Breach Intelligence

2,845

Total breached databases

In 2011, the website direkt.gema.de, associated with the German performance rights organization GEMA, allegedly suffered a data breach. GEMA, or the Gesellschaft für musikalische Aufführungs- und mechanische Vervielfältigungsrechte, is responsible for collecting royalties on behalf of copyright holders in the field of music. Reports suggest that approximately 27,000 records were compromised in the incident. The data exposed allegedly included email addresses, passwords, names, geographic locations, usernames, site activity, and company information. The passwords were reportedly stored as MD5 hashes.
  • Date: 2011
  • Domain: direkt.gema.de
  • Country: Germany
  • Category: Professional & Corporate
  • Data: Email Addresses Passwords Names Geographic Locations Usernames Site Activity Company Information
  • Imported:
  • Records Imported: 27,339
  • Number of lines: 40,119
  • Size: 28.91 MB
  • Passwords: MD5
  • Cracked: 0%
In 2019, ZoneAlarm.com allegedly suffered a data breach. ZoneAlarm is known for its firewall products and cybersecurity solutions. Reports suggest that approximately 5,200 records were exposed in the incident. The data compromised included email addresses, passwords, usernames, IP addresses, site activity, social profiles, birthdates, and websites. Passwords were allegedly encrypted using BCrypt and vBulletin hashing algorithms.
  • Date: 2019
  • Domain: zonealarm.com
  • Category: Cybersecurity
  • Records Announced: 5,128
  • Data: Email Addresses Passwords Usernames IP Addresses Site Activity Social Profiles Websites Birthdates
  • Imported:
  • Records Imported: 5,173
  • Number of lines: 5,281
  • Size: 2.72 MB
  • Passwords: BCrypt, vBulletin
  • Cracked: 0%
In 2016, Zloy.org allegedly suffered a data breach. The breach reportedly exposed approximately 25,000 records, including email addresses, usernames, passwords, IP addresses, site activity, social profiles, websites, and birthdates. The passwords included those hashed using vBulletin.
  • Data: Email Addresses Passwords Usernames IP Addresses Site Activity Social Profiles Websites Birthdates
  • Imported:
  • Records Imported: 25,014
  • Number of lines: 25,098
  • Size: 13.04 MB
  • Passwords: vBulletin
  • Cracked: 7%
In 2011, Xtremeroot.net allegedly suffered a data breach. Reports suggest the incident exposed approximately 12,000 records, which included email addresses, usernames, passwords (hashed in MD5), IP addresses, and site activity details.
  • Data: Email Addresses Passwords Usernames IP Addresses Site Activity
  • Imported:
  • Records Imported: 11,754
  • Number of lines: 11,880
  • Size: 21.87 MB
  • Passwords: MD5
  • Cracked: 0%
In 2018, x-passwords.com allegedly suffered a data breach. x-passwords.com is a website that likely offers or is associated with the distribution of unauthorized access credentials such as passwords and login details. The incident reportedly exposed approximately 81,000 records, including email addresses, passwords, usernames, IP addresses, site activity, and social profiles. The breach compromised encrypted passwords stored using vBulletin technology.
  • Data: Email Addresses Passwords Usernames IP Addresses Site Activity Social Profiles
  • Imported:
  • Records Imported: 80,967
  • Number of lines: 81,057
  • Size: 27.47 MB
  • Passwords: vBulletin
  • Cracked: 0%
In 2021, Xculpter.com allegedly suffered a data breach. Xculpter is an online retailer specializing in hair styling tools. The incident reportedly affected approximately 35,000 records. The data exposed includes email addresses, passwords (encrypted with MD5), names, genders, IP addresses, site activity, websites visited, company information, and birthdates.
  • Data: Email Addresses Passwords Names Genders IP Addresses Site Activity Websites Company Information Birthdates
  • Imported:
  • Records Imported: 34,807
  • Number of lines: 34,869
  • Size: 10.96 MB
  • Passwords: MD5
  • Cracked: 0%
Xcrazy.pl allegedly suffered a data breach impacting approximately 7,200 records. The type of data exposed includes geographic locations, usernames, IP addresses, and site activity. No passwords were reported to be compromised in this breach.
  • Data: Geographic Locations Usernames IP Addresses Site Activity
  • Imported:
  • Records Imported: 7,186
  • Number of lines: 7,734
  • Size: 906.65 KB
  • Passwords: No