Breach Intelligence

2,850

Total breached databases

In December 2020, the Oklahoma state Tourism and Recreation Department suffered a data breach. The incident exposed 637k email addresses across a variety of tables including age ranges against brochure orders and dates of birth against contest entries. Genders, names and physical addresses were also exposed.
  • Data: Ages Birthdates Email Addresses Genders Names Physical Locations
  • Imported:
  • Records Imported: 1,729,802
  • Number of lines: 2,796,313
  • Size: 369.53 MB
  • Passwords: No
In approximately July 2019, the gaming website D3Scene suffered a data breach. The attack led to the exposure of data including Email addresses, Usernames, IP Addresses, Dates of birth and Passwords stored as vBulletin hashes. In total, 963k users were affected. The website was previously breached in 2016.
  • Data: Email Addresses IP Addresses Passwords Usernames
  • Imported:
  • Records Imported: 970,471
  • Number of lines: 15,475,156
  • Size: 3.55 GB
  • Passwords: Hashed
  • Cracked: 0%
On September 11, 2022, OakBend Medical Center, a hospital in the United States accessible via oakbendmedcenter.org, suffered a significant data breach. Reports indicate that approximately 1.1 million patient records were leaked, amounting to 1,116,472 lines of data in a CSV file with a total size of 991.28 MB. The exposed information reportedly included sensitive personal and medical details such as names, sex, dates of birth, Social Security Numbers, physical addresses, phone numbers, race, religion, medical record numbers, and hospital visit details. Additionally, the leaked data contained health-related information like allergies, diagnoses and medication preferences.
  • Date: 2022
  • Country: United States
  • Category: Healthcare
  • Records Announced: 1,000,000
  • Data: Ages Birthdates Consumption Habits Email Addresses Ethnicities Genders Geographic Locations Health Information Languages Names Physical Descriptions Religions Social Security Numbers
  • Imported:
  • Records Imported: 1,122,712
  • Number of lines: 1,122,714
  • Size: 991.28 MB
  • Passwords: No
In June 2023, the French Minecraft network FunCloud, known for its Skyblock server at play.funcloud.fr, appeared in an online compilation of leaked databases. The listing referenced a file titled “FunCloud – LiteBans.txt” containing approximately 256,000 rows from the server’s LiteBans punishment system. Reports indicate that the exposed information included Minecraft usernames and associated IP addresses.
  • Date: 2023
  • Category: Gaming
  • Records Announced: 256,000
  • Data: IP Addresses Usernames
  • Imported:
  • Records Imported: 256,139
  • Number of lines: 256,166
  • Size: 15.32 MB
  • Passwords: No
In approximately August 2022, the Renting service RentingAuthority suffered a data breach that impacted 376k users. The breach led to the exposure of data including Email addresses, Dates of birth, Phone numbers, Full names, Divers License Numbers, SSNs (Partial) and Passwords stored in Plaintext. The website was breached by @3Subs.
  • Data: Birthdates Driving License Numbers Email Addresses Names Passwords Phone Numbers Social Security Numbers
  • Imported:
  • Records Imported: 340,578
  • Number of lines: 376,339
  • Size: 39.69 MB
  • Passwords: Plaintext
Gody.vn, Vietnam's largest travel social network, experienced a data breach on 2020. The breach exposed over 260,000 records of users who used the platform to share experiences, plan itineraries, and manage travel documents. Leaked data includes names, usernames, email addresses, and hashed passwords.
  • Date: 2020
  • Domain: gody.vn
  • Country: Vietnam
  • Category: Travel
  • Records Announced: 261,525
  • Source: hashmob.net
  • Data: Email Addresses Names Passwords Usernames
  • Imported:
  • Records Imported: 260,979
  • Number of lines: 261,525
  • Size: 212.58 MB
  • Passwords: BCrypt
  • Cracked: 1%
In April 2024, the Australian delivery company BHF Couriers (https://www.bhfcouriers.com.au/) suffered a data breach that exposed over 327k clients and over 22k users records. The data included email and physical addresses, names, partial credit cards data, phone numbers, unsalted MD5 password hashes and orders info.
  • Date: Apr 2024
  • Domain: bhfcouriers.com.au
  • Threat Actor: Okhotnik
  • Country: Australia
  • Category: Logistics & Transportation
  • Records Announced: 277,954
  • Source: hashmob.net
  • Data: Credit Card Information Email Addresses Names Order Information Passwords Phone Numbers Physical Locations Site Activity
  • Imported:
  • Records Imported: 2,171,559
  • Number of lines: 3,021,537
  • Size: 2.34 GB
  • Passwords: MD5
  • Cracked: 0%

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.