Breach Intelligence

2,843

Total breached databases

In 2021, the Spanish online pharmacy Promofarma allegedly suffered a data breach. The platform, known for selling health and wellness products, reportedly had data from over 4.9 million users exposed. Among the compromised information were names and email addresses. There is no evidence linking this incident to a previous breach that occurred in 2019.
  • Data: Email Addresses IP Addresses Site Activity
  • Imported:
  • Records Imported: 7,669,779
  • Number of lines: 7,669,792
  • Size: 496.52 MB
  • Passwords: No
In December 2016, an attacker breached PayAsUGym's website exposing over 400k customers' personal data. The data was consequently leaked publicly and broadly distributed via Twitter. The leaked data contained personal information including email addresses and passwords hashed using MD5 without a salt.
  • Data: Credit Card Information Email Addresses IP Addresses Names Passwords Payment Information Phone Numbers Physical Locations Site Activity
  • Imported:
  • Records Imported: 437,644
  • Number of lines: 437,695
  • Size: 52.48 MB
  • Passwords: MD5
  • Cracked: 99%
In September 2023 the popular sneaker marketplace suffered a databreach. The breach included over 850k unique email addresses, names, usernames, phone numbers and personal addresses. The data was scraped by @cuck through an admin panel.
  • Date: Sep 2023
  • Domain: kixify.com
  • Threat Actor: cuck
  • Category: E-commerce & Retail
  • Records Announced: 854,478
  • Source: hashmob.net
  • Data: Email Addresses Names Phone Numbers Physical Locations Usernames
  • Imported:
  • Records Imported: 1,127,169
  • Number of lines: 636,100
  • Size: 36.83 MB
  • Passwords: No
In August 2014, the diet and nutrition website diet.com suffered a data breach resulting in the exposure of 1.4 million unique user records dating back as far as 2004. The data contained email and IP addresses, usernames, plain text passwords and dietary information about the site members including eating habits, BMI and birth date. The site was previously reported as compromised on the Vigilante.pw breached database directory.
  • Data: Birthdates Consumption Habits Email Addresses IP Addresses Names Passwords Physical Descriptions Usernames
  • Imported:
  • Records Imported: 1,340,949
  • Number of lines: 18,986,782
  • Size: 2.37 GB
  • Passwords: Plaintext
In August 2021, the website development company Imavex suffered a data breach that exposed 878 thousand unique email addresses. The data included user records containing names, usernames and password material with some records also containing genders and partial credit card data, including the last 4 digits of the card and expiry date. Hundreds of thousands of form submissions and orders via Imavex customers were also exposed and contained further personal information of submitters and the contents of the form.
  • Data: Credit Card Information Email Addresses Genders Names Order Information Passwords Phone Numbers Physical Locations Usernames
  • Imported:
  • Records Imported: 1,734,294
  • Number of lines: 5,300,369
  • Size: 2.61 GB
  • Passwords: Unknown
In January 2021, Oxfam Australia allegedly suffered a data breach that exposed information on its supporters. The incident reportedly involved 1.8 million unique email addresses, which were later put up for sale on a popular hacking forum. Among the compromised data were names, phone numbers, physical addresses, genders, and dates of birth. In some cases, partial credit card details (including the first six and last three digits, card type, and expiry) were also exposed, along with bank names, account numbers, and BSB details.
  • Data: Bank Account Information Birthdates Credit Card Information Email Addresses Genders Names Payment Information Phone Numbers Physical Locations
  • Imported:
  • Records Imported: 2,873,598
  • Number of lines: 5,570,524
  • Size: 2.67 GB
  • Passwords: No
In December 2020, the economic research company Capital Economics suffered a data breach that exposed 263k customer records. The exposed data included email addresses, names, phone numbers, job titles, company information, physical addresses and passwords.
  • Data: Company Information Email Addresses Job Information Names Passwords Phone Numbers Physical Locations
  • Imported:
  • Records Imported: 425,491
  • Number of lines: 2,913,943
  • Size: 339.93 MB
  • Passwords: BCrypt
  • Cracked: