: 302.03 MB
  • Passwords: BCrypt, MD5
  • Cracked: 7%
Sometime around 2017, a data breach involving the website Rekrute, a platform focused on recruitment and job search services, was identified. The breach stemmed from an exposed MongoDB database labeled "deathNote" and contained an estimated 678,118 records, with a full version including 702,239 records due to duplicates. Among the compromised data were email addresses, plaintext passwords, names, phone numbers, birth dates, and addresses.

Site: Rekrute.
  • Date: 2017
  • Domain: rekrute.com
  • Threat Actor: bipolar turtle
  • Country: Morocco
  • Category: Professional & Corporate
  • Records Announced: 678,118
  • Data: Email Addresses Passwords Names Phone Numbers Physical Locations Birthdates
  • Imported:
  • Records Imported: 702,239
  • Number of lines: 702,239
  • Size: 135.68 MB
  • Passwords: Plaintext
The data breach involves the COVID-19 database from Ecuador's Ministry of Public Health, containing information of 816,314 users. The dataset includes various personal details such as names, identification numbers, contact information, and vaccination data. The data was initially shared on BreachForumsIs and attributed to Kelvinsecurity.
  • Date: 2022
  • Threat Actor: Kelvinsecurity
  • Country: Ecuador
  • Category: Healthcare
  • Records Announced: 730,694
  • Data: Email Addresses Names Phone Numbers Government IDs Genders Birth Information Nationality Vaccination Data
  • Imported:
  • Records Imported: 651,352
  • Number of lines: 651,352
  • Size: 316.42 MB
  • Passwords: No