Breach Intelligence

2,850

Total breached databases

In 2017, leaked data from WarcraftRealms.com, a fan-operated statistics and census site for World of Warcraft players, surfaced online. Although limited information is publicly available about the incident, the breach reportedly occurred in 2010 and exposed approximately 99,487 user records. Some of the leaked data includes usernames, email addresses, and passwords hashed using MD5.
  • Data: Email Addresses Passwords Usernames
  • Imported:
  • Records Imported: 99,507
  • Number of lines: 99,550
  • Size: 6.08 MB
  • Passwords: MD5
  • Cracked: 0%
In September 2014, the RuneScape private server DeviousPk, now defunct, suffered a data breach that affected approximately 5,700 members. The platform was known for hosting a custom RuneScape gameplay experience. The exposed information reportedly consisted of usernames, email addresses, IP addresses, and passwords stored as vBulletin hashes.
  • Date: Sep 2014
  • Domain: deviouspk.com
  • Category: Gaming
  • Records Announced: 5,708
  • Data: Email Addresses IP Addresses Passwords Usernames
  • Imported:
  • Records Imported: 5,706
  • Number of lines: 5,707
  • Size: 636.58 KB
  • Passwords: vBulletin
  • Cracked: 0%
RuneCrypt.com, a RuneScape fan site known for its community forums, guides, and in-game tools, appears to have been affected by a data breach. The site, which branded itself as a major resource for RuneScape players in the mid-2000s, reportedly had user data included in multiple aggregated credential leak compilations. The breach reportedly exposed approximately 34,817 user records. Some of the leaked data includes email addresses, usernames, IP addresses, and password hashes stored using MyBB’s hashing system.
  • Data: Email Addresses IP Addresses Passwords Usernames
  • Imported:
  • Records Imported: 34,815
  • Number of lines: 34,817
  • Size: 2.8 MB
  • Passwords: MyBB
  • Cracked: 78%
In February 2023, the "mutual masturbation" website CityJerks reportedly suffered a data breach, which also included data from TruckerSucker, a "dating app for REAL TRUCKERS and REAL MEN." The breach affected 177,000 users. Among the compromised data were bios, birthdates, email addresses, geographic locations, IP addresses, messages, passwords, profile photos, sexual orientations, and usernames.
  • Data: Bios Birthdates Email Addresses Genders Geographic Locations IP Addresses Messages Names Passwords Profile Photos Sexual Fetishes Sexual Orientations Social Profiles Usernames
  • Imported:
  • Records Imported: 276,759
  • Number of lines: 77,099,706
  • Size: 12.08 GB
  • Passwords: phpBB, vBulletin, Plaintext
In February 2020, an exposed Amazon backup server associated with VijaySales.com, the official e-commerce platform of Indian electronics retailer Vijay Sales, was accessed by unauthorized parties. Reports indicate that nearly 200,000 users were affected. Among the compromised data were names, email addresses, hashed passwords, phone numbers, device information, customer service records, and some administrative account details.
  • Date: 2020
  • Domain: vijaysales.com
  • Category: E-commerce & Retail
  • Records Announced: 200,000
  • Data: Device Identifiers Device Information Email Addresses Names Passwords Phone Numbers Site Activity
  • Imported:
  • Records Imported: 247,394
  • Number of lines: 247,393
  • Size: 189.8 MB
  • Passwords: Unknown
In October 2019, PokerCoaching.com, a poker training platform founded by professional player Jonathan Little, experienced a security incident involving unauthorized access to customer data. The company publicly disclosed the breach through a “Notice of Security Breach” on its website and confirmed that certain customer information had been accessed without authorization. Reports suggest that approximately 200,000 users were affected. Among the compromised data were email addresses, usernames, birthdates, IP addresses, and passwords stored using vBulletin and MD5 hashing methods.
  • Data: Birthdates Email Addresses IP Addresses Passwords Site Activity Social Profiles Usernames Websites
  • Imported:
  • Records Imported: 315,765
  • Number of lines: 5,528,753
  • Size: 1.57 GB
  • Passwords: BCrypt, MD5
  • Cracked: 0%
In 2021, the Cigarette Forum & Smokers Community CigReviews, a now-defunct online platform for discussing tobacco products, experienced a data breach. The incident reportedly involved unauthorized access by an individual known as @donjuji. Approximately 154,000 user accounts were affected. Among the compromised data were usernames, email addresses, IP addresses, dates of birth, and passwords stored as vBulletin hashes.
  • Data: Birthdates Email Addresses IP Addresses Passwords Usernames
  • Imported:
  • Records Imported: 309,523
  • Number of lines: 309,857
  • Size: 85.41 MB
  • Passwords: vBulletin
  • Cracked: 0%

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.