Breach Intelligence

2,850

Total breached databases

In 2019, Mineland.net, the official website of Mineland Network, a prominent Minecraft server offering various game modes and experiences, suffered a data breach. Reports indicate that approximately 1.7 million records were exposed. Among the compromised data were email addresses, passwords, usernames, and IP addresses.
  • Data: Email Addresses Passwords Usernames IP Addresses
  • Imported:
  • Records Imported: 1,728,885
  • Number of lines: 1,733,618
  • Size: 226.03 MB
  • Passwords: SHA-384 Salted
  • Cracked: 0%
In March 2020, the website Epicchannel.com, a platform reportedly associated with entertainment services in India, experienced a data breach. The breach exposed approximately 491,553 records. Among the compromised data were email addresses, phone numbers, birthdates, names, passwords (stored as bcrypt and MD5 hashes), geographic locations and genders.
  • Data: Email Addresses Passwords Names Phone Numbers Physical Locations Genders Birthdates
  • Imported:
  • Records Imported: 482,984
  • Number of lines: 491,553
  • Size: 302.03 MB
  • Passwords: BCrypt, MD5
  • Cracked: 7%
Sometime around 2017, a data breach involving the website Rekrute, a platform focused on recruitment and job search services, was identified. The breach stemmed from an exposed MongoDB database labeled "deathNote" and contained an estimated 678,118 records, with a full version including 702,239 records due to duplicates. Among the compromised data were email addresses, plaintext passwords, names, phone numbers, birth dates, and addresses.

Site: Rekrute.
  • Date: 2017
  • Domain: rekrute.com
  • Threat Actor: bipolar turtle
  • Country: Morocco
  • Category: Professional & Corporate
  • Records Announced: 678,118
  • Data: Email Addresses Passwords Names Phone Numbers Physical Locations Birthdates
  • Imported:
  • Records Imported: 702,239
  • Number of lines: 702,239
  • Size: 135.68 MB
  • Passwords: Plaintext
The data breach involves the COVID-19 database from Ecuador's Ministry of Public Health, containing information of 816,314 users. The dataset includes various personal details such as names, identification numbers, contact information, and vaccination data. The data was initially shared on BreachForumsIs and attributed to Kelvinsecurity.
  • Date: 2022
  • Threat Actor: Kelvinsecurity
  • Country: Ecuador
  • Category: Healthcare
  • Records Announced: 730,694
  • Data: Email Addresses Names Phone Numbers Government IDs Genders Birth Information Nationality Vaccination Data
  • Imported:
  • Records Imported: 651,352
  • Number of lines: 651,352
  • Size: 316.42 MB
  • Passwords: No
In November 2022, the gaming website dedicated to classic DOS games Abandonia suffered a data breach resulting in the exposure of 920k unique user records. This breach was in addition to another one 7 years earlier in 2015. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.
  • Data: Email Addresses Passwords Usernames IP Addresses Social Profiles
  • Imported:
  • Records Imported: 925,288
  • Number of lines: 925,408
  • Size: 270.96 MB
  • Passwords: vBulletin
  • Cracked: 2%
In December 2023, the Spanish online sneaker shop Footdistrict was breached by an individual known as Satanic. Footdistrict is known for selling sneakers and streetwear. Reports suggest that the breach exposed approximately 943,795 lines of data. Some of the leaked data includes email addresses, names, physical locations, phone numbers, and birthdays.
  • Date: Dec 2023
  • Domain: footdistrict.com
  • Threat Actor: Satanic
  • Category: E-commerce & Retail
  • Records Announced: 943,796
  • Data: Email Addresses Names Phone Numbers Physical Locations Site Activity Birthdates
  • Imported:
  • Records Imported: 943,795
  • Number of lines: 943,796
  • Size: 214.59 MB
  • Passwords: No
In November 2024, the 1Win Online Casino Network, a platform offering online casino and betting services, experienced a data breach. It has been reported that the breach affected approximately 96 million users. Among the compromised data were usernames, email addresses, phone numbers, account balances, and other sensitive information.
  • Data: Dates of birth Email addresses Geographic locations IP addresses Passwords Phone numbers
  • Imported:
  • Records Imported: 96,521,883
  • Number of lines: 96,551,066
  • Size: 28.45 GB
  • Passwords: Unknown

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.