Breach Intelligence

2,838

Total breached databases

In April 2011, the music competition show "The X Factor" suffered a data breach by LulzSec as apart of a "50 days of Lulz". The breach led to the exposure of data including Dates of birth, Email addresses, Genders, Full names, Phone numbers and Geographic locations. The breach impacted 73k Contestants.
  • Data: Birthdates Email Addresses Genders Geographic Locations Names Phone Numbers
  • Imported:
  • Records Imported: 73,727
  • Number of lines: 73,755
  • Size: 23.67 MB
  • Passwords: MD5
  • Cracked: 1654%

The Theneoplace.net 2009 breach has been documented in our records, but additional information is not yet available. When the breach is imported, you will be able to search against it. For now, you can check if your data appears in other breaches.

  • Data: The data involved in the Theneoplace.net 2009 security incident has not been specified. We are monitoring for reliable updates and will publish them here.
  • Imported:
  • Records Imported: 8,817
  • Number of lines: 8,962
  • Size: 33.28 MB
  • Passwords: ?

We currently have no detailed description for the Tfsource.com 2016 data breach. This page is part of our effort to track security incidents. You will be able to check your information against this breach once it has been processed. Until then, try our search tool for other breaches.

  • Data: The types of personal information exposed in the Tfsource.com 2016 breach are not yet confirmed. This entry will be updated once verified sources provide details.
  • Imported:
  • Records Imported: 49,270
  • Number of lines: 49,295
  • Size: 9.49 MB
  • Passwords: ?

Details about the Terian.ru 2014 breach remain unavailable. Once it is imported, you will be able to check if your data was affected. Until then, you may search through other breaches to stay informed.

  • Data: At this stage, the exact nature of the compromised information in the Terian.ru 2014 breach is unknown. Updates will be provided as they are verified.
  • Imported:
  • Records Imported: 873
  • Number of lines: 908
  • Size: 227.72 KB
  • Passwords: ?

At present, no extended description exists for the Talkbusinessmagazine.co.uk incident. This entry is included so you are aware of its existence. Verification against this breach will be possible in the future. Meanwhile, you can check other breaches for your information.

  • Data: It is unclear which categories of data were compromised in the Talkbusinessmagazine.co.uk breach. This page will be revised as information becomes available.
  • Imported:
  • Records Imported: 4
  • Number of lines: 79
  • Size: 13.24 KB
  • Passwords: ?
In approximately April 2020, the Service for "Local, Affordable and Friendly Storage" known as Storagefront suffered a data breach that impacted 136k customers. The breach included Email addresses, Full names and Passwords stored as PBKDF2 SHA256 hashes. The website was breahed by @donjuji - the attack vector was "aws s3 credentials were uploaded to a public git".
  • Data: Email Addresses Names Passwords
  • Imported:
  • Records Imported: 143,822
  • Number of lines: 96
  • Size: 27.75 MB
  • Passwords: Django
  • Cracked: 0%

At present, no extended description exists for the Stealth-stresser.com 2014 incident. This entry is included so you are aware of its existence. Verification against this breach will be possible in the future. Meanwhile, you can check other breaches for your information.

  • Data: It is unclear which categories of data were compromised in the Stealth-stresser.com 2014 breach. This page will be revised as information becomes available.
  • Imported:
  • Records Imported: 165
  • Number of lines: 169
  • Size: 16.83 KB
  • Passwords: ?