Breach Intelligence

2,850

Total breached databases

In December 2011, iSpeak.cn suffered a data breach on their website leaking around 9.6 million user's information. The information leaked includes plaintext passwords, email addresses and usernames. iSpeak is a chinese instant messaging app with VOIP capabilities comparable to Teamspeak.
  • Date: Dec 2011
  • Domain: ispeak.cn
  • Country: China
  • Category: Social Media & Communication
  • Records Announced: 9,695,514
  • Source: databreach.com
  • Data: Email Addresses Passwords Usernames
  • Imported:
  • Records Imported: 9,695,453
  • Number of lines: 9,695,514
  • Size: 375.43 MB
  • Passwords: Plaintext
In August 2024, a data breach from the online styling service Lookiero was posted to a popular hacking forum. Dating back to March 2024, the data included 5M unique email addresses, with many of the records also including name, phone number and physical address. When contacted about the incident, Lookiero advised that they would "look into it and get back to you if necessary"
  • Data: Email Addresses Names Phone Numbers Physical Locations
  • Imported:
  • Records Imported: 5,055,513
  • Number of lines: 5,593,319
  • Size: 4.11 GB
  • Passwords: No
In November 2023, a post to a popular hacking forum alleged that millions of LinkedIn records had been scraped and leaked. On investigation, the data turned out to be a combination of legitimate data scraped from LinkedIn and email addresses constructed from impacted individuals' names.
  • Data: Company Information Email Addresses Genders Geographic Locations Job Information Names Phone Numbers Physical Locations Site Activity Social Profiles
  • Imported:
  • Records Imported: 14,555,844
  • Number of lines: 35,941,926
  • Size: 12.24 GB
  • Passwords: No
On August 22, 2024, the website agrariandept.gov.lk, belonging to the Department of Agrarian Development in Sri Lanka, was breached. This government department is responsible for implementing policies, managing resources, and providing services that support the agricultural community, particularly in rural areas. Reports suggest that the breach exposed approximately 1,450,000 farmers and associated information. Among the compromised data were NIC numbers, names, phone numbers, geographic locations, site activity, and IP addresses.
  • Date: Aug 22, 2024
  • Domain: agrariandept.gov.lk
  • Threat Actor: SILKFIN AGENCY
  • Country: Sri Lanka
  • Category: Government
  • Records Announced: 1,724,662
  • Data: Geographic Locations Government IDs IP Addresses Names Phone Numbers Site Activity
  • Imported:
  • Records Imported: 1,475,195
  • Number of lines: 1,780,240
  • Size: 710.46 MB
  • Passwords: No
In May 2016, the online gaming site Army Force Online suffered a data breach that exposed 1.5M accounts. The breached data was found being regularly traded online and included usernames, email and IP addresses and MD5 passwords.
  • Data: Email Addresses Geographic Locations IP Addresses Names Passwords Profile Photos Site Activity Usernames
  • Imported:
  • Records Imported: 2,297,001
  • Number of lines: 2,297,704
  • Size: 161.39 MB
  • Passwords: MD5
  • Cracked: 78%
A data breach at the professional broker with an impeccable reputation, distinguished by a technologically innovative approach to work on Forex website STForex.ru in late 2022 resulted in the exposure of 1,316,448 client records, including Partners records (35,271).
  • Date: 2022
  • Domain: stforex.ru
  • Country: Russia
  • Category: Finance & Payments
  • Records Announced: 1,300,000
  • Data: Email Addresses Usernames
  • Imported:
  • Records Imported: 468,843
  • Number of lines: 14,184,748
  • Size: 390.78 MB
  • Passwords: ?
In early 2020, MeetMindful, an online dating service, allegedly suffered a data breach that exposed 1.4 million unique customer email addresses. The incident reportedly included a wide range of personal details used for matching, such as physical attributes, marital status, birthdates, genders, and preferences, as well as information on alcohol, drug, and cigarette use. Additional exposed data included names, geographic locations, IP addresses, and passwords stored as bcrypt hashes.
  • Data: Birthdates Consumption Habits Email Addresses Genders Geographic Locations IP Addresses Marital Statuses Names Passwords Physical Descriptions Religions Sexual Orientations Social Profiles Usernames
  • Imported:
  • Records Imported: 1,424,633
  • Number of lines: 2,280,128
  • Size: 1.19 GB
  • Passwords: BCrypt
  • Cracked: 40%

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.