Breach Intelligence

2,850

Total breached databases

In December 2020, the economic research company Capital Economics suffered a data breach that exposed 263k customer records. The exposed data included email addresses, names, phone numbers, job titles, company information, physical addresses and passwords.
  • Data: Company Information Email Addresses Job Information Names Passwords Phone Numbers Physical Locations
  • Imported:
  • Records Imported: 425,491
  • Number of lines: 2,913,943
  • Size: 339.93 MB
  • Passwords: BCrypt
  • Cracked: 0%
In June 2021, a data breach occurred affecting Patari, a prominent Pakistani music streaming service. The breach exposed a database containing 273,425 user records. The leaked data includes usernames, email addresses, geographic locations, social profiles, device information and unsalted MD5 password hashes.
  • Date: Jun 2021
  • Domain: patari.pk
  • Country: Pakistan
  • Category: Streaming & Entertainment
  • Records Announced: 273,425
  • Data: Device Information Email Addresses Geographic Locations Passwords Social Profiles Usernames
  • Imported:
  • Records Imported: 273,425
  • Number of lines: 273,425
  • Size: 1.39 GB
  • Passwords: MD5
  • Cracked: 0%
In July 2025, Allianz Life allegedly suffered a cyber attack that led to millions of records being leaked online. The company attributed the incident to a social engineering technique that targeted data stored on Salesforce. Among the compromised information were 1.1 million unique email addresses, names, genders, dates of birth, phone numbers, physical addresses, and company information.
  • Data: Birthdates Company Information Email Addresses Genders Job Information Names Phone Numbers Physical Locations Tax IDs
  • Imported:
  • Records Imported: 2,849,704
  • Number of lines: 2,849,704
  • Size: 67.74 GB
  • Passwords: No
In July 2019, the French Printing service Rapid Flyer suffered a data breach. The breach led to the exposure of data including Full names, Company names, Email addresses, Dates of birth, Physical addresses, Phone numbers, VAT Numbers and Passwords stored as MD5 (Missing salt) hashes. In total, 166k users were affected.
  • Data: Birthdates Company Information Email Addresses Names Passwords Phone Numbers Physical Locations Tax IDs
  • Imported:
  • Records Imported: 166,765
  • Number of lines: 166,784
  • Size: 26.75 MB
  • Passwords: MD5
  • Cracked: 0%
In approximately January 2021, the Korean "Travel Notes" app known as 여행노트 (tnote.kr) suffered a data breach that impacted 170k users. The attack led to the exposure of data including Usernames, Email addresses, Phone numbers, Dates of birth, Device Names, Full names and Passwords stored in an Unknown format.
  • Date: Jan 2021
  • Domain: tnote.kr
  • Country: South Korea
  • Category: Travel
  • Records Announced: 170,534
  • Source: tnote.kr
  • Data: Birthdates Device Information Email Addresses Names Passwords Phone Numbers Usernames
  • Imported:
  • Records Imported: 170,932
  • Number of lines: 171,053
  • Size: 40.98 MB
  • Passwords: Unknown
In August 2016, the underground carding forum Elitecarders.name, known for facilitating the trade of stolen credit card data, personal information ("fullz"), and cybercrime tutorials, was reportedly breached. The breach, believed to have stemmed from a public hack of the site, affected approximately 190,000 users. Some of the leaked data includes usernames, email addresses, dates of birth, IP addresses, social media profiles, site activity logs, and passwords stored using the vBulletin forum software.
  • Data: Birthdates Email Addresses IP Addresses Passwords Site Activity Social Profiles Usernames Websites
  • Imported:
  • Records Imported: 188,865
  • Number of lines: 2,562,796
  • Size: 818.48 MB
  • Passwords: vBulletin
  • Cracked: 0%
In April 2020, the Brazilian shopping website HomeRefill suffered a data breach that impacted 194k users. The attack led to the exposure of data including Email addresses, Full names, Phone numbers, Dates of birth and Passwords stored as SHA512 hashes. The website was breached by @donjuji - "initial attack vector was misconfigured aws s3 bucket".
  • Data: Birthdates Email Addresses Names Passwords Phone Numbers
  • Imported:
  • Records Imported: 190,825
  • Number of lines: 214
  • Size: 94.44 MB
  • Passwords: SHA-512 Salted
  • Cracked: 75%

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.