Breach Intelligence

2,842

Total breached databases

In October 2020, the app data company Reincubate suffered a data breach which exposed a backup from November 2017 (the newest record in the data appeared several months earlier). The data included over 616k unique email addresses, names and passwords stored as PBKDF2 hashes.
  • Data: Email Addresses Names Passwords Site Activity Usernames
  • Imported:
  • Records Imported: 1,362,820
  • Number of lines: 1,365,290
  • Size: 109.19 MB
  • Passwords: Django
  • Cracked:
In September 2023, the threat actor known as USDoD published data from 3,200 Airbus vendors on a well-known hacking forum. The leaked information included full names, addresses, phone numbers, and job titles, exposing sensitive details of Airbus's supply chain network.
  • Date: Sep 11, 2023
  • Threat Actor: USDoD
  • Category: Logistics & Transportation
  • Records Announced: 3,200
  • Data: Company Information Email Addresses Fax Numbers Job Information Names Phone Numbers Physical Locations
  • Imported:
  • Records Imported: 3,203
  • Number of lines: 3,206
  • Size: 644.75 KB
  • Passwords: No
In approximately May 2020, the Website for "Homeopathic Remedies" known as Remedia suffered a data breach that impacted 134k members. The breach led to the exposure of data including Email addresses, Dates of birth and Passwords stored as Bcrypt hashes.
  • Data: Birthdates Email Addresses Passwords
  • Imported:
  • Records Imported: 134,564
  • Number of lines: 134,662
  • Size: 13.86 MB
  • Passwords: BCrypt
  • Cracked:
In December 2014, the Russian hacker community Lolzteam suffered a data breach. The platform is known for its involvement in various underground internet activities. The breach exposed approximately 25,000 users. Some of the leaked data includes usernames, email addresses, genders, social profiles, birthdates, IP addresses and passwords.
  • Data: Birthdates Email Addresses Genders IP Addresses Passwords Social Profiles Usernames
  • Imported:
  • Records Imported: 25,074
  • Number of lines: 1,067,850
  • Size: 334.63 MB
  • Passwords: vBulletin
  • Cracked: 63%
In late March 2022, the Sri Lankan payment gateway PayHere experienced a significant data breach. The platform, which facilitates online payments for merchants and businesses, reportedly had more than 65GB of payment records exposed. The breach affected over 1.5 million unique email addresses. Among the compromised data were names, phone numbers, geographic locations, IP addresses, purchase histories, and partially obfuscated credit card details, including card type, the first six and last four digits, and expiry dates. Additional exposed information is believed to include social media profiles, government-issued identification numbers, birthdates, and business-related information.
  • Data: Company Information Credit Card Information Email Addresses Geographic Locations Government IDs IP Addresses Names Order Information Payment Information Phone Numbers Physical Locations Social Profiles Websites
  • Imported:
  • Records Imported: 17,560,899
  • Number of lines: 148,656,634
  • Size: 65.38 GB
  • Passwords: No
In September 2020, ChqBook, an Indian banking platform that provides financial services to small business owners and professionals, suffered a data breach affecting approximately 4.8 million users. Among the compromised data were email addresses, full names, phone numbers, physical locations, financial income, social media profiles, birthdates, genders, and passwords stored as bcrypt hashes.
  • Date: Sep 2020
  • Domain: chqbook.com
  • Country: India
  • Category: Finance & Payments
  • Records Announced: 4,810,182
  • Source: eccouncil.org
  • Data: Email Addresses Financial Information Genders Names Passwords Phone Numbers Physical Locations Social Profiles
  • Imported:
  • Records Imported: 5,036,022
  • Number of lines: 5,036,034
  • Size: 1.6 GB
  • Passwords: BCrypt
  • Cracked:
In March 2025, New York University (NYU) suffered a data breach when its website was compromised for over two hours by a hacker protesting alleged race-based admissions. The attacker published data from over 3 million applicants dating back to 1989. NYU restored the site, launched an internal investigation, and began notifying affected individuals. At least 10 class action lawsuits have been filed. Although much of the data was redacted, it reportedly included names, email addresses, test scores, GPAs, geographic locations, financial aid details, ethnicities, and, in some cases, Social Security numbers.
  • Date: Mar 22, 2025
  • Domain: nyu.edu
  • Country: United States
  • Category: Education
  • Records Announced: 3,160,701
  • Data: Company Information Education Email Addresses Ethnicities Family Members Financial Information Genders Geographic Locations Names Nationalities Phone Numbers Salutations Social Security Numbers
  • Imported:
  • Records Imported: 1,206,262
  • Number of lines: 4,448,300
  • Size: 5.88 GB
  • Passwords: No