Breach Intelligence

2,850

Total breached databases

In December 2020, the car dealership service provider DriveSure suffered a data breach. The incident resulted in 26GB of data being downloaded and later shared on a hacking forum. Impacted personal information included 3.6 million unique email addresses, names, phone numbers and physical addresses. Vehicle data was also exposed and included makes, models, VIN numbers and odometer readings. A small number of passwords stored as bcrypt hashes were also included in the data set.
  • Data: Email Addresses Names Passwords Phone Numbers Physical Locations Vehicle Information
  • Imported:
  • Records Imported: 7,517,785
  • Number of lines: 7,031,454
  • Size: 1.41 GB
  • Passwords: BCrypt
  • Cracked: 20%
In December 2021, the online booking service FlexBooker reportedly suffered a data breach that exposed 3.7 million accounts. Among the compromised data were names, email addresses, phone numbers, passwords, and credit card information.
  • Data: Credit Card Information Email Addresses Names Passwords Phone Numbers
  • Imported:
  • Records Imported: 9,556,208
  • Number of lines: 9,588,614
  • Size: 3.09 GB
  • Passwords: Hashed
  • Cracked: 0%
In March 2021, news broke of a massive data breach impacting millions of Adecco customers in South America which was subsequently sold on a popular hacking forum. The breach exposed over 4M unique email addresses as well as genders, dates of birth, marital statuses, phone numbers and passwords stored as bcrypt hashes.
  • Data: Email Addresses Genders Geographic Locations Marital Statuses Names Passwords Phone Numbers
  • Imported:
  • Records Imported: 4,536,759
  • Number of lines: 4,543,938
  • Size: 1.92 GB
  • Passwords: BCrypt
  • Cracked: 0%
In May 2019, the online food ordering service EatStreet suffered a data breach affecting 6.4 million customers. An extensive amount of personal data was obtained including names, phone numbers, addresses, partial credit card data and passwords stored as bcrypt hashes.
  • Data: Birthdates Credit Card Information Email Addresses Genders Names Passwords Phone Numbers Physical Locations Social Profiles
  • Imported:
  • Records Imported: 6,402,415
  • Number of lines: 6,402,491
  • Size: 3.12 GB
  • Passwords: BCrypt
  • Cracked: 0%
In November 2015, the online chatroom known as "xat" was hacked and 6 million user accounts were exposed. Used as a chat engine on websites, the leaked data included usernames, email and IP addresses along with hashed passwords.
  • Data: Email Addresses IP Addresses Passwords Site Activity Usernames
  • Imported:
  • Records Imported: 5,934,864
  • Number of lines: 6,173,533
  • Size: 640.87 MB
  • Passwords: Hashed
  • Cracked: 0%
In January 2024, the Russian retail store RendezVous experienced a data breach. RendezVous is known for its collection of fashion and footwear products. The breach involved approximately 7.6 million lines of data, which included phone numbers, order details, and client information. Additionally, 4.5 million email addresses were compromised. Among the leaked data were names, birthdates, email addresses, phone numbers, and passwords.
  • Date: Jan 23, 2024
  • Domain: rendez-vous.ru
  • Country: Russia
  • Category: E-commerce & Retail
  • Records Announced: 6,883,998
  • Data: Email Addresses Passwords Names Phone Numbers Order Information Birthdates
  • Imported:
  • Records Imported: 6,882,297
  • Number of lines: 6,884,709
  • Size: 2.35 GB
  • Passwords: MD5 Salted
  • Cracked: 0%
In 2023, Angelone (angelone.in), a finance and stock trading platform, reportedly suffered a data breach that exposed approximately 7,901,612 user records. Among the compromised data were names, phone numbers, email addresses, dates of birth, bank account information, and geographic locations. Additionally, stock holdings and user profit-and-loss (PNL) statistics were also exposed.
  • Date: Apr 2023
  • Domain: angelone.in
  • Country: India
  • Category: Finance & Payments
  • Records Announced: 7,901,612
  • Data: Email Addresses Names Phone Numbers Geographic Locations Security Credentials Bank Account Information Financial Information Birthdates
  • Imported:
  • Records Imported: 7,900,445
  • Number of lines: 7,901,612
  • Size: 9.6 GB
  • Passwords: No

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.