Breach Intelligence

2,850

Total breached databases

In approximately October 2022, maisamigas.com.br, the website of Brazilian multi-level marketing company Amigas, suffered a data breach. The incident, attributed to threat actor @thrax, reportedly exposed data belonging to around 603,000 users, including 93,000 unique email addresses. Among the compromised data were full names, email addresses, phone numbers, tax identification numbers, physical addresses, genders, marital statuses, and dates of birth.
  • Data: Birthdates Email Addresses Genders Marital Statuses Names Phone Numbers Physical Locations Tax IDs
  • Imported:
  • Records Imported: 603,796
  • Number of lines: 726
  • Size: 164.23 MB
  • Passwords: No
In June 2022, the Taiwan's low-cost airline Tigerair Taiwan (https://www.tigerairtw.com/) suffered a data breach exposed over 585k clients. The data contained over 656k unique email addresses, dates of birth, genders, names, passport numbers and passport expiration date as well as passwords stored as Base64(unhex(SHA-256($plaintext))) hashes.The data also contains almost 3 million credit cards.
  • Date: Jun 2022
  • Domain: tigerairtw.com
  • Country: Taiwan
  • Category: Travel
  • Records Announced: 585,115
  • Data: Birthdates Credit Card Information Email Addresses Genders Names Passports Passwords Site Activity
  • Imported:
  • Records Imported: 585,115
  • Number of lines: 1,902
  • Size: 558.94 MB
  • Passwords: SHA-256
  • Cracked: 0%
In April 2022, the Social media & Messaging Yippiweb suffered a data breach that impacted 578k members. The breach included Email addresses, Usernames, Phone numbers and Passwords stored as MD5 hashes.
  • Date: Apr 2022
  • Domain: yippiweb.com
  • Category: Social Media & Communication
  • Records Announced: 578,409
  • Source: kaduu.ch
  • Data: Email Addresses Passwords Phone Numbers Usernames
  • Imported:
  • Records Imported: 504,856
  • Number of lines: 7,633,211
  • Size: 485.46 MB
  • Passwords: MD5
  • Cracked: 0%
In May 2016, Nulled.cr, a cracking community forum, allegedly suffered a data breach that exposed 599,000 user accounts. The leaked data reportedly included email addresses, IP addresses, weak salted MD5 password hashes, and hundreds of thousands of private messages exchanged between members.
  • Data: Email Addresses IP Addresses Messages Passwords Site Activity Usernames
  • Imported:
  • Records Imported: 599,110
  • Number of lines: 41,140,060
  • Size: 9.46 GB
  • Passwords: MyBB
  • Cracked: 39%
In September 2023, the Russian insurance company ACKO (acko.ru) experienced a data breach. The breach involved the exposure of approximately 4 million lines of data from the user table in SQL format. Among the compromised data were phone numbers, full names, birth dates, email addresses, physical locations, passport numbers, and vehicle information, including VINs and registration details.
  • Date: Sep 2023
  • Domain: acko.ru
  • Country: Russia
  • Category: Finance & Payments
  • Records Announced: 4,773,517
  • Data: Birthdates Email Addresses Names Passports Phone Numbers Physical Locations Vehicle Information
  • Imported:
  • Records Imported: 3,919,247
  • Number of lines: 9,522,179
  • Size: 2.23 GB
  • Passwords: No
In 2020, Parkbench (parkbench.com), a platform providing real estate agents with exclusive neighborhood websites, experienced a data breach affecting approximately 235,000 users. Among the compromised data were names, email addresses, social media profiles, geographic locations, site activity, and passwords.
  • Date: 2020
  • Domain: parkbench.com
  • Category: Real Estate
  • Records Announced: 235,000
  • Data: Email Addresses Names Passwords Physical Locations Site Activity Social Profiles
  • Imported:
  • Records Imported: 149,509
  • Number of lines: 5,889
  • Size: 474.78 MB
  • Passwords: MD5 Salted, BCrypt
  • Cracked: 0%
In approximately August 2021, the companion app Lyf (LyfApp) suffered a data breach. The breach included Email addresses, Names, Countries, Dates of birth and Passwords stored in an Unknown hashing algorithm. In total, 228k users were affected.
  • Date: Aug 2021
  • Domain: lyf.app
  • Category: Healthcare
  • Records Announced: 228,300
  • Source: lyf.app
  • Data: Birthdates Email Addresses Geographic Locations Names Passwords Site Activity Social Profiles Usernames
  • Imported:
  • Records Imported: 227,028
  • Number of lines: 176
  • Size: 89.55 MB
  • Passwords: Unknown

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.