CINXE.COM
Data Breach Database — Mozilla Monitor
<!doctype html> <html lang="en"> <head> <base href="https://monitor.mozilla.org/breaches"> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="stylesheet" href="/_next/static/css/2c7c733a052b5f81.css" data-precedence="next"> <link rel="stylesheet" href="/_next/static/css/b596b8d664859933.css" data-precedence="next"> <link rel="stylesheet" href="/_next/static/css/c54b4526c9aef97b.css" data-precedence="next"> <link rel="stylesheet" href="/_next/static/css/44804ad52a64ab5a.css" data-precedence="next"> <link rel="stylesheet" href="/_next/static/css/641605e04a9ed29c.css" data-precedence="next"> <link rel="stylesheet" href="/_next/static/css/3aefa01f0b48e305.css" data-precedence="next"> <link rel="stylesheet" href="/_next/static/css/ac10e571035702dc.css" data-precedence="next"> <link rel="preload" as="script" fetchpriority="low" nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d" href="/_next/static/chunks/webpack-0943309e9f04a3ed.js"> <script src="/_next/static/chunks/52774a7f-c0c61b1433c895c5.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/fd9d1056-05ff910d48d0d4b5.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/7547-0041c750a52c20c0.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/main-app-f8934a3f9a5f7bdb.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/605-2e4b9c1a816ed366.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/7648-c67cc91fb2c938a2.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/5878-088e90fdcd3325d8.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/4337-1a2f93607eb7f680.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/7185-f0b060a43f2a4e65.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/8096-2517a98fffd53dea.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/4832-19ec1920442fd785.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/app/(proper_react)/(redesign)/(public)/layout-83cd641555a9dec3.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/7954-1b65ae66421619f3.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/9641-8344acb24308343e.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/4501-eafe357e5d4af392.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/3084-d8674e5d117499fa.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/5863-2b60776be84b3b88.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/9463-204c9ad64acb13ec.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/app/(proper_react)/(redesign)/(public)/page-b65154ac7c7615ff.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/app/global-error-3908db0cfef01427.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/app/(proper_react)/(redesign)/(public)/breaches/page-7cc1843a37b25f54.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/5138-fda9f644adc5bac6.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/2561-1e4a6a8ae6d2f4ed.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/app/layout-396f2adab233b982.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/app/not-found-042c97db30ef836e.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/5347-da9a1ea5f765e3fc.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <script src="/_next/static/chunks/app/(proper_react)/layout-bff485c534519c98.js" async nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <link rel="preload" href="https://www.googletagmanager.com/gtag/js?id=G-CXG8K4KW4P" as="script" nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"> <title>Data Breach Database — Mozilla Monitor</title> <meta name="description" content="Find out if you’ve been part of a data breach with Mozilla Monitor. We’ll help you understand what to do next and continuously monitor for any new breaches."> <meta property="og:title" content="All Breaches Detected by Mozilla Monitor"> <meta property="og:description" content="Browse the complete list of known breaches detected by Mozilla Monitor, then find out if your information was exposed."> <meta property="og:url" content="https://monitor.mozilla.org/breaches"> <meta property="og:site_name" content="Mozilla Monitor"> <meta property="og:image" content="https://monitor.mozilla.org/images/og-image.webp"> <meta property="og:type" content="website"> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:title" content="All Breaches Detected by Mozilla Monitor"> <meta name="twitter:description" content="Browse the complete list of known breaches detected by Mozilla Monitor, then find out if your information was exposed."> <meta name="twitter:image" content="https://monitor.mozilla.org/images/og-image.webp"> <link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="48x48"> <meta name="next-size-adjust"> <script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" nomodule="" nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d"></script> <meta http-equiv="X-Translated-By" content="Google"> <meta http-equiv="X-Translated-To" content="fr"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.1hbgkFx4Qn8.O/am=DgY/d=1/rs=AN8SPfqlmAPxwfG457BPbRXwNq39oSMGHg/m=corsproxy" data-sourceurl="https://monitor.mozilla.org/breaches"></script> <link href="https://fonts.googleapis.com/css2?family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20..48,100..700,0..1,-50..200" rel="stylesheet"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.1hbgkFx4Qn8.O/am=DgY/d=1/exm=corsproxy/ed=1/rs=AN8SPfqlmAPxwfG457BPbRXwNq39oSMGHg/m=phishing_protection" data-phishing-protection-enabled="false" data-forms-warning-enabled="true" data-source-url="https://monitor.mozilla.org/breaches"></script> <meta name="robots" content="none"> </head> <body class="__className_d65c78 __variable_d65c78 __variable_373ca7" data-ga4-measurement-id="G-CXG8K4KW4P" data-node-env="production"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.1hbgkFx4Qn8.O/am=DgY/d=1/exm=corsproxy,phishing_protection/ed=1/rs=AN8SPfqlmAPxwfG457BPbRXwNq39oSMGHg/m=navigationui" data-environment="prod" data-proxy-url="https://monitor-mozilla-org.translate.goog" data-proxy-full-url="https://monitor-mozilla-org.translate.goog/breaches?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB" data-source-url="https://monitor.mozilla.org/breaches" data-source-language="pl" data-target-language="fr" data-display-language="en-GB" data-detected-source-language="" data-is-source-untranslated="false" data-source-untranslated-url="https://translate.google.com/website?sl=pl&tl=fr&hl=en-GB&u=https://monitor.mozilla.org/breaches&anno=2" data-client="tr"></script> <div class="PublicShell_wrapper__YjM2J"> <div class="Toastify"></div> <header> <nav class="PublicShell_nav__QbN2v"> <h1><a href="https://monitor-mozilla-org.translate.goog/?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><img alt="Mozilla Monitor" loading="lazy" width="266" height="40" decoding="async" data-nimg="1" class="PublicShell_logo__vbvvO" style="color:transparent" src="/_next/static/media/monitor-logo.e25bb4f2.svg"></a></h1><button type="button" class="Button_button__iA3wi Button_secondary__oOW0L">Sign In</button> </nav> </header> <div class="PublicShell_content__Gx4O4"> <main class="BreachIndexView_wrapper__tJ95w"> <header> <h1>Data Breach Database</h1> <p>We monitor all known data breaches to find out if your personal information was compromised. Here’s a complete list of all of the breaches that have been reported since 2007.</p> <form class="BreachIndexView_filterForm__eBIWY" aria-hidden="true"> <label for="filterTerm">Search Breaches</label><input type="search" id="filterTerm" name="filterTerm" value=""> </form> </header> <ul class="BreachIndexView_breachList__obif_"> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FlipaClip?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">F</span>FlipaClip</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 20, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Finsure?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">F</span>Finsure</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 19, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DemandScience?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">D</span>DemandScience by Pure Incubation</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 13, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HotTopic?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">H</span>Hot Topic</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 11, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Partial credit card data, Phone numbers, Physical addresses, Purchases, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Earth2?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">E</span>Earth 2</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DennisKirk?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">D</span>Dennis Kirk</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 5, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Phone numbers, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Altenen?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">A</span>Altenen</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 5, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> cryptocurrency-wallet-addresses, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ZLib?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">Z</span>Z-lib</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 4, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> cryptocurrency-wallet-addresses, Email addresses, Geographic locations, Passwords, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StalkerOnline?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">S</span>Stalker Online</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 31, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TNAFlix?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">T</span>TNAFlix</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VimeWorld?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">V</span>VimeWorld</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StreamCraft?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">S</span>StreamCraft</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 27, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TheClubPenguinExperience?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">T</span>The Club Penguin Experience</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 26, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Age groups, Email addresses, Password hints, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/digiDirect?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">d</span>digiDirect</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 25, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FairVoteCanada?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">F</span>Fair Vote Canada</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 21, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses, Political donations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AlpineReplay?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">A</span>AlpineReplay</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 17, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Physical attributes, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/InternetArchive?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">I</span>Internet Archive</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 9, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Muah?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">M</span>Muah.AI</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 8, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Sexual fetishes </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Switch?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">S</span>Switch</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 5, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Job applications, Names, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BudTrader?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">B</span>BudTrader</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 1, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CentralTickets?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">C</span>Central Tickets</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GameVN?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">G</span>GameVN</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 23, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HuntStand?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">H</span>HuntStand</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 19, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/InstitutoNacionalDeDeportesDeChile?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">I</span>Instituto Nacional de Deportes de Chile</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 16, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GamesBox?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">G</span>Games Box</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 15, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Ages, Email addresses, Genders, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BloomsToday?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">B</span>Blooms Today</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 3, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Partial credit card data, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MarketMoveis?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">M</span>Market Moveis</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 1, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lookiero?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">L</span>Lookiero</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Sport2000?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">S</span>Sport 2000</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 28, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Phone numbers, Physical addresses, Purchases, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Traderie?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">T</span>Traderie</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 25, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tracki?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">T</span>Tracki</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 19, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ExploreTalentAug2024?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">E</span>Explore Talent (August 2024)</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 19, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ChrisLeong?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">C</span>Chris Leong</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 13, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Nationalities, Phone numbers, Physical addresses, Purchases, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LDLC?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">L</span>LDLC</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 13, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NationalPublicData?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">N</span>National Public Data</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 13, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Government issued IDs, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Shadow?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">S</span>Shadow</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 11, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NotSOCRadar?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">N</span>Not SOCRadar</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 9, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ShoeZone?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">S</span>Shoe Zone</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 5, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Partial credit card data, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LuLu?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">L</span>LuLu</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 2, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MultiplayerIt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">M</span>Multiplayer.it</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 1, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TelegramStealerLogs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">S</span>Stealer Logs Posted to Telegram</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 1, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AnimeLeague?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">A</span>AnimeLeague</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 31, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Phone numbers, Private messages, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ubook?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">U</span>Ubook</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Profile photos </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Spytech?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">S</span>Spytech</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browsing histories, Device information, Email addresses, Names, Passwords, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CondoCom?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">C</span>Condo.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 25, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ExploreTalent?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">E</span>Explore Talent (July 2024)</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 25, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Life360?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">L</span>Life360</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 20, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/mSpy2024?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">m</span>mSpy (2024)</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 11, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Photos </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TheHeritageFoundation?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">T</span>The Heritage Foundation</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 10, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NeimanMarcus?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">N</span>Neiman Marcus</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 9, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Partial credit card data, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HuskyOwners?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">H</span>Husky Owners</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 7, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Time zones, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RobloxDeveloperConference2024?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">F</span>FNTECH</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 6, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DateHotBrunettes?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">D</span>Date Hot Brunettes</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 4, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ticketek?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">T</span>Ticketek</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 28, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AdvanceAutoParts?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">A</span>Advance Auto Parts</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 24, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ZadigVoltaire?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">Z</span>Zadig & Voltaire</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 17, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TelegramCombolists?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">C</span>Combolists Posted to Telegram</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 3, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Combolists Posted to Telegram?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">T</span>Telegram Combolists</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 3, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OperationEndgame?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">O</span>Operation Endgame</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/pcTattletale?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">p</span>pcTattletale</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 25, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, SMS messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dota2?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">D</span>Dota2</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 23, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ThePostMillennial?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">T</span>The Post Millennial</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 10, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tappware?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">T</span>Tappware</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 9, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Government issued IDs, Job titles, Names, Phone numbers, Physical addresses, Religions </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MovieBoxPro?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">M</span>MovieBoxPro</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 30, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PipingRock?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">P</span>Piping Rock</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 26, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/T2?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">T</span>T2</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 22, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LeSlipFrancais?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">L</span>Le Slip Français</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 18, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GiantTiger?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">G</span>Giant Tiger</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 12, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SalvadoranCitizens?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">S</span>Salvadoran Citizens</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 10, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Government issued IDs, Names, Phone numbers, Physical addresses, Profile photos </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KasperskyClub?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">K</span>Kaspersky Club</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 9, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/boAt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">b</span>boAt</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 8, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SurveyLama?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">S</span>SurveyLama</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 2, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Pandabuy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">P</span>Pandabuy</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 1, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WashingtonStateFoodWorkerCard?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">W</span>Washington State Food Worker Card</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 31, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Driver’s licenses, Email addresses, Geographic locations, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ECB?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">E</span>England Cricket</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 29, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Exvagos?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">E</span>Exvagos</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 28, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GSMHosting?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">G</span>GSM Hosting</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 27, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SwordFantasy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">S</span>SwordFantasy</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 26, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MediaWorks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">M</span>MediaWorks</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 22, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AllegedATT?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">A</span>AT&T</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 19, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Government issued IDs, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ClickASnap?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">C</span>ClickASnap</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 13, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Physical addresses, Purchases, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Flipkart?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">M</span>Misattributed Flipkart Data</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 12, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Habibs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">M</span>Misattributed Habib's Data</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 10, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/APKTW?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">A</span>APK.TW</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OnlineTrade?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">O</span>Online Trade (Онлайн Трейд)</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 7, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WoTLabs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">W</span>WoTLabs</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 7, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Time zones, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MrGreenGaming?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">M</span>Mr. Green Gaming</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, IP addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CutoutPro?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">C</span>Cutout.Pro</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 28, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tangerine?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">T</span>Tangerine</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 28, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FacebookMarketplace?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">F</span>Facebook Marketplace</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 22, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Spoutible?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">S</span>Spoutible</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 5, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MyPertamina?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">M</span>MyPertamina</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 27, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Trello?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">T</span>Trello</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 22, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NazApi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">N</span>Naz.API</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 17, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Hathway?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">H</span>Hathway</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 12, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Salutations, Support tickets </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LegendasTV?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">L</span>Legendas.TV</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 4, 2024 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DCHealth?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">D</span>DC Health Link</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 14, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Citizenship statuses, Dates of birth, Email addresses, Employers, Ethnicities, Genders, Names, Phone numbers, Physical addresses, Purchases, Social security numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/InflateVids?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">I</span>InflateVids</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 12, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Kaneva?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">K</span>Kaneva</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 9, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gemplex?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">G</span>Gemplex</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 9, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MovieForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">M</span>Movie Forums</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 8, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JoyGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">J</span>JoyGames</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 7, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RailYatri?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">R</span>RailYatri</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 5, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Phone numbers, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SoarGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">S</span>SoarGames</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 3, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GoNinja?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">G</span>Go Ninja</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 30, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EstanteVirtual?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">E</span>Estante Virtual</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 29, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BleachAnime?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">B</span>Bleach Anime Forum</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 29, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/IndiHome?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">I</span>IndiHome</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 27, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, Genders, Geographic locations, IP addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JamTangan?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">J</span>Jam Tangan</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 27, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KitchenPal?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">K</span>KitchenPal</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 24, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Physical attributes, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OMGPOP?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">O</span>OMGPOP</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 20, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Acuity?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">A</span>Acuity</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 15, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Avito?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">A</span>Avito</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 14, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, IP addresses, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Chess?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">C</span>Chess</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 10, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LinkedInScrape2023?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">L</span>LinkedIn Scraped and Faked Data (2023)</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, Job titles, Names, Professional skills, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GamingMonk?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">G</span>GamingMonk</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 5, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Fitmart?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">F</span>Fitmart</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 3, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GameSprite?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">G</span>GameSprite</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 30, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MemeChat?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">M</span>MemeChat</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 29, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Toumei?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">T</span>Toumei</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 27, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tunngle?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">T</span>Tunngle</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 21, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Sphero?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">S</span>Sphero</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 20, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Names, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AndroidLista?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">A</span>AndroidLista</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 17, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Phoenix?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">P</span>Phoenix</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 17, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BVD?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">P</span>Public Business Data</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 9, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PaySystemTech?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">P</span>PaySystem.tech</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 8, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit cards, Email addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Hjedd?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">H</span>Hjedd</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 5, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Activision?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">A</span>Activision</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 3, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Job titles, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HorseIsle?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">H</span>Horse Isle</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 2, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Names, Passwords, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ApexSMS?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">A</span>ApexSMS</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 21, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, IP addresses, Names, Phone numbers, Telecommunications carriers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/dBforums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">d</span>dBforums</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 20, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MalindoAir?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">M</span>MalindoAir</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 14, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Loyalty program details, Names, Nationalities, Passport numbers, Phone numbers, Physical addresses, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VivaAir?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">V</span>Viva Air</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 11, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Partial credit card data, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dymocks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">D</span>Dymocks</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 8, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CERTPolandPhish?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">P</span>Phished Data via CERT Poland</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 31, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Pampling?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">P</span>Pampling</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 31, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PlayCyberGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">P</span>PlayCyberGames</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 31, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Qakbot?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">Q</span>Qakbot</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 29, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SevenRooms?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">S</span>SevenRooms</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 24, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Duolingo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">D</span>Duolingo</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 23, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Spoken languages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Atmeltomo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">A</span>Atmeltomo</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 22, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ECCIE?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">E</span>ECCIE</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 21, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/iMenu360?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">i</span>iMenu360</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 17, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ManipulatedCaiman?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">M</span>Manipulated Caiman</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 15, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Jobzone?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">J</span>Jobzone</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 15, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Family members’ names, Genders, Government issued IDs, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Rightbiz?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">R</span>Rightbiz</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 10, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CraftRise?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">C</span>CraftRise</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 8, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MagicDuel?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">M</span>MagicDuel</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 2, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Nicknames, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BreachForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">B</span>BreachForums</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 26, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BookCrossing?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">B</span>BookCrossing</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 25, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tigo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">T</span>Tigo</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 24, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, Genders, Geographic locations, IP addresses, Names, Private messages, Profile photos, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Roblox?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">R</span>Roblox</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 23, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Email addresses, IP addresses, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RobloxDeveloperConference?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">R</span>Roblox Developer Conference (2023)</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 18, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Clothing sizes, Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Vermillion?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">V</span>Vermillion</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 11, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Locally?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">L</span>Locally</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 10, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Partial credit card data, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BreachForumsClone?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">B</span>BreachForums Clone</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 25, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zacks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">Z</span>Zacks</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 10, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JDGroup?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">J</span>JD Group</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 5, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Government issued IDs, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RaidForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">R</span>RaidForums</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 31, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PolishCredentials?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">P</span>Polish Credentials</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 30, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Luxottica?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">L</span>Luxottica</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 19, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RentoMojo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">R</span>RentoMojo</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 10, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Government issued IDs, Names, Passport numbers, Passwords, Phone numbers, Purchases, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CityJerks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">C</span>CityJerks</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 27, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Private messages, Profile photos, Sexual orientations, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MEO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">M</span>MEO</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 24, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Terravision?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">T</span>Terravision</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 23, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OGUsers2022?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">O</span>OGUsers (2022 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 14, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KodiFoundation?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">T</span>The Kodi Foundation</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 13, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Dates of birth, Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GenesisMarket?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">G</span>Genesis Market</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 5, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Credit card CVV, Credit cards, Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SundryFiles?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">S</span>Sundry Files</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 31, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LeakedReality?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">L</span>Leaked Reality</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 31, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TheGradCafe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">T</span>TheGradCafe</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 24, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ShopperPlus?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">S</span>Shopper+</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 11, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses, Spoken languages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HDBFinancialServices?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">H</span>HDB Financial Services</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 11, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Loan information, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Eye4Fraud?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">E</span>Eye4Fraud</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 6, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/iDTech?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">i</span>iD Tech</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 6, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LBB?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">L</span>LBB</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 5, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GunAuction?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">G</span>GunAuction.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 2, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, Genders, IP addresses, Partial credit card data, Partial dates of birth, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Convex?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">C</span>Convex</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 26, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RealDudesInc?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">R</span>RealDudesInc</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 19, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Weee?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">W</span>Weee</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 8, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Delivery instructions, Email addresses, Names, Phone numbers, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LimeVPN?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">L</span>LimeVPN</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 6, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TruthFinder?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">T</span>Truth Finder</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 4, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/InstantCheckmate?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">I</span>Instant Checkmate</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 4, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SchoolDistrict42?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">S</span>School District 42</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 2, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PlanetIce?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">P</span>Planet Ice</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 31, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KomplettFritid?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">K</span>KomplettFritid</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 23, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Autotrader?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">A</span>Autotrader</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 23, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Phone numbers, Physical addresses, Vehicle details, Vehicle identification numbers (VINs) </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zurich?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">Z</span>Zurich</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 22, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Vehicle details </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DoorDash?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">D</span>DoorDash</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 7, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Partial credit card data </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SlideTeam?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">S</span>SlideTeam</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 7, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Twitter200M?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">T</span>Twitter (200M)</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 5, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Deezer?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">D</span>Deezer</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 2, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Spoken languages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Benchmark?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">B</span>Benchmark</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 1, 2023 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gemini?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">G</span>Gemini</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Partial phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CoinTracker?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">C</span>CoinTracker</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 12, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Partial phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Abandonia2022?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">A</span>Abandonia (2022)</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 7, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NotAcxiom?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">N</span>Not Acxiom</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 22, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GetRevengeOnYourEx?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">G</span>Get Revenge On Your Ex</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 15, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GGCorp?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">G</span>GGCorp</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 8, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lolzteam?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">L</span>Lolzteam</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 6, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Doomworld?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">D</span>Doomworld</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 24, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EPal?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">E</span>E-Pal</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 24, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Wakanim?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">W</span>Wakanim</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Names, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bhinneka?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">B</span>Bhinneka</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TAPAirPortugal?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">T</span>TAP Air Portugal</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 23, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Nationalities, Phone numbers, Physical addresses, Salutations, Spoken languages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BrandNewTube?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">B</span>Brand New Tube</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 8, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Stripchat?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">S</span>Stripchat</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 31, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Start?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">S</span>START</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 30, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Banorte?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">B</span>Banorte</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 18, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Email addresses, Genders, Government issued IDs, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SitePoint?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">S</span>SitePoint</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 17, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Email addresses, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Shitexpress?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">S</span>Shitexpress</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Physical addresses, Private messages, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Twitter?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">T</span>Twitter</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 13, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Email addresses, Geographic locations, Names, Phone numbers, Profile photos, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/QuestionPro?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">Q</span>QuestionPro</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 5, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Survey results </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TunedGlobal?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">T</span>Tuned Global</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 3, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MechoDownload?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">M</span>Mecho Download</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 2, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Battlefy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">B</span>Battlefy</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 29, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Paytm?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">P</span>Paytm</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 26, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Income levels, Names, Phone numbers, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Shadi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">S</span>Shadi.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 20, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PPCGeeks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">P</span>PPCGeeks</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 18, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JukinMedia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">J</span>JukinMedia</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 17, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, IP addresses, Names, Occupations, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Famm?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">F</span>Famm</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Eskimi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">E</span>Eskimi</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LaPosteMobile?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">L</span>La Poste Mobile</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 14, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bank account numbers, Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Mangatoon?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">M</span>Mangatoon</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 6, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Avatars, Email addresses, Genders, Names, Passwords, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CapialEconomics?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">C</span>Capital Economics</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 4, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bookchor?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">B</span>Bookchor</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 3, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BourseDesVols?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">B</span>Bourse des Vols</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 3, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Flights taken, IP addresses, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DivXSubTitles?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">D</span>DivX SubTitles</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 14, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CTARS?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">C</span>CTARS</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 31, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Personal health data, Phone numbers, Physical addresses, Salutations, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Adecco?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">A</span>Adecco</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 31, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, Marital statuses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MGM2022Update?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">M</span>MGM Resorts (2022 Update)</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 29, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PreenMe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">P</span>Preen.Me</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 26, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AmartFurniture?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">A</span>Amart Furniture</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 25, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Wendys?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">W</span>Wendy's</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 24, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Education levels, Email addresses, IP addresses, Job applications, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SirHurt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">S</span>SirHurt</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 24, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Fanpass?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">F</span>Fanpass</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 24, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Partial dates of birth, Passwords, Phone numbers, Physical addresses, Purchases, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ReadNovel?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">R</span>Read Novel</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BlackBerryFans?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">B</span>BlackBerry Fans</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OGUsers2021?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">O</span>OGUsers (2021 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ParagonCheats?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">P</span>Paragon Cheats</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 14, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PayHere?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">P</span>PayHere</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 2, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Partial credit card data, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Aimware?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">A</span>Aimware</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 2, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DevilTorrents?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">D</span>Devil-Torrents.pl</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 1, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Avvo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">A</span>Avvo</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 15, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Travelio?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">T</span>Travelio</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 8, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RoyalEnfield?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">R</span>Royal Enfield</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 31, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Social media profiles, Vehicle details </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ZAPHosting?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">Z</span>ZAP-Hosting</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 19, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Chat logs, Email addresses, IP addresses, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CDEK?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">C</span>CDEK</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 17, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Robinhood?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">R</span>Robinhood</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MacGeneration?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">M</span>MacGeneration</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NVIDIA?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">N</span>NVIDIA</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 2, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GiveSendGo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">G</span>GiveSendGo</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 15, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RedDoorz?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">R</span>RedDoorz</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 28, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Occupations, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BTCAlpha?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">B</span>BTC-Alpha</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 27, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ShockGore?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">S</span>ShockGore</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 20, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OpenSubtitles?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">O</span>Open Subtitles</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 19, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Upstox?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">U</span>Upstox</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 19, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bank account numbers, Dates of birth, Email addresses, Family members’ names, Genders, Government issued IDs, Income levels, Marital statuses, Nationalities, Occupations, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CardingMafiaDec2021?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">C</span>Carding Mafia (December 2021)</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 16, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ABFRL?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">A</span>Aditya Birla Fashion and Retail</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 15, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Income levels, Job titles, Marital statuses, Names, Passwords, Phone numbers, Physical addresses, Purchases, Religions, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GunsDotCom?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">G</span>Guns.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 13, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Doxbin?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">D</span>Doxbin</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 8, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FlexBooker?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">F</span>FlexBooker</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 6, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Partial credit card data, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DatPiff?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">D</span>DatPiff</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 4, 2022 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Security questions and answers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RedLineStealer?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">R</span>RedLine Stealer</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 30, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Protemps?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">P</span>Protemps</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 20, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Job applications, Marital statuses, Names, Nationalities, Passport numbers, Passwords, Phone numbers, Physical addresses, Religions, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gravatar?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">G</span>Gravatar</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 5, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/IDCGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">I</span>IDC Games</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 17, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DucksUnlimited?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">D</span>Ducks Unlimited</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 16, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ActMobile?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">A</span>ActMobile</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 9, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CyberServe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">C</span>CyberServe</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 4, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Drinking habits, Email addresses, Family structure, Genders, Geographic locations, HIV statuses, IP addresses, Names, Passwords, Personal health data, Phone numbers, Physical attributes, Private messages, Profile photos, Religions, Sexual orientations, Smoking habits, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CoinMarketCap?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">C</span>CoinMarketCap</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 22, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Thingiverse?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">T</span>Thingiverse</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 14, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Playbook?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">P</span>Playbook</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 11, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Job titles, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FantasyFootballHub?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">F</span>Fantasy Football Hub</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 7, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RepublicanPartyOfTexas?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">R</span>Republican Party of Texas</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, Geographic locations, IP addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LinkedInScrape?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">L</span>LinkedIn Scraped Data (2021)</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 2, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Education levels, Email addresses, Genders, Geographic locations, Job titles, Names, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ajarn?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">A</span>Ajarn</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 26, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Education levels, Email addresses, Genders, Geographic locations, Job applications, Marital statuses, Names, Nationalities, Passwords, Phone numbers, Profile photos </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Epik?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">E</span>Epik</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 19, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/IndiaMART?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">I</span>IndiaMART</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 27, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Imavex?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">I</span>Imavex</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 26, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SubaGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">S</span>SubaGames</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 25, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Eatigo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">E</span>Eatigo</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 25, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OrderSnapp?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">O</span>OrderSnapp</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 8, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MMGFusion?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">M</span>MMG Fusion</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 7, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Appointments, Dates of birth, Email addresses, Genders, Marital statuses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Audi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">A</span>Audi</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Driver’s licenses, Email addresses, Names, Phone numbers, Physical addresses, Social security numbers, Vehicle details </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Guntrader?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">G</span>Guntrader</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 21, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, Geographic locations, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ShortEdition?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">S</span>Short Édition</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 19, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Vastaamo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">V</span>Vastaamo</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 17, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Personal health data, Social security numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Raychat?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">R</span>Raychat</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 4, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Teespring?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">T</span>Teespring</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 25, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/YoteprestoCom?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">y</span>yotepresto.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 25, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/UC?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">U</span>University of California</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 20, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Education levels, Email addresses, Ethnicities, Genders, Job titles, Names, Phone numbers, Physical addresses, Social security numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Fotolog?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">F</span>Fotolog</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 15, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NamelessMalware?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">N</span>Nameless Malware</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 9, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DominosIndia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">D</span>Domino's India</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 3, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JD?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">J</span>JD</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 2, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MobiFriends?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">M</span>MobiFriends</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Moneycontrol?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">M</span>Moneycontrol</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 22, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Yam?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">Y</span>Yam</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 22, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Livpure?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">L</span>Livpure</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 22, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses, Purchases, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DailyQuiz?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">D</span>Daily Quiz</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 21, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/IIMJobs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">I</span>IIMJobs</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 21, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, IP addresses, Job applications, Job titles, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WedMeGood?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">W</span>WedMeGood</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 13, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DriveSure?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">D</span>DriveSure</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 10, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses, Vehicle details </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ParkMobile?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">P</span>ParkMobile</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 30, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, License Plates, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Descomplica?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">D</span>Descomplica</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 28, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Partial credit card data, Passwords, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Jefit?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">J</span>Jefit</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 27, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Emotet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">E</span>Emotet</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 26, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/bigbasket?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">b</span>bigbasket</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 26, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MangaDex?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">M</span>MangaDex</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 25, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ShopBack?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">S</span>ShopBack</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 25, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ClearVoiceSurveys?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">C</span>ClearVoice Surveys</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PhoneHouse?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">P</span>Phone House España</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 22, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Nationalities, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Facebook?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">F</span>Facebook</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 4, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Employers, Genders, Geographic locations, Names, Phone numbers, Relationship statuses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Astoria?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">U</span>Unverified Data Source</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 24, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bank account numbers, Credit status information, Dates of birth, Email addresses, Employers, Health insurance information, Income levels, IP addresses, Names, Personal health data, Phone numbers, Physical addresses, Smoking habits, Social security numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CardingMafia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">C</span>Carding Mafia (March 2021)</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WeLeakInfo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">W</span>WeLeakInfo</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 15, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, Employers, IP addresses, Names, Partial credit card data, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Liker?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">L</span>Liker</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 13, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Dates of birth, Education levels, Email addresses, Geographic locations, IP addresses, Names, Passwords, Phone numbers, Private messages, Security questions and answers, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TravelOK?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">T</span>Travel Oklahoma</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 10, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Age groups, Dates of birth, Email addresses, Genders, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gab?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">G</span>Gab</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Avatars, Email addresses, Names, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Oxfam?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">O</span>Oxfam</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 2, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bank account numbers, Dates of birth, Email addresses, Genders, Names, Partial credit card data, Payment histories, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ticketcounter?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">T</span>Ticketcounter</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 1, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bank account numbers, Dates of birth, Email addresses, Genders, IP addresses, Names, Payment histories, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SuperVPNGeckoVPN?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">S</span>SuperVPN & GeckoVPN</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 28, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Device serial numbers, Email addresses, Geographic locations, IMSI numbers, Login histories </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FilmaiIn?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">F</span>Filmai.in</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NurseryCam?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">N</span>NurseryCam</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PeoplesEnergy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">P</span>People's Energy</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NetGalley?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">N</span>NetGalley</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CityBee?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">C</span>CityBee</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 17, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Government issued IDs, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gett?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">G</span>Ge.tt</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 16, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StoryBird?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">S</span>StoryBird</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 2, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Pixlr?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">P</span>Pixlr</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 1, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MeetMindful?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">M</span>MeetMindful</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 31, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Drinking habits, Drug habits, Email addresses, Genders, Geographic locations, IP addresses, Marital statuses, Names, Passwords, Physical attributes, Religions, Sexual orientations, Smoking habits, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bonobos?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">B</span>Bonobos</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 31, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Historical passwords, IP addresses, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Nitro?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">N</span>Nitro</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 19, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Romwe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">R</span>Romwe</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 18, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Geographic locations, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JobAndTalent?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">J</span>Jobandtalent</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 17, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Glofox?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">G</span>Glofox</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 10, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GeniusU?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">G</span>GeniusU</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 8, 2021 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Names, Passwords, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ledger?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">L</span>Ledger</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 20, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Peatix?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">P</span>Peatix</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 6, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PlutoTV?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">P</span>Pluto TV</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 5, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Device information, Email addresses, Genders, IP addresses, Names, Passwords, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Cit0day?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">C</span>Cit0day</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 19, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/123RF?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">1</span>123RF</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 15, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HomeChef?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">H</span>Home Chef</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 13, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, IP addresses, Names, Partial credit card data, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AnimalJam?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">A</span>Animal Jam</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 12, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Mashable?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">M</span>Mashable</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 10, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Email addresses, Genders, Geographic locations, IP addresses, Names, Partial dates of birth, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lazada?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">L</span>Lazada RedMart</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 10, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/James?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">J</span>James</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 5, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Wongnai?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">W</span>Wongnai</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 4, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, IP addresses, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Minted?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">M</span>Minted</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 3, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Promofarma?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">P</span>Promofarma</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 1, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StarTribune?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">S</span>StarTribune</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 30, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Reincubate?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">R</span>Reincubate</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 29, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Chowbus?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">C</span>Chowbus</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WiziShop?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">W</span>WiziShop</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 5, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Experian2020?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">E</span>Experian (South Africa)</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 1, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Government issued IDs, Names, Occupations, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LiveAuctioneers?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">L</span>LiveAuctioneers</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 22, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/UnicoCampania?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">U</span>Unico Campania</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 19, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/UtahGunExchange?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">U</span>Utah Gun Exchange</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 19, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Catho?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">C</span>Catho</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 18, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Sonicbids?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">S</span>Sonicbids</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 18, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zoosk2020?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">Z</span>Zoosk (2020)</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 7, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Drinking habits, Education levels, Email addresses, Ethnicities, Family structure, Genders, Geographic locations, Income levels, Names, Nicknames, Physical attributes, Political views, Relationship statuses, Religions, Sexual orientations, Smoking habits </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ProctorU?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">P</span>ProctorU</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 6, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Kreditplus?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">K</span>Kreditplus</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 3, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Employers, Family structure, Genders, Income levels, Living costs, Marital statuses, Mothers maiden names, Names, Phone numbers, Physical addresses, Places of birth, Religions, Spouses names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TrueFire?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">T</span>TrueFire</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 2, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DecoratingTheHouse?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">집</span>집꾸미기</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 2, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Vakinha?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">V</span>Vakinha</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 1, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Havenly?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">H</span>Havenly</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 1, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Swvl?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">S</span>Swvl</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 31, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Partial credit card data, Passwords, Phone numbers, Profile photos </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Appen?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">A</span>Appen</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 30, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, IP addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Scentbird?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">S</span>Scentbird</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 30, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Password strengths, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Chatbooks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">C</span>Chatbooks</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 29, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dunzo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">D</span>Dunzo</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 29, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, Geographic locations, IP addresses, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Drizly?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">D</span>Drizly</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 28, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Hurb?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">H</span>Hurb</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 27, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dave?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">D</span>Dave</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 27, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Social security numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Promo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">P</span>Promo</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 26, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Wattpad?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">W</span>Wattpad</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 19, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Social media profiles, User website URLs, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Quidd?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">Q</span>Quidd</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 24, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Foodora?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">F</span>Foodora</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 16, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Mathway?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">M</span>Mathway</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 5, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, Names, Passwords, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zoomcar?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">Z</span>Zoomcar</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 5, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LeadHunter?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">L</span>Lead Hunter</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 3, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Wishbone2020?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">W</span>Wishbone (2020)</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 28, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Phone numbers, Profile photos, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LiveJournal?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">L</span>LiveJournal</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 26, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PetFlow?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">P</span>PetFlow</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 26, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Artsy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">A</span>Artsy</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 25, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lifebear?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">L</span>Lifebear</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 25, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NulledCH?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">N</span>Nulled.ch</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 24, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/db8151dd?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">C</span>Covve</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 15, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Job titles, Names, Phone numbers, Physical addresses, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ulmon?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">U</span>Ulmon</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 8, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Email addresses, Names, Passwords, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Elanic?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">E</span>Elanic</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 4, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TaiLieu?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">T</span>TaiLieu</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 3, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tokopedia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">T</span>Tokopedia</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 2, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Vianet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">V</span>Vianet</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 22, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Aptoide?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">A</span>Aptoide</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 19, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HTCMania?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">H</span>HTC Mania</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 6, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Historical passwords, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OGUsers2020?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">O</span>OGUsers (2020 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 4, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DuelingNetwork?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">D</span>Dueling Network</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 30, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tamodo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">T</span>Tamodo</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 24, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PropTiger?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">P</span>PropTiger</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 24, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Device information, Email addresses, Genders, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HalloweenSpot?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">T</span>The Halloween Spot</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 16, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AnimeGame?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">A</span>AnimeGame</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Straffic?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">S</span>Straffic</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 27, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Slickwraps?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">S</span>Slickwraps</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 22, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MGM?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">M</span>MGM Resorts</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 20, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AdultFriendFinder2016?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">A</span>Adult FriendFinder (2016)</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 6, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Spoken languages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DailyObjects?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">D</span>DailyObjects</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 28, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tout?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">T</span>Tout</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 25, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EuropaJobs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">e</span>europa.jobs</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 15, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Job applications, Names, Passwords, Phone numbers, Spoken languages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PlanetCalypso?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">P</span>Planet Calypso</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 12, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BtoBet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">B</span>BtoBet</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 11, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Financial transactions, Geographic locations, IP addresses, Names, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GoGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">G</span>Go Games</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 11, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/IndianRailways?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">I</span>Indian Railways</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 10, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Universarium?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">U</span>Universarium</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 3, 2020 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Factual?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">F</span>Factual</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 24, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zynga?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">Z</span>Zynga</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AgusiQTorrents?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">A</span>AgusiQ-Torrents.pl</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 4, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PDL?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">D</span>Data Enrichment Exposure From PDL Customer</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 22, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GateHub?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">G</span>GateHub</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 20, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Encrypted keys, Mnemonic phrases, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EpicBot?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">E</span>EpicBot</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GPSUnderground?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">G</span>GPS Underground</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ToonDoo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">T</span>ToonDoo</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 11, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Vedantu?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">V</span>Vedantu</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 1, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Spoken languages, Time zones, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HookersNL?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">H</span>Hookers.nl</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 23, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zooville?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">Z</span>Zooville</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StreetEasy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">S</span>StreetEasy</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Sephora?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">S</span>Sephora</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Ethnicities, Genders, Names, Physical attributes </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Wanelo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">W</span>Wanelo</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 30, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LuminPDF?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">L</span>Lumin PDF</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 18, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Email addresses, Genders, Names, Passwords, Spoken languages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KiwiFarms?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">K</span>KiwiFarms</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 17, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Avatars, Dates of birth, Email addresses, IP addresses, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Minehut?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">M</span>Minehut</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 17, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VoidTO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">V</span>Void.to</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 11, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Poshmark?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">P</span>Poshmark</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 2, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MastercardPricelessSpecials?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">M</span>Mastercard Priceless Specials</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 1, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Partial credit card data, Phone numbers, Salutations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/XKCD?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">X</span>XKCD</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 1, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Coinmama?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">C</span>Coinmama</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 30, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Chegg?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">C</span>Chegg</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 16, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CrackedTO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">C</span>Cracked.to</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 12, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StockX?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">S</span>StockX</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 10, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Physical addresses, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Canva?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">C</span>Canva</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 9, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CafePress?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">C</span>CafePress</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 5, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ClubPenguinRewrittenJul2019?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">C</span>Club Penguin Rewritten (July 2019)</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 30, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AnimePlanet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">A</span>Anime-Planet</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 28, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EpicNPC?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">E</span>EpicNPC</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 27, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ClashOfKings?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">C</span>Clash of Kings</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 27, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Snail?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">S</span>Snail</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 27, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Xiaomi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">X</span>Xiaomi</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 21, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FlashFlashRevolution2019?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">F</span>Flash Flash Revolution (2019 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 21, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StrongholdKingdoms?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">S</span>Stronghold Kingdoms</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 21, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GameSalad?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">G</span>GameSalad</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 21, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ArmorGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">A</span>Armor Games</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 20, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Roll20?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">R</span>Roll20</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Partial credit card data, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Artvalue?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">A</span>Artvalue</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Salutations, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EatStreet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">E</span>EatStreet</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BulgarianNationalRevenueAgency?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">B</span>Bulgarian National Revenue Agency</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 18, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses, Taxation records </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/YouNow?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">Y</span>YouNow</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 18, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Animoto?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">A</span>Animoto</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 18, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BlackSpigotMC?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">B</span>BlackSpigotMC</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 17, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SHEIN?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">S</span>SHEIN</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 17, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/piZap?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">p</span>piZap</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 16, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, Names, Passwords, Social media profiles, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Netlog?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">N</span>Netlog</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 15, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Evite?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">E</span>Evite</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 14, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MindJolt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">M</span>Mindjolt</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 13, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zhenai?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">Z</span>Zhenai.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 11, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WienerBuchereien?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">W</span>Wiener Büchereien</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 28, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SocialEngineered?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">S</span>Social Engineered</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 23, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/D3scene?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">D</span>D3Scene</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 15, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Emuparadise?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">E</span>Emuparadise</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 9, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OrdineAvvocatiDiRoma?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">O</span>Ordine Avvocati di Roma</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 26, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages, Geographic locations, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OGUsers?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">O</span>OGUsers (2019 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 19, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Appartoo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">A</span>Appartoo</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 2, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Ages, Auth tokens, Email addresses, Employment statuses, Genders, IP addresses, Marital statuses, Names, Passwords, Physical addresses, Private messages, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ClubPenguinRewritten?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">C</span>Club Penguin Rewritten (January 2018)</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 23, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MoreleNet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">M</span>Morele.net</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 20, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bukalapak?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">B</span>Bukalapak</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 18, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DataCamp?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">D</span>DataCamp</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 9, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Knuddels?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">K</span>Knuddels</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 8, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DemonForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">D</span>Demon Forums</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 4, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EverybodyEdits?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">E</span>Everybody Edits</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 3, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Intelimost?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">I</span>Intelimost</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 2, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Whitepages?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">W</span>Whitepages</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 27, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/500px?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">5</span>500px</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 25, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bookmate?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">B</span>Bookmate</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 22, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HauteLook?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">H</span>HauteLook</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 21, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/8fit?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">8</span>8fit</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 21, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ixigo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">i</span>ixigo</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 17, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Device information, Email addresses, Genders, Names, Passwords, Phone numbers, Salutations, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Houzz?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">H</span>Houzz</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 12, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, IP addresses, Names, Passwords, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VerificationsIO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">V</span>Verifications.io</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ShareThis?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">S</span>ShareThis</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dubsmash?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">D</span>Dubsmash</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 25, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Passwords, Phone numbers, Spoken languages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MyFitnessPal?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">M</span>MyFitnessPal</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 21, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MyHeritage?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">M</span>MyHeritage</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 20, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EyeEm?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">E</span>EyeEm</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 16, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bios, Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/devkitPro?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">d</span>devkitPro</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 11, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Private messages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Collection1?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">C</span>Collection #1</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 16, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FaceUP?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">F</span>FaceUP</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 13, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dangdang?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">D</span>Dangdang</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 10, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BannerBit?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">B</span>BannerBit</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 8, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BlankMediaGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">B</span>BlankMediaGames</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 2, 2019 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Passwords, Purchases, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GoldSilver?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">G</span>GoldSilver</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 27, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bank account numbers, Email addresses, IP addresses, Names, Partial credit card data, Passport numbers, Phone numbers, Physical addresses, Purchases, Security questions and answers, Social security numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Mappery?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">M</span>Mappery</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 18, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BombujEu?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">B</span>Bombuj.eu</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 10, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Hub4Tech?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">H</span>Hub4Tech</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 9, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/YouveBeenScraped?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">Y</span>You've Been Scraped</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 6, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Geographic locations, Job titles, Names, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AerServ?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">A</span>AerServ</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 6, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ForumCommunity?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">F</span>ForumCommunity</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 5, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Technic?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">T</span>Technic</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 4, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Chat logs, Email addresses, IP addresses, Passwords, Private messages, Time zones </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DataAndLeads?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">D</span>Data & Leads</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 28, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, IP addresses, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Adapt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">A</span>Adapt</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 22, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HTHStudios?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">H</span>HTH Studios</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 20, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ElasticsearchSalesLeads?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">E</span>Elasticsearch Instance of Sales Leads on AWS</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 17, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KnownCircle?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">K</span>KnownCircle</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 17, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages, Genders, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RbxRocks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">R</span>Rbx.Rocks</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SIAE?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">S</span>Società Italiana degli Autori ed Editori</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WPSandbox?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">W</span>WPSandbox</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 6, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JoomlArt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">J</span>JoomlArt</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 1, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Payment histories, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MacForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">M</span>Mac Forums</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 29, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BabyNames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">B</span>Baby Names</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 24, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WifeLovers?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">W</span>Wife Lovers</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 20, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Facepunch?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">F</span>Facepunch</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 17, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Apollo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">A</span>Apollo</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 5, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Salutations, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Digimon?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">D</span>Digimon</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 28, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages, IP addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SaverSpy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">S</span>SaverSpy</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 25, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RealEstateMogul?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">R</span>Real Estate Mogul</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 24, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NemoWeb?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">N</span>NemoWeb</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 19, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KayoMoe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">K</span>Kayo.moe Credential Stuffing List</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 13, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RussianAmerica?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">R</span>Russian America</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 13, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FreshMenu?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">F</span>FreshMenu</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 10, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, Names, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NapsGear?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">N</span>NapsGear</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 10, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Warmane?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">W</span>Warmane</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 8, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MortalOnline?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">M</span>Mortal Online</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 31, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SvenskaMagic?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">S</span>SvenskaMagic</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 30, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AtlasQuantum?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">A</span>Atlas Quantum</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 27, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Email addresses, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SpyFone?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">S</span>SpyFone</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 24, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Audio recordings, Browsing histories, Device information, Email addresses, Geographic locations, IMEI numbers, IP addresses, Names, Passwords, Photos, SMS messages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MyFHA?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">M</span>MyFHA</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 9, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit status information, Email addresses, Income levels, IP addresses, Loan information, Names, Passwords, Personal descriptions, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lanwar?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">L</span>Lanwar</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 8, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AdultFanFiction?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">A</span>Adult-FanFiction.Org</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 6, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WhiteRoom?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">F</span>Fashion Nexus</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 31, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LeagueOfLegends?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">L</span>League of Legends</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 28, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Exactis?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">E</span>Exactis</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 25, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit status information, Dates of birth, Education levels, Email addresses, Ethnicities, Family structure, Financial investments, Genders, Home ownership statuses, Income levels, IP addresses, Marital statuses, Names, Net worths, Occupations, Personal interests, Phone numbers, Physical addresses, Religions, Spoken languages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FunnyGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">F</span>Funny Games</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 24, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Pemiblanc?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">P</span>Pemiblanc</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 9, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Yatra?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">Y</span>Yatra</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 4, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, PINs </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LightsHope?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">L</span>Light's Hope</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 4, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gaadi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">G</span>Gaadi</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 1, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TrikSpamBotnet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">T</span>Trik Spam Botnet</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 14, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Estonia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">E</span>Estonian Citizens (via Estonian Cybercrime Bureau)</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 11, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Creative?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">C</span>Creative</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 7, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LinuxForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">L</span>Linux Forums</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 7, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ticketfly?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">T</span>Ticketfly</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 3, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ViewFines?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">V</span>ViewFines</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 24, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Government issued IDs, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VNG?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">V</span>VNG</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 28, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Marital statuses, Names, Occupations, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/17173?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">1</span>17173</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 28, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TGBUS?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">T</span>TGBUS</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 28, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ILikeCheats?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">I</span>ILikeCheats</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 22, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CashCrate?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">C</span>CashCrate</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 20, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Taringa?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">T</span>Taringa</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 19, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Smogon?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">S</span>Smogon</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 11, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HIAPK?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">H</span>HiAPK</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 1, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bestialitysextaboo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">B</span>Bestialitysextaboo</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 29, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MDPI?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">M</span>MDPI</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 25, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages, IP addresses, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FLVS?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">F</span>Florida Virtual School</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 18, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, School grades (class levels), Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MangaFox?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">M</span>MangaFox.me</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 17, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/xHamster?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">x</span>xHamster</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 8, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/2844Breaches?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">2</span>2,844 Separate Data Breaches</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 26, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/UnderworldEmpire?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">U</span>Underworld Empire</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 19, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/8tracks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">8</span>8tracks</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 16, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Playgar?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">G</span>Guns and Robots</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 14, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Autocentrum?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">A</span>Autocentrum.pl</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 9, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TheTVDB?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">T</span>TheTVDB.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 29, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TheFlyOnTheWall?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">T</span>The Fly on the Wall</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 15, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Age groups, Credit cards, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Purchases, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LyricsMania?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">L</span>Lyrics Mania</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 15, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OpenCSGO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">O</span>Open CS:GO</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 15, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Avatars, Email addresses, IP addresses, Phone numbers, Physical addresses, Purchases, Social media profiles, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/2fast4u?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">2</span>2fast4u</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 7, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HoundDawgs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">H</span>HoundDawgs</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 3, 2018 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ancestry?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">A</span>Ancestry</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 24, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CrackingForum?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">C</span>CrackingForum</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 10, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DVDShopCH?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">d</span>dvd-shop.ch</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 10, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Netshoes?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">N</span>Netshoes</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 10, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AIType?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">a</span>ai.type</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 8, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Address book contacts, Apps installed on devices, Cellular network names, Dates of birth, Device information, Email addresses, Genders, Geographic locations, IMEI numbers, IMSI numbers, IP addresses, Names, Phone numbers, Profile photos, Social media profiles </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/imgur?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">i</span>imgur</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 25, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bolt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">B</span>Bolt</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 24, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VTightGel?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">V</span>V-Tight Gel</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 17, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PoliceOne?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">P</span>PoliceOne</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 15, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CouponMomAndArmorGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">C</span>Coupon Mom / Armor Games</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 9, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CafeMom?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">C</span>CafeMom</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 9, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Rankwatch?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">R</span>RankWatch</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 3, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JobStreet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">J</span>JobStreet</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 30, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Government issued IDs, Marital statuses, Names, Nationalities, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Shotbow?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">S</span>Shotbow</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 29, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MasterDeeds?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">M</span>Master Deeds</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 18, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Deceased statuses, Email addresses, Employers, Ethnicities, Genders, Government issued IDs, Home ownership statuses, Job titles, Names, Nationalities, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WeHeartIt?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">W</span>We Heart It</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 14, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DietCom?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">d</span>diet.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 13, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Eating habits, Email addresses, IP addresses, Names, Passwords, Physical attributes, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VictoryPhones?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">V</span>Victory Phones</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 11, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AbuseWithUs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">A</span>AbuseWith.Us</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 9, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Disqus?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">D</span>Disqus</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Kickstarter?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">K</span>Kickstarter</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bitly?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">B</span>Bitly</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 6, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Reverb-Nation?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">R</span>ReverbNation</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 5, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Staminus?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">S</span>Staminus</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 5, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit cards, Email addresses, IP addresses, Passwords, Support tickets, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AKP?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">A</span>AKP Emails</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 1, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/7k7k?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">7</span>7k7k</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 26, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zomato?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">Z</span>Zomato</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 4, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MallCZ?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">M</span>MALL.cz</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 4, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OnlinerSpambot?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">O</span>Onliner Spambot</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 29, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BiohackMe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">B</span>Biohack.me</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 23, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Private messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BinWeevils?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">B</span>Bin Weevils</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 18, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Ages, Email addresses, Genders, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dailymotion?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">D</span>Dailymotion</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 7, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MCBans?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">M</span>MCBans</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 23, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/B2BUSABusinesses?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">B</span>B2B USA Businesses</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 18, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Evermotion?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">E</span>Evermotion</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 2, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ProgrammingForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">P</span>Programming Forums</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 1, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Powerbot?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">P</span>Powerbot</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 1, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/XPGameSaves?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">X</span>XPG</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 1, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Coachella?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">C</span>Coachella</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 27, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VINs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">E</span>Exposed VINs</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 9, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Family structure, Genders, Names, Phone numbers, Physical addresses, Vehicle details </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DataEnrichment?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">D</span>Data Enrichment Records</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 8, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Buying preferences, Charitable donations, Credit status information, Dates of birth, Email addresses, Family structure, Financial investments, Home ownership statuses, Income levels, Job titles, Marital statuses, Names, Net worths, Phone numbers, Physical addresses, Political donations </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Abandonia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">A</span>Abandonia (2015)</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 5, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Edmodo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">E</span>Edmodo</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 1, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DaFont?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">D</span>DaFont</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 18, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bell2017?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">B</span>Bell (2017 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 16, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, IP addresses, Job titles, Names, Passwords, Phone numbers, Spoken languages, Survey results, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ExploitIn?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">E</span>Exploit.In</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 6, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AntiPublic?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">A</span>Anti Public Combo List</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 4, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RetinaX?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">R</span>Retina-X</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 30, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/R2-2017?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">R</span>R2 (2017 forum breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 25, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FashionFantasyGame?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">F</span>FashionFantasyGame</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 20, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Youku?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">Y</span>Youku</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 15, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HealthNowNetworks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">H</span>Health Now Networks</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 7, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Health insurance information, IP addresses, Names, Personal health data, Phone numbers, Physical addresses, Security questions and answers, Social connections </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BitcoinTalk?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">B</span>Bitcoin Talk</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 27, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Passwords, Security questions and answers, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Evony?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">E</span>Evony</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 25, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HLTV?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">H</span>HLTV</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 22, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SweClockers?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">S</span>SweClockers.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 22, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TorrentInvites?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">T</span>Torrent Invites</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 22, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CrimeAgencyVBulletin?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">C</span>CrimeAgency vBulletin Hacks</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 21, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Soundwave?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">S</span>Soundwave</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 17, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Social connections </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Wishbone?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">W</span>Wishbone (2016)</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 15, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Auth tokens, Dates of birth, Email addresses, Genders, Names, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NetProspex?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">N</span>NetProspex</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 15, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SterKinekor?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">S</span>Ster-Kinekor</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 13, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Spoken languages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BTCE?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">B</span>BTC-E</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 12, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RiverCityMedia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">R</span>River City Media Spam List</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 8, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LittleMonsters?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">L</span>Little Monsters</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 7, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CloudPets?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">C</span>CloudPets</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 27, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Family members’ names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Funimation?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">F</span>Funimation</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 20, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Elance?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">E</span>Elance</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 18, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Geographic locations, Passwords, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Zoosk?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">Z</span>Zoosk (2011)</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 8, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/JustDate?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">J</span>Justdate.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 7, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Names </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HongFire?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">H</span>HongFire</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 5, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FreedomHostingII?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">F</span>Freedom Hosting II</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 5, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CDProjektRed?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">C</span>CD Projekt RED</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 31, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PSPISO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">P</span>PSP ISO</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 29, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Xbox360ISO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">X</span>Xbox 360 ISO</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 29, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NonNudeGirls?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">N</span>Non Nude Girls</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 25, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TheCandidBoard?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">T</span>The Candid Board</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 22, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MrExcel?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">M</span>MrExcel</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 22, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Social connections, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Eroticy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">E</span>Eroticy</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 10, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/QIP?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">Q</span>QIP</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 8, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PokemonNegro?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">P</span>Pokémon Negro</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 3, 2017 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DaniWeb?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">D</span>DaniWeb</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 28, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Parapa?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">П</span>Пара Па</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 28, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CrossFire?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">C</span>Cross Fire</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 28, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/uuu9?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">u</span>uuu9</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 27, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BotOfLegends?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">B</span>Bot of Legends</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 27, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OVH?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">O</span>OVH</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 27, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Kimsufi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">K</span>Kimsufi</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 27, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Ethereum?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">E</span>Ethereum</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 20, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/QuinStreet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">Q</span>QuinStreet</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 17, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PayAsUGym?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">P</span>PayAsUGym</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 17, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Names, Partial credit card data, Passwords, Phone numbers, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SCDailyPhoneSpamList?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">S</span>SC Daily Phone Spam List</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 24, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SpecialKSpamList?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">S</span>Special K Data Feed Spam List</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 24, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GeekedIn?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">G</span>GeekedIn</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 17, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Geographic locations, Names, Professional skills, Usernames, Years of professional experience </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ArmyForceOnline?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">A</span>Army Force Online</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 10, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Avatars, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dodonew?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">D</span>Dodonew.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 10, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lookbook?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">L</span>Lookbook</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CheapAssGamer?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">C</span>CheapAssGamer.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Aipai?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">A</span>Aipai.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CivilOnline?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">C</span>Civil Online</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Duowan?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">D</span>Duowan.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WarInc?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">W</span>War Inc.</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/EpicGames?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">E</span>Epic Games</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/UnrealEngine?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">U</span>Unreal Engine</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HeroesOfGaia?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">H</span>Heroes of Gaia</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Email addresses, IP addresses, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/uTorrent?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">u</span>uTorrent</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 5, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Rambler?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">R</span>Rambler</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 1, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ModernBusinessSolutions?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">M</span>Modern Business Solutions</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 12, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GFAN?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">G</span>GFAN</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 10, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NetEase?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">N</span>NetEase</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Taobao?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">T</span>Taobao</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/126?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">1</span>126</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Aternos?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">A</span>Aternos</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 1, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Leet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">L</span>Leet</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 30, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/iDressup?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">i</span>i-Dressup</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 26, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/gPotato?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">g</span>gPotato</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 24, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Physical addresses, Security questions and answers, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GameTuts?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">G</span>GameTuts</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 23, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lastfm?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">L</span>Last.fm</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 20, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MoDaCo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">M</span>MoDaCo</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 20, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/eThekwiniMunicipality?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">e</span>eThekwini Municipality</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 15, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Deceased date, Email addresses, Genders, Government issued IDs, Names, Passport numbers, Passwords, Phone numbers, Physical addresses, Utility bills </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BlueSnapRegpack?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">R</span>Regpack</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 13, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Browser user agent details, Credit card CVV, Email addresses, IP addresses, Names, Partial credit card data, Phone numbers, Physical addresses, Purchases </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ClixSense?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">C</span>ClixSense</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 11, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Payment histories, Payment methods, Physical addresses, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Pokebip?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">P</span>Pokébip</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Time zones, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DLH?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">D</span>DLH.net</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Names, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Experian?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">E</span>Experian (2015)</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit status information, Dates of birth, Email addresses, Ethnicities, Family structure, Genders, Home ownership statuses, Income levels, IP addresses, Names, Phone numbers, Physical addresses, Purchasing habits </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FlashFlashRevolution?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">F</span>Flash Flash Revolution (2016 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Onverse?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">O</span>Onverse</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WIIUISO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">W</span>WIIU ISO</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ServerPact?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">S</span>ServerPact</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Brazzers?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">B</span>Brazzers</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 5, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dropbox?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">D</span>Dropbox</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 31, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Interpals?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">I</span>InterPals</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 30, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Nihonomaru?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">N</span>Nihonomaru</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 30, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MinecraftWorldMap?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">M</span>Minecraft World Map</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 29, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GTAGaming?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">G</span>GTAGaming</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 23, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Teracod?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">T</span>Teracod</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 22, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Avatars, Email addresses, IP addresses, Passwords, Payment histories, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/xat?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">x</span>xat</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 5, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Warframe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">W</span>Warframe</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 21, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Trillian?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">T</span>Trillian</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 15, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/17Media?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">1</span>17</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device information, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Neopets?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">N</span>Neopets</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Badoo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">B</span>Badoo</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/iMesh?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">i</span>iMesh</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 2, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tianya?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">T</span>Tianya</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 30, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MuslimMatch?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">M</span>Muslim Match</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 29, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Chat logs, Email addresses, Geographic locations, IP addresses, Passwords, Private messages, User statuses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WHMCS?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">W</span>WHMCS</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 28, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages, Employers, IP addresses, Names, Partial credit card data, Passwords, Payment histories, Physical addresses, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Uiggy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">U</span>Uiggy</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 27, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Names, Social connections, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VK?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">V</span>VK</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BitTorrent?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">B</span>BitTorrent</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MySpace?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">M</span>MySpace</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 31, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tumblr?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">t</span>tumblr</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 29, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Fling?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">F</span>Fling</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 28, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Phone numbers, Sexual fetishes, Sexual orientations, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FurAffinity?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">F</span>Fur Affinity</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 27, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LinkedIn?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">L</span>LinkedIn</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 21, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/RosebuttBoard?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">R</span>Rosebutt Board</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 10, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Nulled?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">N</span>Nulled.cr</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/QatarNationalBank?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">Q</span>Qatar National Bank</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 1, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Bank account numbers, Customer feedback, Dates of birth, Financial transactions, Genders, Geographic locations, Government issued IDs, IP addresses, Marital statuses, Names, Passwords, Phone numbers, Physical addresses, PINs, Security questions and answers, Spoken languages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Lifeboat?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">L</span>Lifeboat</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 25, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BeautifulPeople?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">B</span>Beautiful People</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 25, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Beauty ratings, Car ownership statuses, Dates of birth, Drinking habits, Education levels, Email addresses, Genders, Geographic locations, Home ownership statuses, Income levels, IP addresses, Job titles, Names, Passwords, Personal descriptions, Personal interests, Physical attributes, Sexual orientations, Smoking habits, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TruckersMP?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">T</span>TruckersMP</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 24, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NaughtyAmerica?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">N</span>Naughty America</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 24, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Mate1?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">M</span>Mate1.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 14, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Astrological signs, Dates of birth, Drinking habits, Drug habits, Education levels, Email addresses, Ethnicities, Fitness levels, Genders, Geographic locations, Income levels, Job titles, Names, Parenting plans, Passwords, Personal descriptions, Physical attributes, Political views, Relationship statuses, Religions, Sexual fetishes, Travel habits, Usernames, Website activity, Work habits </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/COMELEC?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">C</span>COMELEC (Philippines Voters)</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 14, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Biometric data, Dates of birth, Email addresses, Family members’ names, Genders, Job titles, Marital statuses, Names, Passport numbers, Phone numbers, Physical addresses, Physical attributes </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TheFappening?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">T</span>The Fappening</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 13, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Avast?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">A</span>Avast</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 12, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LOTR?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">L</span>Lord of the Rings Online</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 12, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/DDO?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">D</span>Dungeons & Dragons Online</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 12, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Solomid?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">T</span>Team SoloMid</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Malwarebytes?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">M</span>Malwarebytes</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Minefield?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">M</span>Minefield</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Seedpeer?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">S</span>Seedpeer</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SumoTorrent?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">S</span>Sumo Torrent</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WildStar?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">W</span>WildStar</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AcneOrg?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">A</span>Acne.org</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/KMRU?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">K</span>KM.RU</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, Recovery email addresses, Security questions and answers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MajorGeeks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">M</span>MajorGeeks</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Nival?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">N</span>Nival</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 3, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Avatars, Dates of birth, Email addresses, Genders, Names, Spoken languages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/iPmart?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">i</span>iPmart</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SkTorrent?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">S</span>SkTorrent</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LinuxMint?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">L</span>Linux Mint</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 22, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Avatars, Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Time zones, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/R2Games?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">R</span>R2Games</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 9, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Comcast?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">C</span>Comcast</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Plex?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">P</span>Plex</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 8, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Xbox-Scene?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">X</span>Xbox-Scene</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PS3Hax?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">P</span>PS3Hax</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PSX-Scene?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">P</span>PSX-Scene</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 7, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/OwnedCore?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green40__m3WlE">O</span>OwnedCore</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 6, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/GamerzPlanet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">G</span>Gamerzplanet</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 5, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HeroesOfNewerth?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">H</span>Heroes of Newerth</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 24, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VBulletin?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">v</span>vBulletin</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 24, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords, Security questions and answers, Spoken languages, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gamigo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">G</span>Gamigo</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 18, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NexusMods?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple40__Rxkig">N</span>Nexus Mods</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 17, 2016 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AndroidForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">A</span>Android Forums</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 20, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Neteller?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">N</span>Neteller</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 30, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Dates of birth, Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses, Security questions and answers, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MoneyBookers?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">M</span>Money Bookers</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 30, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/VTech?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">V</span>VTech</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 25, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Family members’ names, Genders, IP addresses, Names, Passwords, Physical addresses, Security questions and answers, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FoxyBingo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">F</span>Foxy Bingo</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 22, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Browser user agent details, Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BlackHatWorld?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">B</span>Black Hat World</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 3, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Instant messenger identities, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Mac-Torrents?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">M</span>Mac-Torrents</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 31, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/FFShrine?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">F</span>Final Fantasy Shrine</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 31, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PHPFreaks?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red10__NlGQc">P</span>PHP Freaks</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 30, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/000webhost?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">0</span>000webhost</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 26, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MPGH?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">M</span>MPGH</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 26, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PaddyPower?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">P</span>Paddy Power</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 11, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Account balances, Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses, Security questions and answers, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MyVidster?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">M</span>MyVidster</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 10, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Patreon?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">P</span>Patreon</h2> <dl> <div> <dt> Breach added: </dt> <dd> October 2, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Payment histories, Physical addresses, Private messages, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AshleyMadison?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">A</span>Ashley Madison</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 18, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Ethnicities, Genders, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Security questions and answers, Sexual orientations, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/XSplit?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">X</span>XSplit</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 8, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/YouPorn?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">Y</span>YouPorn</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 30, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HackingTeam?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">H</span>Hacking Team</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 12, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Hemmakvall?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">H</span>Hemmakväll</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 9, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/myRepoSpace?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple30__9v68k">m</span>myRepoSpace</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 8, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MinecraftPocketEditionForum?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">M</span>Minecraft Pocket Edition Forum</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 30, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/NextGenUpdate?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">N</span>NextGenUpdate</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 5, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/mSpy?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">m</span>mSpy</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 28, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Device usage tracking data </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AdultFriendFinder?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">A</span>Adult FriendFinder (2015)</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 22, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Races, Relationship statuses, Sexual orientations, Spoken languages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/SprashivaiRu?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">С</span>Спрашивай.ру</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 12, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Spoken languages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/TRAI?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">T</span>Telecom Regulatory Authority of India</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 27, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Email messages </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/StarNet?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">S</span>StarNet</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 11, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Customer interactions, Dates of birth, Email addresses, Genders, IP addresses, MAC addresses, Names, Passport numbers, Passwords, Phone numbers </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/QuantumBooter?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">Q</span>Quantum Booter</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 4, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/ThisHabboForum?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">T</span>ThisHabbo Forum</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 28, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Flashback?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">F</span>Flashback</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 12, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Government issued IDs, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CrackCommunity?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">C</span>Crack Community</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 3, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LizardSquad?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">L</span>Lizard Squad</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 18, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Dominos?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">D</span>Domino's</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 4, 2015 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AhaShare?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">A</span>AhaShare.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 6, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Geographic locations, IP addresses, Partial dates of birth, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Yandex?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">Y</span>Yandex Dump</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 12, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MailRu?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">m</span>mail.ru Dump</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 12, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BTSec?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">B</span>Bitcoin Security Forum Gmail Dump</h2> <dl> <div> <dt> Breach added: </dt> <dd> September 10, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PokemonCreed?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">P</span>Pokémon Creed</h2> <dl> <div> <dt> Breach added: </dt> <dd> August 10, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, IP addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Insanelyi?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange10__AvplW">I</span>Insanelyi</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 22, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/LoungeBoard?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">L</span>Lounge Board</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 6, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, IP addresses, Names, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Verified?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">V</span>Verified</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 6, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Historical passwords, IP addresses, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/AstroPID?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet20__Jk1Mi">A</span>Astropid</h2> <dl> <div> <dt> Breach added: </dt> <dd> July 6, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Instant messenger identities, IP addresses, Names, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MangaTraders?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">M</span>Manga Traders</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 10, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Win7Vista?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple05__HLQ4i">W</span>Win7Vista Forum</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 1, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Instant messenger identities, IP addresses, Names, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/CannabisForum?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue10__DuAas">C</span>Cannabis.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> June 1, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/HackForums?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink10___nfZv">h</span>hackforums.net</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 11, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Instant messenger identities, IP addresses, Passwords, Social connections, Spoken languages, Time zones, User website URLs, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BusinessAcumen?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_pink20__1imxR">B</span>Business Acumen Magazine</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 11, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Fridae?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">F</span>Fridae</h2> <dl> <div> <dt> Breach added: </dt> <dd> May 6, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BigMoneyJobs?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange20__OXbdG">B</span>BigMoneyJobs</h2> <dl> <div> <dt> Breach added: </dt> <dd> April 8, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Career levels, Education levels, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Salutations, User website URLs, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Boxee?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red20__1u6Dy">B</span>Boxee</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 30, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, User website URLs, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Hemmelig?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet30__C8gMQ">h</span>hemmelig.com</h2> <dl> <div> <dt> Breach added: </dt> <dd> March 25, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Genders, Nicknames, Partial dates of birth, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/IGF?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green10__n1Yb_">U</span>UN Internet Governance Forum</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Names, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/MuslimDirectory?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">M</span>Muslim Directory</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 23, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Age groups, Email addresses, Employers, Names, Passwords, Phone numbers, Physical addresses, Website activity </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Spirol?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">S</span>Spirol</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 22, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Forbes?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">F</span>Forbes</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 15, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, User website URLs, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Tesco?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green50__XzWJ6">T</span>Tesco</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 13, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Reward program balances </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Bell?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">B</span>Bell (2014 breach)</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 1, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit cards, Genders, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/WPT?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue30__KjLrT">W</span>WPT Amateur Poker League</h2> <dl> <div> <dt> Breach added: </dt> <dd> February 1, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/BattlefieldHeroes?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_orange30__tSFSt">B</span>Battlefield Heroes</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 23, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Snapchat?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">S</span>Snapchat</h2> <dl> <div> <dt> Breach added: </dt> <dd> January 2, 2014 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Geographic locations, Phone numbers, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/PixelFederation?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green20__11pQX">P</span>Pixel Federation</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 6, 2013 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Adobe?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_red30__NwhtP">A</span>Adobe</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 4, 2013 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Password hints, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Gawker?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">G</span>Gawker</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 4, 2013 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Sony?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_violet10__uFMbl">S</span>Sony</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 4, 2013 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Yahoo?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_green30__JTmup">Y</span>Yahoo</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 4, 2013 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Email addresses, Passwords </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Stratfor?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_purple10__d3VgH">S</span>Stratfor</h2> <dl> <div> <dt> Breach added: </dt> <dd> December 4, 2013 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit cards, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> <li><a class="BreachIndexView_breachCard__LN9Rx" href="https://monitor-mozilla-org.translate.goog/breach-details/Vodafone?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB"><h2><span role="presentation" aria-hidden="true" class="BreachLogo_breachLogo__Hfb02 BreachLogo_blue20__h5N91">V</span>Vodafone</h2> <dl> <div> <dt> Breach added: </dt> <dd> November 30, 2013 </dd> </div> <div> <dt> Exposed data: </dt> <dd> Credit cards, Email addresses, Government issued IDs, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases, SMS messages, Usernames </dd> </div> </dl><p class="BreachIndexView_linkDescription__cvDZ8">More about this breach</p></a></li> </ul> </main> </div> <footer class="Shell_footer__ZF9FV"> <a class="Shell_mozillaLink__iGZJR" target="_blank" href="https://translate.google.com/website?sl=pl&tl=fr&hl=en-GB&u=https://www.mozilla.org"><img alt="Mozilla" loading="lazy" width="100" height="29" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/mozilla-logo.68223779.svg"></a> <ul class="Shell_externalLinks__Btcxg"> <li><a href="https://monitor-mozilla-org.translate.goog/breaches?_x_tr_sl=pl&_x_tr_tl=fr&_x_tr_hl=en-GB">Recent Data Breaches</a></li> <li><a href="https://translate.google.com/website?sl=pl&tl=fr&hl=en-GB&u=https://support.mozilla.org/kb/firefox-monitor-faq" title="Frequently asked questions" class="TelemetryLink_link__JXXzq " target="_blank">FAQs</a></li> <li><a href="https://translate.google.com/website?sl=pl&tl=fr&hl=en-GB&u=https://www.mozilla.org/about/legal/terms/subscription-services/" class="TelemetryLink_link__JXXzq " target="_blank">Terms of Service</a></li> <li><a href="https://translate.google.com/website?sl=pl&tl=fr&hl=en-GB&u=https://www.mozilla.org/privacy/subscription-services/" class="TelemetryLink_link__JXXzq " target="_blank">Privacy Notice</a></li> <li><a href="https://translate.google.com/website?sl=pl&tl=fr&hl=en-GB&u=https://github.com/mozilla/blurts-server" class="TelemetryLink_link__JXXzq " target="_blank">GitHub</a></li> </ul> </footer> </div> <script src="/_next/static/chunks/webpack-0943309e9f04a3ed.js" nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d" async></script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">(self.__next_f=self.__next_f||[]).push([0]);self.__next_f.push([2,null])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"1:HL[\"/_next/static/media/5f2dbf67246008c1-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n2:HL[\"/_next/static/media/a34f9d1faa5f3315-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n3:HL[\"/_next/static/media/a745ddc86d0c3d32-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n4:HL[\"/_next/static/media/bd82e0c1746bd560-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n5:HL[\"/_next/static/css/2c7c733a052b5f81.css\",\"style\"]\n6:HL[\"/_next/static/css/b596b8d664859933.css\",\"style\"]\n7:HL[\"/_next/static/css/c54b4526c9aef97b.css\",\"style\"]\n8:HL[\"/_next/static/css/44804ad52a64ab5a.css\",\"style\"]\n9:HL[\"/_next/static/css/641605e04a9ed29c.css\",\"style\"]\na:HL[\"/_next/static/css/3aefa01f0b48e305.css\",\"style\"]\nb:HL[\"/_next/static/css/ac10e571035702dc.css\",\"style\"]\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"c:I[12846,[],\"\"]\nf:I[4707,[],\"\"]\n10:I[36423,[],\"\"]\n11:I[7261,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"7648\",\"static/chunks/7648-c67cc91fb2c938a2.js\",\"5878\",\"static/chunks/5878-088e90fdcd3325d8.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"7185\",\"static/chunks/7185-f0b060a43f2a4e65.js\",\"8096\",\"static/chunks/8096-2517a98fffd53dea.js\",\"4832\",\"static/chunks/4832-19ec1920442fd785.js\",\"2574\",\"static/chunks/app/(proper_react)/(redesign)/(public)/layout-83cd641555a9dec3.js\"],\"ToastContainer\"]\n12:I[72972,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"7648\",\"static/chunks/7648-c67cc91fb2c938a2.js\",\"5878\",\"static/chunks/5878-088e90fdcd3325d8.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"7185\",\"static/chunks/7185-f0b060a43f2a4e65.js\",\"8096\",\"static/chunks/8096-2517a98fffd53dea.js\",\"4832\",\"static/chunks/4832-19ec1920442fd785.js\",\"2574\",\"static/chunks/app/(proper_react)/(redesign)/(public)/layout-83cd641555a9dec3.js\"],\"\"]\n13:I[65878,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"7648\",\"static/chunks/7648-c67cc91fb2c938a2.js\",\"5878\",\"static/chunks/5878-088e90fdcd3325d8.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"7185\",\"static/chunks/7185-f0b060a43f2a4e65.js\",\"7954\",\"static/chunks/7954-1b65ae66421619f3.js\",\"9641\",\"static/chunks/9641-8344acb24308343e.js\",\"4501\",\"static/chunks/4501-eafe357e5d4af392.js\",\"3084\",\"static/chunks/3084-d8674e5d117499fa.js\",\"5863\",\"static/chunks/5863-2b60776be84b3b88.js\",\"9463\",\"static/chunks/9463-204c9ad64acb13ec.js\",\"4832\",\"static/chunks/4832-19ec1920442fd785.js\",\"5194\",\"static/chunks/app/(proper_react)/(redesign)/(public)/page-b65154ac7c7615ff.js\"],\"Image\"]\n14:I[39708,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"7648\",\"static/chunks/7648-c67cc91fb2c938a2.js\",\"5878\",\"static/chunks/5878-088e90fdcd3325d8.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"7185\",\"static/chunks/7185-f0b060a43f2a4e65.js\",\"8096\",\"static/chunks/8096-2517a98fffd53dea.js\",\"4832\",\"static/chunks/4832-19ec1920442fd785.js\",\"2574\",\"static/chunks/app/(proper_react)/(redesign)/(public)/layout-83cd641"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"555a9dec3.js\"],\"SignInButton\"]\n15:I[70686,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"7648\",\"static/chunks/7648-c67cc91fb2c938a2.js\",\"5878\",\"static/chunks/5878-088e90fdcd3325d8.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"7185\",\"static/chunks/7185-f0b060a43f2a4e65.js\",\"7954\",\"static/chunks/7954-1b65ae66421619f3.js\",\"9641\",\"static/chunks/9641-8344acb24308343e.js\",\"4501\",\"static/chunks/4501-eafe357e5d4af392.js\",\"3084\",\"static/chunks/3084-d8674e5d117499fa.js\",\"5863\",\"static/chunks/5863-2b60776be84b3b88.js\",\"9463\",\"static/chunks/9463-204c9ad64acb13ec.js\",\"4832\",\"static/chunks/4832-19ec1920442fd785.js\",\"5194\",\"static/chunks/app/(proper_react)/(redesign)/(public)/page-b65154ac7c7615ff.js\"],\"TelemetryLink\"]\n19:I[74437,[\"6470\",\"static/chunks/app/global-error-3908db0cfef01427.js\"],\"default\"]\n1a:[]\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"0:[\"$\",\"$Lc\",null,{\"buildId\":\"MHzRf9uBo2EiaL0dPpKTd\",\"assetPrefix\":\"\",\"urlParts\":[\"\",\"breaches\"],\"initialTree\":[\"\",{\"children\":[\"(proper_react)\",{\"children\":[\"(redesign)\",{\"children\":[\"(public)\",{\"children\":[\"breaches\",{\"children\":[\"__PAGE__\",{}]}]}]}]}]},\"$undefined\",\"$undefined\",true],\"initialSeedData\":[\"\",{\"children\":[\"(proper_react)\",{\"children\":[\"(redesign)\",{\"children\":[\"(public)\",{\"children\":[\"breaches\",{\"children\":[\"__PAGE__\",{},[[\"$Ld\",\"$Le\",[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/ac10e571035702dc.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]]],null],null]},[null,[\"$\",\"$Lf\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"(proper_react)\",\"children\",\"(redesign)\",\"children\",\"(public)\",\"children\",\"breaches\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L10\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/b596b8d664859933.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/c54b4526c9aef97b.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"2\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/44804ad52a64ab5a.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"3\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/641605e04a9ed29c.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"4\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/3aefa01f0b48e305.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]],[\"$\",\"div\",null,{\"className\":\"PublicShell_wrapper__YjM2J\",\"children\":[[\"$\",\"$L11\",null,{\"toastClassName\":\"$undefined\",\"position\":\"top-center\",\"theme\":\"colored\",\"autoClose\":false}],[\"$\",\"header\",null,{\"children\":[\"$\",\"nav\",null,{\"className\":\"PublicShell_nav__QbN2v\",\"children\":[[\"$\",\"h1\",null,{\"children\":[\"$\",\"$L12\",null,{\"href\":\"/\",\"children\":[\"$\",\"$L13\",null,{\"className\":\"PublicShell_logo__vbvvO\",\"src\":{\"src\":\"/_next/static/media/monitor-logo.e25bb4f2.svg\",\"height\":40,\"width\":266,\"blurWidth\":0,\"blurHeight\":0},\"alt\":\"Mozilla Monitor\"}]}]}],[\"$\",\"$L14\",null,{}]]}]}],[\"$\",\"div\",null,{\"className\":\"PublicShell_content__Gx4O4\",\"children\":[\"$\",\"$Lf\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"(proper_react)\",\"children\",\"(redesign)\",\"children\",\"(public)\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L10\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]}],[\"$\",\"footer\",null,{\"className\":\"Shell_footer__ZF9FV\",\"children\":[[\"$\",\"$L12\",null,{\"href\":\"https://www.mozilla.org\",\"className\":\"Shell_mozillaLink__iGZJR\",\"target\":\"_blank\",\"children\":[\"$\",\"$L13\",null,{\"src\":{\"src\":\"/_next/static/media/mozilla-logo.68223779.svg\",\"height\":572,\"width\":2000,\"blurWidth\":0,\"blurHeight\":0},\"width\":100,\"alt\":\"Mozilla\"}]}],[\"$\",\"ul\",null,{\"className\":\"Shell_externalLinks__Btcxg\",\"children\":[[\"$\",\"li\",null,{\"children\":[\"$\",\"$L15\",null,{\"href\":\"/breaches\",\"eventData\":{\"link_id\":\"recent_breaches_footer\"},\"children\":\"Recent Data Breaches\"}]}],false,[\"$\",\"li\",null,{\"children\":[\"$\",\"$L15\",null,{\"href\":\"https://support.mozilla.org/kb/firefox-monitor-faq\",\"target\":\"_blank\",\"title\":\"Frequently asked questions\",\"eventData\":{\"link_id\":\"faqs_footer\"},\"children\":\"FAQs\"}]}],[\"$\",\"li\",null,{\"children\":[\"$\",\"$L15\",null,{\"href\":\"https://www.mozilla.org/about/legal/terms/subscription-services/\",\"target\":\"_blank\",\"eventData\":{\"link_id\":\"tos_footer\"},\"children\":\"Terms of Service\"}]}],[\"$\",\"li\",null,{\"children\":[\"$\",\"$L15\",null,{\"href\":\"https://www.mozilla.org/privacy/subscription-services/\",\"target\":\"_blank\",\"eventData\":{\"link_id\":\"privacy_notice_footer\"},\"children\":\"Privacy Notice\"}]}],[\"$\",\"li\",null,{\"children\":[\"$\",\"$L15\",null,{\"href\":\"https://github.com/mozilla/blurts-server\",\"target\":\"_blank\",\"eventData\":{\"link_id\":\"github_footer\"},\"children\":\"GitHub\"}]}]]}]]}]]}]],null],null]},[null,[\"$\",\"$Lf\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"(proper_react)\",\"children\",\"(redesign)\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L10\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[[null,\"$L16\"],null],null]},[[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/2c7c733a052b5f81.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]],\"$L17\"],null],null],\"couldBeIntercepted\":false,\"initialHead\":[null,\"$L18\"],\"globalErrorComponent\":\"$19\",\"missingSlots\":\"$W1a\"}]\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"1b:I[14190,[\"7648\",\"static/chunks/7648-c67cc91fb2c938a2.js\",\"5878\",\"static/chunks/5878-088e90fdcd3325d8.js\",\"6713\",\"static/chunks/app/(proper_react)/(redesign)/(public)/breaches/page-7cc1843a37b25f54.js\"],\"BreachIndexView\"]\n21:I[99597,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"2561\",\"static/chunks/2561-1e4a6a8ae6d2f4ed.js\",\"3185\",\"static/chunks/app/layout-396f2adab233b982.js\"],\"SessionProvider\"]\n22:I[17581,[\"7648\",\"static/chunks/7648-c67cc91fb2c938a2.js\",\"5878\",\"static/chunks/5878-088e90fdcd3325d8.js\",\"9160\",\"static/chunks/app/not-found-042c97db30ef836e.js\"],\"BackButton\"]\n23:I[98165,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"2561\",\"static/chunks/2561-1e4a6a8ae6d2f4ed.js\",\"3185\",\"static/chunks/app/layout-396f2adab233b982.js\"],\"default\"]\n24:I[39760,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"2561\",\"static/chunks/2561-1e4a6a8ae6d2f4ed.js\",\"3185\",\"static/chunks/app/layout-396f2adab233b982.js\"],\"GleanScript\"]\n25:I[61625,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"2561\",\"static/chunks/2561-1e4a6a8ae6d2f4ed.js\",\"3185\",\"static/chunks/app/layout-396f2adab233b982.js\"],\"GoogleAnalyticsWorkaround\"]\n1c:T452,In May 2024, \u003ca href=\"https://www.mediaite.com/politics/conservative-news-websites-hacked-replaced-with-page-leaking-private-information/\" target=\"_blank\" rel=\"noopener\"\u003ethe conservative news website The Post Millennial suffered a data breach\u003c/a\u003e. The breach resulted in the defacement of the website and links posted to 3 different corpuses of data including hundreds of writers and editors (IP, physical address and email exposed), tens of thousands of subscribers to the site (name, email, username, phone and plain text password exposed), and tens of millions of email addresses from \u003ca href=\"https://sprunge.us/SZTt4N\" target=\"_blank\" rel=\"noopener\"\u003ethousands of mailing lists\u003c/a\u003e \u003cem\u003ealleged\u003c/em\u003e to have been used by Th"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"e Post Millennial (this has not been independently verified). The mailing lists appear to be sourced from various campaigns not necessarily run by The Post Millennial and contain a variety of different personal attributes including name, phone and physical address (depending on the campaign). The data was subsequently posted to a popular hacking forum and extensively torrented.1d:T46b,In March 2024, \u003ca href=\"https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach\" target=\"_blank\" rel=\"noopener\"\u003etens of millions of records allegedly breached from AT\u0026T were posted to a popular hacking forum\u003c/a\u003e. Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT\u0026T maintained that there had not been a breach of their systems and that the data originated from elsewhere. 12 days later, \u003ca href=\"https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html\" target=\"_blank\" rel=\"noopener\"\u003eAT\u0026T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor\u003c/a\u003e. \u003ca href=\"https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/\" target=\"_blank\" rel=\"noopener\"\u003eAT\u0026T also proceeded to reset customer account passcodes\u003c/a\u003e, an indicator that there was sufficient belief passcodes had been compromised. The incident exposed names, email and physical addresses, dates of birth, phone numbers and US social security numbers.1e:T435,In July 2018, the sales engagement startup \u003ca href=\"https://www.wired.com/story/apollo-breach-linkedin-salesforce-data/\" target=\"_blank\" rel=\"noopener\"\u003eApollo left a database containing billions of data points publicly exposed without a password\u003c/a\u003e. The data was discovered by security researcher \u003ca href=\"http://www.vinnytroia.com/\" target=\"_blank\" rel=\"noopener\"\u003eVinny Troia\u003c/a\u003e who subsequently sent a subset of the data containing 126 million unique email addresses to Have I Been Pwned. The data left exposed by Apo"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"llo was used in their \u0026quot;revenue acceleration platform\u0026quot; and included personal information such as names and email addresses as well as professional information including places of employment, the roles people hold and where they're located. Apollo stressed that the exposed data did not include sensitive information such as passwords, social security numbers or financial data. \u003ca href=\"https://www.apollo.io/contact\" target=\"_blank\" rel=\"noopener\"\u003eThe Apollo website has a contact form\u003c/a\u003e for those looking to get in touch with the organisation.1f:T43e,In 2014, a file allegedly containing data hacked from \u003ca href=\"https://www.couponmom.com\" target=\"_blank\" rel=\"noopener\"\u003eCoupon Mom\u003c/a\u003e was created and included 11 million email addresses and plain text passwords. On further investigation, the file was also found to contain data indicating it had been sourced from \u003ca href=\"https://armorgames.com\" target=\"_blank\" rel=\"noopener\"\u003eArmor Games\u003c/a\u003e. Subsequent verification with HIBP subscribers confirmed the passwords had previously been used and many subscribers had used either Coupon Mom or Armor Games in the past. On disclosure to both organisations, each found that the data did not represent their entire customer base and possibly includes records from other sources with common subscribers. The breach has subsequently been flagged as \u0026quot;unverified\u0026quot; as the source cannot be emphatically proven. In July 2020, \u003ca href=\"https://www.troyhunt.com/how-beeradvocate-learned-theyd-been-pwned/\" target=\"_blank\" rel=\"noopener\"\u003ethe data was also found to contain BeerAdvocate accounts sourced from a previously unknown breach\u003c/a\u003e.20:T43e,In July 2016, a tweet was posted with a link to an alleged data breach of \u003ca href=\"http://bluesnap.com\" target=\"_blank\" rel=\"noopener\"\u003eBlueSnap, a global payment gateway and merchant account provider\u003c/a\u003e. The data contained 324k payment records across 105k unique email addresses and included personal attributes such as name, home address and phone number. The data was verified with multi"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"ple Have I Been Pwned subscribers who confirmed it also contained valid transactions, partial credit card numbers, expiry dates and CVVs. A downstream consumer of BlueSnap services known as \u003ca href=\"http://www.regpacks.com/\" target=\"_blank\" rel=\"noopener\"\u003eRegpack\u003c/a\u003e was subsequently identified as the source of the data after they identified human error had left the transactions exposed on a publicly facing server. A full investigation of the data and statement by Regpack is detailed in the post titled \u003ca href=\"https://www.troyhunt.com/someone-just-lost-324k-payment-records-complete-with-cvvs/\" target=\"_blank\" rel=\"noopener\"\u003eSomeone just lost 324k payment records, complete with CVVs\u003c/a\u003e."])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"e:[\"$\",\"$L1b\",null,{\"allBreaches\":[{\"Id\":45619889,\"Name\":\"FlipaClip\",\"Title\":\"FlipaClip\",\"Domain\":\"flipaclip.com\",\"BreachDate\":\"2024-11-18T00:00:00.000Z\",\"AddedDate\":\"2024-11-20T22:37:58.000Z\",\"ModifiedDate\":\"2024-11-20T22:42:16.000Z\",\"PwnCount\":892854,\"Description\":\"In November 2024, the animation app \u003ca href=\\\"https://x.com/RhinozzCode/status/1859291987360321631\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFlipaClip suffered a data breach that exposed almost 900k records due to an exposed Firebase server\u003c/a\u003e. The impacted data included name, email address, country and date of birth. FlipaClip advised the issue has since been rectified.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FlipaClip.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":45410218,\"Name\":\"Finsure\",\"Title\":\"Finsure\",\"Domain\":\"finsure.com.au\",\"BreachDate\":\"2024-10-15T00:00:00.000Z\",\"AddedDate\":\"2024-11-19T04:25:18.000Z\",\"ModifiedDate\":\"2024-11-19T04:25:18.000Z\",\"PwnCount\":296124,\"Description\":\"In October 2024, almost 300k unique email addresses from Australian mortgage broking group Finsure were obtained from the ActivePipe real estate marketing platform. The impacted data also included names, phone numbers and physical addresses. The incident did not directly affect any of Finsure's systems or expose any passwords or financial data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Finsure.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":44718745,\"Name\":\"DemandScience\",\"Title\":\"DemandScience by Pure Incubation\",\"Domain\":\"demandscience.com\",\"BreachDate\":\"2024-02-28T00:00:00.000Z\",\"AddedDate\":\"2024-11-13T09:53:35.000Z\",\"ModifiedDate\":\"2024-11-13T10:00:34.000Z\",\"PwnCount\":121796165,\"Description\":\"In early 2024, \u003ca href=\\\"https://www.troyhunt.com/inside-the-demandscience-by-pure-incubation-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea large corpus of data from DemandScience (a company owned by Pure Incubation), appeared for sale on a popular hacking forum\u003c/a\u003e. Later attributed to a leak from a decommissioned legacy system, the breach contained extensive data that was largely business contact information aggregated from public sources. Specifically, the data included 122M unique corporate email addresses, physical addresses, phone numbers, employers and job titles. It also included names and for many individuals, a link to their LinkedIn profile.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DemandScience.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":44469898,\"Name\":\"HotTopic\",\"Title\":\"Hot Topic\",\"Domain\":\"hottopic.com\",\"BreachDate\":\"2024-10-19T00:00:00.000Z\",\"AddedDate\":\"2024-11-11T07:50:58.000Z\",\"ModifiedDate\":\"2024-11-11T07:50:58.000Z\",\"PwnCount\":56904909,\"Description\":\"In October 2024, \u003ca href=\\\"https://au.pcmag.com/security/107921/hacker-may-have-breached-hot-topic-stolen-data-on-millions\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eretailer Hot Topic suffered a data breach that exposed 57 million unique email addresses\u003c/a\u003e. The impacted data also included physical addresses, phone numbers, purchases, genders, dates of birth and partial credit data containing card type, expiry and last 4 digits.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HotTopic.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"partial-credit-card-data\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43976520,\"Name\":\"Earth2\",\"Title\":\"Earth 2\",\"Domain\":\"earth2.io\",\"BreachDate\":\"2024-10-16T00:00:00.000Z\",\"AddedDate\":\"2024-11-07T04:49:02.000Z\",\"ModifiedDate\":\"2024-11-07T04:49:02.000Z\",\"PwnCount\":420961,\"Description\":\"In October 2024, 421k unique email addresses from the virtual earth game Earth 2 were derived from embedded Gravatar images. Appearing alongside player usernames, the root cause was related to how Gravatar presents links to avatars as MD5 hashes within consuming services, a feature Earth 2 advised has now been disabled on their platform. This incident did not expose any further personal information, passwords or financial data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Earth2.png\",\"DataClasses\":[\"email-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43824139,\"Name\":\"DennisKirk\",\"Title\":\"Dennis Kirk\",\"Domain\":\"denniskirk.com\",\"BreachDate\":\"2021-09-04T00:00:00.000Z\",\"AddedDate\":\"2024-11-05T22:11:58.000Z\",\"ModifiedDate\":\"2024-11-06T04:39:38.000Z\",\"PwnCount\":1356026,\"Description\":\"In October 2024, almost 20GB of data containing 1.3M unique email addresses from motorcycle supplies store Dennis Kirk was circulated. Dating back to September 2021, the data also contained purchases from the online store along with customer names, phone numbers and postcodes. Dennis Kirk did not respond to multiple attempts to make contact about the breach. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;IntelBroker, almighty444 \u0026 EnergyWeaponUser\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DennisKirk.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"phone-numbers\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43745424,\"Name\":\"Altenen\",\"Title\":\"Altenen\",\"Domain\":\"altenens.is\",\"BreachDate\":\"2022-06-24T00:00:00.000Z\",\"AddedDate\":\"2024-11-05T06:20:27.000Z\",\"ModifiedDate\":\"2024-11-05T06:20:27.000Z\",\"PwnCount\":1267701,\"Description\":\"In June 2022, the malicious \u0026quot;carding\u0026quot; (referring to credit card fraud) website Altenen suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The data included 1.3M unique email addresses, usernames, bcrypt password hashes and cryptocurrency wallet addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Altenen.png\",\"DataClasses\":[\"cryptocurrency-wallet-addresses\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43616522,\"Name\":\"ZLib\",\"Title\":\"Z-lib\",\"Domain\":\"z-lib.is\",\"BreachDate\":\"2024-06-20T00:00:00.000Z\",\"AddedDate\":\"2024-11-04T04:12:07.000Z\",\"ModifiedDate\":\"2024-11-04T04:12:07.000Z\",\"PwnCount\":9737374,\"Description\":\"In June 2024, \u003ca href=\\\"https://cybernews.com/security/zlibrary-copycat-exposes-millions-digital-pirates/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ealmost 10M user records from Z-lib were discovered exposed online\u003c/a\u003e. Now defunct, Z-lib was a malicious clone of Z-Library, a well-known shadow online platform for pirating books and academic papers. The exposed data included usernames, email addresses, countries of residence, Bitcoin and Monero cryptocurrency wallet addresses, purchases and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ZLib.png\",\"DataClasses\":[\"cryptocurrency-wallet-addresses\",\"email-addresses\",\"geographic-locations\",\"passwords\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43221189,\"Name\":\"StalkerOnline\",\"Title\":\"Stalker Online\",\"Domain\":\"stalker.so\",\"BreachDate\":\"2020-05-05T00:00:00.000Z\",\"AddedDate\":\"2024-10-31T20:11:33.000Z\",\"ModifiedDate\":\"2024-10-31T20:11:33.000Z\",\"PwnCount\":1385472,\"Description\":\"In May 2020, \u003ca href=\\\"https://www.bitdefender.com/en-gb/blog/hotforsecurity/data-breach-hacker-sells-over-1-3-million-user-records-of-popular-stalker-online-mmo-game-on-dark-web-marketplace/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 1.3M records from the MMO game Stalker Online were breached\u003c/a\u003e. The data included email and IP addresses, usernames and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StalkerOnline.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43116598,\"Name\":\"TNAFlix\",\"Title\":\"TNAFlix\",\"Domain\":\"tnaflix.com\",\"BreachDate\":\"2022-06-01T00:00:00.000Z\",\"AddedDate\":\"2024-10-30T23:01:03.000Z\",\"ModifiedDate\":\"2024-10-30T23:01:03.000Z\",\"PwnCount\":1374344,\"Description\":\"In June 2022, the adult website TNAFlix suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The data included 1.4M records of email and IP addresses, usernames and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TNAFlix.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43037634,\"Name\":\"VimeWorld\",\"Title\":\"VimeWorld\",\"Domain\":\"vimeworld.com\",\"BreachDate\":\"2018-10-01T00:00:00.000Z\",\"AddedDate\":\"2024-10-30T07:02:43.000Z\",\"ModifiedDate\":\"2024-10-30T07:02:43.000Z\",\"PwnCount\":3118964,\"Description\":\"In October 2018, the Russian Minecraft service VimeWorld suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The data included 3.1M records of usernames, email and IP addresses and passwords stored as either MD5 or bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VimeWorld.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":42751487,\"Name\":\"StreamCraft\",\"Title\":\"StreamCraft\",\"Domain\":\"streamcraft.net\",\"BreachDate\":\"2020-07-06T00:00:00.000Z\",\"AddedDate\":\"2024-10-27T21:01:08.000Z\",\"ModifiedDate\":\"2024-10-27T21:01:08.000Z\",\"PwnCount\":1772620,\"Description\":\"In July 2020, the Russian Minecraft service StreamCraft suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The data included 1.8M records of usernames, email and IP addresses and passwords stored as either MD5 or bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StreamCraft.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":42556119,\"Name\":\"TheClubPenguinExperience\",\"Title\":\"The Club Penguin Experience\",\"Domain\":\"thecpexperience.com\",\"BreachDate\":\"2024-10-14T00:00:00.000Z\",\"AddedDate\":\"2024-10-26T05:21:55.000Z\",\"ModifiedDate\":\"2024-10-26T05:21:55.000Z\",\"PwnCount\":6342,\"Description\":\"In October 2024, \u003ca href=\\\"https://x.com/troyhunt/status/1850043298049888760\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eThe Club Penguin Experience (TCPE) suffered a data breach\u003c/a\u003e. The incident exposed over 6k subscribers' email addresses alongside usernames, age groups, passwords stored as bcrypt hashes and in some cases, plain text password hints. TCPE sent prompt disclosure notices to impacted customers following the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TheClubPenguinExperience.png\",\"DataClasses\":[\"age-groups\",\"email-addresses\",\"password-hints\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":42421130,\"Name\":\"digiDirect\",\"Title\":\"digiDirect\",\"Domain\":\"digidirect.com.au\",\"BreachDate\":\"2024-09-29T00:00:00.000Z\",\"AddedDate\":\"2024-10-25T02:01:08.000Z\",\"ModifiedDate\":\"2024-10-25T02:01:08.000Z\",\"PwnCount\":304337,\"Description\":\"In September 2024, \u003ca href=\\\"https://www.theregister.com/2024/10/01/australian_digidirect_info_leak/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data breach sourced from the Australian retailer digiDirect was published to a popular hacking forum\u003c/a\u003e. The breach exposed over 300k rows of data including email and physical address, name, phone number and date of birth. Approximately half the email addresses were on domains from external marketplaces including Amazon, eBay and Westfield.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/digiDirect.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":41964192,\"Name\":\"FairVoteCanada\",\"Title\":\"Fair Vote Canada\",\"Domain\":\"fairvote.ca\",\"BreachDate\":\"2024-03-02T00:00:00.000Z\",\"AddedDate\":\"2024-10-21T05:04:21.000Z\",\"ModifiedDate\":\"2024-10-21T05:06:43.000Z\",\"PwnCount\":134336,\"Description\":\"In March 2024, the Canadian national citizens' campaign for proportional representation \u003ca href=\\\"https://secure.fairvote.ca/en/civicrm/mailing/view?reset=1\u0026id=6424\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFair Vote Canada suffered a data breach\u003c/a\u003e. The incident was attributed to \u0026quot;a well-meaning volunteer\u0026quot; who inadvertently exposed data from 2020 which included 134k unique email addresses, names, physical addresses, phone numbers and, for some individuals, date and amount of a donation.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FairVoteCanada.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"political-donations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":41487080,\"Name\":\"AlpineReplay\",\"Title\":\"AlpineReplay\",\"Domain\":\"traceup.com\",\"BreachDate\":\"2019-08-27T00:00:00.000Z\",\"AddedDate\":\"2024-10-17T04:01:13.000Z\",\"ModifiedDate\":\"2024-10-17T04:01:13.000Z\",\"PwnCount\":898681,\"Description\":\"In 2019, the snow sports tracking app AlpineReplay suffered a data breach that exposed 900k unique email addresses. Later rolled into the Trace service, the breach included names, usernames, genders, dates of birth, weights and passwords stored as either unsalted MD5 or bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AlpineReplay.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"physical-attributes\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":40637722,\"Name\":\"InternetArchive\",\"Title\":\"Internet Archive\",\"Domain\":\"archive.org\",\"BreachDate\":\"2024-09-28T00:00:00.000Z\",\"AddedDate\":\"2024-10-09T22:31:53.000Z\",\"ModifiedDate\":\"2024-10-09T22:31:53.000Z\",\"PwnCount\":31081179,\"Description\":\"In September 2024, the digital library of internet sites \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eInternet Archive suffered a data breach that exposed 31M records\u003c/a\u003e. The breach exposed user records including email addresses, screen names and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/InternetArchive.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":40518705,\"Name\":\"Muah\",\"Title\":\"Muah.AI\",\"Domain\":\"muah.ai\",\"BreachDate\":\"2024-09-17T00:00:00.000Z\",\"AddedDate\":\"2024-10-08T22:05:01.000Z\",\"ModifiedDate\":\"2024-10-08T22:05:01.000Z\",\"PwnCount\":1910261,\"Description\":\"In September 2024, \u003ca href=\\\"https://www.404media.co/hacked-ai-girlfriend-data-shows-prompts-describing-child-sexual-abuse-2/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe \u0026quot;AI girlfriend\u0026quot; website Muah.AI suffered a data breach\u003c/a\u003e. The breach exposed 1.9M email addresses alongside prompts to generate AI-based images. Many of the prompts were highly sexual in nature, with many also describing child exploitation scenarios.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MuahAI.png\",\"DataClasses\":[\"email-addresses\",\"sexual-fetishes\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":40157042,\"Name\":\"Switch\",\"Title\":\"Switch\",\"Domain\":\"switchit.hu\",\"BreachDate\":\"2024-10-01T00:00:00.000Z\",\"AddedDate\":\"2024-10-05T20:18:44.000Z\",\"ModifiedDate\":\"2024-10-05T20:18:44.000Z\",\"PwnCount\":5397,\"Description\":\"In October 2024, the Hungarian IT headhunting service \u003ca href=\\\"https://telex.hu/techtud/2024/10/01/kiberbiztonsag-adatvedelem-adatszivargas-szemelyes-adatok-switch-it-fejvadasz-ceg\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSwitch inadvertently exposed thousands of customer records via a public GitHub repository\u003c/a\u003e. The exposed data contained job applications with names, email addresses and in some cases, commentary on the applicant.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Switch.png\",\"DataClasses\":[\"email-addresses\",\"job-applications\",\"names\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":39655870,\"Name\":\"BudTrader\",\"Title\":\"BudTrader\",\"Domain\":\"budtrader.com\",\"BreachDate\":\"2024-06-27T00:00:00.000Z\",\"AddedDate\":\"2024-10-01T13:51:19.000Z\",\"ModifiedDate\":\"2024-10-01T13:51:19.000Z\",\"PwnCount\":2721185,\"Description\":\"In July 2024, \u003ca href=\\\"https://darkwebinformer.com/a-threat-actor-is-allegedly-selling-data-to-budtrader-com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data breach of the now defunct cannabis social platform BudTrader was posted for sale on a hacking forum\u003c/a\u003e. Dating back to the previous month, the breach of the website exposed 2.7M email addresses, usernames and WordPress password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BudTrader.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":39550194,\"Name\":\"CentralTickets\",\"Title\":\"Central Tickets\",\"Domain\":\"centraltickets.co.uk\",\"BreachDate\":\"2024-07-01T00:00:00.000Z\",\"AddedDate\":\"2024-09-30T15:57:13.000Z\",\"ModifiedDate\":\"2024-09-30T15:57:13.000Z\",\"PwnCount\":722860,\"Description\":\"In September 2024, \u003ca href=\\\"https://www.linkedin.com/posts/threatmon_databreach-cybersecurity-centraltickets-activity-7243167088565960705-vUDM/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata from the ticketing service Central Tickets was publicly posted to a hacking forum\u003c/a\u003e. The data suggests the breach occurred several months earlier and exposed 723k unique email addresses alongside names, phone numbers, IP addresses, purchases and passwords stored as unsalted SHA-1 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CentralTickets.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":38662024,\"Name\":\"GameVN\",\"Title\":\"GameVN\",\"Domain\":\"gamevn.com\",\"BreachDate\":\"2016-05-01T00:00:00.000Z\",\"AddedDate\":\"2024-09-23T01:39:12.000Z\",\"ModifiedDate\":\"2024-09-23T01:39:12.000Z\",\"PwnCount\":1369485,\"Description\":\"In May 2016, the Vietnamese gaming forum GameVN suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. Data breached from the XenForo-based forum included 1.4M unique email addresses, usernames, IP addresses and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GameVN.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":38284149,\"Name\":\"HuntStand\",\"Title\":\"HuntStand\",\"Domain\":\"huntstand.com\",\"BreachDate\":\"2024-03-08T00:00:00.000Z\",\"AddedDate\":\"2024-09-19T07:31:13.000Z\",\"ModifiedDate\":\"2024-09-19T07:31:13.000Z\",\"PwnCount\":2795947,\"Description\":\"In March 2024, \u003ca href=\\\"https://dailydarkweb.net/alleged-database-leak-over-2-9-million-scrapped-huntstand-user-records-reportedly-compromised/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emillions of records scraped from the hunting and land management service HuntStand were publicly posted to a popular hacking forum\u003c/a\u003e. The data included 2.8M unique email addresses with many records also containing name, date of birth and country.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HuntStand.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":37944776,\"Name\":\"InstitutoNacionalDeDeportesDeChile\",\"Title\":\"Instituto Nacional de Deportes de Chile\",\"Domain\":\"ind.cl\",\"BreachDate\":\"2024-09-12T00:00:00.000Z\",\"AddedDate\":\"2024-09-16T22:04:06.000Z\",\"ModifiedDate\":\"2024-09-16T22:04:06.000Z\",\"PwnCount\":319613,\"Description\":\"In September 2024, \u003ca href=\\\"https://doingfedtime.com/1-7-million-users-affected-in-massive-data-breach-at-chiles-national-sports-institute/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Instituto Nacional de Deportes de Chile (Chile's National Sports Institute) suffered a data breach\u003c/a\u003e. The incident exposed 1.7M rows of data with 320k unique email addresses alongside names, dates of birth, genders and bcrypt password hashes. The newest records in the data date back to August 2022, suggesting the breach may be of an older data set.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/InstitutoNacionalDeDeportesDeChile.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":37733555,\"Name\":\"GamesBox\",\"Title\":\"Games Box\",\"Domain\":\"gamesbox.com\",\"BreachDate\":\"2020-09-21T00:00:00.000Z\",\"AddedDate\":\"2024-09-15T02:41:52.000Z\",\"ModifiedDate\":\"2024-09-15T02:41:52.000Z\",\"PwnCount\":1439354,\"Description\":\"In September 2020, now defunct website Games Box suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The impacted data included 1.4M email addresses alongside usernames, genders, ages and passwords stored as either a hash or plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GamesBox.png\",\"DataClasses\":[\"ages\",\"email-addresses\",\"genders\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":36358961,\"Name\":\"BloomsToday\",\"Title\":\"Blooms Today\",\"Domain\":\"bloomstoday.com\",\"BreachDate\":\"2023-11-11T00:00:00.000Z\",\"AddedDate\":\"2024-09-03T07:06:36.000Z\",\"ModifiedDate\":\"2024-09-03T07:06:36.000Z\",\"PwnCount\":3184010,\"Description\":\"In April 2024, \u003ca href=\\\"https://dailydarkweb.net/blooms-today-alleged-data-breach-threat-actor-offers-15-million-records-for-sale-at-5000/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e15M records from the online florist Blooms Today were listed for sale on a popular hacking forum\u003c/a\u003e. The most recent data in the breach corpus was from November 2023 and appeared alongside 3.2M unique email addresses, names, phone numbers physical addresses and partial credit card data (card type, 4 digits of the number and expiry date). The breach did not expose sufficient card data to make purchases. Blooms Today did not respond when contacted about the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BloomsToday.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"partial-credit-card-data\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":36128497,\"Name\":\"MarketMoveis\",\"Title\":\"Market Moveis\",\"Domain\":\"marketmoveis.pt\",\"BreachDate\":\"2023-08-30T00:00:00.000Z\",\"AddedDate\":\"2024-09-01T07:22:42.000Z\",\"ModifiedDate\":\"2024-09-01T07:35:32.000Z\",\"PwnCount\":28220,\"Description\":\"In August 2023, the Portuguese home decor company \u003ca href=\\\"https://portaldaqueixa.com/brands/market-moveis/complaints/market-moveis-encomenda-atrasada-nao-respondem-emails-nem-chamadas-e-email-fraudulento-98633223\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMarket Moveis suffered a data breach\u003c/a\u003e that impacted 28k records. The exposed records were limited to names and email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MarketMoveis.png\",\"DataClasses\":[\"email-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":35885869,\"Name\":\"Lookiero\",\"Title\":\"Lookiero\",\"Domain\":\"lookiero.com\",\"BreachDate\":\"2024-03-27T00:00:00.000Z\",\"AddedDate\":\"2024-08-30T05:23:12.000Z\",\"ModifiedDate\":\"2024-08-30T05:23:12.000Z\",\"PwnCount\":4981760,\"Description\":\"In August 2024, \u003ca href=\\\"https://x.com/DailyDarkWeb/status/1825895814385856678\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data breach from the online styling service Lookiero was posted to a popular hacking forum\u003c/a\u003e. Dating back to March 2024, the data included 5M unique email addresses, with many of the records also including name, phone number and physical address. When contacted about the incident, Lookiero advised that they would \u0026quot;look into it and get back to you if necessary\u0026quot;. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;oathnet.ru\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lookiero.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":35662310,\"Name\":\"Sport2000\",\"Title\":\"Sport 2000\",\"Domain\":\"sport2000.fr\",\"BreachDate\":\"2024-04-18T00:00:00.000Z\",\"AddedDate\":\"2024-08-28T06:56:12.000Z\",\"ModifiedDate\":\"2024-08-28T06:56:12.000Z\",\"PwnCount\":3189643,\"Description\":\"In April 2024, \u003ca href=\\\"https://www.clubic.com/actualite-525045-sport-2000-victime-d-une-cyberattaque-un-gang-de-pirates-francais-soupconne-de-vendre-les-donnees-de-4-millions-de-clients.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe French sporting equipment manufacturer Sport 2000 announced it had suffered a data breach\u003c/a\u003e. The data was subsequently put up for sale on a popular hacking forum and included 4.4M rows with 3.2M unique email addresses alongside names, physical addresses, phone numbers, dates of birth and purchases made by store name. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;oathnet.ru\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Sport2000.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":35379365,\"Name\":\"Traderie\",\"Title\":\"Traderie\",\"Domain\":\"traderie.com\",\"BreachDate\":\"2022-09-24T00:00:00.000Z\",\"AddedDate\":\"2024-08-25T20:08:07.000Z\",\"ModifiedDate\":\"2024-08-25T20:08:07.000Z\",\"PwnCount\":364898,\"Description\":\"In September 2022, \u003ca href=\\\"https://techcrunch.com/2023/09/07/traderie-a-marketplace-for-in-game-items-alerts-users-to-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe in-game trading marketplace Traderie suffered a data breach that exposed almost 400k records\u003c/a\u003e (this preceded a subsequent breach the following year). The incident exposed email and IP addresses, usernames and links to social media profiles. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;oathnet.ru\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Traderie.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":34625347,\"Name\":\"Tracki\",\"Title\":\"Tracki\",\"Domain\":\"tracki.com\",\"BreachDate\":\"2024-08-15T00:00:00.000Z\",\"AddedDate\":\"2024-08-19T07:52:19.000Z\",\"ModifiedDate\":\"2024-08-19T07:52:19.000Z\",\"PwnCount\":372557,\"Description\":\"In August 2024, \u003ca href=\\\"https://maia.crimew.gay/posts/gps-track-deez-nuts/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea slew of security vulnerabilities were identified with a conglomerate of online services which included the GPS tracking service Tracki\u003c/a\u003e. Multiple vulnerabilities exposed the personal records of 372k users of the service including names and email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tracki.png\",\"DataClasses\":[\"email-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":34615259,\"Name\":\"ExploreTalentAug2024\",\"Title\":\"Explore Talent (August 2024)\",\"Domain\":\"exploretalent.com\",\"BreachDate\":\"2024-08-15T00:00:00.000Z\",\"AddedDate\":\"2024-08-19T05:52:35.000Z\",\"ModifiedDate\":\"2024-08-19T05:52:35.000Z\",\"PwnCount\":8929384,\"Description\":\"In August 2024, \u003ca href=\\\"https://maia.crimew.gay/posts/gps-track-deez-nuts/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea slew of security vulnerabilities were identified with a conglomerate of online services which included the talent network Explore Talent\u003c/a\u003e. A vulnerable API exposed the personal records of 11.4M users of the service of which 8.9M unique email addresses were provided to HIBP. This incident is separate to the Explore Talent breach which occurred in 2022 and was loaded into HIBP in July 2024.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ExploreTalent.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":34002385,\"Name\":\"ChrisLeong\",\"Title\":\"Chris Leong\",\"Domain\":\"chrisleong.com\",\"BreachDate\":\"2024-08-10T00:00:00.000Z\",\"AddedDate\":\"2024-08-13T22:16:41.000Z\",\"ModifiedDate\":\"2024-08-13T22:16:41.000Z\",\"PwnCount\":27096,\"Description\":\"In August 2024, \u003ca href=\\\"https://x.com/DarkWebInformer/status/1822330521147376007\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe website of Master Chris Leong \u0026quot;a leading Tit Tar practitioner in Malaysia\u0026quot; suffered a data breach\u003c/a\u003e. The incident exposed 27k unique email addresses along with names, physical addresses, dates of birth, genders, nationalities and in many cases, links to Facebook profiles. The company did not respond when contacted about the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ChrisLeong.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"nationalities\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":33996236,\"Name\":\"LDLC\",\"Title\":\"LDLC\",\"Domain\":\"ldlc.com\",\"BreachDate\":\"2024-02-28T00:00:00.000Z\",\"AddedDate\":\"2024-08-13T21:05:38.000Z\",\"ModifiedDate\":\"2024-08-13T21:23:54.000Z\",\"PwnCount\":1266026,\"Description\":\"In March 2024, \u003ca href=\\\"https://www.groupe-ldlc.com/information-relative-a-un-incident-de-cybersecurite-2/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFrench retailer LDLC disclosed a data breach that impacted customers of their physical stores\u003c/a\u003e. The data was \u003ca href=\\\"https://x.com/H4ckManac/status/1763100569810420017\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epreviously listed for sale on a popular hacking forum\u003c/a\u003e and contained 1.26M unique email addresses along with names, phone numbers and physical addresses. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;oathnet.ru\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LDLC.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":33982749,\"Name\":\"NationalPublicData\",\"Title\":\"National Public Data\",\"Domain\":\"\",\"BreachDate\":\"2024-04-09T00:00:00.000Z\",\"AddedDate\":\"2024-08-13T18:09:46.000Z\",\"ModifiedDate\":\"2024-08-13T18:09:46.000Z\",\"PwnCount\":133957569,\"Description\":\"In April 2024, \u003ca href=\\\"https://www.troyhunt.com/inside-the-3-billion-people-national-public-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea large trove of data made headlines as having exposed \u0026quot;3 billion people\u0026quot; due to a breach of the National Public Data background check service\u003c/a\u003e. The initial corpus of data released in the breach contained billions of rows of personal information, including US social security numbers. Further partial data sets were later released including extensive personal information and 134M unique email addresses, although the origin and accuracy of the data remains in question. This breach has been flagged as \u0026quot;unverified\u0026quot; and a full description of the incident is in the link above.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"government-issued-ids\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":33666874,\"Name\":\"Shadow\",\"Title\":\"Shadow\",\"Domain\":\"shadow.tech\",\"BreachDate\":\"2023-09-28T00:00:00.000Z\",\"AddedDate\":\"2024-08-11T00:06:02.000Z\",\"ModifiedDate\":\"2024-08-11T04:46:29.000Z\",\"PwnCount\":543295,\"Description\":\"In September 2023, the cloud gaming provider \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/shadow-pc-warns-of-data-breach-as-hacker-tries-to-sell-gamers-info/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShadow suffered a data breach that exposed over half a million customer records\u003c/a\u003e. The data included email and physical addresses, names and dates of birth. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;oathnet.ru\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Shadow.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":33481855,\"Name\":\"NotSOCRadar\",\"Title\":\"Not SOCRadar\",\"Domain\":\"\",\"BreachDate\":\"2024-08-03T00:00:00.000Z\",\"AddedDate\":\"2024-08-09T09:28:24.000Z\",\"ModifiedDate\":\"2024-08-09T09:28:24.000Z\",\"PwnCount\":282478425,\"Description\":\"In August 2024, over 332M rows of email addresses were posted to a popular hacking forum. The post alleged the addresses were scraped from cybersecurity firm SOCRadar, however \u003ca href=\\\"https://socradar.io/socradars-response-to-the-usdods-claim-of-scraping-330-million-emails/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ean investigation on their behalf concluded that \u0026quot;the actor merely utilised functionalities inherent in the platform's standard offerings, designed to gather information from publicly available sources\u0026quot;\u003c/a\u003e. There is no suggestion the incident compromised SOCRadar's security or posed any risk to their customers. In total, the data set contained 282M unique addresses of valid email address format.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":33083973,\"Name\":\"ShoeZone\",\"Title\":\"Shoe Zone\",\"Domain\":\"shoezone.com\",\"BreachDate\":\"2024-06-28T00:00:00.000Z\",\"AddedDate\":\"2024-08-05T22:13:35.000Z\",\"ModifiedDate\":\"2024-08-05T22:13:35.000Z\",\"PwnCount\":46140,\"Description\":\"In June 2024, \u003ca href=\\\"https://cybernews.com/news/shoezone-cyberattack-uk-retail-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe UK footwear chain Shoe Zone disclosed a data breach that was subsequently posted for sale on a popular hacking forum\u003c/a\u003e. The data included over 100k orders containing names, addresses, partial credit card numbers (card type and last 4 digits), and 46k unique email addresses. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;IntelBroker\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ShoeZone.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"partial-credit-card-data\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":32648109,\"Name\":\"LuLu\",\"Title\":\"LuLu\",\"Domain\":\"luluhypermarket.com\",\"BreachDate\":\"2024-07-06T00:00:00.000Z\",\"AddedDate\":\"2024-08-02T02:59:07.000Z\",\"ModifiedDate\":\"2024-08-10T07:06:17.000Z\",\"PwnCount\":2796835,\"Description\":\"In July 2024, \u003ca href=\\\"https://www.csoonline.com/article/2516119/hackers-steal-data-of-200k-lulu-customers-in-an-alleged-breach.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Emirati-based LuLu retail store suffered a data breach\u003c/a\u003e. The impacted data included 190k email addresses and associated phone numbers which were subsequently shared on a popular hacking forum. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;IntelBroker\u0026quot;. The following month, the threat of leaking the full database was carried out and a backup from October 2022 with a further 2.6M unique email addresses appeared. This data also included names, physical addresses, orders and PBKDF2 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LuLu.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":32562412,\"Name\":\"MultiplayerIt\",\"Title\":\"Multiplayer.it\",\"Domain\":\"multiplayer.it\",\"BreachDate\":\"2018-09-01T00:00:00.000Z\",\"AddedDate\":\"2024-08-01T08:55:16.000Z\",\"ModifiedDate\":\"2024-08-01T19:28:20.000Z\",\"PwnCount\":503957,\"Description\":\"In April 2024, \u003ca href=\\\"https://twitter.com/DarkWebInformer/status/1779593190141554871\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover half a million records taken from the Italian gaming website Multiplayer.it were posted to a popular hacking forum\u003c/a\u003e. The impacted data included email addresses, usernames and salted MD5 password hashes. Multiplayer.it subsequently confirmed the breach dated back 6 years to September 2018 and was merely re-posted in 2024.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MultiplayerIt.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":32547520,\"Name\":\"TelegramStealerLogs\",\"Title\":\"Stealer Logs Posted to Telegram\",\"Domain\":\"\",\"BreachDate\":\"2024-07-18T00:00:00.000Z\",\"AddedDate\":\"2024-08-01T05:38:53.000Z\",\"ModifiedDate\":\"2024-08-01T05:38:53.000Z\",\"PwnCount\":26105473,\"Description\":\"In July 2024, \u003ca href=\\\"https://troyhunt.com/begging-for-bounties-and-more-info-stealer-logs\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003einfo stealer logs with 26M unique email addresses were collated from malicious Telegram channels\u003c/a\u003e. The data contained 22GB of logs consisting of email addresses, passwords and the websites they were used on, all obtained by malware running on infected machines.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":32443171,\"Name\":\"AnimeLeague\",\"Title\":\"AnimeLeague\",\"Domain\":\"animeleague.net\",\"BreachDate\":\"2024-07-04T00:00:00.000Z\",\"AddedDate\":\"2024-07-31T07:57:48.000Z\",\"ModifiedDate\":\"2024-07-31T07:57:48.000Z\",\"PwnCount\":192134,\"Description\":\"In July 2024, \u003ca href=\\\"https://www.animeleague.net/forum/viewtopic.php?f=55\u0026t=134675\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAnimeLeague disclosed a data breach of their services\u003c/a\u003e. The data was posted for sale on a popular hacking forum and included 2 databases covering both event registration records and a dump of the phpBB bulletin board. The impacted data included passwords in various hashed formats including SHA-1, salted md5 and bcrypt, as well as usernames, private messages, dates of birth, purchases and 192k unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AnimeLeague.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"phone-numbers\",\"private-messages\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":32399538,\"Name\":\"Ubook\",\"Title\":\"Ubook\",\"Domain\":\"ubook.com\",\"BreachDate\":\"2024-07-28T00:00:00.000Z\",\"AddedDate\":\"2024-07-30T22:25:42.000Z\",\"ModifiedDate\":\"2024-07-30T22:25:42.000Z\",\"PwnCount\":699908,\"Description\":\"In July 2024, \u003ca href=\\\"https://gbhackers.com/ubook-suffered-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e700k unique email addresses from the audiobook platform Ubook were posted to a popular hacking forum\u003c/a\u003e. Allegedly scraped from the service, the data appears to be sourced from the Ubook Exchange (UBX) and also includes names, genders, dates of birth and links to profile photos.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ubook.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"profile-photos\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":32309406,\"Name\":\"Spytech\",\"Title\":\"Spytech\",\"Domain\":\"spytech-web.com\",\"BreachDate\":\"2024-06-04T00:00:00.000Z\",\"AddedDate\":\"2024-07-30T03:30:44.000Z\",\"ModifiedDate\":\"2024-07-30T03:30:44.000Z\",\"PwnCount\":5645,\"Description\":\"In July 2024, \u003ca href=\\\"https://techcrunch.com/2024/07/25/spytech-data-breach-windows-mac-android-chromebook-spyware/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003espyware maker Spytech suffered a data breach that exposed data collected as recently as the previous month\u003c/a\u003e. Designed to \u0026quot;invisibly record everything users do\u0026quot;, the breach exposed information related to both purchasers and targets of the product. Target data collection (and subsequent exposure) included the infected computer name, browsing history, applications used, usernames of authenticated users, keywords being monitored, file operations (creation and deletion), computer usage times and email addresses, often captured within the spyware's logs. The data also included the names, purchases and md5 password hashes of purchasers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Spytech.png\",\"DataClasses\":[\"browsing-histories\",\"device-information\",\"email-addresses\",\"names\",\"passwords\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":31743208,\"Name\":\"CondoCom\",\"Title\":\"Condo.com\",\"Domain\":\"condo.com\",\"BreachDate\":\"2019-06-01T00:00:00.000Z\",\"AddedDate\":\"2024-07-25T04:12:07.000Z\",\"ModifiedDate\":\"2024-07-25T04:12:07.000Z\",\"PwnCount\":1481555,\"Description\":\"In June 2019, now defunct website Condo.com suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The impacted data included 1.5M email addresses alongside names, phone numbers and for a small number of records, physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CondoCom.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":31740144,\"Name\":\"ExploreTalent\",\"Title\":\"Explore Talent (July 2024)\",\"Domain\":\"exploretalent.com\",\"BreachDate\":\"2022-02-28T00:00:00.000Z\",\"AddedDate\":\"2024-07-25T03:21:40.000Z\",\"ModifiedDate\":\"2024-08-19T05:52:35.000Z\",\"PwnCount\":5371574,\"Description\":\"In July 2024, \u003ca href=\\\"https://x.com/H4ckManac/status/1813528139881988225\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data breach attributed to Explore Talent was publicly posted to a popular hacking forum\u003c/a\u003e. Containing 5.7M rows with 5.4M unique email addresses, the incident has been described by various sources as occurring between early 2022 to 2023 and also contains names, phone numbers and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ExploreTalent.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":31260223,\"Name\":\"Life360\",\"Title\":\"Life360\",\"Domain\":\"life360.com\",\"BreachDate\":\"2024-03-01T00:00:00.000Z\",\"AddedDate\":\"2024-07-20T21:40:31.000Z\",\"ModifiedDate\":\"2024-07-22T20:46:04.000Z\",\"PwnCount\":442519,\"Description\":\"In July 2024, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/over-400-000-life360-user-phone-numbers-leaked-via-unsecured-android-api/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata scraped from a misconfigured Life360 API was posted online after being obtained several months earlier\u003c/a\u003e. The records included 443k unique email addresses and in most cases, corresponding names and phone numbers (some records were null or obfuscated). Life360 promptly notified impacted users after the incident was discovered.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Life360.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":30230637,\"Name\":\"mSpy2024\",\"Title\":\"mSpy (2024)\",\"Domain\":\"mspy.com\",\"BreachDate\":\"2024-06-09T00:00:00.000Z\",\"AddedDate\":\"2024-07-11T19:29:21.000Z\",\"ModifiedDate\":\"2024-07-12T23:43:02.000Z\",\"PwnCount\":2394179,\"Description\":\"In June 2024, \u003ca href=\\\"https://techcrunch.com/2024/07/11/mspy-spyware-millions-customers-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea huge trove of data from spyware maker mSpy was obtained by hacktivists and published online\u003c/a\u003e. Comprising of 142GB of user data and support tickets along with 176GB of more than half a million attachments, the data contained 2.4M unique email addresses, IP addresses names and photos. The data was predominantly support tickets seeking help to install the spyware on target devices, whilst the attachments contained various data including screen grans of financial transactions, photos of credit cards and nude selfies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/mSpy.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"photos\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":30059718,\"Name\":\"TheHeritageFoundation\",\"Title\":\"The Heritage Foundation\",\"Domain\":\"heritage.org\",\"BreachDate\":\"2024-07-09T00:00:00.000Z\",\"AddedDate\":\"2024-07-10T06:51:28.000Z\",\"ModifiedDate\":\"2024-07-10T06:51:28.000Z\",\"PwnCount\":72004,\"Description\":\"In July 2024, \u003ca href=\\\"https://cyberscoop.com/hackvists-release-two-gigabytes-of-heritage-foundation-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehacktivists published almost 2GB of data taken from The Heritage Foundation and their media arm, The Daily Signal\u003c/a\u003e. The data contained 72k unique email addresses, primarily used for commenting on articles (along with names, IP addresses and the comments left) and by content contributors (along with usernames and passwords stored as either MD5 or phpass hashes).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TheHeritageFoundation.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":30004639,\"Name\":\"NeimanMarcus\",\"Title\":\"Neiman Marcus\",\"Domain\":\"neimanmarcus.com\",\"BreachDate\":\"2024-04-14T00:00:00.000Z\",\"AddedDate\":\"2024-07-09T19:27:32.000Z\",\"ModifiedDate\":\"2024-07-09T19:27:32.000Z\",\"PwnCount\":31152842,\"Description\":\"In May 2024, the American luxury retailer Neiman Marcus suffered a data breach \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/neiman-marcus-data-breach-31-million-email-addresses-found-exposed/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewhich was later posted to a popular hacking forum\u003c/a\u003e. The data included 31M unique email addresses, names, phone numbers, dates of birth, physical addresses and partial credit card data (note: this is insufficient to make purchases). The breach was traced back to a series of attacks against the Snowflake cloud service which impacted 165 organisations worldwide.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NeimanMarcus.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":29784473,\"Name\":\"HuskyOwners\",\"Title\":\"Husky Owners\",\"Domain\":\"husky-owners.com\",\"BreachDate\":\"2024-07-04T00:00:00.000Z\",\"AddedDate\":\"2024-07-07T20:40:12.000Z\",\"ModifiedDate\":\"2024-07-07T20:40:12.000Z\",\"PwnCount\":16502,\"Description\":\"In July 2024, \u003ca href=\\\"https://archive.is/lFPTL\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Husky Owners forum website was defaced\u003c/a\u003e and linked to a breach of user data containing 16k records. The exposed data included usernames, email addresses, dates of birth and time zones.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HuskyOwners.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"time-zones\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":29579063,\"Name\":\"RobloxDeveloperConference2024\",\"Title\":\"FNTECH\",\"Domain\":\"fntech.com\",\"BreachDate\":\"2024-07-04T00:00:00.000Z\",\"AddedDate\":\"2024-07-06T01:21:29.000Z\",\"ModifiedDate\":\"2024-07-10T06:59:15.000Z\",\"PwnCount\":10386,\"Description\":\"In July 2024, the events management platform FNTECH suffered a data breach that exposed 10k unique email addresses. The data contained registrants from various events, \u003ca href=\\\"https://x.com/Roblox_RTC/status/1809300821701427220\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eincluding participants of the Roblox Developer Conference registration list\u003c/a\u003e. The data also included names and IP addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FNTECH.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":29371686,\"Name\":\"DateHotBrunettes\",\"Title\":\"Date Hot Brunettes\",\"Domain\":\"datehotbrunettes.com\",\"BreachDate\":\"2021-01-12T00:00:00.000Z\",\"AddedDate\":\"2024-07-04T05:08:43.000Z\",\"ModifiedDate\":\"2024-07-04T05:08:43.000Z\",\"PwnCount\":1494078,\"Description\":\"In January 2021, the now defunct website Date Hot Brunettes which provided a service to \u0026quot;Date Neglected Women Who Can Keep a Secret\u0026quot;, suffered a data breach. The incident exposed 1.5M unique email addresses along with IP addresses, usernames, user-entered bios and MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DateHotBrunettes.png\",\"DataClasses\":[\"bios\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":28681108,\"Name\":\"Ticketek\",\"Title\":\"Ticketek\",\"Domain\":\"ticketek.com.au\",\"BreachDate\":\"2024-05-31T00:00:00.000Z\",\"AddedDate\":\"2024-06-28T01:17:02.000Z\",\"ModifiedDate\":\"2024-07-17T20:43:22.000Z\",\"PwnCount\":17643173,\"Description\":\"In May 2024, \u003ca href=\\\"https://www.abc.net.au/news/2024-05-31/ticketek-australia-cyber-security-data-breach-names-emails-leak/103921986\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Australian event ticketing company Ticketek reported a data breach linked to a third party cloud-based platform\u003c/a\u003e. The following month, \u003ca href=\\\"https://techcrunch.com/2024/06/21/hacker-claims-to-have-30-million-customer-records-from-australian-ticket-seller-giant-teg/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe data appeared for sale on a popular hacking forum\u003c/a\u003e and was later linked to a series of breaches of the Snowflake cloud storage service. The data contained almost 30M rows with 17.6M unique email addresses alongside names, genders, dates of birth and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ticketek.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":true,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":28270707,\"Name\":\"AdvanceAutoParts\",\"Title\":\"Advance Auto Parts\",\"Domain\":\"advanceautoparts.com\",\"BreachDate\":\"2024-06-05T00:00:00.000Z\",\"AddedDate\":\"2024-06-24T09:51:11.000Z\",\"ModifiedDate\":\"2024-06-24T09:51:11.000Z\",\"PwnCount\":79243727,\"Description\":\"In June 2024, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/advance-auto-parts-confirms-data-breach-exposed-employee-information/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAdvance Auto Parts confirmed they had suffered a data breach\u003c/a\u003e which was posted for sale to a popular hacking forum. Linked to unauthorised access to Snowflake cloud services, the breach exposed a large number of records related to both customers and employees. In total, 79M unique email addresses were included in the breach, alongside names, phone numbers, addresses and further data attributes related to company employees.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AdvanceAutoParts.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":27468551,\"Name\":\"ZadigVoltaire\",\"Title\":\"Zadig \u0026 Voltaire\",\"Domain\":\"zadig-et-voltaire.com\",\"BreachDate\":\"2023-11-16T00:00:00.000Z\",\"AddedDate\":\"2024-06-17T06:02:11.000Z\",\"ModifiedDate\":\"2024-06-17T06:02:11.000Z\",\"PwnCount\":586895,\"Description\":\"In June 2024, \u003ca href=\\\"https://x.com/h4ckmanac/status/1798228918006091819\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data brach sourced from French fashion brand Zadig \u0026 Voltaire was publicly posted to a popular hacking forum\u003c/a\u003e. The data included names, email and physical addresses, phone numbers and genders. When contacted about the incident, Zadig \u0026 Voltaire advised the incident had occurred more than 6 months ago and that \u0026quot;all measures were taken quickly\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ZadigVoltaire.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":25961060,\"Name\":\"TelegramCombolists\",\"Title\":\"Combolists Posted to Telegram\",\"Domain\":\"\",\"BreachDate\":\"2024-05-28T00:00:00.000Z\",\"AddedDate\":\"2024-06-03T19:10:03.000Z\",\"ModifiedDate\":\"2024-06-11T07:01:09.000Z\",\"PwnCount\":361468099,\"Description\":\"In May 2024, \u003ca href=\\\"https://troyhunt.com/telegram-combolists-and-361m-email-addresses\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e2B rows of data with 361M unique email addresses were collated from malicious Telegram channels\u003c/a\u003e. The data contained 122GB across 1.7k files with email addresses, usernames, passwords and in many cases, the website they were entered into. The data appears to have been sourced from a combination of existing combolists and info stealer malware.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":27468440,\"Name\":\"Combolists Posted to Telegram\",\"Title\":\"Telegram Combolists\",\"Domain\":\"\",\"BreachDate\":\"2024-05-28T00:00:00.000Z\",\"AddedDate\":\"2024-06-03T19:10:03.000Z\",\"ModifiedDate\":\"2024-06-11T07:01:09.000Z\",\"PwnCount\":361468099,\"Description\":\"In May 2024, \u003ca href=\\\"https://troyhunt.com/telegram-combolists-and-361m-email-addresses\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e2B rows of data with 361M unique email addresses were collated from malicious Telegram channels\u003c/a\u003e. The data contained 122GB across 1.7k files with email addresses, usernames, passwords and in many cases, the website they were entered into. The data appears to have been sourced from a combination of existing combolists and info stealer malware.\",\"LogoPath\":\"List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":25444860,\"Name\":\"OperationEndgame\",\"Title\":\"Operation Endgame\",\"Domain\":\"\",\"BreachDate\":\"2024-05-30T00:00:00.000Z\",\"AddedDate\":\"2024-05-30T04:19:45.000Z\",\"ModifiedDate\":\"2024-05-31T03:22:05.000Z\",\"PwnCount\":16466858,\"Description\":\"In May 2024, \u003ca href=\\\"https://www.troyhunt.com/operation-endgame/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea coalition of international law enforcement agencies took down a series of botnets in a campaign they coined \u0026quot;Operation Endgame\u0026quot;\u003c/a\u003e. Data seized in the operation included impacted email addresses and passwords which were provided to HIBP to help victims learn of their exposure.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":24968250,\"Name\":\"pcTattletale\",\"Title\":\"pcTattletale\",\"Domain\":\"pctattletale.com\",\"BreachDate\":\"2024-05-25T00:00:00.000Z\",\"AddedDate\":\"2024-05-25T21:38:18.000Z\",\"ModifiedDate\":\"2024-07-11T19:29:17.000Z\",\"PwnCount\":138751,\"Description\":\"In May 2024, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe spyware service pcTattletale suffered a data breach that defaced the website and posted tens of gigabytes of data to the homepage\u003c/a\u003e, allegedly due to pcTattletale not responding to a previous security vulnerability report. The breach exposed data including membership records, infected PC names, captured messages and extensive logs of IP addresses and device information.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/pcTattletale.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"sms-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":24674582,\"Name\":\"Dota2\",\"Title\":\"Dota2\",\"Domain\":\"dev.dota2.com\",\"BreachDate\":\"2016-07-10T00:00:00.000Z\",\"AddedDate\":\"2024-05-23T06:44:21.000Z\",\"ModifiedDate\":\"2024-05-23T06:44:21.000Z\",\"PwnCount\":1907205,\"Description\":\"In July 2016, \u003ca href=\\\"https://news.softpedia.com/news/data-of-nearly-2-million-users-exposed-in-dota2-forum-hack-507162.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Dota2 official developers forum suffered a data breach that exposed almost 2 million users\u003c/a\u003e. The hack of the vBulletin forum led to the disclosure of email and IP addresses, usernames and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dota2.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":23200944,\"Name\":\"ThePostMillennial\",\"Title\":\"The Post Millennial\",\"Domain\":\"thepostmillennial.com\",\"BreachDate\":\"2024-05-02T00:00:00.000Z\",\"AddedDate\":\"2024-05-10T01:55:22.000Z\",\"ModifiedDate\":\"2024-05-14T20:33:14.000Z\",\"PwnCount\":56973345,\"Description\":\"$1c\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ThePostMillennial.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":23085129,\"Name\":\"Tappware\",\"Title\":\"Tappware\",\"Domain\":\"tappware.com\",\"BreachDate\":\"2024-04-23T00:00:00.000Z\",\"AddedDate\":\"2024-05-09T00:34:12.000Z\",\"ModifiedDate\":\"2024-05-09T00:34:12.000Z\",\"PwnCount\":94734,\"Description\":\"In April 2024, \u003ca href=\\\"https://bcsi.gov.bd/bangladeshi-tech-company-tappware-database-compromise/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea substantial volume of data was taken from the Bangladeshi IT services provider Tappware and published to a popular hacking forum\u003c/a\u003e. Comprising of 95k unique email addresses, the data also included extensive labour information on local citizens including names, physical addresses, job titles, dates of birth, genders and scans of government issued national identity (NID) cards.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tappware.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"government-issued-ids\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\",\"religions\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":22090340,\"Name\":\"MovieBoxPro\",\"Title\":\"MovieBoxPro\",\"Domain\":\"movieboxpro.app\",\"BreachDate\":\"2024-04-15T00:00:00.000Z\",\"AddedDate\":\"2024-04-30T01:54:06.000Z\",\"ModifiedDate\":\"2024-04-30T01:54:06.000Z\",\"PwnCount\":6009014,\"Description\":\"In April 2024, over 6M records from the streaming service MovieBoxPro were scraped from a vulnerable API. Of questionable legality, the service \u003ca href=\\\"https://twitter.com/troyhunt/status/1784701384266543128\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eprovided no contact information to disclose the incident\u003c/a\u003e, although reportedly the vulnerability was rectified after being mass enumerated.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MovieBoxPro.png\",\"DataClasses\":[\"email-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":21643040,\"Name\":\"PipingRock\",\"Title\":\"Piping Rock\",\"Domain\":\"pipingrock.com\",\"BreachDate\":\"2024-04-24T00:00:00.000Z\",\"AddedDate\":\"2024-04-26T01:13:39.000Z\",\"ModifiedDate\":\"2024-04-26T01:13:39.000Z\",\"PwnCount\":2103100,\"Description\":\"In April 2024, \u003ca href=\\\"https://cybernews.com/news/piping-rock-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e2.1M email addresses from the online health products store Piping Rock were publicly posted to a popular hacking forum\u003c/a\u003e. The data also included names, phone numbers and physical addresses. The account posting the data had previously posted multiple other data breaches which all appear to have been obtained from the Shopify service used by the respective websites.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PipingRock.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":21223288,\"Name\":\"T2\",\"Title\":\"T2\",\"Domain\":\"t2tea.com\",\"BreachDate\":\"2024-04-17T00:00:00.000Z\",\"AddedDate\":\"2024-04-22T06:17:17.000Z\",\"ModifiedDate\":\"2024-04-24T04:06:11.000Z\",\"PwnCount\":94584,\"Description\":\"In April 2024, \u003ca href=\\\"https://www.cyberdaily.au/security/10446-t2-scalded-by-alleged-data-breach-affecting-more-than-80-000-customers\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e95k records from the T2 tea store were posted to a popular hacking forum\u003c/a\u003e. Data included email and physical addresses, names, phone numbers, dates of birth, purchases and passwords stored as scrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/T2.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":20790639,\"Name\":\"LeSlipFrancais\",\"Title\":\"Le Slip Français\",\"Domain\":\"leslipfrancais.fr\",\"BreachDate\":\"2024-04-13T00:00:00.000Z\",\"AddedDate\":\"2024-04-18T07:44:32.000Z\",\"ModifiedDate\":\"2024-04-18T07:44:32.000Z\",\"PwnCount\":1495127,\"Description\":\"In April 2024, the French underwear maker \u003ca href=\\\"https://twitter.com/troyhunt/status/1780856574787064075\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLe Slip Français suffered a data breach\u003c/a\u003e. The breach included 1.5M email addresses, physical addresses, names and phone numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LeSlipFrancais.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":20194592,\"Name\":\"GiantTiger\",\"Title\":\"Giant Tiger\",\"Domain\":\"gianttiger.com\",\"BreachDate\":\"2024-03-04T00:00:00.000Z\",\"AddedDate\":\"2024-04-12T22:31:29.000Z\",\"ModifiedDate\":\"2024-04-12T22:57:56.000Z\",\"PwnCount\":2842669,\"Description\":\"In March 2024, \u003ca href=\\\"https://cybernews.com/news/giant-tiger-customers-exposed/#google_vignette\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCanadian discount store Giant Tiger suffered a data breach that exposed 2.8M customer records\u003c/a\u003e. Attributed to a vendor of the retailer, the breach included physical and email addresses, names and phone numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GiantTiger.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":19970447,\"Name\":\"SalvadoranCitizens\",\"Title\":\"Salvadoran Citizens\",\"Domain\":\"\",\"BreachDate\":\"2024-04-02T00:00:00.000Z\",\"AddedDate\":\"2024-04-10T22:25:03.000Z\",\"ModifiedDate\":\"2024-04-10T22:26:30.000Z\",\"PwnCount\":946989,\"Description\":\"In April 2024, \u003ca href=\\\"https://protos.com/hacker-doxxes-nearly-every-adult-in-el-salvador/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enearly 6 million records of Salvadoran citizens were published to a popular hacking forum\u003c/a\u003e. The data included names, dates of birth, phone numbers, physical addresses and nearly 1M unique email addresses. Further, over 5M corresponding profile photos were also included in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ElSalvadorFlag.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"government-issued-ids\",\"names\",\"phone-numbers\",\"physical-addresses\",\"profile-photos\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":19788155,\"Name\":\"KasperskyClub\",\"Title\":\"Kaspersky Club\",\"Domain\":\"kasperskyclub.ru\",\"BreachDate\":\"2024-03-24T00:00:00.000Z\",\"AddedDate\":\"2024-04-09T06:22:14.000Z\",\"ModifiedDate\":\"2024-04-09T06:22:14.000Z\",\"PwnCount\":55971,\"Description\":\"In March 2024, the independent fan forum \u003ca href=\\\"https://www.hackread.com/57000-kaspersky-fan-club-forum-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKaspersky Club suffered a data breach\u003c/a\u003e. The incident exposed 56k unique email addresses alongside usernames, IP addresses and passwords stored as either MD5 or bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/KasperskyClub.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":19687042,\"Name\":\"boAt\",\"Title\":\"boAt\",\"Domain\":\"boat-lifestyle.com\",\"BreachDate\":\"2024-03-25T00:00:00.000Z\",\"AddedDate\":\"2024-04-08T08:33:44.000Z\",\"ModifiedDate\":\"2024-04-09T04:17:09.000Z\",\"PwnCount\":7528985,\"Description\":\"In March 2024, the Indian audio and wearables brand \u003ca href=\\\"https://www.forbesindia.com/article/news/hit-with-massive-data-breach-boat-loses-data-of-75-million-customers/92483/1\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eboAt suffered a data breach that exposed 7.5M customer records\u003c/a\u003e. The data included physical and email address, names and phone numbers, all of which were subsequently published to a popular clear web hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/boAt.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":19095491,\"Name\":\"SurveyLama\",\"Title\":\"SurveyLama\",\"Domain\":\"surveylama.com\",\"BreachDate\":\"2024-02-01T00:00:00.000Z\",\"AddedDate\":\"2024-04-02T23:04:58.000Z\",\"ModifiedDate\":\"2024-04-02T23:04:58.000Z\",\"PwnCount\":4426879,\"Description\":\"In February 2024, the paid survey website SurveyLama suffered a data breach that exposed 4.4M customer email addresses. The incident also exposed names, physical and IP addresses, phone numbers, dates of birth and passwords stored as either salted SHA-1, bcrypt or argon2 hashes. When contacted about the incident, SurveyLama advised that they had already \u0026quot;notified the users by email\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SurveyLama.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18920099,\"Name\":\"Pandabuy\",\"Title\":\"Pandabuy\",\"Domain\":\"pandabuy.com\",\"BreachDate\":\"2024-03-31T00:00:00.000Z\",\"AddedDate\":\"2024-04-01T08:34:24.000Z\",\"ModifiedDate\":\"2024-04-01T08:34:24.000Z\",\"PwnCount\":1348407,\"Description\":\"In March 2024, \u003ca href=\\\"https://twitter.com/troyhunt/status/1774704266500043067\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e1.3M unique email addresses from the online store for purchasing goods from China, Pandabuy, were posted to a popular hacking forum\u003c/a\u003e. The data also included IP and physical addresses, names, phone numbers and order enquiries. The breach was alleged to be attributed to \u0026quot;Sanggiero\u0026quot; and \u0026quot;IntelBroker\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Pandabuy.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18784095,\"Name\":\"WashingtonStateFoodWorkerCard\",\"Title\":\"Washington State Food Worker Card\",\"Domain\":\"foodworkercard.wa.gov\",\"BreachDate\":\"2022-11-17T00:00:00.000Z\",\"AddedDate\":\"2024-03-31T02:34:15.000Z\",\"ModifiedDate\":\"2024-03-31T02:38:36.000Z\",\"PwnCount\":1594305,\"Description\":\"In June 2023, \u003ca href=\\\"https://tpchd.org/news/data-breach-exposed-food-worker-card-records-we-are-notifying-those-affected/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Tacoma-Pierce County Health Department announced a data breach of their Washington State Food Worker Card online training system\u003c/a\u003e. The breach was published to a popular hacking forum the year before and dated back to a 2018 database backup. Included in the data were 1.6M unique email addresses along with names, post codes, dates of birth and approximately 9.5k driver's licence numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TacomaPierceCountyHealthDepartment.png\",\"DataClasses\":[\"dates-of-birth\",\"driver-s-licenses\",\"email-addresses\",\"geographic-locations\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18556353,\"Name\":\"ECB\",\"Title\":\"England Cricket\",\"Domain\":\"ecb.co.uk\",\"BreachDate\":\"2024-03-23T00:00:00.000Z\",\"AddedDate\":\"2024-03-29T01:10:19.000Z\",\"ModifiedDate\":\"2024-03-29T01:15:59.000Z\",\"PwnCount\":43299,\"Description\":\"In March 2024, \u003ca href=\\\"https://www.thecricketer.com/Topics/grassroots/ecb_issue_warning_to_users_of_online_coaching_platform_following_data_breach.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEnglish Cricket's icoachcricket website suffered a data breach that exposed over 40k records\u003c/a\u003e. The data included email addresses and passwords stored as either bcrypt hashes, salted MD5 hashes or both. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;IntelBroker\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ECB.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18472125,\"Name\":\"Exvagos\",\"Title\":\"Exvagos\",\"Domain\":\"exvagos.org\",\"BreachDate\":\"2022-07-21T00:00:00.000Z\",\"AddedDate\":\"2024-03-28T06:28:55.000Z\",\"ModifiedDate\":\"2024-03-28T06:28:55.000Z\",\"PwnCount\":2121789,\"Description\":\"In July 2022, the direct download website Exvagos suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The breach exposed 2.1M unique email addresses along with IP addresses, usernames, dates of birth and MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Exvagos.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18361517,\"Name\":\"GSMHosting\",\"Title\":\"GSM Hosting\",\"Domain\":\"gsmhosting.com\",\"BreachDate\":\"2016-08-01T00:00:00.000Z\",\"AddedDate\":\"2024-03-27T06:23:58.000Z\",\"ModifiedDate\":\"2024-03-27T06:29:15.000Z\",\"PwnCount\":2607440,\"Description\":\"In August 2016, \u003ca href=\\\"https://www.hackread.com/vbulletin-forums-hacked-accounts-sold-on-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreached data from the vBulletin forum for GSM-Hosting appeared for sale alongside dozens of other hacked services\u003c/a\u003e. The breach impacted 2.6M users of the service and included email and IP addresses, usernames and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GSMHosting.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18263443,\"Name\":\"SwordFantasy\",\"Title\":\"SwordFantasy\",\"Domain\":\"swordfantasy.com\",\"BreachDate\":\"2017-01-20T00:00:00.000Z\",\"AddedDate\":\"2024-03-26T08:31:58.000Z\",\"ModifiedDate\":\"2024-03-26T08:31:58.000Z\",\"PwnCount\":2690657,\"Description\":\"In January 2019, the now defunct MMO and RPG game SwordFantasy suffered a data breach that exposed 2.7M unique email addresses. Other impacted data included username, IP address and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SwordFantasy.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":17818708,\"Name\":\"MediaWorks\",\"Title\":\"MediaWorks\",\"Domain\":\"mediaworks.co.nz\",\"BreachDate\":\"2023-03-15T00:00:00.000Z\",\"AddedDate\":\"2024-03-22T06:43:09.000Z\",\"ModifiedDate\":\"2024-03-22T06:43:09.000Z\",\"PwnCount\":162710,\"Description\":\"In March 2024, \u003ca href=\\\"https://www.rnz.co.nz/news/national/512042/mediaworks-data-breach-hackers-email-victims-demanding-820\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emillions of rows of data from the New Zealand media company MediaWorks was publicly posted to a popular hacking forum\u003c/a\u003e. The incident exposed 163k unique email addresses provided by visitors who filled out online competitions and included names, physical addresses, phone numbers, dates of birth, genders and the responses to questions in the competition. Some victims of the breach subsequently received ransom demands requesting payment to have their data deleted.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MediaWorks.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":17491408,\"Name\":\"AllegedATT\",\"Title\":\"AT\u0026T\",\"Domain\":\"\",\"BreachDate\":\"2021-08-20T00:00:00.000Z\",\"AddedDate\":\"2024-03-19T06:30:49.000Z\",\"ModifiedDate\":\"2024-03-31T03:04:13.000Z\",\"PwnCount\":49102176,\"Description\":\"$1d\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ATT.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"government-issued-ids\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":16827985,\"Name\":\"ClickASnap\",\"Title\":\"ClickASnap\",\"Domain\":\"clickasnap.com\",\"BreachDate\":\"2022-09-24T00:00:00.000Z\",\"AddedDate\":\"2024-03-13T03:47:22.000Z\",\"ModifiedDate\":\"2024-03-13T03:47:22.000Z\",\"PwnCount\":3262980,\"Description\":\"In September 2022, the online photo sharing platform \u003ca href=\\\"https://blog.clickasnap.com/2022/10/14/clickasnap-website-breach-24-09-22/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eClickASnap suffered a data breach\u003c/a\u003e. The incident exposed almost 3.3M personal records including email addresses, usernames and passwords stored as SHA-512 hashes. Further, a collection of paid subscriptions were also included and contained names, physical addresses and amounts paid.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ClickASnap.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"purchases\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":16725694,\"Name\":\"Flipkart\",\"Title\":\"Misattributed Flipkart Data\",\"Domain\":\"\",\"BreachDate\":\"2022-09-02T00:00:00.000Z\",\"AddedDate\":\"2024-03-12T05:09:11.000Z\",\"ModifiedDate\":\"2024-05-02T23:00:46.000Z\",\"PwnCount\":552094,\"Description\":\"In September 2022, \u003ca href=\\\"https://izoologic.com/region/central-asia/a-new-alleged-flipkart-data-breach-was-discovered-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 500k customer records alleged to have been sourced from the Indian e-commerce service Flipkart appeared on a popular hacking forum\u003c/a\u003e. Flipkart subsequently reviewed the data and concluded there was minimal overlap with their subscriber base and was not sourced from their services. The data included email addresses, latitudes and longitudes, names and phone numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"phone-numbers\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":16500890,\"Name\":\"Habibs\",\"Title\":\"Misattributed Habib's Data\",\"Domain\":\"habibs.com.br\",\"BreachDate\":\"2021-08-05T00:00:00.000Z\",\"AddedDate\":\"2024-03-10T03:31:15.000Z\",\"ModifiedDate\":\"2024-05-25T21:24:28.000Z\",\"PwnCount\":3517679,\"Description\":\"In August 2021, an allegation was made that the Brazilian fast food company \u0026quot;Habib's\u0026quot; had suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. Upon thorough investigation, parent company Gennius concluded that the information in the breach was not related to any databases that hold their customers' personal information and had been misattributed to Habib's. The corpus of data contained 3.5M unique email addresses along with IP addresses, names, phone numbers, dates of birth and links to social media profiles.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":16378980,\"Name\":\"APKTW\",\"Title\":\"APK.TW\",\"Domain\":\"apk.tw\",\"BreachDate\":\"2022-09-03T00:00:00.000Z\",\"AddedDate\":\"2024-03-09T00:17:54.000Z\",\"ModifiedDate\":\"2024-03-09T00:17:54.000Z\",\"PwnCount\":2451197,\"Description\":\"In September 2022, the Taiwanese Android forum APK.TW suffered a data breach \u003ca href=\\\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethat was later redistributed as part of a larger corpus of data\u003c/a\u003e. The breach exposed 2.5M unique email addresses along with IP addresses, usernames and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/APKTW.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":16191911,\"Name\":\"OnlineTrade\",\"Title\":\"Online Trade (Онлайн Трейд)\",\"Domain\":\"onlinetrade.ru\",\"BreachDate\":\"2022-09-19T00:00:00.000Z\",\"AddedDate\":\"2024-03-07T06:51:12.000Z\",\"ModifiedDate\":\"2024-03-07T07:01:28.000Z\",\"PwnCount\":3805265,\"Description\":\"In September 2022, the Russian e-commerce website \u003ca href=\\\"https://xakep.ru/2022/09/21/new-leaks/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOnline Trade (Онлайн Трейд) suffered a data breach\u003c/a\u003e that exposed 3.8M customer records. The data included email and IP addresses, names, phone numbers, dates of birth and MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OnlineTrade.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":16178671,\"Name\":\"WoTLabs\",\"Title\":\"WoTLabs\",\"Domain\":\"wotlabs.net\",\"BreachDate\":\"2024-03-03T00:00:00.000Z\",\"AddedDate\":\"2024-03-07T03:32:45.000Z\",\"ModifiedDate\":\"2024-03-07T03:45:25.000Z\",\"PwnCount\":21994,\"Description\":\"In March 2024, WoTLabs (World of Tanks Statistics and Resources) suffered a data breach and \u003ca href=\\\"https://web.archive.org/web/20240303062156/http://forum.wotlabs.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewebsite defacement attributed to \u0026quot;chromebook breachers\u0026quot;\u003c/a\u003e. The breach exposed 22k forum members' personal data including email and IP addresses, usernames, dates of birth and time zones.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WoTLabs.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"time-zones\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":15758761,\"Name\":\"MrGreenGaming\",\"Title\":\"Mr. Green Gaming\",\"Domain\":\"mrgreengaming.com\",\"BreachDate\":\"2024-03-01T00:00:00.000Z\",\"AddedDate\":\"2024-03-03T06:28:42.000Z\",\"ModifiedDate\":\"2024-03-03T06:41:04.000Z\",\"PwnCount\":27123,\"Description\":\"In March 2024, the online games community Mr. Green Gaming suffered a data breach that exposed 27k user records. Acknowledged on their Discord server, the incident exposed email and IP addresses, usernames, geographic locations and dates of birth.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MrGreenGaming.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":15399171,\"Name\":\"CutoutPro\",\"Title\":\"Cutout.Pro\",\"Domain\":\"cutout.pro\",\"BreachDate\":\"2024-02-26T00:00:00.000Z\",\"AddedDate\":\"2024-02-28T22:16:27.000Z\",\"ModifiedDate\":\"2024-02-28T22:16:27.000Z\",\"PwnCount\":19972829,\"Description\":\"In February 2024, the AI-powered visual design platform \u003ca href=\\\"https://twitter.com/H4ckManac/status/1762387053889675658\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCutout.Pro suffered a data breach that exposed 20M records\u003c/a\u003e. The data included email and IP addresses, names and salted MD5 password hashes which were subsequently broadly distributed on a popular hacking forum and Telegram channels.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CutoutPro.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":15307881,\"Name\":\"Tangerine\",\"Title\":\"Tangerine\",\"Domain\":\"tangerinetelecom.com.au\",\"BreachDate\":\"2024-02-18T00:00:00.000Z\",\"AddedDate\":\"2024-02-28T01:42:43.000Z\",\"ModifiedDate\":\"2024-02-28T01:42:43.000Z\",\"PwnCount\":243462,\"Description\":\"In February 2024, the Australian Telco \u003ca href=\\\"https://www.itnews.com.au/news/tangerine-telecom-says-customer-data-of-232000-affected-by-cyber-incident-605337\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTangerine suffered a data breach that exposed over 200k customer records\u003c/a\u003e. Attributed to a legacy customer database, the data included physical and email addresses, names, phone numbers and dates of birth. Whilst the Tangerine login process involves sending a one-time password after entering an email address and phone number, it previously used a traditional password which was also exposed as a bcrypt hash.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tangerine.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":14659340,\"Name\":\"FacebookMarketplace\",\"Title\":\"Facebook Marketplace\",\"Domain\":\"facebook.com\",\"BreachDate\":\"2023-10-01T00:00:00.000Z\",\"AddedDate\":\"2024-02-22T00:53:37.000Z\",\"ModifiedDate\":\"2024-02-22T00:55:02.000Z\",\"PwnCount\":77267,\"Description\":\"In February 2024, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/200-000-facebook-marketplace-user-records-leaked-on-hacking-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e200k Facebook Marketplace records allegedly obtained from a Meta contractor in October 2023 were posted to a popular hacking forum\u003c/a\u003e. The data contained 77k unique email addresses alongside names, phone numbers, Facebook profile IDs and geographic locations. The data also contained bcrypt password hashes, although there is no indication these belong to the corresponding Facebook accounts.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Facebook.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":12865923,\"Name\":\"Spoutible\",\"Title\":\"Spoutible\",\"Domain\":\"spoutible.com\",\"BreachDate\":\"2024-01-31T00:00:00.000Z\",\"AddedDate\":\"2024-02-05T07:33:00.000Z\",\"ModifiedDate\":\"2024-02-05T07:33:00.000Z\",\"PwnCount\":207114,\"Description\":\"In January 2024, \u003ca href=\\\"https://www.troyhunt.com/how-spoutibles-leaky-api-spurted-out-a-deluge-of-personal-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSpoutible had 207k records scraped from a misconfigured API that inadvertently returned excessive personal information\u003c/a\u003e. The data included names, usernames, email and IP addresses, phone numbers (where provided to the platform), genders and bcrypt password hashes. The incident also exposed 2FA secrets and backup codes along with password reset tokens.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Spoutible.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11890951,\"Name\":\"MyPertamina\",\"Title\":\"MyPertamina\",\"Domain\":\"mypertamina.id\",\"BreachDate\":\"2022-11-01T00:00:00.000Z\",\"AddedDate\":\"2024-01-27T05:19:27.000Z\",\"ModifiedDate\":\"2024-01-27T05:19:27.000Z\",\"PwnCount\":5970416,\"Description\":\"In November 2022, the Indonesian oil and gas company \u003ca href=\\\"https://voi.id/en/technology/226367\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePertamina suffered a data breach of their MyPertamina service\u003c/a\u003e. The incident exposed 44M records with 6M unique email addresses along with names, dates of birth, genders, physical addresses and purchases.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MyPertamina.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11434829,\"Name\":\"Trello\",\"Title\":\"Trello\",\"Domain\":\"trello.com\",\"BreachDate\":\"2024-01-16T00:00:00.000Z\",\"AddedDate\":\"2024-01-22T19:41:05.000Z\",\"ModifiedDate\":\"2024-01-22T19:41:05.000Z\",\"PwnCount\":15111945,\"Description\":\"In January 2024, \u003ca href=\\\"https://twitter.com/H4ckManac/status/1747527579559411959\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata was scraped from Trello and posted for sale on a popular hacking forum\u003c/a\u003e. Containing over 15M email addresses, names and usernames, the data was obtained by enumerating a publicly accessible resource using email addresses from previous breach corpuses. Trello advised that no unauthorised access had occurred.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Trello.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11434627,\"Name\":\"NazApi\",\"Title\":\"Naz.API\",\"Domain\":\"\",\"BreachDate\":\"2023-09-20T00:00:00.000Z\",\"AddedDate\":\"2024-01-17T13:24:27.000Z\",\"ModifiedDate\":\"2024-01-17T13:24:27.000Z\",\"PwnCount\":70840771,\"Description\":\"In September 2023, \u003ca href=\\\"https://www.troyhunt.com/inside-the-massive-naz-api-credential-stuffing-list/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 100GB of stealer logs and credential stuffing lists titled \u0026quot;Naz.API\u0026quot; was posted to a popular hacking forum\u003c/a\u003e. The incident contained a combination of email address and plain text password pairs alongside the service they were entered into, and standalone credential pairs obtained from unnamed sources. In total, the corpus of data included 71M unique email addresses and 100M unique passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11434472,\"Name\":\"Hathway\",\"Title\":\"Hathway\",\"Domain\":\"hathway.com\",\"BreachDate\":\"2023-12-17T00:00:00.000Z\",\"AddedDate\":\"2024-01-12T09:34:25.000Z\",\"ModifiedDate\":\"2024-01-12T09:34:25.000Z\",\"PwnCount\":4670080,\"Description\":\"In December 2023, \u003ca href=\\\"https://restoreprivacy.com/hacker-allegedly-holds-data-of-41-million-hathway-customers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehundreds of gigabytes of data allegedly taken from Indian ISP and digital TV provider Hathway appeared on a popular hacking website\u003c/a\u003e. The incident exposed extensive personal information including 4.7M unique email addresses along with names, physical and IP addresses, phone numbers, password hashes and support ticket logs.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Hathway.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"salutations\",\"support-tickets\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11434546,\"Name\":\"LegendasTV\",\"Title\":\"Legendas.TV\",\"Domain\":\"legendas.tv\",\"BreachDate\":\"2017-10-01T00:00:00.000Z\",\"AddedDate\":\"2024-01-04T17:10:04.000Z\",\"ModifiedDate\":\"2024-01-04T17:10:04.000Z\",\"PwnCount\":3869181,\"Description\":\"In October 2017, the now defunct Brazilian service for retrieving subtitles in Portuguese \u003ca href=\\\"https://www.hackread.com/dark-web-hacker-selling-accounts-on-dream-market/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLegendas.TV suffered a data breach that exposed nearly 4M customer records\u003c/a\u003e. The impacted data included names, usernames, email and IP addresses and unsalted SHA-1 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LegendasTV.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10919962,\"Name\":\"DCHealth\",\"Title\":\"DC Health Link\",\"Domain\":\"dchealthlink.com\",\"BreachDate\":\"2023-03-06T00:00:00.000Z\",\"AddedDate\":\"2023-12-14T19:11:43.000Z\",\"ModifiedDate\":\"2023-12-14T23:34:44.000Z\",\"PwnCount\":48145,\"Description\":\"In March 2023, \u003ca href=\\\"https://cyberscoop.com/dc-health-link-breach-russia-hacker-congress/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDC Health Link discovered a data breach\u003c/a\u003e that was later publicly posted to a popular data breach forum. The impacted data included 48k unique email addresses alongside names, genders, dates of birth, home addresses, phone numbers and social security numbers. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;Aegis\u0026quot; and \u0026quot;IntelBroker\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DCHealth.png\",\"DataClasses\":[\"citizenship-statuses\",\"dates-of-birth\",\"email-addresses\",\"employers\",\"ethnicities\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"social-security-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10623107,\"Name\":\"InflateVids\",\"Title\":\"InflateVids\",\"Domain\":\"tube.inflatevids.xyz\",\"BreachDate\":\"2023-12-12T00:00:00.000Z\",\"AddedDate\":\"2023-12-12T00:13:41.000Z\",\"ModifiedDate\":\"2023-12-12T00:13:41.000Z\",\"PwnCount\":13405,\"Description\":\"In December 2023, the inflatable and balloon fetish videos website \u003ca href=\\\"https://twitter.com/InflateVids/status/1734114873317925294\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eInflateVids suffered a data breach\u003c/a\u003e. The incident exposed over 13k unique email addresses alongside usernames, IP addresses, genders and SHA-1 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/InflateVids.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10531861,\"Name\":\"Kaneva\",\"Title\":\"Kaneva\",\"Domain\":\"kaneva.com\",\"BreachDate\":\"2016-07-01T00:00:00.000Z\",\"AddedDate\":\"2023-12-09T07:00:29.000Z\",\"ModifiedDate\":\"2023-12-09T07:00:29.000Z\",\"PwnCount\":3901179,\"Description\":\"In July 2016, now defunct website Kaneva, the service to \u0026quot;build and explore virtual worlds\u0026quot;, suffered a data breach that exposed 3.9M user records. The data included email addresses, usernames, dates of birth and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Kaneva.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10511209,\"Name\":\"Gemplex\",\"Title\":\"Gemplex\",\"Domain\":\"gemplex.tv\",\"BreachDate\":\"2021-02-18T00:00:00.000Z\",\"AddedDate\":\"2023-12-09T02:19:40.000Z\",\"ModifiedDate\":\"2023-12-09T02:19:40.000Z\",\"PwnCount\":4563166,\"Description\":\"In February 2021, the Indian streaming platform Gemplex suffered a data breach that exposed 4.6M user accounts. The impacted data included device information, names, phone numbers, email addresses and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Gemplex.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10407871,\"Name\":\"MovieForums\",\"Title\":\"Movie Forums\",\"Domain\":\"movieforums.com\",\"BreachDate\":\"2022-11-24T00:00:00.000Z\",\"AddedDate\":\"2023-12-08T02:45:49.000Z\",\"ModifiedDate\":\"2023-12-08T02:45:49.000Z\",\"PwnCount\":39914,\"Description\":\"In December 2022, \u003ca href=\\\"https://www.movieforums.com/community/showthread.php?t=67897\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Movie Forums website suffered a data breach\u003c/a\u003e that affected 40k users. The breach exposed email and IP addresses, usernames, dates of birth and passwords stored as easily crackable salted MD5 hashes. The data was subsequently posted a popular clear web hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MovieForums.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10316158,\"Name\":\"JoyGames\",\"Title\":\"JoyGames\",\"Domain\":\"joygames.me\",\"BreachDate\":\"2019-12-14T00:00:00.000Z\",\"AddedDate\":\"2023-12-07T05:52:24.000Z\",\"ModifiedDate\":\"2023-12-07T05:52:24.000Z\",\"PwnCount\":4461787,\"Description\":\"In December 2019, the forum for the JoyGames website suffered a data breach that exposed 4.5M unique email addresses. The impacted data also included usernames, IP addresses and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JoyGames.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10110655,\"Name\":\"RailYatri\",\"Title\":\"RailYatri\",\"Domain\":\"railyatri.in\",\"BreachDate\":\"2022-12-26T00:00:00.000Z\",\"AddedDate\":\"2023-12-05T07:17:53.000Z\",\"ModifiedDate\":\"2023-12-05T07:17:53.000Z\",\"PwnCount\":23209732,\"Description\":\"In December 2022, India’s government-approved online travel agency \u003ca href=\\\"https://cybersecuritynews.com/railyatri-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRailYatri suffered a data breach\u003c/a\u003e. The incident impacted over 31M customers and exposed 23M unique email addresses. Also impacted were names, genders, phone numbers and tickets purchased, including travel information and fares.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RailYatri.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9900177,\"Name\":\"SoarGames\",\"Title\":\"SoarGames\",\"Domain\":\"soargames.com\",\"BreachDate\":\"2019-12-16T00:00:00.000Z\",\"AddedDate\":\"2023-12-03T06:56:13.000Z\",\"ModifiedDate\":\"2023-12-03T06:56:13.000Z\",\"PwnCount\":4774445,\"Description\":\"In December 2019, the now defunct gaming website SoarGames suffered a data breach that exposed 4.8M unique email addresses. The impacted data included usernames, email and IP addresses and salted MD5 password hashes. A significant number of the email addresses appeared to have been generated as opposed to organically provided by the user.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SoarGames.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9585979,\"Name\":\"GoNinja\",\"Title\":\"Go Ninja\",\"Domain\":\"goninja.de\",\"BreachDate\":\"2019-12-17T00:00:00.000Z\",\"AddedDate\":\"2023-11-30T07:18:59.000Z\",\"ModifiedDate\":\"2023-11-30T07:18:59.000Z\",\"PwnCount\":4999001,\"Description\":\"In December 2019, the now defunct German gaming website Go Ninja suffered a data breach that exposed 5M unique email addresses. The impacted data included usernames, email and IP addresses and salted MD5 password hashes. More than 4M of the email addresses appeared to have been generated as opposed to organically provided by the user.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GoNinja.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9543631,\"Name\":\"EstanteVirtual\",\"Title\":\"Estante Virtual\",\"Domain\":\"estantevirtual.com.br\",\"BreachDate\":\"2019-02-28T00:00:00.000Z\",\"AddedDate\":\"2023-11-29T22:13:34.000Z\",\"ModifiedDate\":\"2023-11-29T22:13:34.000Z\",\"PwnCount\":5412603,\"Description\":\"In February 2019, the Brazilian book store \u003ca href=\\\"https://www.zdnet.com/article/round-4-hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEstante Virtual suffered a data breach that impacted 5.4M customers\u003c/a\u003e. The exposed data included names, usernames, email and physical addresses, phone numbers, dates of birth and unsalted SHA-1 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EstanteVirtual.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9474347,\"Name\":\"BleachAnime\",\"Title\":\"Bleach Anime Forum\",\"Domain\":\"bleachanime.org\",\"BreachDate\":\"2015-01-01T00:00:00.000Z\",\"AddedDate\":\"2023-11-29T06:22:50.000Z\",\"ModifiedDate\":\"2023-11-29T06:22:50.000Z\",\"PwnCount\":143711,\"Description\":\"In 2015, the now defunct independent forum for the Bleach Anime series suffered a data breach that exposed 144k user records. The impacted data included usernames, email addresses and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BleachAnime.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9267467,\"Name\":\"IndiHome\",\"Title\":\"IndiHome\",\"Domain\":\"indihome.co.id\",\"BreachDate\":\"2019-11-01T00:00:00.000Z\",\"AddedDate\":\"2023-11-27T07:02:10.000Z\",\"ModifiedDate\":\"2023-11-27T21:36:59.000Z\",\"PwnCount\":12629245,\"Description\":\"In mid-2021, \u003ca href=\\\"https://en.antaranews.com/news/245609/communication-ministry-studying-report-of-indihome-data-leak\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ereports emerged of a data breach of Indonesia's telecommunications company, IndiHome\u003c/a\u003e. Over 26M rows of data alleged to have been sourced from the company was posted to a popular hacking forum and contained 12.6M unique email addresses alongside names, IP addresses, genders and geographic locations. The most recent data was stamped as being recorded in November 2019.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/IndiHome.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9252953,\"Name\":\"JamTangan\",\"Title\":\"Jam Tangan\",\"Domain\":\"jamtangan.com\",\"BreachDate\":\"2021-07-06T00:00:00.000Z\",\"AddedDate\":\"2023-11-27T03:49:33.000Z\",\"ModifiedDate\":\"2023-11-27T03:49:33.000Z\",\"PwnCount\":434784,\"Description\":\"In July 2021, the online Indonesian watch store, Jam Tangan (AKA Machtwatch), suffered a data breach that exposed over 400k customer records which were subsequently posted to a popular hacking forum. The data included email and IP addresses, names, phone numbers, physical addresses and passwords stored as either unsalted MD5 or bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JamTangan.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9045616,\"Name\":\"KitchenPal\",\"Title\":\"KitchenPal\",\"Domain\":\"kitchenpalapp.com\",\"BreachDate\":\"2023-11-14T00:00:00.000Z\",\"AddedDate\":\"2023-11-24T20:42:36.000Z\",\"ModifiedDate\":\"2023-11-24T20:42:36.000Z\",\"PwnCount\":98726,\"Description\":\"In November 2023, the kitchen management application \u003ca href=\\\"https://restoreprivacy.com/hackers-claim-attack-on-general-electric-leak-data-samples/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKitchenPal suffered a data breach that exposed 146k lines of data\u003c/a\u003e. When contacted about the incident, KitchenPal advised the corpus of data came from a staging environment, although acknowledged it contained a small number of users for debugging purposes and included passwords that could not be used. Impacted data included almost 100k email addresses, names, geolocations and incomplete data on dates of birth, genders, height and weight, social media profile identifiers and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/KitchenPal.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\",\"physical-attributes\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":8631606,\"Name\":\"OMGPOP\",\"Title\":\"OMGPOP\",\"Domain\":\"omgpop.com\",\"BreachDate\":\"2013-01-01T00:00:00.000Z\",\"AddedDate\":\"2023-11-20T21:20:28.000Z\",\"ModifiedDate\":\"2023-11-20T21:20:28.000Z\",\"PwnCount\":7071293,\"Description\":\"In approximately 2013, the maker of the Draw Something game \u003ca href=\\\"https://www.cpomagazine.com/cyber-security/password-breach-of-game-developer-zynga-compromises-170-million-accounts/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOMGPOP suffered a data breach\u003c/a\u003e. Formerly known as i'minlikewithyou or iilwy and later purchased by Zynga, the breach exposed over 7M email address and plain text password pairs which were later leaked in 2019.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OMGPOP.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":8049153,\"Name\":\"Acuity\",\"Title\":\"Acuity\",\"Domain\":\"\",\"BreachDate\":\"2020-06-18T00:00:00.000Z\",\"AddedDate\":\"2023-11-15T07:16:23.000Z\",\"ModifiedDate\":\"2023-11-15T07:16:23.000Z\",\"PwnCount\":14055729,\"Description\":\"In mid-2020, \u003ca href=\\\"https://www.troyhunt.com/acuity-who-attempts-and-failures-to-attribute-437gb-of-breached-data\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea 437GB corpus of data attributed to an entity named \u0026quot;Acuity\u0026quot; was created and later extensively distributed\u003c/a\u003e. However, the source could not be confidently verified as any known companies named Acuity. The data totalled over 14M unique email addresses with each row containing extensive personal information across more than 400 columns of data including names, phone numbers, physical addresses, genders and dates of birth.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":7943783,\"Name\":\"Avito\",\"Title\":\"Avito\",\"Domain\":\"avito.ma\",\"BreachDate\":\"2022-11-18T00:00:00.000Z\",\"AddedDate\":\"2023-11-14T06:51:25.000Z\",\"ModifiedDate\":\"2023-11-14T06:51:25.000Z\",\"PwnCount\":2721835,\"Description\":\"In November 2022, the Moroccan e-commerce service \u003ca href=\\\"https://ledesk.ma/2022/12/20/avito-sexplique-sur-le-data-breach-ayant-touche-27-millions-dutilisateurs-de-sa-plateforme/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAvito suffered a data breach that exposed the personal information of 2.7M customers\u003c/a\u003e. The data included name, email, phone, IP address and geographic location.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Avito.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":7508359,\"Name\":\"Chess\",\"Title\":\"Chess\",\"Domain\":\"chess.com\",\"BreachDate\":\"2023-11-08T00:00:00.000Z\",\"AddedDate\":\"2023-11-10T02:02:26.000Z\",\"ModifiedDate\":\"2023-11-10T02:02:26.000Z\",\"PwnCount\":827620,\"Description\":\"In November 2023, \u003ca href=\\\"https://www.hackread.com/hacker-leaks-scraped-chess-com-user-records/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 800k user records were scraped from the Chess website and posted to a popular hacking forum\u003c/a\u003e. The data included email address, name, username and the geographic location of the user.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Chess.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":7219156,\"Name\":\"LinkedInScrape2023\",\"Title\":\"LinkedIn Scraped and Faked Data (2023)\",\"Domain\":\"linkedin.com\",\"BreachDate\":\"2023-11-04T00:00:00.000Z\",\"AddedDate\":\"2023-11-07T07:12:02.000Z\",\"ModifiedDate\":\"2024-06-04T19:46:37.000Z\",\"PwnCount\":19788753,\"Description\":\"In November 2023, \u003ca href=\\\"https://troyhunt.com/hackers-scrapers-fakers-whats-really-inside-the-latest-linkedin-dataset\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea post to a popular hacking forum alleged that millions of LinkedIn records had been scraped and leaked\u003c/a\u003e. On investigation, the data turned out to be a combination of legitimate data scraped from LinkedIn and email addresses constructed from impacted individuals' names.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LinkedIn.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"job-titles\",\"names\",\"professional-skills\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":7080291,\"Name\":\"GamingMonk\",\"Title\":\"GamingMonk\",\"Domain\":\"gamingmonk.com\",\"BreachDate\":\"2020-12-02T00:00:00.000Z\",\"AddedDate\":\"2023-11-05T23:05:37.000Z\",\"ModifiedDate\":\"2023-11-05T23:05:37.000Z\",\"PwnCount\":654510,\"Description\":\"In December 2020, India's \u0026quot;largest esports community\u0026quot; \u003ca href=\\\"http://gamingmonk.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGamingMonk\u003c/a\u003e (since acquired by and redirected to MPL Esports), suffered a data breach. The incident exposed 655k unique email addresses along with names, usernames, phone numbers, dates of birth and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GamingMonk.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":6799528,\"Name\":\"Fitmart\",\"Title\":\"Fitmart\",\"Domain\":\"fitmart.de\",\"BreachDate\":\"2021-10-01T00:00:00.000Z\",\"AddedDate\":\"2023-11-03T05:57:10.000Z\",\"ModifiedDate\":\"2023-11-03T05:57:10.000Z\",\"PwnCount\":214492,\"Description\":\"In October 2021, \u003ca href=\\\"https://www.mydealz.de/diskussion/datenleck-bei-fitmart-2214625\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata from the German fitness supplies store Fitmart was obtained and later redistributed online\u003c/a\u003e. The data included 214k unique email addresses accompanied by plain text passwords, allegedly \u0026quot;dehashed\u0026quot; from the original stored version.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Fitmart.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":5562724,\"Name\":\"GameSprite\",\"Title\":\"GameSprite\",\"Domain\":\"gamesprite.me\",\"BreachDate\":\"2019-12-17T00:00:00.000Z\",\"AddedDate\":\"2023-10-30T02:32:54.000Z\",\"ModifiedDate\":\"2023-10-30T07:06:29.000Z\",\"PwnCount\":6164643,\"Description\":\"In December 2019, the now defunct gaming platform \u003ca href=\\\"https://gamesprite.me\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGameSprite\u003c/a\u003e suffered a data breach that exposed over 6M unique email addresses. The impacted data also included usernames, IP addresses and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GameSprite.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":5040899,\"Name\":\"MemeChat\",\"Title\":\"MemeChat\",\"Domain\":\"memechat.app\",\"BreachDate\":\"2022-06-01T00:00:00.000Z\",\"AddedDate\":\"2023-10-29T05:02:56.000Z\",\"ModifiedDate\":\"2023-10-29T05:02:56.000Z\",\"PwnCount\":4348570,\"Description\":\"In mid-2022, \u0026quot;the ultimate hub of memes\u0026quot; \u003ca href=\\\"https://twitter.com/search?q=memechat%20breach\u0026src=typed_query\u0026f=media\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMemeChat suffered a data breach that exposed 7.4M records\u003c/a\u003e. Alleged to be due to a misconfigured Elasticsearch instance, the data contained 4.3M unique email addresses alongside usernames.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MemeChat.png\",\"DataClasses\":[\"email-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":3919288,\"Name\":\"Toumei\",\"Title\":\"Toumei\",\"Domain\":\"toumei.co.jp\",\"BreachDate\":\"2023-10-18T00:00:00.000Z\",\"AddedDate\":\"2023-10-27T07:16:19.000Z\",\"ModifiedDate\":\"2023-10-27T07:16:19.000Z\",\"PwnCount\":76682,\"Description\":\"In October 2023, the Japanese consultancy firm \u003ca href=\\\"https://www.toumei.co.jp/news/2023/10/information_privacy/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eToumei suffered a data breach\u003c/a\u003e. The breach exposed over 100M lines and 10GB of data including 77k unique email addresses along with names, phone numbers and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Toumei.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":2703356,\"Name\":\"Tunngle\",\"Title\":\"Tunngle\",\"Domain\":\"tunngle.net\",\"BreachDate\":\"2016-07-01T00:00:00.000Z\",\"AddedDate\":\"2023-10-21T21:20:33.000Z\",\"ModifiedDate\":\"2023-10-21T21:20:33.000Z\",\"PwnCount\":8192928,\"Description\":\"In 2016, the now defunct global LAN gaming network \u003ca href=\\\"https://web.archive.org/web/20160305044242/http://www.tunngle.net/en/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTunngle\u003c/a\u003e suffered a data breach that exposed 8.2M unique email addresses. The compromised data also included usernames, IP addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tunngle.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":2537879,\"Name\":\"Sphero\",\"Title\":\"Sphero\",\"Domain\":\"sphero.com\",\"BreachDate\":\"2023-09-09T00:00:00.000Z\",\"AddedDate\":\"2023-10-20T07:16:25.000Z\",\"ModifiedDate\":\"2023-10-20T07:16:25.000Z\",\"PwnCount\":832255,\"Description\":\"In September 2023, \u003ca href=\\\"https://www.safetydetectives.com/news/sphero-leak-report/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 1M rows of data from the educational robots company Sphero was posted to a popular hacking forum\u003c/a\u003e. The data contained 832k unique email addresses alongside names, usernames, dates of birth and geographic locations.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Sphero.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"names\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":2230476,\"Name\":\"AndroidLista\",\"Title\":\"AndroidLista\",\"Domain\":\"androidlista.com\",\"BreachDate\":\"2021-07-28T00:00:00.000Z\",\"AddedDate\":\"2023-10-17T21:15:55.000Z\",\"ModifiedDate\":\"2023-10-17T21:18:24.000Z\",\"PwnCount\":6640643,\"Description\":\"In July 2021, the Android applications and games review site \u003ca href=\\\"https://www.androidlista.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAndroidLista\u003c/a\u003e suffered a data breach. The incident exposed 6.6M user records containing email addresses, names, usernames and passwords stored as salted SHA-1 hashes, all of which were subsequently posted to a popular hacking forum. AndroidLista did not respond when contacted about the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AndroidLista.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":2150567,\"Name\":\"Phoenix\",\"Title\":\"Phoenix\",\"Domain\":\"phoenixim.ddns.net\",\"BreachDate\":\"2021-06-05T00:00:00.000Z\",\"AddedDate\":\"2023-10-17T02:27:58.000Z\",\"ModifiedDate\":\"2023-10-17T02:27:58.000Z\",\"PwnCount\":74776,\"Description\":\"In mid-2021, the \u0026quot;vintage messaging reborn\u0026quot; service \u003ca href=\\\"https://prnt.sc/_t-Usfo2rHqP\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePhoenix suffered a data breach\u003c/a\u003e that exposed 75k unique email addresses. The breach also exposed IP addresses, usernames and passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Phoenix.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":1334410,\"Name\":\"BVD\",\"Title\":\"Public Business Data\",\"Domain\":\"bvdinfo.com\",\"BreachDate\":\"2021-08-19T00:00:00.000Z\",\"AddedDate\":\"2023-10-09T07:05:10.000Z\",\"ModifiedDate\":\"2023-12-06T22:45:20.000Z\",\"PwnCount\":27917714,\"Description\":\"In approximately August 2021, \u003ca href=\\\"https://kaduu.io/blog/2022/02/04/us-strategic-company-bureau-van-dijk-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehundreds of gigabytes of business data collated from public sources was obtained and later published to a popular hacking forum\u003c/a\u003e. Sourced from a customer of Bureau van Dijk's (BvD) \u0026quot;Orbis\u0026quot; product, the corpus of data released contained hundreds of millions of lines about corporations and individuals, including personal information such as names and dates of birth. The data also included 28M unique email addresses along with physical addresses (presumedly corporate locations), phone numbers and job titles. There was no unauthorised access to BvD's systems, nor did the incident expose any of their or parent company's Moody's clients.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":1300028,\"Name\":\"PaySystemTech\",\"Title\":\"PaySystem.tech\",\"Domain\":\"paysystem.tech\",\"BreachDate\":\"2022-04-29T00:00:00.000Z\",\"AddedDate\":\"2023-10-08T23:07:02.000Z\",\"ModifiedDate\":\"2023-10-08T23:07:02.000Z\",\"PwnCount\":1410764,\"Description\":\"In mid-2022, \u003ca href=\\\"https://twitter.com/troyhunt/status/1711145477872431529\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata alleged to have been sourced from the Russian payment provider PaySystem.tech appeared in hacking circles where it was made publicly available for download\u003c/a\u003e. Consisting of 16M rows with 1.4M unique email addresses, the data also included purchases and full credit card numbers and expiry dates. The data could not be independently attributed back to PaySystem.tech and the breach has been flagged as \u0026quot;unverified\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PaySystemTech.png\",\"DataClasses\":[\"credit-cards\",\"email-addresses\",\"purchases\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":884966,\"Name\":\"Hjedd\",\"Title\":\"Hjedd\",\"Domain\":\"hjedd.com\",\"BreachDate\":\"2022-07-18T00:00:00.000Z\",\"AddedDate\":\"2023-10-05T03:41:42.000Z\",\"ModifiedDate\":\"2023-10-05T03:41:42.000Z\",\"PwnCount\":13204029,\"Description\":\"In July 2022, the Chinese adult website \u003ca href=\\\"https://www.bitdefender.com.au/blog/hotforsecurity/leaky-platform-at-chinese-adult-platform-exposed-sensitive-info-of-14-million-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHjedd was found to be leaking more than 13M customer records which subsequently appeared on a popular hacking forum\u003c/a\u003e. The exposed data included email and IP addresses, usernames and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Hjedd.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":695925,\"Name\":\"Activision\",\"Title\":\"Activision\",\"Domain\":\"activision.com\",\"BreachDate\":\"2022-12-04T00:00:00.000Z\",\"AddedDate\":\"2023-10-03T07:09:49.000Z\",\"ModifiedDate\":\"2023-10-03T07:09:49.000Z\",\"PwnCount\":16006,\"Description\":\"In December 2022, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-leaks-alleged-activision-employee-data-on-cybercrime-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eattackers socially engineered an Activision HR employee into disclosing information which led to the breach of almost 20k employee records\u003c/a\u003e. The data contained 16k unique email addresses along with names, phone numbers, job titles and the office location of the employee. Activision advised that no sensitive employee information was included in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Activision.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"job-titles\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":593830,\"Name\":\"HorseIsle\",\"Title\":\"Horse Isle\",\"Domain\":\"horseisle.com\",\"BreachDate\":\"2020-09-19T00:00:00.000Z\",\"AddedDate\":\"2023-10-02T06:47:11.000Z\",\"ModifiedDate\":\"2023-10-02T06:48:42.000Z\",\"PwnCount\":27786,\"Description\":\"In June 2020 then again in September that same year, \u003ca href=\\\"https://hi1.horseisle.com/web/news.php\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHorse Isle \u0026quot;The Secrent Land of Horses\u0026quot; suffered a data breach\u003c/a\u003e. The incident exposed 28k unique email addresses along with names, usernames, IP addresses, genders, purchases and plain text passwords. The system also stored and exposed failed password attempts for each user with the password retained in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HorseIsle.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":137444,\"Name\":\"ApexSMS\",\"Title\":\"ApexSMS\",\"Domain\":\"\",\"BreachDate\":\"2019-04-15T00:00:00.000Z\",\"AddedDate\":\"2023-09-21T14:57:43.000Z\",\"ModifiedDate\":\"2023-09-21T14:57:43.000Z\",\"PwnCount\":23246481,\"Description\":\"In May 2019, \u003ca href=\\\"https://techcrunch.com/2019/05/09/sms-spammers-doxxed/?guccounter=1\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of a massive SMS spam operation known as \u0026quot;ApexSMS\u0026quot; which was discovered after a MongoDB instance of the same name was found exposed without a password\u003c/a\u003e. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and IP addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"phone-numbers\",\"telecommunications-carrier\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":136859,\"Name\":\"dBforums\",\"Title\":\"dBforums\",\"Domain\":\"dbforums.com\",\"BreachDate\":\"2016-07-04T00:00:00.000Z\",\"AddedDate\":\"2023-09-20T07:26:28.000Z\",\"ModifiedDate\":\"2023-09-20T07:26:28.000Z\",\"PwnCount\":363468,\"Description\":\"In July 2016, \u003ca href=\\\"https://www.vice.com/en/article/78kwwe/hackers-allegedly-steal-14m-passwords-from-mac-forums-web-hosting-talk\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data breach of the now defunct database forum \u0026quot;dBforums\u0026quot; appeared for sale alongside several others hacked from the parent company, Penton\u003c/a\u003e. The breach of the vBulletin based forum contained 363k unique email addresses alongside usernames, IP addresses, dates of birth and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/dBforums.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":132851,\"Name\":\"MalindoAir\",\"Title\":\"MalindoAir\",\"Domain\":\"malindoair.com\",\"BreachDate\":\"2019-03-01T00:00:00.000Z\",\"AddedDate\":\"2023-09-14T08:52:38.000Z\",\"ModifiedDate\":\"2023-09-14T08:52:38.000Z\",\"PwnCount\":4328232,\"Description\":\"In early 2019, the Malaysian airline \u003ca href=\\\"https://vpnoverview.com/news/malindo-air-data-leak-reveals-info-of-60-million-passengers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMalindo Air suffered a data breach that exposed tens of millions of customer records\u003c/a\u003e. Containing 4.3M unique email addresses, the breach also exposed extensive personal information including names, dates of birth, genders, physical addresses, phone numbers and passport details. The data was later extensively shared on popular hacking forums.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MalindoAir.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"loyalty-program-details\",\"names\",\"nationalities\",\"passport-numbers\",\"phone-numbers\",\"physical-addresses\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":131018,\"Name\":\"VivaAir\",\"Title\":\"Viva Air\",\"Domain\":\"vivaair.com\",\"BreachDate\":\"2022-03-14T00:00:00.000Z\",\"AddedDate\":\"2023-09-11T07:11:30.000Z\",\"ModifiedDate\":\"2024-06-04T18:43:45.000Z\",\"PwnCount\":932232,\"Description\":\"In March 2022, the now defunct Colombian airline \u003ca href=\\\"https://muchohacker.lol/2023/01/viva-air-leak-26-millones-de-datos-privados-de-clientes-de-la-aerolinea-de-bajo-costo-estarian-en-linea-desde-hace-nueve-meses/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eViva Air suffered a data breach and subsequent ransomware attack\u003c/a\u003e. Among a trove of other ransomed data, the incident exposed a log of 2.6M transactions with 932k unique email addresses, physical and IP addresses, names, phone numbers and partial credit card data (last 4 digits).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VivaAir.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":128459,\"Name\":\"Dymocks\",\"Title\":\"Dymocks\",\"Domain\":\"dymocks.com.au\",\"BreachDate\":\"2023-06-20T00:00:00.000Z\",\"AddedDate\":\"2023-09-08T07:35:22.000Z\",\"ModifiedDate\":\"2023-09-08T07:46:30.000Z\",\"PwnCount\":836120,\"Description\":\"In September 2023, the Australian book retailer \u003ca href=\\\"https://www.abc.net.au/news/2023-09-08/dymocks-warns-customers-after-information-leaked-to-dark-web/102833430\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDymocks announced a data breach\u003c/a\u003e. The data dated back to June 2023 and contained 1.2M records with 836k unique email addresses. The breach also exposed names, dates of birth, genders, phone numbers and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dymocks.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":123133,\"Name\":\"CERTPolandPhish\",\"Title\":\"Phished Data via CERT Poland\",\"Domain\":\"\",\"BreachDate\":\"2023-02-25T00:00:00.000Z\",\"AddedDate\":\"2023-08-31T05:53:44.000Z\",\"ModifiedDate\":\"2023-08-31T05:53:44.000Z\",\"PwnCount\":67943,\"Description\":\"In August 2023, \u003ca href=\\\"https://www.troyhunt.com/68k-polish-phishing-victims-are-now-searchable-in-have-i-been-pwned-courtesy-of-cert-poland\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCERT Poland observed a phishing campaign that collected credentials from 68k victims\u003c/a\u003e. The campaign collected email addresses and passwords via a phishing email masquerading as a purchase order confirmation. CERT Poland identified a further 202 other phishing campaigns operating on the same C2 server, which has now been dismantled.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":123122,\"Name\":\"Pampling\",\"Title\":\"Pampling\",\"Domain\":\"pampling.com\",\"BreachDate\":\"2020-01-04T00:00:00.000Z\",\"AddedDate\":\"2023-08-31T05:09:24.000Z\",\"ModifiedDate\":\"2023-09-03T06:23:38.000Z\",\"PwnCount\":383468,\"Description\":\"In January 2020, \u003ca href=\\\"https://www.elespanol.com/omicrono/20200308/comprado-camiseta-pampling-cambia-contrasena-seguridad/473202676_0.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe online clothing retailer Pampling suffered a data breach\u003c/a\u003e that exposed 383k unique customer email addresses. The data was later shared on a popular hacking forum and also included names, usernames and unsalted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Pampling.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":123142,\"Name\":\"PlayCyberGames\",\"Title\":\"PlayCyberGames\",\"Domain\":\"playcybergames.com\",\"BreachDate\":\"2023-08-09T00:00:00.000Z\",\"AddedDate\":\"2023-08-31T02:22:55.000Z\",\"ModifiedDate\":\"2023-08-31T02:22:55.000Z\",\"PwnCount\":3681753,\"Description\":\"In August 2023, PlayCyberGames which \u0026quot;allows users to play any games with LAN function or games using IP address\u0026quot; suffered a data breach which exposed 3.7M customer records. The data included email addresses, usernames and MD5 password hashes with a constant value in the \u0026quot;salt\u0026quot; field. PlayCyberGames did not respond to multiple attempts to disclose the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PlayCyberGames.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":121766,\"Name\":\"Qakbot\",\"Title\":\"Qakbot\",\"Domain\":\"\",\"BreachDate\":\"2023-08-29T00:00:00.000Z\",\"AddedDate\":\"2023-08-29T19:40:03.000Z\",\"ModifiedDate\":\"2023-08-29T19:40:03.000Z\",\"PwnCount\":6431319,\"Description\":\"In August 2023, \u003ca href=\\\"https://www.troyhunt.com/data-from-the-qakbot-malware-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe US Justice Department announced a multinational operation involving actions in the United States, France, Germany, the Netherlands, and the United Kingdom to disrupt the botnet and malware known as Qakbot and take down its infrastructure\u003c/a\u003e. After the takedown, 6.43M email addresses were provided to HIBP to help notify victims of the malware.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":true,\"FaviconUrl\":null},{\"Id\":118327,\"Name\":\"SevenRooms\",\"Title\":\"SevenRooms\",\"Domain\":\"sevenrooms.com\",\"BreachDate\":\"2022-12-11T00:00:00.000Z\",\"AddedDate\":\"2023-08-24T21:49:00.000Z\",\"ModifiedDate\":\"2023-08-24T21:49:00.000Z\",\"PwnCount\":1205385,\"Description\":\"In December 2022, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/restaurant-crm-platform-sevenrooms-confirms-breach-after-data-for-sale/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 400GB of data belonging to restaurant customer management platform SevenRooms was posted for sale to a popular hacking forum\u003c/a\u003e. The data included 1.2M unique email addresses alongside names and purchases. SevenRooms advised that the breach was due to unauthorised access of \u0026quot;a file transfer interface of a third-party vendor\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SevenRooms.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":117287,\"Name\":\"Duolingo\",\"Title\":\"Duolingo\",\"Domain\":\"duolingo.com\",\"BreachDate\":\"2023-01-24T00:00:00.000Z\",\"AddedDate\":\"2023-08-23T04:31:08.000Z\",\"ModifiedDate\":\"2023-08-23T04:31:08.000Z\",\"PwnCount\":2676696,\"Description\":\"In August 2023, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/scraped-data-of-26-million-duolingo-users-released-on-hacking-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e2.6M records of data scraped from Duolingo were broadly distributed on a popular hacking forum\u003c/a\u003e. Obtained by enumerating a vulnerable API, the data had earlier appeared for sale in January 2023 and contained email addresses, names, the languages being learned, XP (experience points), and other data related to learning progress on Duolingo. Whilst some of the data attributes are intentionally public, the ability to map private email addresses to them presents an ongoing risk to user privacy.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Duolingo.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"spoken-languages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":116462,\"Name\":\"Atmeltomo\",\"Title\":\"Atmeltomo\",\"Domain\":\"atmeltomo.com\",\"BreachDate\":\"2021-04-16T00:00:00.000Z\",\"AddedDate\":\"2023-08-22T01:29:29.000Z\",\"ModifiedDate\":\"2023-08-22T01:29:29.000Z\",\"PwnCount\":580177,\"Description\":\"In April 2021, \u0026quot;Japan's largest e-mail friend search site\u0026quot; \u003ca href=\\\"https://socradar.io/the-week-in-dark-web-29-august-2022-access-sales-and-data-leaks/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAtmeltomo suffered a data breach that was later sold on a popular hacking forum\u003c/a\u003e. The breach exposed 1.3M records with 580k unique email addresses along with usernames, IP addresses and unsalted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Atmeltomo.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":115903,\"Name\":\"ECCIE\",\"Title\":\"ECCIE\",\"Domain\":\"eccie.net\",\"BreachDate\":\"2021-07-01T00:00:00.000Z\",\"AddedDate\":\"2023-08-21T23:19:18.000Z\",\"ModifiedDate\":\"2023-08-21T23:19:18.000Z\",\"PwnCount\":536923,\"Description\":\"In January 2021, the adult escort forum \u003ca href=\\\"https://www.eccie.net/showthread.php?p=1062479958\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eECCIE suffered a data breach\u003c/a\u003e which was later posted to a popular hacking forum. The data included 536k user records with email and IP addresses, usernames, dates of birth and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ECCIE.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":113246,\"Name\":\"iMenu360\",\"Title\":\"iMenu360\",\"Domain\":\"imenu360.com\",\"BreachDate\":\"2022-08-11T00:00:00.000Z\",\"AddedDate\":\"2023-08-17T20:55:07.000Z\",\"ModifiedDate\":\"2023-08-17T20:55:07.000Z\",\"PwnCount\":3425860,\"Description\":\"In approximately late 2022, 3.4M customer records from iMenu360 (\u0026quot;The world's #1 most trusted online ordering platform\u0026quot;) were exposed. The data appeared to be from ordering systems using the platform and contained email and physical addresses, latitudes and longitudes, names and phone numbers. Numerous attempts were made to contact iMenu360 about the incident between April and August 2023, but no response was received.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/iMenu360.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":111937,\"Name\":\"ManipulatedCaiman\",\"Title\":\"Manipulated Caiman\",\"Domain\":\"\",\"BreachDate\":\"2023-07-16T00:00:00.000Z\",\"AddedDate\":\"2023-08-15T07:06:49.000Z\",\"ModifiedDate\":\"2023-08-15T07:06:49.000Z\",\"PwnCount\":39901389,\"Description\":\"In July 2023, \u003ca href=\\\"https://perception-point.io/blog/manipulated-caiman-the-sophisticated-snare-of-mexicos-banking-predators-technical-edition/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePerception Point reported on a phishing operation dubbed \u0026quot;Manipulated Caiman\u0026quot;\u003c/a\u003e. Targeting primarily the citizens of Mexico, the campaign attempted to gain access to victims' bank accounts via spear phishing attacks using malicious attachments. Researchers obtained almost 40M email addresses targeted in the campaign and provided the data to HIBP to alert potential victims.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":111880,\"Name\":\"Jobzone\",\"Title\":\"Jobzone\",\"Domain\":\"jobzone.co.il\",\"BreachDate\":\"2023-04-15T00:00:00.000Z\",\"AddedDate\":\"2023-08-15T02:43:10.000Z\",\"ModifiedDate\":\"2023-08-15T02:43:10.000Z\",\"PwnCount\":29708,\"Description\":\"In April 2023, \u003ca href=\\\"https://twitter.com/PalCyberNews/status/1647208008806461440\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata from the Israeli jobs website Jobzone was posted online\u003c/a\u003e. The data included 30k records of email addresses, names, social security numbers, genders, dates of birth, fathers' names and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Jobzone.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"family-members-names\",\"genders\",\"government-issued-ids\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":108627,\"Name\":\"Rightbiz\",\"Title\":\"Rightbiz\",\"Domain\":\"rightdev.co.uk\",\"BreachDate\":\"2023-07-09T00:00:00.000Z\",\"AddedDate\":\"2023-08-10T22:11:35.000Z\",\"ModifiedDate\":\"2023-08-10T22:43:06.000Z\",\"PwnCount\":65376,\"Description\":\"In June 2023, data belonging to the \u0026quot;UK's No.1 Business Marketplace\u0026quot; Rightbiz appeared on a popular hacking forum. Comprising of more than 18M rows of data, the breach included 65k unique email addresses along with names, phone numbers and physical address. Rightbiz didn't respond to mulitple attempts to disclose the incident. The data was provided to HIBP by a source who requested it be attributed to \u003ca href=\\\"https://discord.gg/gN9C9em\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e\u0026quot;https://discord.gg/gN9C9em\u0026quot;\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Rightbiz.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":106885,\"Name\":\"CraftRise\",\"Title\":\"CraftRise\",\"Domain\":\"craftrise.com.tr\",\"BreachDate\":\"2022-03-05T00:00:00.000Z\",\"AddedDate\":\"2023-08-08T07:57:30.000Z\",\"ModifiedDate\":\"2023-08-08T08:00:39.000Z\",\"PwnCount\":2532527,\"Description\":\"In May 2023, \u003ca href=\\\"https://memoryhackers.org/konular/craftrise-verileri-sizdirilmis.270536/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of a data breach of the Turkish Minecraft server known as CraftRise\u003c/a\u003e. The data of over 2.5M users was subsequently shared on a popular hacking forum and included email addresses, usernames, geographic locations and plain text passwords. The newest records indicate the data was obtained in March 2022.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CraftRise.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":102983,\"Name\":\"MagicDuel\",\"Title\":\"MagicDuel\",\"Domain\":\"magicduel.com\",\"BreachDate\":\"2023-08-02T00:00:00.000Z\",\"AddedDate\":\"2023-08-02T23:22:58.000Z\",\"ModifiedDate\":\"2023-08-02T23:22:58.000Z\",\"PwnCount\":138443,\"Description\":\"In August 2023, \u003ca href=\\\"https://magicduel.com/page/Announcement/view/5952\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe MagicDuel Adventure website suffered a data breach that exposed 138k user records\u003c/a\u003e. The data included player names, email and IP addresses and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"nicknames\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":97915,\"Name\":\"BreachForums\",\"Title\":\"BreachForums\",\"Domain\":\"breached.vc\",\"BreachDate\":\"2022-11-29T00:00:00.000Z\",\"AddedDate\":\"2023-07-26T21:08:55.000Z\",\"ModifiedDate\":\"2023-07-26T21:08:55.000Z\",\"PwnCount\":212156,\"Description\":\"In November 2022, the well-known hacking forum \u0026quot;BreachForums\u0026quot; was itself, breached. Later the following year, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/fbi-seizes-breachforums-after-arresting-its-owner-pompompurin-in-march/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe operator of the website was arrested and the site seized by law enforcement agencies\u003c/a\u003e. The breach exposed 212k records including usernames, IP and email addresses, private messages between site members and passwords stored as argon2 hashes. The data was provided to HIBP by a source who requested it be attributed to \u003ca href=\\\"http://t.me/breached_db_person\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e\u0026quot;breached_db_person\u0026quot;\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BreachForums.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":97223,\"Name\":\"BookCrossing\",\"Title\":\"BookCrossing\",\"Domain\":\"bookcrossing.com\",\"BreachDate\":\"2012-11-05T00:00:00.000Z\",\"AddedDate\":\"2023-07-25T02:24:52.000Z\",\"ModifiedDate\":\"2023-07-25T03:53:37.000Z\",\"PwnCount\":1582323,\"Description\":\"In August 2022, the book social networking site \u003ca href=\\\"https://www.bookcrossing.com/forum/9/584194\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBookCrossing disclosed a data breach that dated back to a database backup from November 2012\u003c/a\u003e. The incident exposed almost 1.6M records including names, usernames, email and IP addresses, dates of birth and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BookCrossing.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":97039,\"Name\":\"Tigo\",\"Title\":\"Tigo\",\"Domain\":\"tigo.chat\",\"BreachDate\":\"2023-03-31T00:00:00.000Z\",\"AddedDate\":\"2023-07-24T23:25:32.000Z\",\"ModifiedDate\":\"2023-07-24T23:25:32.000Z\",\"PwnCount\":700394,\"Description\":\"In Mid-2023, 300GB of data containing over 100M records from \u003ca href=\\\"https://tigo.chat/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Chinese video chat platform \u0026quot;Tigo\u0026quot;\u003c/a\u003e dating back to March that year was discovered. The data contained over 700k unique names, usernames, email and IP addresses, genders, profile photos and private messages. Tigo did not respond to multiple attempts to disclose the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tigo.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"private-messages\",\"profile-photos\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":96273,\"Name\":\"Roblox\",\"Title\":\"Roblox\",\"Domain\":\"roblox.com\",\"BreachDate\":\"2016-07-31T00:00:00.000Z\",\"AddedDate\":\"2023-07-23T03:51:55.000Z\",\"ModifiedDate\":\"2023-07-23T04:01:44.000Z\",\"PwnCount\":52458,\"Description\":\"In August 2016, \u003ca href=\\\"https://roblox.fandom.com/wiki/2016_Roblox_security_breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRoblox disclosed a data breach that affected over 50k users\u003c/a\u003e. The security incident impacted email and IP addresses, usernames, purchases and Robux balances which were left exposed on a test server.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Roblox.png\",\"DataClasses\":[\"account-balances\",\"email-addresses\",\"ip-addresses\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":92863,\"Name\":\"RobloxDeveloperConference\",\"Title\":\"Roblox Developer Conference (2023)\",\"Domain\":\"rdcglobal.com\",\"BreachDate\":\"2020-12-18T00:00:00.000Z\",\"AddedDate\":\"2023-07-18T21:06:48.000Z\",\"ModifiedDate\":\"2024-07-06T00:37:32.000Z\",\"PwnCount\":3943,\"Description\":\"In July 2023, \u003ca href=\\\"https://twitter.com/troyhunt/status/1681163196110098432\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea list of alleged attendees from the 2017-2020 Roblox Developers Conferences was circulated on a forum\u003c/a\u003e. The data contained 4k unique email addresses along with names, usernames, dates of birth, phone numbers, physical and IP addresses and T-shirt sizes\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Roblox.png\",\"DataClasses\":[\"clothing-sizes\",\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":87530,\"Name\":\"Vermillion\",\"Title\":\"Vermillion\",\"Domain\":\"v3rmillion.net\",\"BreachDate\":\"2014-08-30T00:00:00.000Z\",\"AddedDate\":\"2023-07-11T08:14:42.000Z\",\"ModifiedDate\":\"2023-07-11T08:14:42.000Z\",\"PwnCount\":8106,\"Description\":\"In August 2014, the Roblox hacking forum Vermillion suffered a data breach that exposed over 8k subscriber records. The breach of the MyBB forum exposed email and IP addresses, usernames, dates of birth and salted password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Vermillion.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":84538,\"Name\":\"Locally\",\"Title\":\"Locally\",\"Domain\":\"locally.com\",\"BreachDate\":\"2022-10-01T00:00:00.000Z\",\"AddedDate\":\"2023-07-10T11:09:43.000Z\",\"ModifiedDate\":\"2023-07-10T11:12:48.000Z\",\"PwnCount\":362619,\"Description\":\"In October 2022, \u0026quot;The Industry's Leading Online-to-Offline Shopping Solution\u0026quot; \u003ca href=\\\"https://twitter.com/troyhunt/status/1677855117960441858\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLocally suffered a data breach\u003c/a\u003e. Whilst Locally acknowledged the breach privately, it's unknown whether impacted customers were subsequently notified of the incident which exposed over 362k names, phone numbers, email and physical addresses, purchases, credit card type and last four digits and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Locally.png\",\"DataClasses\":[\"email-addresses\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":74099,\"Name\":\"BreachForumsClone\",\"Title\":\"BreachForums Clone\",\"Domain\":\"breachforums.vc\",\"BreachDate\":\"2023-06-17T00:00:00.000Z\",\"AddedDate\":\"2023-06-25T05:47:36.000Z\",\"ModifiedDate\":\"2023-06-25T05:52:08.000Z\",\"PwnCount\":4204,\"Description\":\"In June 2023, \u003ca href=\\\"https://www.hackread.com/breachforums-data-breach-members-data-leak/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea clone of the previously shuttered popular hacking forum \u0026quot;BreachForums\u0026quot; suffered a data breach that exposed over 4k records\u003c/a\u003e. The breach was due to an exposed backup of the MyBB database which included email and IP addresses, usernames and Argon2 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BreachForums.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":64503,\"Name\":\"Zacks\",\"Title\":\"Zacks\",\"Domain\":\"zacks.com\",\"BreachDate\":\"2020-05-10T00:00:00.000Z\",\"AddedDate\":\"2023-06-10T23:10:02.000Z\",\"ModifiedDate\":\"2023-06-10T23:23:18.000Z\",\"PwnCount\":8929503,\"Description\":\"In December 2022, the investment research company \u003ca href=\\\"https://www.zacks.com/breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZacks announced a data breach\u003c/a\u003e. The following month, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/zacks-investment-research-data-breach-affects-820-000-clients/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ereports emerged of the incident impacting 820k customers\u003c/a\u003e. However, in June 2023, a corpus of data with almost 9M Zacks customers appeared before being broadly circulated on a popular hacking forum. The most recent data was dated May 2020 and included names, usernames, email and physical addresses, phone numbers and passwords stored as unsalted SHA-256 hashes. On disclosure of the larger breach, Zacks advised that in addition to their original report \u0026quot;the unauthorised third parties also gained access to encrypted [sic] passwords of zacks.com customers, but only in the encrypted [sic] format\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zacks.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":60757,\"Name\":\"JDGroup\",\"Title\":\"JD Group\",\"Domain\":\"jdgroup.co.za\",\"BreachDate\":\"2023-05-31T00:00:00.000Z\",\"AddedDate\":\"2023-06-05T19:47:51.000Z\",\"ModifiedDate\":\"2023-06-05T19:47:51.000Z\",\"PwnCount\":521878,\"Description\":\"In May 2023, the South African retailer \u003ca href=\\\"https://mybroadband.co.za/news/security/494239-half-a-million-customers-hit-by-incredible-hifi-corp-and-everyshop-data-breach.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJD Group announced a data breach affecting a number of their online assets\u003c/a\u003e including Bradlows, Everyshop, HiFi Corp, Incredible (Connection), Rochester, Russells, and Sleepmasters. The breach exposed over 520k unique customer records including names, email and physical addresses, phone numbers and South African ID numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JDGroup.png\",\"DataClasses\":[\"email-addresses\",\"government-issued-ids\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":53498,\"Name\":\"RaidForums\",\"Title\":\"RaidForums\",\"Domain\":\"raidforums.com\",\"BreachDate\":\"2020-09-24T00:00:00.000Z\",\"AddedDate\":\"2023-05-31T01:43:34.000Z\",\"ModifiedDate\":\"2023-05-31T02:12:05.000Z\",\"PwnCount\":478604,\"Description\":\"In May 2023, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e478k user records from the now defunct hacking forum known as \u0026quot;RaidForums\u0026quot; was posted to another hacking forum\u003c/a\u003e. The data dated back to September 2020 and included email addresses, usernames, dates of birth, IP addresses and passwords stored as Argon2 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RaidForums.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":52801,\"Name\":\"PolishCredentials\",\"Title\":\"Polish Credentials\",\"Domain\":\"\",\"BreachDate\":\"2023-05-29T00:00:00.000Z\",\"AddedDate\":\"2023-05-30T23:13:32.000Z\",\"ModifiedDate\":\"2023-05-30T23:13:32.000Z\",\"PwnCount\":1204870,\"Description\":\"In May 2023, \u003ca href=\\\"https://zaufanatrzeciastrona.pl/post/kilka-milionow-loginow-i-hasel-z-polski-wycieklo-do-sieci/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea credential stuffing list of 6.3M Polish email address and password pairs appeared on a local forum\u003c/a\u003e. Likely obtained by malware running on victims' machines, each record included an email address and plain text password alongside the website the credentials were used on. The data included 1.2M unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PolishCredentials.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":39211,\"Name\":\"Luxottica\",\"Title\":\"Luxottica\",\"Domain\":\"luxottica.com\",\"BreachDate\":\"2021-03-16T00:00:00.000Z\",\"AddedDate\":\"2023-05-19T20:24:45.000Z\",\"ModifiedDate\":\"2023-05-19T20:24:45.000Z\",\"PwnCount\":77093812,\"Description\":\"In March 2021, the world's largest eyewear company \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/luxottica-confirms-2021-data-breach-after-info-of-70m-leaks-online/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLuxoticca suffered a data breach via one of their partners that exposed the personal information of more than 70M people\u003c/a\u003e. The data was subsequently sold via a popular hacking forum in late 2022 and included email and physical addresses, names, genders, dates of birth and phone numbers. In a statement from Luxottica, they advised they were aware of the incident and are currently \u0026quot;considering other notification obligations\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Luxottica.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":29260,\"Name\":\"RentoMojo\",\"Title\":\"RentoMojo\",\"Domain\":\"rentomojo.com\",\"BreachDate\":\"2023-04-15T00:00:00.000Z\",\"AddedDate\":\"2023-05-10T22:36:01.000Z\",\"ModifiedDate\":\"2023-05-10T22:36:01.000Z\",\"PwnCount\":2185697,\"Description\":\"In April 2023, the Indian rental service \u003ca href=\\\"https://www.indiatoday.in/technology/news/story/rentomojo-confirms-data-breach-attackers-accessed-identifiable-customer-information-2362942-2023-04-21\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRentoMojo suffered a data breach\u003c/a\u003e. The breach exposed over 2M unique email addresses along with names, phone, passport and Aadhaar numbers, genders, dates of birth, purchases and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RentoMojo.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"government-issued-ids\",\"names\",\"passport-numbers\",\"passwords\",\"phone-numbers\",\"purchases\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":20145,\"Name\":\"CityJerks\",\"Title\":\"CityJerks\",\"Domain\":\"cityjerks.com\",\"BreachDate\":\"2023-02-27T00:00:00.000Z\",\"AddedDate\":\"2023-04-27T21:50:05.000Z\",\"ModifiedDate\":\"2023-04-27T21:50:05.000Z\",\"PwnCount\":177554,\"Description\":\"In early 2023, the \u0026quot;mutual masturbation\u0026quot; website \u003ca href=\\\"https://techcrunch.com/2023/04/27/hackers-steal-emails-private-messages-from-hookup-websites/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCityJerks suffered a data breach that exposed 177k unique email addresses\u003c/a\u003e. The breach also included data from the TruckerSucker \u0026quot;dating app for REAL TRUCKERS and REAL MEN\u0026quot; with the combined corpus of data also exposing usernames, IP addresses, dates of birth, sexual orientations, geo locations, private messages between members and passwords stored as salted MD5 hashes. The data was listed on a public hacking site and provided to HIBP by a source who requested it be attributed to \u0026quot;discord.gg/gN9C9em\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CityJerks.png\",\"DataClasses\":[\"bios\",\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"private-messages\",\"profile-photos\",\"sexual-orientations\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18387,\"Name\":\"MEO\",\"Title\":\"MEO\",\"Domain\":\"meoair.com\",\"BreachDate\":\"2020-12-24T00:00:00.000Z\",\"AddedDate\":\"2023-04-24T02:39:49.000Z\",\"ModifiedDate\":\"2023-04-24T02:39:49.000Z\",\"PwnCount\":8227,\"Description\":\"In early 2023, a corpus of data sourced from the New Zealand based face mask company \u003ca href=\\\"https://www.meoair.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMEO\u003c/a\u003e was discovered. Dating back to December 2020, the data contained over 8k customer records including names, addresses, phone numbers and passwords stored as MD5 Wordpress hashes. MEO did not respond to multiple attempts to report the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MEO.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":17907,\"Name\":\"Terravision\",\"Title\":\"Terravision\",\"Domain\":\"terravision.eu\",\"BreachDate\":\"2023-02-01T00:00:00.000Z\",\"AddedDate\":\"2023-04-23T03:50:37.000Z\",\"ModifiedDate\":\"2023-04-23T03:50:37.000Z\",\"PwnCount\":2075625,\"Description\":\"In February 2023, the European airport transfers service \u003ca href=\\\"https://www.terravision.eu/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTerravision\u003c/a\u003e suffered a data breach. The breach exposed over 2M records of customer data including names, phone numbers, email addresses, salted password hashes and in some cases, date of birth and country of origin. Terravision did not respond to multiple attempts by individuals period over a period of months to report the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Terravision.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11748,\"Name\":\"OGUsers2022\",\"Title\":\"OGUsers (2022 breach)\",\"Domain\":\"ogusers.com\",\"BreachDate\":\"2022-07-13T00:00:00.000Z\",\"AddedDate\":\"2023-04-14T01:51:23.000Z\",\"ModifiedDate\":\"2023-04-14T01:51:23.000Z\",\"PwnCount\":529020,\"Description\":\"In July 2022, the account hijacking and SIM swapping forum OGusers suffered a data breach, the fifth since December 2018. The breach contained usernames, email and IP addresses and passwords stored as argon2 hashes. A total of 529k unique email addresses appeared in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OGUsers.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11223,\"Name\":\"KodiFoundation\",\"Title\":\"The Kodi Foundation\",\"Domain\":\"kodi.tv\",\"BreachDate\":\"2023-02-16T00:00:00.000Z\",\"AddedDate\":\"2023-04-13T05:01:41.000Z\",\"ModifiedDate\":\"2023-04-13T05:01:41.000Z\",\"PwnCount\":400635,\"Description\":\"In February 2023, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/kodi-discloses-data-breach-after-forum-database-for-sale-online/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eThe Kodi Foundation suffered a data breach that exposed more than 400k user records\u003c/a\u003e. Attributed to an account belonging to \u0026quot;a trusted but currently inactive member of the forum admin team\u0026quot;, the breach involved the administrator account creating a database backup that was subsequently downloaded before being sold on a hacking forum. The breach exposed email and IP addresses, usernames, genders and passwords stored as MyBB salted hashes. The Kodi Foundation elected to self-submit impacted email addresses to HIBP.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/KodiFoundation.png\",\"DataClasses\":[\"browser-user-agent-details\",\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":5570,\"Name\":\"GenesisMarket\",\"Title\":\"Genesis Market\",\"Domain\":\"genesis.market\",\"BreachDate\":\"2023-04-05T00:00:00.000Z\",\"AddedDate\":\"2023-04-05T12:00:00.000Z\",\"ModifiedDate\":\"2023-04-05T12:00:00.000Z\",\"PwnCount\":8000000,\"Description\":\"In April 2023, the stolen identity marketplace \u003ca href=\\\"https://www.troyhunt.com/seized-genesis-market-data-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi-and-operation-cookie-monster/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGenesis Market was shut down by the FBI and a coalition of law enforcement agencies across the globe in \u0026quot;Operation Cookie Monster\u0026quot;\u003c/a\u003e. The service traded in \u0026quot;browser fingerprints\u0026quot; which enabled criminals to impersonate victims and access their online services. As many of the impacted accounts did not include email addresses, \u0026quot;8M\u0026quot; is merely an approximation intended to indicate scale. Other personal data compromised by the service included names, addresses and credit card information, although not all individuals had each of these fields exposed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GenesisMarket.png\",\"DataClasses\":[\"browser-user-agent-details\",\"credit-card-cvv\",\"credit-cards\",\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":2535,\"Name\":\"SundryFiles\",\"Title\":\"Sundry Files\",\"Domain\":\"sundryfiles.com\",\"BreachDate\":\"2022-01-21T00:00:00.000Z\",\"AddedDate\":\"2023-03-31T04:51:11.000Z\",\"ModifiedDate\":\"2023-03-31T04:51:11.000Z\",\"PwnCount\":274461,\"Description\":\"In January 2022, the now defunct file upload service Sundry Files suffered a data breach that exposed 274k unique email addresses. The data also included usernames, IP addresses and passwords stored as salted SHA-256 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SundryFiles.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":2317,\"Name\":\"LeakedReality\",\"Title\":\"Leaked Reality\",\"Domain\":\"leakedreality.com\",\"BreachDate\":\"2022-01-31T00:00:00.000Z\",\"AddedDate\":\"2023-03-31T01:38:59.000Z\",\"ModifiedDate\":\"2023-03-31T01:38:59.000Z\",\"PwnCount\":114907,\"Description\":\"In January 2022, \u003ca href=\\\"https://twitter.com/LeakedReality/status/1531953947216338945\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe now defunct uncensored video website Leaked Reality\u003c/a\u003e suffered a data breach that exposed 115k unique email addresses. The data also included usernames, IP addresses and passwords stored as either MD5 or phpass hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LeakedReality.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":562,\"Name\":\"TheGradCafe\",\"Title\":\"TheGradCafe\",\"Domain\":\"thegradcafe.com\",\"BreachDate\":\"2023-02-26T00:00:00.000Z\",\"AddedDate\":\"2023-03-24T04:12:17.000Z\",\"ModifiedDate\":\"2023-03-24T04:12:17.000Z\",\"PwnCount\":310975,\"Description\":\"In February 2023, the grad school admissions search website TheGradCafe suffered a data breach that disclosed the personal records of 310k users. The data included email addresses, names and usernames, genders, geographic locations and passwords stored as bcrypt hashes. Some records also included physical address, phone number and date of birth. TheGradCafe did not respond to multiple attempts to disclose the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TheGradCafe.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":509,\"Name\":\"ShopperPlus\",\"Title\":\"Shopper+\",\"Domain\":\"shopperplus.ca\",\"BreachDate\":\"2020-09-14T00:00:00.000Z\",\"AddedDate\":\"2023-03-11T07:20:20.000Z\",\"ModifiedDate\":\"2023-03-11T07:20:20.000Z\",\"PwnCount\":878290,\"Description\":\"In March 2023, \u0026quot;Canada's online shopping mall\u0026quot; \u003ca href=\\\"https://twitter.com/MikeSafariMusic/status/1634251270817980424\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShopper+ disclosed a data breach discovered on a public hacking forum\u003c/a\u003e. The breach dated back to September 2020 and included 878k customer records with email and physical addresses, names, phone numbers and in some cases, genders and dates of birth.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ShopperPlus.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\",\"spoken-languages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":268,\"Name\":\"HDBFinancialServices\",\"Title\":\"HDB Financial Services\",\"Domain\":\"hdbfs.com\",\"BreachDate\":\"2023-02-22T00:00:00.000Z\",\"AddedDate\":\"2023-03-11T03:00:06.000Z\",\"ModifiedDate\":\"2023-03-11T03:04:29.000Z\",\"PwnCount\":1658750,\"Description\":\"In March 2023, the Indian non-bank lending unit \u003ca href=\\\"https://economictimes.indiatimes.com/industry/banking/finance/banking/hdb-financial-services-flags-data-breach-at-service-provider/articleshow/98483482.cms\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHDB Financial Services suffered a data breach that disclosed over 70M customer records\u003c/a\u003e. Containing 1.6M unique email addresses, the breach also disclosed names, dates of birth, phone numbers, genders, post codes and loan information belonging to the customers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HDBFinancialServices.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"loan-information\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":207,\"Name\":\"Eye4Fraud\",\"Title\":\"Eye4Fraud\",\"Domain\":\"eye4fraud.com\",\"BreachDate\":\"2023-01-25T00:00:00.000Z\",\"AddedDate\":\"2023-03-06T04:46:58.000Z\",\"ModifiedDate\":\"2023-03-06T06:04:28.000Z\",\"PwnCount\":16000591,\"Description\":\"In February 2023, \u003ca href=\\\"https://twitter.com/FalconFeedsio/status/1622838659689988098\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata alleged to have been taken from the fraud protection service Eye4Fraud was listed for sale on a popular hacking forum\u003c/a\u003e. Spanning tens of millions of rows with 16M unique email addresses, the data was spread across 147 tables totalling 65GB and included both direct users of the service and what appears to be individuals who'd placed orders on other services that implemented Eye4Fraud to protect their sales. The data included names and bcrypt password hashes for users, and names, phone numbers, physical addresses and partial credit card data (card type and last 4 digits) for orders placed using the service. Eye4Fraud did not respond to multiple attempts to report the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Eye4Fraud.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":285,\"Name\":\"iDTech\",\"Title\":\"iD Tech\",\"Domain\":\"idtech.com\",\"BreachDate\":\"2023-01-03T00:00:00.000Z\",\"AddedDate\":\"2023-03-06T02:31:18.000Z\",\"ModifiedDate\":\"2023-03-06T02:31:18.000Z\",\"PwnCount\":415121,\"Description\":\"In February 2023, the tech camps for kids service \u003ca href=\\\"https://twitter.com/FalconFeedsio/status/1629340450149498881\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eiD Tech had almost 1M records posted to a popular hacking forum\u003c/a\u003e. The data included 415k unique email addresses, names, dates of birth and plain text passwords which appear to have been breached in the previous month. iD Tech did not respond to multiple attempts to report the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/iDTech.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":322,\"Name\":\"LBB\",\"Title\":\"LBB\",\"Domain\":\"lbb.in\",\"BreachDate\":\"2019-02-14T00:00:00.000Z\",\"AddedDate\":\"2023-03-05T07:35:48.000Z\",\"ModifiedDate\":\"2023-03-05T07:35:48.000Z\",\"PwnCount\":39288,\"Description\":\"In August 2022, customer data of \u003ca href=\\\"https://lbb.in/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Indian shopping site \u0026quot;LBB\u0026quot; (Little Black Book)\u003c/a\u003e was posted to a popular hacking forum. The data contained over 3M records with 39k unique email addresses alongside IP and physical addresses, names and device information with the most recent data dating back to early 2019. LBB advised they believe the data was exposed by a third party service and whilst it contained information they retain on their customers, it had also been enriched with additional data attributes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LBB.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":260,\"Name\":\"GunAuction\",\"Title\":\"GunAuction.com\",\"Domain\":\"gunauction.com\",\"BreachDate\":\"2022-12-03T00:00:00.000Z\",\"AddedDate\":\"2023-03-02T19:43:51.000Z\",\"ModifiedDate\":\"2023-03-05T03:13:20.000Z\",\"PwnCount\":565470,\"Description\":\"In December 2022, the online firearms auction website \u003ca href=\\\"https://techcrunch.com/2023/03/02/hackers-steal-gun-owners-data-from-firearm-auction-website/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGunAuction.com suffered a data breach which was later discovered left unprotected on the hacker's server\u003c/a\u003e. The data included over 565k user records with extensive personal data including email, IP and physical addresses, names, phone numbers, genders, years of birth, credit card type and passwords stored in plain text. The leaked identities could subsequently be matched to firearms listed for sale on the website.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GunAuction.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"genders\",\"ip-addresses\",\"partial-credit-card-data\",\"partial-dates-of-birth\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":129,\"Name\":\"Convex\",\"Title\":\"Convex\",\"Domain\":\"convex.ru\",\"BreachDate\":\"2023-02-01T00:00:00.000Z\",\"AddedDate\":\"2023-02-26T06:51:44.000Z\",\"ModifiedDate\":\"2023-02-26T06:51:44.000Z\",\"PwnCount\":150129,\"Description\":\"In February 2023, the Russian telecommunications provider \u003ca href=\\\"https://www.hackread.com/anonymous-data-leak-russia-isp-convex/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eConvex was hacked by \u0026quot;Anonymous\u0026quot; who subsequently released 128GB of data publicly\u003c/a\u003e, alleging it revealed illegal government surveillance. The leaked data contained 150k unique email, IP and physical addresses, names and phone numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Convex.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":481,\"Name\":\"RealDudesInc\",\"Title\":\"RealDudesInc\",\"Domain\":\"realdudesinc.com\",\"BreachDate\":\"2022-10-22T00:00:00.000Z\",\"AddedDate\":\"2023-02-19T04:52:21.000Z\",\"ModifiedDate\":\"2023-02-19T04:52:21.000Z\",\"PwnCount\":101543,\"Description\":\"In October 2022, the GTA mod menu provider \u003ca href=\\\"https://twitter.com/FalconFeedsio/status/1584795069260869632\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRealDudesInc suffered a data breach\u003c/a\u003e that exposed over 100k email addresses (many of which are temporary guest account addresses). The breach also included usernames and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RealDudesInc.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":620,\"Name\":\"Weee\",\"Title\":\"Weee\",\"Domain\":\"sayweee.com\",\"BreachDate\":\"2022-07-11T00:00:00.000Z\",\"AddedDate\":\"2023-02-08T23:17:51.000Z\",\"ModifiedDate\":\"2023-02-08T23:17:51.000Z\",\"PwnCount\":1117405,\"Description\":\"In February 2023, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/weee-grocery-service-confirms-data-breach-11-million-affected/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata belonging to the Asian and Hispanic food delivery service Weee appeared on a popular hacking forum\u003c/a\u003e. Dating back to mid-2022, the data included 1.1M unique email addresses from 11M rows of orders containing names, phone numbers and delivery instructions.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Weee.png\",\"DataClasses\":[\"delivery-instructions\",\"email-addresses\",\"names\",\"phone-numbers\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":331,\"Name\":\"LimeVPN\",\"Title\":\"LimeVPN\",\"Domain\":\"limevpn.com\",\"BreachDate\":\"2020-10-08T00:00:00.000Z\",\"AddedDate\":\"2023-02-06T21:42:01.000Z\",\"ModifiedDate\":\"2023-02-06T21:42:01.000Z\",\"PwnCount\":23348,\"Description\":\"In October 2020, the VPN provider \u003ca href=\\\"https://threatpost.com/hacked-data-limevpn-dark-web/167492/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLimeVPN suffered a data breach that exposed the personal information of tens of thousands of customers\u003c/a\u003e. The data included email, IP and physical addresses, names, phone numbers, purchase histories and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LimeVPN.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":579,\"Name\":\"TruthFinder\",\"Title\":\"Truth Finder\",\"Domain\":\"truthfinder.com\",\"BreachDate\":\"2019-04-12T00:00:00.000Z\",\"AddedDate\":\"2023-02-04T07:02:52.000Z\",\"ModifiedDate\":\"2023-02-04T07:02:52.000Z\",\"PwnCount\":8159573,\"Description\":\"In 2019, the public records search service \u003ca href=\\\"https://www.truthfinder.com/security-incident-alert/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTruthFinder suffered a data breach that later came to light in early 2023\u003c/a\u003e. The data included over 8M unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TruthFinder.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":296,\"Name\":\"InstantCheckmate\",\"Title\":\"Instant Checkmate\",\"Domain\":\"instantcheckmate.com\",\"BreachDate\":\"2019-04-12T00:00:00.000Z\",\"AddedDate\":\"2023-02-04T00:26:28.000Z\",\"ModifiedDate\":\"2023-02-04T00:26:28.000Z\",\"PwnCount\":11943887,\"Description\":\"In 2019, the public records search service \u003ca href=\\\"https://www.instantcheckmate.com/security-incident-alert/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eInstant Checkmate suffered a data breach that later came to light in early 2023\u003c/a\u003e. The data included almost 12M unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/InstantCheckmate.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":499,\"Name\":\"SchoolDistrict42\",\"Title\":\"School District 42\",\"Domain\":\"sd42.ca\",\"BreachDate\":\"2023-01-15T00:00:00.000Z\",\"AddedDate\":\"2023-02-02T05:27:50.000Z\",\"ModifiedDate\":\"2023-02-02T08:16:17.000Z\",\"PwnCount\":18850,\"Description\":\"In January 2023, \u003ca href=\\\"https://www.mapleridgenews.com/news/maple-ridge-pitt-meadows-school-district-suffers-massive-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePitt Meadows School District 42 in British Columbia suffered a data breach\u003c/a\u003e. The incident exposed the names and email addresses of approximately 19k students and staff which were consequently redistributed on a popular hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SchoolDistrict42.png\",\"DataClasses\":[\"email-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":446,\"Name\":\"PlanetIce\",\"Title\":\"Planet Ice\",\"Domain\":\"planet-ice.co.uk\",\"BreachDate\":\"2023-01-14T00:00:00.000Z\",\"AddedDate\":\"2023-01-31T02:00:53.000Z\",\"ModifiedDate\":\"2023-01-31T02:00:53.000Z\",\"PwnCount\":240488,\"Description\":\"In January 2023, the UK-based ice skating rink booking service \u003ca href=\\\"https://www.bristolpost.co.uk/news/bristol-news/bristol-planet-ice-cyber-attack-8076491\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePlanet Ice suffered a data breach\u003c/a\u003e. The incident exposed the personal data of 240k people including email and physical addresses, phone numbers, genders, dates of birth and passwords stored as MD5 hashes. The data also included the names, genders and dates of birth of children having parties.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PlanetIce.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":316,\"Name\":\"KomplettFritid\",\"Title\":\"KomplettFritid\",\"Domain\":\"komplettfritid.no\",\"BreachDate\":\"2021-02-01T00:00:00.000Z\",\"AddedDate\":\"2023-01-23T22:24:47.000Z\",\"ModifiedDate\":\"2023-01-23T22:24:47.000Z\",\"PwnCount\":139401,\"Description\":\"In January 2023, \u003ca href=\\\"https://www.digi.no/artikler/selger-datalekkasje-med-140-000-berorte-kunder-fra-lars-monsens-nettbutikk/525070\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe online Norwegian store KomplettFritid was reported as having had a data breach dating back to February 2021\u003c/a\u003e. The incident exposed 140k customer records including physical, email and IP addresses, names, phone numbers and passwords. Most passwords were stored as bcrypt hashes with a small number appearing in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/KomplettFritid.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":54,\"Name\":\"Autotrader\",\"Title\":\"Autotrader\",\"Domain\":\"autotrader.com\",\"BreachDate\":\"2023-01-06T00:00:00.000Z\",\"AddedDate\":\"2023-01-23T06:24:21.000Z\",\"ModifiedDate\":\"2023-01-23T06:24:21.000Z\",\"PwnCount\":20032,\"Description\":\"In January 2023, \u003ca href=\\\"https://thecyberexpress.com/data1-4-million-autotrader-user-exposed/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e1.4M records from the Autotrader online vehicle marketplace appeared on a popular hacking forum\u003c/a\u003e. Autotrader stated that the \u0026quot;data in question relates to aged listing data that was generally publicly available on our site at the time and open to automated collection methods\u0026quot;. The data contained 20k unique email addresses alongside physical addresses and phone numbers of dealers and vehicle details including VIN numbers. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;IntelBroker\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Autotrader.png\",\"DataClasses\":[\"email-addresses\",\"phone-numbers\",\"physical-addresses\",\"vehicle-details\",\"vehicle-identification-numbers-vins\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":660,\"Name\":\"Zurich\",\"Title\":\"Zurich\",\"Domain\":\"zurich.co.jp\",\"BreachDate\":\"2023-01-08T00:00:00.000Z\",\"AddedDate\":\"2023-01-22T22:30:56.000Z\",\"ModifiedDate\":\"2023-01-22T22:30:56.000Z\",\"PwnCount\":756737,\"Description\":\"In January 2023, \u003ca href=\\\"https://therecord.media/millions-of-aflac-zurich-insurance-customers-in-japan-have-data-leaked-after-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Japanese arm of Zurich insurance suffered a data breach that exposed 2.6M customer records with over 756k unique email addresses\u003c/a\u003e. The data was subsequently posted to a popular hacking forum and also included names, genders, dates of birth and details of insured vehicles. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;IntelBroker\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zurich.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"vehicle-details\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":167,\"Name\":\"DoorDash\",\"Title\":\"DoorDash\",\"Domain\":\"doordash.com\",\"BreachDate\":\"2022-08-02T00:00:00.000Z\",\"AddedDate\":\"2023-01-07T03:59:32.000Z\",\"ModifiedDate\":\"2023-01-07T03:59:32.000Z\",\"PwnCount\":367476,\"Description\":\"In August 2022, the food ordering and delivery service \u003ca href=\\\"https://mashable.com/article/doordash-hack-customer-details-exposed\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDoorDash disclosed a data breach that impacted a portion of their customers\u003c/a\u003e. DoorDash attributed the breach to an unnamed \u0026quot;third-party vendor\u0026quot; they stated was the victim of a phishing campaign. The incident exposed 367k unique personal email addresses alongside names, post codes and partial card data, namely the brand, expiry data and last four digits of the card.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DoorDash.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"partial-credit-card-data\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":516,\"Name\":\"SlideTeam\",\"Title\":\"SlideTeam\",\"Domain\":\"slideteam.net\",\"BreachDate\":\"2021-04-06T00:00:00.000Z\",\"AddedDate\":\"2023-01-07T01:05:24.000Z\",\"ModifiedDate\":\"2023-01-07T01:05:24.000Z\",\"PwnCount\":1464271,\"Description\":\"In April 2021, the \u0026quot;world’s largest collection of pre-designed presentation slides\u0026quot; \u003ca href=\\\"https://news.kaduu.ch/2022/08/25/worlds-largest-supplier-of-powerpoint-content-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSlideTeam had 1.4M records breached and later published to a popular hacking forum the following year\u003c/a\u003e. Allegedly sourced from a compromised Magento instance, the data included names, email addresses and passwords stored as salted hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SlideTeam.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":583,\"Name\":\"Twitter200M\",\"Title\":\"Twitter (200M)\",\"Domain\":\"twitter.com\",\"BreachDate\":\"2021-01-01T00:00:00.000Z\",\"AddedDate\":\"2023-01-05T20:49:16.000Z\",\"ModifiedDate\":\"2023-01-05T20:49:16.000Z\",\"PwnCount\":211524284,\"Description\":\"In early 2023, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/200-million-twitter-users-email-addresses-allegedly-leaked-online/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 200M records scraped from Twitter appeared on a popular hacking forum\u003c/a\u003e. The data was obtained sometime in 2021 by abusing an API that enabled email addresses to be resolved to Twitter profiles. The subsequent results were then composed into a corpus of data containing email addresses alongside public Twitter profile information including names, usernames and follower counts.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Twitter.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":153,\"Name\":\"Deezer\",\"Title\":\"Deezer\",\"Domain\":\"deezer.com\",\"BreachDate\":\"2019-04-22T00:00:00.000Z\",\"AddedDate\":\"2023-01-02T03:10:50.000Z\",\"ModifiedDate\":\"2023-01-02T03:10:50.000Z\",\"PwnCount\":229037936,\"Description\":\"In late 2022, the music streaming service \u003ca href=\\\"https://restoreprivacy.com/music-service-deezer-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDeezer disclosed a data breach that impacted over 240M customers\u003c/a\u003e. The breach dated back to a mid-2019 backup exposed by a 3rd party partner which was subsequently sold and then broadly redistributed on a popular hacking forum. Impacted data included 229M unique email addresses, IP addresses, names, usernames, genders, DoBs and the geographic location of the customer.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Deezer.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"spoken-languages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":67,\"Name\":\"Benchmark\",\"Title\":\"Benchmark\",\"Domain\":\"benchmark.rs\",\"BreachDate\":\"2019-11-01T00:00:00.000Z\",\"AddedDate\":\"2023-01-01T01:50:43.000Z\",\"ModifiedDate\":\"2023-01-01T01:52:21.000Z\",\"PwnCount\":93343,\"Description\":\"In November 2019, the Serbian technology news website \u003ca href=\\\"https://forum.benchmark.rs/threads/benchmark-forum-kompromitovan.489760/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBenchmark suffered a breach of its forum\u003c/a\u003e that exposed 93k customer records. The breach exposed IP and email addresses, usernames and passwords stored as salted MD5 hashes. \u003ca href=\\\"https://forum.benchmark.rs/threads/benchmark-forum-kompromitovan.489760/#post-6758095\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eA forum administrator subsequently advised that the breach was due to the forum previously running on an outdated vBulletin instance\u003c/a\u003e. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;ZAN @ BF\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Benchmark.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":247,\"Name\":\"Gemini\",\"Title\":\"Gemini\",\"Domain\":\"gemini.com\",\"BreachDate\":\"2022-12-13T00:00:00.000Z\",\"AddedDate\":\"2022-12-16T16:47:43.000Z\",\"ModifiedDate\":\"2024-04-23T19:32:40.000Z\",\"PwnCount\":5274214,\"Description\":\"In late 2022, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hackers-leak-personal-info-allegedly-stolen-from-57m-gemini-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata allegedly taken from the Gemini crypto exchange was posted to a public hacking forum\u003c/a\u003e. The data consisted of email addresses and partial phone numbers, which Gemini later attributed to \u003ca href=\\\"https://www.gemini.com/blog/protecting-our-customers-from-phishing-campaigns\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ean incident at a third-party vendor\u003c/a\u003e (the vendor was not named). The data was provided to HIBP by a source who requested it be attributed to \u0026quot;ZAN @ BF\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"partial-phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":125,\"Name\":\"CoinTracker\",\"Title\":\"CoinTracker\",\"Domain\":\"cointracker.io\",\"BreachDate\":\"2022-12-01T00:00:00.000Z\",\"AddedDate\":\"2022-12-12T08:55:48.000Z\",\"ModifiedDate\":\"2023-01-01T07:04:48.000Z\",\"PwnCount\":1557153,\"Description\":\"In December 2022, the Crypto \u0026 NFT taxes service \u003ca href=\\\"https://www.databreaches.net/important-cointracker-security-update/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCoinTracker reported a data breach that impacted over 1.5M of their customers\u003c/a\u003e. The company \u003ca href=\\\"https://www.cointracker.io/blog/sendgrid-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003elater attributed the breach to a compromise SendGrid\u003c/a\u003e in an attack that targeted multiple customers of the email provider. The breach exposed email addresses and partially redacted phone numbers, with CoinTracker advising that the later did not originate from their service.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CoinTracker.png\",\"DataClasses\":[\"email-addresses\",\"partial-phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":13,\"Name\":\"Abandonia2022\",\"Title\":\"Abandonia (2022)\",\"Domain\":\"abandonia.com\",\"BreachDate\":\"2022-11-15T00:00:00.000Z\",\"AddedDate\":\"2022-12-07T06:04:17.000Z\",\"ModifiedDate\":\"2022-12-11T12:25:07.000Z\",\"PwnCount\":919790,\"Description\":\"In November 2022, the gaming website dedicated to classic DOS games \u003ca href=\\\"https://twitter.com/FalconFeedsio/status/1594670215471792130\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAbandonia\u003c/a\u003e suffered a data breach resulting in the exposure of 920k unique user records. This breach was in addition to another one 7 years earlier in 2015. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Abandonia.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":412,\"Name\":\"NotAcxiom\",\"Title\":\"Not Acxiom\",\"Domain\":\"\",\"BreachDate\":\"2020-06-21T00:00:00.000Z\",\"AddedDate\":\"2022-11-22T19:17:40.000Z\",\"ModifiedDate\":\"2022-11-22T19:17:40.000Z\",\"PwnCount\":51730831,\"Description\":\"In 2020, \u003ca href=\\\"https://www.troyhunt.com/data-breach-misattribution-acxiom-live-ramp/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea corpus of data containing almost a quarter of a billion records spanning over 400 different fields was misattributed to database marketing company Acxiom\u003c/a\u003e and subsequently circulated within the hacking community. On review, Acxiom concluded that \u0026quot;the claims are indeed false and that the data, which has been readily available across multiple environments, does not come from Acxiom and is in no way the subject of an Acxiom breach\u0026quot;. The data contained almost 52M unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":249,\"Name\":\"GetRevengeOnYourEx\",\"Title\":\"Get Revenge On Your Ex\",\"Domain\":\"getrevengeonyourex.com\",\"BreachDate\":\"2022-09-09T00:00:00.000Z\",\"AddedDate\":\"2022-11-15T01:57:17.000Z\",\"ModifiedDate\":\"2022-12-11T12:24:54.000Z\",\"PwnCount\":79195,\"Description\":\"In September 2022, the revenge website \u003ca href=\\\"https://getrevengeonyourex.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGet Revenge On Your Ex\u003c/a\u003e suffered a data breach that exposed almost 80k unique email addresses. The data spanned both customers and victims including names, IP and physical addresses, phone numbers, purchase histories and plain text passwords. The data was subsequently shared on a public hacking forum, Get Revenge On Your Ex did not reply when contacted.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GetRevengeOnYourEx.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":251,\"Name\":\"GGCorp\",\"Title\":\"GGCorp\",\"Domain\":\"ggcorp.me\",\"BreachDate\":\"2022-08-11T00:00:00.000Z\",\"AddedDate\":\"2022-11-08T07:35:13.000Z\",\"ModifiedDate\":\"2022-11-08T07:35:13.000Z\",\"PwnCount\":2376330,\"Description\":\"In August 2022, the MMORPG website \u003ca href=\\\"https://twitter.com/FalconFeedsio/status/1558362615067250688\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGGCorp suffered a data breach that exposed almost 2.4M unique email addresses\u003c/a\u003e. The data also included IP addresses, usernames and MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GGCorp.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":341,\"Name\":\"Lolzteam\",\"Title\":\"Lolzteam\",\"Domain\":\"lolzteam.net\",\"BreachDate\":\"2018-05-13T00:00:00.000Z\",\"AddedDate\":\"2022-11-06T02:58:23.000Z\",\"ModifiedDate\":\"2022-11-06T02:58:23.000Z\",\"PwnCount\":398011,\"Description\":\"In May 2018, the Russian hacking forum \u003ca href=\\\"https://medium.com/breach-report/data-hacking-news-over-405-000-hackers-from-lolzteam-net-exposed-3121555080cc\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLolzteam suffered a data breach that exposed 400k members\u003c/a\u003e. The impacted data included usernames and email addresses which were later redistributed via another hacking forum. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;ZAN @ BF\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lolzteam.png\",\"DataClasses\":[\"email-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":166,\"Name\":\"Doomworld\",\"Title\":\"Doomworld\",\"Domain\":\"doomworld.com\",\"BreachDate\":\"2022-10-12T00:00:00.000Z\",\"AddedDate\":\"2022-10-24T06:10:24.000Z\",\"ModifiedDate\":\"2022-10-24T06:10:24.000Z\",\"PwnCount\":34478,\"Description\":\"In October 2022, \u003ca href=\\\"https://www.doomworld.com/announcement/4-doomworld-probably-got-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Doomworld fourm suffered a data breach\u003c/a\u003e that exposed 34k member records. The data included email and IP addresses, usernames and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Doomworld.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":187,\"Name\":\"EPal\",\"Title\":\"E-Pal\",\"Domain\":\"epal.gg\",\"BreachDate\":\"2022-04-15T00:00:00.000Z\",\"AddedDate\":\"2022-10-24T04:54:30.000Z\",\"ModifiedDate\":\"2022-10-24T04:56:02.000Z\",\"PwnCount\":108887,\"Description\":\"In October 2022, the service dedicated to finding friends on Discord known as \u003ca href=\\\"https://twitter.com/PogoWasRight/status/1578496290534539264\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eE-Pal disclosed a data breach\u003c/a\u003e. The compromised data included over 100k unique email addresses and usernames spanning approximately 1M orders. The data was subsequently distributed via a popular hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EPal.png\",\"DataClasses\":[\"email-addresses\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":612,\"Name\":\"Wakanim\",\"Title\":\"Wakanim\",\"Domain\":\"wakanim.tv\",\"BreachDate\":\"2022-08-28T00:00:00.000Z\",\"AddedDate\":\"2022-10-06T22:44:01.000Z\",\"ModifiedDate\":\"2022-10-06T22:44:01.000Z\",\"PwnCount\":6706951,\"Description\":\"In August 2022, the European streaming service \u003ca href=\\\"https://www.animenewsnetwork.com/news/2022-09-07/wakanim-streaming-service-delays-content-after-possible-data-breach/.189234\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWakanim suffered a data breach which was subsequently advertised and sold on a popular hacking forum\u003c/a\u003e. The breach exposed 6.7M customer records including email, IP and physical addresses, names and usernames.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Wakanim.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"names\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":69,\"Name\":\"Bhinneka\",\"Title\":\"Bhinneka\",\"Domain\":\"bhinneka.com\",\"BreachDate\":\"2020-01-27T00:00:00.000Z\",\"AddedDate\":\"2022-10-06T05:11:47.000Z\",\"ModifiedDate\":\"2022-10-06T05:11:47.000Z\",\"PwnCount\":1274340,\"Description\":\"In early 2020, the Indonesian consumer electronics website \u003ca href=\\\"https://www.thejakartapost.com/news/2020/05/13/e-commerce-platform-bhinneka-com-reported-to-be-latest-target-of-data-theft.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBhinneka suffered a data breach that exposed almost 1.3M customer records\u003c/a\u003e. The data included email and physical addresses, names, genders, dates of birth, phone numbers and salted password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bhinneka.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":549,\"Name\":\"TAPAirPortugal\",\"Title\":\"TAP Air Portugal\",\"Domain\":\"flytap.com\",\"BreachDate\":\"2022-08-25T00:00:00.000Z\",\"AddedDate\":\"2022-09-23T05:33:05.000Z\",\"ModifiedDate\":\"2023-02-05T06:13:01.000Z\",\"PwnCount\":6083479,\"Description\":\"In August 2022, the Portuguese airline \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTAP Air Portugal was the target of a ransomware attack perpetrated by the Ragnar Locker gang\u003c/a\u003e who later leaked the compromised data via a public dark web site. Over 5M unique email addresses were exposed alongside other personal data including names, genders, DoBs, phone numbers and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TAPAirPortugal.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"nationalities\",\"phone-numbers\",\"physical-addresses\",\"salutations\",\"spoken-languages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":90,\"Name\":\"BrandNewTube\",\"Title\":\"Brand New Tube\",\"Domain\":\"brandnewtube.com\",\"BreachDate\":\"2022-08-14T00:00:00.000Z\",\"AddedDate\":\"2022-09-08T08:00:37.000Z\",\"ModifiedDate\":\"2022-09-08T08:00:37.000Z\",\"PwnCount\":349627,\"Description\":\"In August 2022, the streaming website \u003ca href=\\\"https://unitynewsnetwork.co.uk/streaming-site-brand-new-tube-sees-massive-data-breach-with-ip-addresses-and-names-of-users-revealed/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBrand New Tube suffered a data breach that exposed the personal information of almost 350k subscribers\u003c/a\u003e. The impacted data included email and IP addresses, usernames, genders, passwords stored as unsalted SHA-1 hashes and private messages.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BrandNewTube.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":538,\"Name\":\"Stripchat\",\"Title\":\"Stripchat\",\"Domain\":\"stripchat.com\",\"BreachDate\":\"2021-11-05T00:00:00.000Z\",\"AddedDate\":\"2022-08-31T06:17:42.000Z\",\"ModifiedDate\":\"2022-08-31T06:37:07.000Z\",\"PwnCount\":10001355,\"Description\":\"In November 2021, the live sex cams and adult chat website \u003ca href=\\\"https://www.bitdefender.com.au/blog/hotforsecurity/unsecure-server-exposed-200-million-records-of-adult-webcam-models-and-users-online/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStripchat left several databases exposed and unsecured\u003c/a\u003e. In June the following year, over 10M Stripchat records appeared on a popular hacking forum. The exposed data included usernames, email addresses and IP addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Stripchat.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":530,\"Name\":\"Start\",\"Title\":\"START\",\"Domain\":\"start.film\",\"BreachDate\":\"2021-06-01T00:00:00.000Z\",\"AddedDate\":\"2022-08-30T02:48:30.000Z\",\"ModifiedDate\":\"2022-08-30T02:55:07.000Z\",\"PwnCount\":7455386,\"Description\":\"In August 2022, \u003ca href=\\\"https://meduza.io/news/2022/08/28/v-set-popali-dannye-44-millionov-polzovateley-onlayn-kinoteatra-start\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of an attack against the Russian streaming service \u0026quot;START\u0026quot;\u003c/a\u003e. The incident led to the exposure of 44M records containing 7.4M unique email addresses. The impacted data also included the subscriber's country and password hash. START subsequently \u003ca href=\\\"https://t.me/start_shows/1181\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eacknowledged the incident in a Telegram post\u003c/a\u003e and stated that the data dated back to 2021.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Start.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":61,\"Name\":\"Banorte\",\"Title\":\"Banorte\",\"Domain\":\"banorte.com\",\"BreachDate\":\"2014-08-18T00:00:00.000Z\",\"AddedDate\":\"2022-08-18T23:36:24.000Z\",\"ModifiedDate\":\"2022-08-18T23:36:24.000Z\",\"PwnCount\":2107000,\"Description\":\"In August 2022, \u003ca href=\\\"https://krebsonsecurity.com/2022/08/when-efforts-to-contain-a-data-breach-backfire/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emillions of records from Mexican bank \u0026quot;Banorte\u0026quot; were publicly dumped on a popular hacking forum\u003c/a\u003e including 2.1M unique email addresses, physical addresses, names, phone numbers, RFC (tax) numbers, genders and bank balances. Banorte have stated that the data is \u0026quot;outdated\u0026quot;, although have not yet indicated how far back it dates to. Anecdotal feedback from HIBP subscribers suggests the data may date back 8 years to 2014.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Banorte.png\",\"DataClasses\":[\"account-balances\",\"email-addresses\",\"genders\",\"government-issued-ids\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":513,\"Name\":\"SitePoint\",\"Title\":\"SitePoint\",\"Domain\":\"sitepoint.com\",\"BreachDate\":\"2020-06-20T00:00:00.000Z\",\"AddedDate\":\"2022-08-17T08:21:50.000Z\",\"ModifiedDate\":\"2022-08-17T08:21:50.000Z\",\"PwnCount\":1021790,\"Description\":\"In June 2020, the web development site \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/sitepoint-discloses-data-breach-after-stolen-info-used-in-attacks/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSitePoint suffered a data breach that exposed over 1M customer records\u003c/a\u003e. Impacted data included email and IP addresses, names, usernames, bios and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SitePoint.png\",\"DataClasses\":[\"bios\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":506,\"Name\":\"Shitexpress\",\"Title\":\"Shitexpress\",\"Domain\":\"shitexpress.com\",\"BreachDate\":\"2022-08-08T00:00:00.000Z\",\"AddedDate\":\"2022-08-16T22:40:35.000Z\",\"ModifiedDate\":\"2022-08-16T22:40:35.000Z\",\"PwnCount\":23817,\"Description\":\"In August 2022, the online faeces delivery service \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShitexpress suffered a data breach that exposed 24k unique email addresses\u003c/a\u003e. The addresses spanned invoices, gift cards, promotions and PayPal records. The breach also exposed the IP and email addresses of senders, physical addresses of recipients and messages accompanying the shit delivery.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Shitexpress.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"physical-addresses\",\"private-messages\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":582,\"Name\":\"Twitter\",\"Title\":\"Twitter\",\"Domain\":\"twitter.com\",\"BreachDate\":\"2022-01-01T00:00:00.000Z\",\"AddedDate\":\"2022-08-13T02:29:52.000Z\",\"ModifiedDate\":\"2022-08-13T02:40:49.000Z\",\"PwnCount\":6682453,\"Description\":\"In January 2022, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-selling-twitter-account-data-of-54-million-users-for-30k/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea vulnerability in Twitter's platform allowed an attacker to build a database of the email addresses and phone numbers of millions of users of the social platform\u003c/a\u003e. In a disclosure notice later shared in August 2022, \u003ca href=\\\"https://privacy.twitter.com/en/blog/2022/an-issue-affecting-some-anonymous-accounts\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTwitter advised that the vulnerability was related to a bug introduced in June 2021\u003c/a\u003e and that they are directly notifying impacted customers. The impacted data included either email address or phone number alongside other public information including the username, display name, bio, location and profile photo. The data included 6.7M unique email addresses across both active and suspended accounts, the latter appearing in a separate list of 1.4M addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Twitter.png\",\"DataClasses\":[\"bios\",\"email-addresses\",\"geographic-locations\",\"names\",\"phone-numbers\",\"profile-photos\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":470,\"Name\":\"QuestionPro\",\"Title\":\"QuestionPro\",\"Domain\":\"questionpro.com\",\"BreachDate\":\"2022-05-21T00:00:00.000Z\",\"AddedDate\":\"2022-08-05T00:05:34.000Z\",\"ModifiedDate\":\"2022-08-05T23:24:27.000Z\",\"PwnCount\":22229637,\"Description\":\"In May 2022, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hackers-try-to-extort-survey-firm-questionpro-after-alleged-data-theft/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe survey website QuestionPro was the target of an extortion attempt relating to an alleged data breach\u003c/a\u003e. Over 100GB of data containing 22M unique email addresses (some of which appear to be generated by the platform), are alleged to have been extracted from the service along with IP addresses, browser user agents and results relating to surveys. QuestionPro would not confirm whether a breach had occurred (although they did confirm they were the target of an extortion attempt), so the data was initially flagged as \u0026quot;unverified\u0026quot;. \u003ca href=\\\"https://twitter.com/troyhunt/status/1555696116351377410\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSubsequent verification by impacted HIBP subscribers\u003c/a\u003e later led to the removal of the unverified flag.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/QuestionPro.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"survey-results\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":581,\"Name\":\"TunedGlobal\",\"Title\":\"Tuned Global\",\"Domain\":\"tunedglobal.com\",\"BreachDate\":\"2016-03-16T00:00:00.000Z\",\"AddedDate\":\"2022-08-03T00:00:15.000Z\",\"ModifiedDate\":\"2022-08-03T03:10:14.000Z\",\"PwnCount\":985586,\"Description\":\"In January 2021, \u003ca href=\\\"https://siliconangle.com/2021/01/20/shinyhunters-publishes-1-9m-stolen-user-credentials-photo-editing-site-pixlr/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata from a number of breached services including Tuned Global were released to a public hacking forum\u003c/a\u003e. The breach appears to date back to 2016 and includes 985k records containing email addresses, names, a small number of physical addresses and phone numbers and passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TunedGlobal.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":366,\"Name\":\"MechoDownload\",\"Title\":\"Mecho Download\",\"Domain\":\"mechodownload.com\",\"BreachDate\":\"2013-10-31T00:00:00.000Z\",\"AddedDate\":\"2022-08-02T04:04:59.000Z\",\"ModifiedDate\":\"2022-08-02T04:10:06.000Z\",\"PwnCount\":437928,\"Description\":\"In October 2013, the (now defunct) downloads website \u0026quot;Mecho Download\u0026quot; suffered a data breach that exposed 438k records. Data from the vBulletin based website included email and IP addresses, usernames and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MechoDownload.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":63,\"Name\":\"Battlefy\",\"Title\":\"Battlefy\",\"Domain\":\"battlefy.com\",\"BreachDate\":\"2016-01-11T00:00:00.000Z\",\"AddedDate\":\"2022-07-29T00:24:33.000Z\",\"ModifiedDate\":\"2022-07-29T00:24:33.000Z\",\"PwnCount\":83610,\"Description\":\"In January 2016, the esports website \u003ca href=\\\"https://dotesports.com/general/news/battlefy-hack-data-breach-user-credentials-2800\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBattlefy suffered a data breach that exposed 83k customer records\u003c/a\u003e. The impacted data included email addresses, usernames and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Battlefy.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":435,\"Name\":\"Paytm\",\"Title\":\"Paytm\",\"Domain\":\"paytm.com\",\"BreachDate\":\"2020-08-30T00:00:00.000Z\",\"AddedDate\":\"2022-07-26T23:17:02.000Z\",\"ModifiedDate\":\"2022-07-29T00:10:06.000Z\",\"PwnCount\":3395101,\"Description\":\"In August 2020, the Indian payment provider \u003ca href=\\\"https://economictimes.indiatimes.com/tech/internet/paytm-mall-suffers-massive-breach-ransom-demanded-report/articleshow/77833664.cms\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePaytm was reported as having suffered a data breach and subsequent ransom demand\u003c/a\u003e, after which the data was circulated publicly. Further investigation into the data concluded that \u003ca href=\\\"https://twitter.com/troyhunt/status/1552808334759043073 target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe breach was fabricated and did not originate from Paytm\u003c/a\u003e. The impacted data covered 3.4M unique email addresses along with names, phone numbers, genders, dates of birth, income levels and previous purchases.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Paytm.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"income-levels\",\"names\",\"phone-numbers\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":true,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":503,\"Name\":\"Shadi\",\"Title\":\"Shadi.com\",\"Domain\":\"shadi.com\",\"BreachDate\":\"2016-07-09T00:00:00.000Z\",\"AddedDate\":\"2022-07-20T07:07:31.000Z\",\"ModifiedDate\":\"2022-07-20T07:07:31.000Z\",\"PwnCount\":2021984,\"Description\":\"In July 2016, the Muslim dating site \u003ca href=\\\"https://news.softpedia.com/news/data-from-two-muslim-dating-sites-two-others-dumped-online-506356.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShadi.com suffered a data breach that exposed over 2M members' email addresses\u003c/a\u003e. The breach also exposed passwords stored as MD5 hashes alongside their plain text equivalents. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;fall1984@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Shadi.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":456,\"Name\":\"PPCGeeks\",\"Title\":\"PPCGeeks\",\"Domain\":\"ppcgeeks.com\",\"BreachDate\":\"2016-08-19T00:00:00.000Z\",\"AddedDate\":\"2022-07-18T22:20:50.000Z\",\"ModifiedDate\":\"2022-07-18T22:20:50.000Z\",\"PwnCount\":492518,\"Description\":\"In August 2016, the pocket PC fan site forum \u003ca href=\\\"https://web.archive.org/web/20210227221024/https://forum.ppcgeeks.com/site-news-announcements/153465-urgent-ppcgeeks-hacked-database-dumped.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePPCGeeks suffered a data breach that exposed over 490k records\u003c/a\u003e. The breach of the vBulletin forum exposed email and IP addresses, usernames, dates of birth and passwords stored as salted MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;fall1984@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PPCGeeks.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":307,\"Name\":\"JukinMedia\",\"Title\":\"JukinMedia\",\"Domain\":\"jukinmedia.com\",\"BreachDate\":\"2021-10-28T00:00:00.000Z\",\"AddedDate\":\"2022-07-17T04:50:13.000Z\",\"ModifiedDate\":\"2022-07-17T04:55:21.000Z\",\"PwnCount\":314290,\"Description\":\"In October 2021, the \u0026quot;global leader in user-generated entertainment\u0026quot; \u003ca href=\\\"https://www.databreaches.net/jukin-media-hacked-and-data-dumped-while-company-claims-a-password-reset-is-required-due-to-a-security-upgrade/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJukin Media suffered a data breach\u003c/a\u003e. The breach exposed 13GB of code, configuration and data consisting of 314k unique email addresses along with names, phone numbers, IP addresses and bcrypt password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JukinMedia.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"ip-addresses\",\"names\",\"occupations\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":213,\"Name\":\"Famm\",\"Title\":\"Famm\",\"Domain\":\"famm.us\",\"BreachDate\":\"2020-10-08T00:00:00.000Z\",\"AddedDate\":\"2022-07-16T09:57:48.000Z\",\"ModifiedDate\":\"2022-07-16T09:57:48.000Z\",\"PwnCount\":535240,\"Description\":\"In late 2020, the Japanese family photos website \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/01/25/shinyhunters-wave-3-one-hacker-exposes-over-125-million-credentials/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFamm suffered a data breach that subsequently exposed 1.3M customer records\u003c/a\u003e, including 535k unique email addresses. Impacted data also included names, dates of birth, genders and passwords stored as SHA-256 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Famm.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":193,\"Name\":\"Eskimi\",\"Title\":\"Eskimi\",\"Domain\":\"eskimi.com\",\"BreachDate\":\"2020-09-25T00:00:00.000Z\",\"AddedDate\":\"2022-07-16T07:51:26.000Z\",\"ModifiedDate\":\"2022-07-16T07:51:26.000Z\",\"PwnCount\":1197620,\"Description\":\"In late 2020, the AdTech platform \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/01/25/shinyhunters-wave-3-one-hacker-exposes-over-125-million-credentials/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEskimi suffered a data breach that exposed 26M records with 1.2M unique email addresses\u003c/a\u003e. The data included usernames, dates of birth, genders and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Eskimi.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":318,\"Name\":\"LaPosteMobile\",\"Title\":\"La Poste Mobile\",\"Domain\":\"lapostemobile.fr\",\"BreachDate\":\"2022-07-04T00:00:00.000Z\",\"AddedDate\":\"2022-07-14T00:29:21.000Z\",\"ModifiedDate\":\"2022-07-14T00:57:52.000Z\",\"PwnCount\":533886,\"Description\":\"In July 2022, the French telecommunications company \u003ca href=\\\"https://securityaffairs.co/wordpress/133080/cyber-crime/la-poste-mobile-ransomware.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLa Poste Mobile was the target of an attack by the LockBit ransomware\u003c/a\u003e which resulted in company data being published publicly. The impacted data included 533k unique email addresses along with names, physical addresses, phone numbers, dates of births, genders and banking information. 10 days after the attack, the La Poste Mobile website remained offline.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LaPosteMobile.png\",\"DataClasses\":[\"bank-account-numbers\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":357,\"Name\":\"Mangatoon\",\"Title\":\"Mangatoon\",\"Domain\":\"mangatoon.mobi\",\"BreachDate\":\"2022-05-13T00:00:00.000Z\",\"AddedDate\":\"2022-07-06T21:04:25.000Z\",\"ModifiedDate\":\"2022-07-06T21:04:25.000Z\",\"PwnCount\":23040238,\"Description\":\"In May 2022, the Hong Kong based Manga service \u003ca href=\\\"https://mangatoon.mobi/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMangatoon\u003c/a\u003e suffered a data breach that exposed 23M subscriber records. The breach exposed names, email addresses, genders, social media account identities, auth tokens from social logins and passwords stored as salted MD5 hashes. Mangatoon did not respond to multiple attempts to make contact regarding the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mangatoon.png\",\"DataClasses\":[\"auth-tokens\",\"avatars\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":102,\"Name\":\"CapialEconomics\",\"Title\":\"Capital Economics\",\"Domain\":\"capitaleconomics.com\",\"BreachDate\":\"2020-12-12T00:00:00.000Z\",\"AddedDate\":\"2022-07-04T08:16:36.000Z\",\"ModifiedDate\":\"2022-07-04T08:16:36.000Z\",\"PwnCount\":263829,\"Description\":\"In December 2020, the economic research company \u003ca href=\\\"https://securityaffairs.co/wordpress/113581/deep-web/capital-economics-data-leak.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCapital Economics suffered a data breach that exposed 263k customer records\u003c/a\u003e. The exposed data included email and physical addresses, names, phone numbers, job titles and the employer of impacted customers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CapialEconomics.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":85,\"Name\":\"Bookchor\",\"Title\":\"Bookchor\",\"Domain\":\"bookchor.com\",\"BreachDate\":\"2021-01-28T00:00:00.000Z\",\"AddedDate\":\"2022-07-03T23:41:38.000Z\",\"ModifiedDate\":\"2022-07-03T23:41:38.000Z\",\"PwnCount\":498297,\"Description\":\"In January 2021, the Indian book trading website \u003ca href=\\\"https://www.opindia.com/2021/04/bookchor-data-breach-information-of-over-5-lakh-users-leaked-what-we-know-so-far/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBookchor suffered a data breach that exposed half a million customer records\u003c/a\u003e. The exposed data included email and IP addresses, names, genders, dates of birth, phone numbers and passwords stored as unsalted MD5 hashes. The data was subsequently traded on a popular hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bookchor.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":88,\"Name\":\"BourseDesVols\",\"Title\":\"Bourse des Vols\",\"Domain\":\"bourse-des-vols.com\",\"BreachDate\":\"2021-01-12T00:00:00.000Z\",\"AddedDate\":\"2022-07-03T05:17:56.000Z\",\"ModifiedDate\":\"2022-07-03T05:17:56.000Z\",\"PwnCount\":1460130,\"Description\":\"In January 2021, the French travel company \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/02/19/dark-web-roundup-january-2021/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBourse des Vols suffered a data breach that exposed 1.46M unique email addresses\u003c/a\u003e across more than 1.2k .sql files and over 9GB of data. The impacted data exposed personal information and travel histories including names, phone numbers, IP and physical addresses, dates of birth along with flights taken and purchases.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BourseDesVols.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"flights-taken\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":161,\"Name\":\"DivXSubTitles\",\"Title\":\"DivX SubTitles\",\"Domain\":\"divxsubtitles.net\",\"BreachDate\":\"2010-01-01T00:00:00.000Z\",\"AddedDate\":\"2022-06-14T02:57:46.000Z\",\"ModifiedDate\":\"2022-06-14T04:55:40.000Z\",\"PwnCount\":783058,\"Description\":\"In approximately 2010, the now defunct website DivX SubTitles suffered a data breach that exposed 783k user accounts including email addresses, usernames and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DivXSubTitles.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":138,\"Name\":\"CTARS\",\"Title\":\"CTARS\",\"Domain\":\"ctars.com.au\",\"BreachDate\":\"2021-05-21T00:00:00.000Z\",\"AddedDate\":\"2022-05-31T22:58:15.000Z\",\"ModifiedDate\":\"2022-05-31T23:02:54.000Z\",\"PwnCount\":12314,\"Description\":\"In May 2022, the client management system for the Australian government's NDIS (National Disability Insurance Scheme) \u003ca href=\\\"https://ctars.com.au/ctars-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach which was subsequently posted to an online hacking forum\u003c/a\u003e. The CTARS cloud platform is used by care providers to record information about NDIS participants and often contains sensitive medical information. Impacted data includes over 12k unique email addresses, physical addresses, names, dates of birth, phone numbers and data related to patient conditions and treatments.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CTARS.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"personal-health-data\",\"phone-numbers\",\"physical-addresses\",\"salutations\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":18,\"Name\":\"Adecco\",\"Title\":\"Adecco\",\"Domain\":\"adecco.com\",\"BreachDate\":\"2021-01-03T00:00:00.000Z\",\"AddedDate\":\"2022-05-31T06:33:24.000Z\",\"ModifiedDate\":\"2022-05-31T06:37:53.000Z\",\"PwnCount\":4284538,\"Description\":\"In March 2021, \u003ca href=\\\"https://cybernews.com/security/5-million-adecco-com-users-data-leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of a massive data breach impacting millions of Adecco customers in South America\u003c/a\u003e which was subsequently sold on a popular hacking forum. The breach exposed over 4M unique email addresses as well as genders, dates of birth, marital statuses, phone numbers and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Adecco.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"marital-statuses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":369,\"Name\":\"MGM2022Update\",\"Title\":\"MGM Resorts (2022 Update)\",\"Domain\":\"mgmresorts.com\",\"BreachDate\":\"2019-07-25T00:00:00.000Z\",\"AddedDate\":\"2022-05-29T01:43:46.000Z\",\"ModifiedDate\":\"2022-05-29T01:43:46.000Z\",\"PwnCount\":24842001,\"Description\":\"In July 2019, \u003ca href=\\\"https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMGM Resorts discovered a data breach of one of their cloud services\u003c/a\u003e. The breach included 10.6M guest records with 3.1M unique email addresses stemming back to 2017. In May 2022, \u003ca href=\\\"https://www.vpnmentor.com/blog/mgm-leaked-on-telegram/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea superset of the data totalling almost 25M unique email addresses across 142M rows was extensively shared on Telegram\u003c/a\u003e. On analysis, it's highly likely the data stems from the same incident \u003ca href=\\\"https://www.zdnet.com/article/a-hacker-is-selling-details-of-142-million-mgm-hotel-guests-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewith 142M records having been discovered for sale on a dark web marketplace in mid-2020\u003c/a\u003e. The exposed data included email and physical addresses, names, phone numbers and dates of birth.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MGM.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":457,\"Name\":\"PreenMe\",\"Title\":\"Preen.Me\",\"Domain\":\"preen.me\",\"BreachDate\":\"2020-05-25T00:00:00.000Z\",\"AddedDate\":\"2022-05-26T00:58:43.000Z\",\"ModifiedDate\":\"2022-05-26T00:58:43.000Z\",\"PwnCount\":236105,\"Description\":\"In May 2020, social media marketing company \u003ca href=\\\"https://www.riskbasedsecurity.com/2020/06/24/personal-data-of-350000-social-media-influencers-and-users-compromised-following-preen-me-hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePreen.Me was the target of a ransom attack that resulted in hundreds of thousands of records being publicly posted\u003c/a\u003e. Over 236k unique email addresses were exposed in the attack alongside names, usernames and links to social media profiles.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PreenMe.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":32,\"Name\":\"AmartFurniture\",\"Title\":\"Amart Furniture\",\"Domain\":\"amartfurniture.com.au\",\"BreachDate\":\"2022-05-16T00:00:00.000Z\",\"AddedDate\":\"2022-05-25T23:43:23.000Z\",\"ModifiedDate\":\"2022-05-25T23:43:23.000Z\",\"PwnCount\":108940,\"Description\":\"In May 2022, the Australian retailer \u003ca href=\\\"https://www.ozbargain.com.au/node/701231\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAmart Furniture advised that their warranty claims database hosted on Amazon Web Services had been the target of a cyber attack\u003c/a\u003e. Over 100k records containing email and physical address, names, phone numbers and passwords stored as bcrypt hashes were exposed and shared online by the attacker.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AmartFurniture.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":622,\"Name\":\"Wendys\",\"Title\":\"Wendy's\",\"Domain\":\"wendys.com.ph\",\"BreachDate\":\"2018-03-31T00:00:00.000Z\",\"AddedDate\":\"2022-05-24T23:50:35.000Z\",\"ModifiedDate\":\"2022-05-24T23:50:35.000Z\",\"PwnCount\":52485,\"Description\":\"In March 2018, \u003ca href=\\\"https://www.rappler.com/technology/202040-wendys-philippines-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWendy's in the Philippines suffered a data breach\u003c/a\u003e which impacted over 52k customers and job applicants. The breach exposed extensive personal information including names, email and IP addresses, physical addresses, phone numbers and passwords stored as MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Wendys.png\",\"DataClasses\":[\"education-levels\",\"email-addresses\",\"ip-addresses\",\"job-applications\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":512,\"Name\":\"SirHurt\",\"Title\":\"SirHurt\",\"Domain\":\"sirhurt.net\",\"BreachDate\":\"2021-04-23T00:00:00.000Z\",\"AddedDate\":\"2022-05-24T05:06:08.000Z\",\"ModifiedDate\":\"2022-05-24T05:06:08.000Z\",\"PwnCount\":90655,\"Description\":\"In April 2021, the the Roblox cheats website \u003ca href=\\\"https://wearedevs.net/forum/t/20397\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSirHurt suffered a data breach\u003c/a\u003e that exposed over 90k customer records. The exposed data included email and IP addresses, usernames and passwords stored as MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SirHurt.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":214,\"Name\":\"Fanpass\",\"Title\":\"Fanpass\",\"Domain\":\"fanpass.co.uk\",\"BreachDate\":\"2022-04-30T00:00:00.000Z\",\"AddedDate\":\"2022-05-24T03:55:30.000Z\",\"ModifiedDate\":\"2022-05-24T23:28:33.000Z\",\"PwnCount\":112251,\"Description\":\"In April 2022, the UK based website for buying and selling soccer tickets \u003ca href=\\\"https://milled.com/fanpass/fanpass-incident-notification-V6odeYPOxOTPZFq-\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFanpass suffered a data breach\u003c/a\u003e which exposed 112k customer records. Impacted data includes names, phone numbers, physical addresses, purchase histories and salted password hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;\u003ca href=\\\"https://breaches.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreaches.net\u003c/a\u003e\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Fanpass.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"partial-dates-of-birth\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":479,\"Name\":\"ReadNovel\",\"Title\":\"Read Novel\",\"Domain\":\"readnovel.com\",\"BreachDate\":\"2019-05-01T00:00:00.000Z\",\"AddedDate\":\"2022-05-16T08:41:14.000Z\",\"ModifiedDate\":\"2022-05-16T08:41:14.000Z\",\"PwnCount\":22424472,\"Description\":\"In May 2019, the Chinese literature website \u003ca href=\\\"https://www.readnovel.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead Novel\u003c/a\u003e allegedly suffered a data breach that exposed 22M unique email addresses. Data also included usernames, genders, phone numbers and passwords stored as salted MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ReadNovel.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":79,\"Name\":\"BlackBerryFans\",\"Title\":\"BlackBerry Fans\",\"Domain\":\"blackberryfans.org\",\"BreachDate\":\"2022-05-06T00:00:00.000Z\",\"AddedDate\":\"2022-05-16T02:15:13.000Z\",\"ModifiedDate\":\"2022-05-16T02:16:15.000Z\",\"PwnCount\":174168,\"Description\":\"In May 2022, the Chinese BlackBerry enthusiasts website \u003ca href=\\\"http://blackberryfans.org/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBlackBerry Fans\u003c/a\u003e suffered a data breach that exposed 174k member records. The impacted data included usernames, email and IP addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BlackBerryFans.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":419,\"Name\":\"OGUsers2021\",\"Title\":\"OGUsers (2021 breach)\",\"Domain\":\"ogusers.com\",\"BreachDate\":\"2021-04-11T00:00:00.000Z\",\"AddedDate\":\"2022-05-16T00:40:46.000Z\",\"ModifiedDate\":\"2022-05-16T00:40:46.000Z\",\"PwnCount\":348302,\"Description\":\"In April 2021, the account hijacking and SIM swapping forum \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/fourth-times-a-charm-ogusers-hacking-forum-hacked-again/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOGusers suffered a data breach\u003c/a\u003e, the fourth since December 2018. The breach was subsequently sold on a rival hacking forum and contained usernames, email and IP addresses and passwords stored as either salted MD5 or argon2 hashes. A total of 348k unique email addresses appeared in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OGUsers.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":430,\"Name\":\"ParagonCheats\",\"Title\":\"Paragon Cheats\",\"Domain\":\"paragoncheats.com\",\"BreachDate\":\"2021-05-22T00:00:00.000Z\",\"AddedDate\":\"2022-05-14T02:26:40.000Z\",\"ModifiedDate\":\"2022-05-14T02:32:52.000Z\",\"PwnCount\":188089,\"Description\":\"In May 2021, the Grand Theft Auto Online cheats website \u003ca href=\\\"https://screenrant.com/gta-online-cheater-mod-shut-down/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eParagon Cheats suffered a data breach that lead to the shutdown of the service\u003c/a\u003e. The breach exposed 188k customer records including usernames, email and IP addresses. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;VRAirhead and xFueY\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ParagonCheats.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":434,\"Name\":\"PayHere\",\"Title\":\"PayHere\",\"Domain\":\"payhere.lk\",\"BreachDate\":\"2022-03-27T00:00:00.000Z\",\"AddedDate\":\"2022-05-02T05:26:25.000Z\",\"ModifiedDate\":\"2022-05-02T08:27:23.000Z\",\"PwnCount\":1580249,\"Description\":\"In late March 2022, the Sri Lankan payment gateway \u003ca href=\\\"https://www.yoshlk.me/technicity/payhere-hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePayHere suffered a data breach that exposed more than 65GB of payment records\u003c/a\u003e including over 1.5M unique email addresses. The data also included IP and physical addresses, names, phone numbers, purchase histories and partially obfuscated credit card data (card type, first 6 and last 4 digits plus expiry date). A month later, PayHere published a blog on the incident titled \u003ca href=\\\"https://blog.payhere.lk/ensuring-integrity-on-payhere-cybersecurity-incident/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEnsuring Integrity on PayHere Cybersecurity Incident\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PayHere.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":28,\"Name\":\"Aimware\",\"Title\":\"Aimware\",\"Domain\":\"aimware.net\",\"BreachDate\":\"2019-04-28T00:00:00.000Z\",\"AddedDate\":\"2022-05-02T02:13:41.000Z\",\"ModifiedDate\":\"2022-05-02T02:23:27.000Z\",\"PwnCount\":305470,\"Description\":\"In mid-2019, the video game cheats website \u0026quot;Aimware\u0026quot; suffered a data breach that exposed hundreds of thousands of subscribers' personal information. Data included email and IP addresses, usernames, forum posts, private messages, website activity and passwords stored as salted MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;clerk/anthrax/soontoberichh\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Aimware.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":156,\"Name\":\"DevilTorrents\",\"Title\":\"Devil-Torrents.pl\",\"Domain\":\"devil-torrents.pl\",\"BreachDate\":\"2021-01-04T00:00:00.000Z\",\"AddedDate\":\"2022-05-01T23:56:34.000Z\",\"ModifiedDate\":\"2022-05-01T23:56:34.000Z\",\"PwnCount\":63451,\"Description\":\"In early 2021, the Polish torrents website Devil-Torrents.pl suffered a data breach. A subset of the data including 63k unique email addresses and cracked passwords were subsequently socialised on a popular data breach sharing service.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DevilTorrents.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":56,\"Name\":\"Avvo\",\"Title\":\"Avvo\",\"Domain\":\"avvo.com\",\"BreachDate\":\"2019-12-17T00:00:00.000Z\",\"AddedDate\":\"2022-04-15T03:39:42.000Z\",\"ModifiedDate\":\"2022-04-15T03:45:01.000Z\",\"PwnCount\":4101101,\"Description\":\"In approximately December 2019, an alleged data breach of the lawyer directory service Avvo was published to an online hacking forum and used in an extortion scam (it's possible the exposure dates back earlier than that). The data contained 4.1M unique email addresses alongside SHA-1 hashes, most likely representing user passwords. \u003ca href=\\\"https://troyhunt.com/breach-disclosure-blow-by-blow-heres-why-its-so-hard\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMultiple attempts at contacting Avvo over the course of a week were unsuccessful and the authenticity of the data was eventually verified with common Avvo and HIBP subscribers.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Avvo.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":574,\"Name\":\"Travelio\",\"Title\":\"Travelio\",\"Domain\":\"travelio.com\",\"BreachDate\":\"2021-11-23T00:00:00.000Z\",\"AddedDate\":\"2022-04-08T00:05:43.000Z\",\"ModifiedDate\":\"2022-04-08T00:05:43.000Z\",\"PwnCount\":471376,\"Description\":\"In November 2021, the Indonesian real estate website \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/12/14/dark-web-roundup-november-2021/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTravelio suffered a data breach that exposed over 470k customer accounts\u003c/a\u003e. The data included email addresses, names, password hashes, phone numbers and for some accounts, dates of birth, physical address and Facebook auth tokens. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Travelio.png\",\"DataClasses\":[\"auth-tokens\",\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":494,\"Name\":\"RoyalEnfield\",\"Title\":\"Royal Enfield\",\"Domain\":\"royalenfield.com\",\"BreachDate\":\"2019-01-01T00:00:00.000Z\",\"AddedDate\":\"2022-03-31T21:13:58.000Z\",\"ModifiedDate\":\"2022-03-31T21:13:58.000Z\",\"PwnCount\":420873,\"Description\":\"In January 2020, motorcycle maker \u003ca href=\\\"https://www.thequint.com/news/india/royal-enfield-exposed-database-containing-450000-customer-data-cyber-security-expert\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRoyal Enfield left a database publicly exposed that resulted in the inadvertent publication of over 400k customers\u003c/a\u003e. The impacted data included email and physical addresses, names, motorcycle information, social media profiles, passwords, and other personal information. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RoyalEnfield.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"social-media-profiles\",\"vehicle-details\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":653,\"Name\":\"ZAPHosting\",\"Title\":\"ZAP-Hosting\",\"Domain\":\"zap-hosting.com\",\"BreachDate\":\"2021-11-22T00:00:00.000Z\",\"AddedDate\":\"2022-03-19T23:48:45.000Z\",\"ModifiedDate\":\"2022-03-19T23:48:45.000Z\",\"PwnCount\":746682,\"Description\":\"In November 2021, web host \u003ca href=\\\"https://twitter.com/zaphosting/status/1503346593591873543\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZAP-Hosting suffered a data breach\u003c/a\u003e that exposed over 60GB of data containing 746k unique email addresses. The breach also contained support chat logs, IP addresses, names, purchases, physical addresses and phone numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ZAPHosting.png\",\"DataClasses\":[\"browser-user-agent-details\",\"chat-logs\",\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":108,\"Name\":\"CDEK\",\"Title\":\"CDEK\",\"Domain\":\"cdek.ru\",\"BreachDate\":\"2022-03-09T00:00:00.000Z\",\"AddedDate\":\"2022-03-17T06:19:02.000Z\",\"ModifiedDate\":\"2022-03-17T06:19:02.000Z\",\"PwnCount\":19218203,\"Description\":\"In early 2022, a collective known as \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/ukraine-recruits-it-army-to-hack-russian-entities-lists-31-targets/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eIT Army whose stated goal is to \u0026quot;completely de-anonymise most Russian users by leaking hundreds of gigabytes of databases\u0026quot;\u003c/a\u003e published over 30GB of data allegedly sourced from Russian courier service CDEK. The data contained over 19M unique email addresses along with names and phone numbers. The authenticity of the breach could not be independently established and has been flagged as \u0026quot;unverfieid\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CDEK.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":490,\"Name\":\"Robinhood\",\"Title\":\"Robinhood\",\"Domain\":\"robinhood.com\",\"BreachDate\":\"2021-11-03T00:00:00.000Z\",\"AddedDate\":\"2022-03-03T22:47:32.000Z\",\"ModifiedDate\":\"2022-03-03T22:47:32.000Z\",\"PwnCount\":5003937,\"Description\":\"In November 2021, the online trading platform \u003ca href=\\\"https://techcrunch.com/2021/11/09/robinhood-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRobinhood suffered a data breach\u003c/a\u003e after a customer service representative was socially engineered. The incident exposed over 5M customer email addresses and 2M customer names. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;Jarand Moen Romtviet\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Robinhood.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":348,\"Name\":\"MacGeneration\",\"Title\":\"MacGeneration\",\"Domain\":\"macg.co\",\"BreachDate\":\"2022-01-29T00:00:00.000Z\",\"AddedDate\":\"2022-03-03T03:07:19.000Z\",\"ModifiedDate\":\"2022-03-03T03:24:04.000Z\",\"PwnCount\":101004,\"Description\":\"In January 2022, the French Apple news website \u003ca href=\\\"https://www.macg.co/macgeneration/2022/02/macgeneration-victime-dune-attaque-informatique-127149\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMacGeneration suffered a data breach\u003c/a\u003e. The incident exposed over 100k usernames, email addresses and passwords stored as salted SHA-512 hashes. After discovering the incident, MacGeneration self-submitted data to HIBP.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MacGeneration.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":416,\"Name\":\"NVIDIA\",\"Title\":\"NVIDIA\",\"Domain\":\"nvidia.com\",\"BreachDate\":\"2022-02-23T00:00:00.000Z\",\"AddedDate\":\"2022-03-02T23:50:10.000Z\",\"ModifiedDate\":\"2022-03-02T23:51:53.000Z\",\"PwnCount\":71335,\"Description\":\"In February 2022, microchip company \u003ca href=\\\"https://www.zdnet.com/article/nvidia-says-employee-credentials-proprietary-information-stolen-during-cyberattack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNVIDIA suffered a data breach that exposed employee credentials and proprietary code\u003c/a\u003e. Impacted data included over 70k employee email addresses and NTLM password hashes, many of which were subsequently cracked and circulated within the hacking community.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NVIDIA.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":252,\"Name\":\"GiveSendGo\",\"Title\":\"GiveSendGo\",\"Domain\":\"givesendgo.com\",\"BreachDate\":\"2022-02-07T00:00:00.000Z\",\"AddedDate\":\"2022-02-15T00:01:14.000Z\",\"ModifiedDate\":\"2022-02-15T00:01:14.000Z\",\"PwnCount\":89966,\"Description\":\"In February 2022, the Christian fundraising service \u003ca href=\\\"https://techcrunch.com/2022/02/14/freedom-convoy-donor-leak-givesendgo/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGiveSendGo suffered a data breach which exposed the personal data of 90k donors to the Canadian \u0026quot;Freedom Convoy\u0026quot; protest against vaccine mandates\u003c/a\u003e. The breach exposed names, email addresses, post codes, donation amount and comments left at the time of donation.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GiveSendGo.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":482,\"Name\":\"RedDoorz\",\"Title\":\"RedDoorz\",\"Domain\":\"reddoorz.com\",\"BreachDate\":\"2020-09-04T00:00:00.000Z\",\"AddedDate\":\"2022-01-28T03:44:12.000Z\",\"ModifiedDate\":\"2022-01-28T03:44:12.000Z\",\"PwnCount\":5890277,\"Description\":\"In September 2020, the hotel management \u0026amp; booking platform \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/58-million-reddoorz-user-records-for-sale-on-hacking-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRedDoorz suffered a data breach that exposed over 5.8M user accounts\u003c/a\u003e. The breached data included names, email addresses, phone numbers, genders, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RedDoorz.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"occupations\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":92,\"Name\":\"BTCAlpha\",\"Title\":\"BTC-Alpha\",\"Domain\":\"btc-alpha.com\",\"BreachDate\":\"2021-11-02T00:00:00.000Z\",\"AddedDate\":\"2022-01-27T23:39:18.000Z\",\"ModifiedDate\":\"2022-01-27T23:39:18.000Z\",\"PwnCount\":362426,\"Description\":\"In November 2021, the crypto exchange platform \u003ca href=\\\"https://www.techtarget.com/searchsecurity/news/252509877/Cryptocurrency-exchange-BTC-Alpha-confirms-ransomware-attack\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBTC-Alpha suffered a ransomware attack data breach\u003c/a\u003e after which customer data was publicly dumped. The impacted data included 362k email and IP addresses, usernames and passwords stored as PBKDF2 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BTCAlpha.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":507,\"Name\":\"ShockGore\",\"Title\":\"ShockGore\",\"Domain\":\"shockgore.com\",\"BreachDate\":\"2020-08-11T00:00:00.000Z\",\"AddedDate\":\"2022-01-20T00:07:47.000Z\",\"ModifiedDate\":\"2022-01-20T00:07:47.000Z\",\"PwnCount\":73944,\"Description\":\"In August 2020, the website for sharing graphic videos and images of gore and animal cruelty suffered a data breach. The breach exposed 74k unique email addresses alongside usernames, IP addresses, genders and unsalted SHA-1 password hashes. Private messages were also exposed, many containing requests for material of a depraved nature. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ShockGore.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":423,\"Name\":\"OpenSubtitles\",\"Title\":\"Open Subtitles\",\"Domain\":\"opensubtitles.org\",\"BreachDate\":\"2021-08-01T00:00:00.000Z\",\"AddedDate\":\"2022-01-19T04:51:36.000Z\",\"ModifiedDate\":\"2022-01-19T04:51:36.000Z\",\"PwnCount\":6783158,\"Description\":\"In August 2021, the subtitling website \u003ca href=\\\"https://forum.opensubtitles.org/viewtopic.php?f=1\u0026p=46835\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOpen Subtitles suffered a data breach and subsequent ransom demand\u003c/a\u003e. The breach exposed almost 7M subscribers' personal data including email and IP addresses, usernames, the country of the user and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OpenSubtitles.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":593,\"Name\":\"Upstox\",\"Title\":\"Upstox\",\"Domain\":\"upstox.com\",\"BreachDate\":\"2021-04-08T00:00:00.000Z\",\"AddedDate\":\"2022-01-19T03:29:03.000Z\",\"ModifiedDate\":\"2022-01-19T03:29:03.000Z\",\"PwnCount\":111002,\"Description\":\"In April 2021, Indian brokerage firm \u003ca href=\\\"https://www.hackread.com/shinyhunters-broker-firm-upstox-database-leak/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eUpstox suffered a data breach\u003c/a\u003e. The incident exposed extensive personal information on over 100k customers including names, genders, dates of birth, physical addresses, banking information and passwords stored as bcrypt hashes. Extensive \u0026quot;know your customer\u0026quot; information was also exposed including scans of bank statements, cheques and identity documents complete with Aadhaar numbers. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Upstox.png\",\"DataClasses\":[\"bank-account-numbers\",\"dates-of-birth\",\"email-addresses\",\"family-members-names\",\"genders\",\"government-issued-ids\",\"income-levels\",\"marital-statuses\",\"nationalities\",\"occupations\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":103,\"Name\":\"CardingMafiaDec2021\",\"Title\":\"Carding Mafia (December 2021)\",\"Domain\":\"cardmafia.cc\",\"BreachDate\":\"2021-12-28T00:00:00.000Z\",\"AddedDate\":\"2022-01-16T00:04:04.000Z\",\"ModifiedDate\":\"2022-01-16T00:04:04.000Z\",\"PwnCount\":303877,\"Description\":\"In December 2021, the Carding Mafia forum suffered a data breach that exposed over 300k members' email addresses. Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes. This breach came only 9 months after another breach of the forum in March 2021.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CardingMafia.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":19,\"Name\":\"ABFRL\",\"Title\":\"Aditya Birla Fashion and Retail\",\"Domain\":\"abfrl.com\",\"BreachDate\":\"2021-12-01T00:00:00.000Z\",\"AddedDate\":\"2022-01-15T02:58:39.000Z\",\"ModifiedDate\":\"2022-01-15T03:02:43.000Z\",\"PwnCount\":5470063,\"Description\":\"In December 2021, Indian retailer \u003ca href=\\\"https://restoreprivacy.com/aditya-birla-fashion-and-retail-ltd-abfrl-hack-2022/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAditya Birla Fashion and Retail Ltd was breached and ransomed\u003c/a\u003e. The ransom demand was allegedly rejected and data containing 5.4M unique email addresses was subsequently dumped publicly on a popular hacking forum the next month. The data contained extensive personal customer information including names, phone numbers, physical addresses, DoBs, order histories and passwords stored as MD5 hashes. Employee data was also dumped publicly and included salary grades, marital statuses and religions. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ABFRL.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"income-levels\",\"job-titles\",\"marital-statuses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"religions\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":262,\"Name\":\"GunsDotCom\",\"Title\":\"Guns.com\",\"Domain\":\"guns.com\",\"BreachDate\":\"2021-01-12T00:00:00.000Z\",\"AddedDate\":\"2022-01-13T05:14:53.000Z\",\"ModifiedDate\":\"2022-01-13T06:32:48.000Z\",\"PwnCount\":375928,\"Description\":\"In January 2021, the firearms website \u003ca href=\\\"https://gizmodo.com/guns-com-gets-hacked-spilling-gun-owner-information-al-1846544734\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eguns.com suffered a data breach\u003c/a\u003e. The breach exposed 376k unique email addresses along with names, phone numbers, physical addresses, gun purchases, partial credit card data, dates of birth and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GunsDotCom.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":168,\"Name\":\"Doxbin\",\"Title\":\"Doxbin\",\"Domain\":\"doxbin.com\",\"BreachDate\":\"2022-01-05T00:00:00.000Z\",\"AddedDate\":\"2022-01-08T05:51:48.000Z\",\"ModifiedDate\":\"2022-01-09T06:23:56.000Z\",\"PwnCount\":370794,\"Description\":\"In January 2022, the \u0026quot;doxing\u0026quot; website designed to disclose the personal information of targeted individuals (\u0026quot;doxes\u0026quot;) \u003ca href=\\\"https://www.flashpoint-intel.com/blog/doxbin-leak/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDoxbin suffered a data breach\u003c/a\u003e. The breach was subsequently leaked online and included over 370k unique email addresses across user accounts and doxes. User accounts also included usernames, password hashes and browser user agents. The personal information disclosed in the doxes was often extensive including names, physical addresses, phone numbers and more.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Doxbin.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":223,\"Name\":\"FlexBooker\",\"Title\":\"FlexBooker\",\"Domain\":\"flexbooker.com\",\"BreachDate\":\"2021-12-23T00:00:00.000Z\",\"AddedDate\":\"2022-01-06T06:11:10.000Z\",\"ModifiedDate\":\"2022-01-06T06:34:26.000Z\",\"PwnCount\":3756794,\"Description\":\"In December 2021, the online booking service \u003ca href=\\\"https://www.flexbooker.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFlexBooker\u003c/a\u003e suffered a data breach that exposed 3.7 million accounts. The data included email addresses, names, phone numbers and for a small number of accounts, password hashes and partial credit card data. FlexBooker has identified the breach as originating from a compromised account within their AWS infrastructure. The data was found being actively traded on a popular hacking forum and was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FlexBooker.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":151,\"Name\":\"DatPiff\",\"Title\":\"DatPiff\",\"Domain\":\"datpiff.com\",\"BreachDate\":\"2021-08-25T00:00:00.000Z\",\"AddedDate\":\"2022-01-04T07:42:27.000Z\",\"ModifiedDate\":\"2022-01-04T07:42:27.000Z\",\"PwnCount\":7476940,\"Description\":\"In late 2021, \u003ca href=\\\"https://www.numerama.com/cyberguerre/784965-la-plateforme-de-rap-datpiff-piratee-les-mots-de-passe-dans-la-nature.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eemail address and plain text password pairs from the rap mixtape website DatPiff appeared for sale on a popular hacking forum\u003c/a\u003e. The data allegedly dated back to an earlier breach and in total, contained almost 7.5M email addresses and cracked password pairs. The original data source allegedly contained usernames, security questions and answers and passwords stored as MD5 hashes with a static salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DatPiff.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"security-questions-and-answers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":483,\"Name\":\"RedLineStealer\",\"Title\":\"RedLine Stealer\",\"Domain\":\"\",\"BreachDate\":\"2021-12-05T00:00:00.000Z\",\"AddedDate\":\"2021-12-30T05:24:21.000Z\",\"ModifiedDate\":\"2022-01-05T04:11:30.000Z\",\"PwnCount\":441657,\"Description\":\"In December 2021, \u003ca href=\\\"https://twitter.com/MayhemDayOne/status/1474749233475596292\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003elogs from the RedLine Stealer malware were left publicly exposed and were then obtained by security researcher Bob Diachenko\u003c/a\u003e. The data included 441 thousand unique email addresses, usernames and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":true,\"FaviconUrl\":null},{\"Id\":463,\"Name\":\"Protemps\",\"Title\":\"Protemps\",\"Domain\":\"protemps.com.sg\",\"BreachDate\":\"2021-10-04T00:00:00.000Z\",\"AddedDate\":\"2021-12-20T02:36:08.000Z\",\"ModifiedDate\":\"2021-12-20T02:57:50.000Z\",\"PwnCount\":49591,\"Description\":\"In October 2021, the Singaporean recruitment website \u003ca href=\\\"https://www.straitstimes.com/singapore/courts-crime/spore-employment-agency-hacked-ic-scans-and-salaries-of-40000-job-seekers\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eProtemps suffered a data breach\u003c/a\u003e that exposed almost 50,000 unique email addresses. The impacted data includes names, email and physical addresses, phone numbers, passport numbers and passwords stored as unsalted MD5 hashes, among troves of other jobseeker data. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Protemps.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"job-applications\",\"marital-statuses\",\"names\",\"nationalities\",\"passport-numbers\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"religions\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":258,\"Name\":\"Gravatar\",\"Title\":\"Gravatar\",\"Domain\":\"gravatar.com\",\"BreachDate\":\"2020-10-03T00:00:00.000Z\",\"AddedDate\":\"2021-12-05T22:45:58.000Z\",\"ModifiedDate\":\"2021-12-08T01:47:02.000Z\",\"PwnCount\":113990759,\"Description\":\"In October 2020, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/online-avatar-service-gravatar-allows-mass-collection-of-user-info/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea security researcher published a technique for scraping large volumes of data from Gravatar, the service for providing globally unique avatars \u003c/a\u003e. 167 million names, usernames and MD5 hashes of email addresses used to reference users' avatars were subsequently scraped and distributed within the hacking community. 114 million of the MD5 hashes were cracked and distributed alongside the source hash, thus disclosing the original email address and accompanying data. Following the impacted email addresses being searchable in HIBP, \u003ca href=\\\"https://en.gravatar.com/support/data-privacy\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGravatar release an FAQ detailing the incident\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Gravatar.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":286,\"Name\":\"IDCGames\",\"Title\":\"IDC Games\",\"Domain\":\"idcgames.com\",\"BreachDate\":\"2021-03-15T00:00:00.000Z\",\"AddedDate\":\"2021-11-17T06:41:24.000Z\",\"ModifiedDate\":\"2021-11-17T06:55:42.000Z\",\"PwnCount\":3966871,\"Description\":\"In March 2021, \u003ca href=\\\"https://socradar.io/the-week-in-dark-web-19-march-2021-us-law-firms-on-target/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e4 million records sourced from IDC Games were shared on a public hacking forum\u003c/a\u003e. The data included usernames, email addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/IDCGames.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":173,\"Name\":\"DucksUnlimited\",\"Title\":\"Ducks Unlimited\",\"Domain\":\"ducks.org\",\"BreachDate\":\"2021-01-29T00:00:00.000Z\",\"AddedDate\":\"2021-11-16T01:24:35.000Z\",\"ModifiedDate\":\"2021-11-16T05:39:28.000Z\",\"PwnCount\":1324364,\"Description\":\"In mid-2021, \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/06/14/dark-web-roundup-may-2021/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRisk Based Security reported on a database sourced from Ducks Unlimited being traded online\u003c/a\u003e. The data dated back to January 2021 and contained 1.3M unique email addresses across both a membership list and a list of website users. Impacted data included names, phones numbers, physical addresses, dates of birth and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DucksUnlimited.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":16,\"Name\":\"ActMobile\",\"Title\":\"ActMobile\",\"Domain\":\"actmobile.com\",\"BreachDate\":\"2021-10-08T00:00:00.000Z\",\"AddedDate\":\"2021-11-09T07:55:03.000Z\",\"ModifiedDate\":\"2021-11-09T07:55:03.000Z\",\"PwnCount\":1583193,\"Description\":\"In October 2021, \u003ca href=\\\"https://www.comparitech.com/blog/information-security/vpn-database-leak/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esecurity researcher Bob Diachenko discovered an exposed database he attributed to ActMobile, the operators of Dash VPN and FreeVPN\u003c/a\u003e. The exposed data included 1.6 million unique email addresses along with IP addresses and password hashes, all of which were subsequently leaked on a popular hacking forum. Although usage of the service was verified by HIBP subscribers, \u003ca href=\\\"https://www.databreaches.net/shoot-the-messenger-monday-edition-actmobile-threatens-researcher-whose-only-sin-was-trying-to-let-them-know-they-are-leaking-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eActMobile denied the data was sourced from them\u003c/a\u003e and the breach has subsequently been flagged as \u0026quot;unverified\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ActMobile.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":139,\"Name\":\"CyberServe\",\"Title\":\"CyberServe\",\"Domain\":\"cyberserve.co.il\",\"BreachDate\":\"2021-10-29T00:00:00.000Z\",\"AddedDate\":\"2021-11-04T09:58:03.000Z\",\"ModifiedDate\":\"2021-11-04T10:28:56.000Z\",\"PwnCount\":1107034,\"Description\":\"In October 2021, the Israeli hosting provider \u003ca href=\\\"https://www.timesofisrael.com/black-shadow-hackers-leak-medical-records-of-290000-israeli-patients/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCyberServe was breached and ransomed before having a substantial amount of their customer data leaked publicly by a group known as \u0026quot;Black Shadow\u0026quot;\u003c/a\u003e. Amongst the data was the LGBTQ dating site Atraf and the Machon Mor medical institute. Due to multiple different sites being compromised, the impacted data is broad and ranges from relationship information to medical data to email addresses and passwords stored in plain text. The data was made available to HIBP with support from May Brooks-Kempler, founder of \u003ca href=\\\"https://www.facebook.com/groups/Think.Safe.Cyber/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Think Safe Cyber community in Israel\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CyberServe.png\",\"DataClasses\":[\"dates-of-birth\",\"drinking-habits\",\"email-addresses\",\"family-structure\",\"genders\",\"geographic-locations\",\"hiv-statuses\",\"ip-addresses\",\"names\",\"passwords\",\"personal-health-data\",\"phone-numbers\",\"physical-attributes\",\"private-messages\",\"profile-photos\",\"religions\",\"sexual-orientations\",\"smoking-habits\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":124,\"Name\":\"CoinMarketCap\",\"Title\":\"CoinMarketCap\",\"Domain\":\"coinmarketcap.com\",\"BreachDate\":\"2021-10-12T00:00:00.000Z\",\"AddedDate\":\"2021-10-22T20:32:53.000Z\",\"ModifiedDate\":\"2021-10-22T20:32:53.000Z\",\"PwnCount\":3117548,\"Description\":\"During October 2021, 3.1 million email addresses with accounts on the cryptocurrency market capitalisation website \u003ca href=\\\"https://coinmarketcap.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCoinMarketCap\u003c/a\u003e were discovered being traded on hacking forums. Whilst the email addresses were found to correlate with CoinMarketCap accounts, it's unclear precisely how they were obtained. CoinMarketCap has provided the following statement on the data: \u0026quot;CoinMarketCap has become aware that batches of data have shown up online purporting to be a list of user accounts. While the data lists we have seen are only email addresses (no passwords), we have found a correlation with our subscriber base. We have not found any evidence of a data leak from our own servers — we are actively investigating this issue and will update our subscribers as soon as we have any new information.\u0026quot;\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CoinMarketCap.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":564,\"Name\":\"Thingiverse\",\"Title\":\"Thingiverse\",\"Domain\":\"thingiverse.com\",\"BreachDate\":\"2020-10-13T00:00:00.000Z\",\"AddedDate\":\"2021-10-14T10:02:04.000Z\",\"ModifiedDate\":\"2021-10-14T10:02:04.000Z\",\"PwnCount\":228102,\"Description\":\"In October 2021, a database backup taken from the 3D model sharing service \u003ca href=\\\"https://www.databreachtoday.com/thingiverse-data-leak-affects-25-million-subscribers-a-17729\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eThingiverse began extensively circulating within the hacking community\u003c/a\u003e. Dating back to October 2020, the 36GB file contained 228 thousand unique email addresses, mostly alongside comments left on 3D models. The data also included usernames, IP addresses, full names and passwords stored as either unsalted SHA-1 or bcrypt hashes. In some cases, physical addresses was also exposed. Thingiverse's owner, MakerBot, is aware of the incident but at the time of writing, is yet to issue a disclosure statement. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Thingiverse.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":447,\"Name\":\"Playbook\",\"Title\":\"Playbook\",\"Domain\":\"playbook.vc\",\"BreachDate\":\"2020-10-19T00:00:00.000Z\",\"AddedDate\":\"2021-10-11T23:39:05.000Z\",\"ModifiedDate\":\"2021-10-11T23:39:05.000Z\",\"PwnCount\":50538,\"Description\":\"In September 2021, \u003ca href=\\\"https://www.bankinfosecurity.com/articles.php?art_id=17696\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea publicly accessible PostgresSQL database belonging to the Playbook service was identified\u003c/a\u003e. Run by VC firm Plug and Play Ventures, the database had been exposed since October 2020 and contained more than 50 thousand unique email addresses along with names, phone numbers, job titles and passwords stored as PBKDF2 hashes. It took more than 2 weeks after being notified of the exposed data to properly secure it. It's unknown whether Plug and Play Ventures notified impacted individuals as they ceased responding to queries from the press.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Playbook.png\",\"DataClasses\":[\"email-addresses\",\"job-titles\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":215,\"Name\":\"FantasyFootballHub\",\"Title\":\"Fantasy Football Hub\",\"Domain\":\"fantasyfootballhub.co.uk\",\"BreachDate\":\"2021-10-02T00:00:00.000Z\",\"AddedDate\":\"2021-10-07T06:32:57.000Z\",\"ModifiedDate\":\"2021-10-07T06:32:57.000Z\",\"PwnCount\":66479,\"Description\":\"In October 2021, the fantasy premier league (soccer) website \u003ca href=\\\"https://fantasyfootballhub.co.uk/we-have-suffered-a-cyber-attack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFantasy Football Hub suffered a data breach that exposed 66 thousand unique email addresses\u003c/a\u003e. The data included names, usernames, IP addresses, transactions and passwords stored as WordPress MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FantasyFootballHub.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":486,\"Name\":\"RepublicanPartyOfTexas\",\"Title\":\"Republican Party of Texas\",\"Domain\":\"texasgop.org\",\"BreachDate\":\"2021-09-11T00:00:00.000Z\",\"AddedDate\":\"2021-10-06T07:44:39.000Z\",\"ModifiedDate\":\"2021-10-06T07:44:39.000Z\",\"PwnCount\":72596,\"Description\":\"In September 2021, \u003ca href=\\\"https://www.dailydot.com/debug/anonymous-texas-gop-epik/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Republican Party of Texas was hacked by a group claiming to be \u0026quot;Anonymous\u0026quot; in retaliation for the state's controversial abortion ban\u003c/a\u003e. The September defacement was followed by a leak of data and documents which included material from the hosting provider Epik. Impacted data included over 72 thousand unique email addresses across various tables, some also including names, geographic location data, IP addresses and browser user agents.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RepublicanPartyOfTexas.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":333,\"Name\":\"LinkedInScrape\",\"Title\":\"LinkedIn Scraped Data (2021)\",\"Domain\":\"linkedin.com\",\"BreachDate\":\"2021-04-08T00:00:00.000Z\",\"AddedDate\":\"2021-10-02T21:39:21.000Z\",\"ModifiedDate\":\"2023-11-07T06:51:33.000Z\",\"PwnCount\":125698496,\"Description\":\"During the first half of 2021, \u003ca href=\\\"https://www.businessinsider.com.au/linkedin-data-scraped-500-million-users-for-sale-online-2021-4\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLinkedIn was targeted by attackers who scraped data from hundreds of millions of public profiles and later sold them online\u003c/a\u003e. Whilst the scraping did not constitute a data breach nor did it access any personal data not intended to be publicly accessible, the data was still monetised and later broadly circulated in hacking circles. The scraped data contains approximately 400M records with 125M unique email addresses, as well as names, geographic locations, genders and job titles. LinkedIn specifically addresses the incident in their post on \u003ca href=\\\"https://news.linkedin.com/2021/june/an-update-from-linkedin\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAn update on report of scraped data\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LinkedIn.png\",\"DataClasses\":[\"education-levels\",\"email-addresses\",\"genders\",\"geographic-locations\",\"job-titles\",\"names\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":30,\"Name\":\"Ajarn\",\"Title\":\"Ajarn\",\"Domain\":\"ajarn.com\",\"BreachDate\":\"2018-12-13T00:00:00.000Z\",\"AddedDate\":\"2021-09-26T03:45:38.000Z\",\"ModifiedDate\":\"2021-09-26T03:45:38.000Z\",\"PwnCount\":266399,\"Description\":\"In September 2021, the Thai-based English language teaching website \u003ca href=\\\"https://www.ajarn.com/data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAjarn discovered they'd been the victim of a data breach dating back to December 2018\u003c/a\u003e. The breach was self-submitted to HIBP and included 266k email addresses, names, genders, phone numbers and other personal information. Hashed passwords were also impacted in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ajarn.png\",\"DataClasses\":[\"dates-of-birth\",\"education-levels\",\"email-addresses\",\"genders\",\"geographic-locations\",\"job-applications\",\"marital-statuses\",\"names\",\"nationalities\",\"passwords\",\"phone-numbers\",\"profile-photos\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":191,\"Name\":\"Epik\",\"Title\":\"Epik\",\"Domain\":\"epik.com\",\"BreachDate\":\"2021-09-13T00:00:00.000Z\",\"AddedDate\":\"2021-09-19T21:27:17.000Z\",\"ModifiedDate\":\"2021-09-19T21:27:17.000Z\",\"PwnCount\":15003961,\"Description\":\"In September 2021, \u003ca href=\\\"https://arstechnica.com/information-technology/2021/09/anonymous-leaks-gigabytes-of-data-from-epik-web-host-of-gab-and-parler/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe domain registrar and web host Epik suffered a significant data breach\u003c/a\u003e, allegedly in retaliation for hosting alt-right websites. The breach exposed a huge volume of data not just of Epik customers, but also scraped WHOIS records belonging to individuals and organisations who were not Epik customers. The data included over 15 million unique email addresses (including anonymised versions for domain privacy), names, phone numbers, physical addresses, purchases and passwords stored in various formats.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Epik.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":293,\"Name\":\"IndiaMART\",\"Title\":\"IndiaMART\",\"Domain\":\"indiamart.com\",\"BreachDate\":\"2021-05-23T00:00:00.000Z\",\"AddedDate\":\"2021-08-27T05:33:29.000Z\",\"ModifiedDate\":\"2021-08-27T05:33:29.000Z\",\"PwnCount\":20154583,\"Description\":\"In August 2021, \u003ca href=\\\"https://economictimes.indiatimes.com/industry/services/retail/data-breach-or-data-scraping-with-over-38-million-records-up-for-grabs-indiamart-has-some-answering-to-do/articleshow/85563628.cms\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e38 million records from Indian e-commerce company IndiaMART were found being traded on a popular hacking forum\u003c/a\u003e. Dated several months earlier, the data included over 20 million unique email addresses alongside names, phone numbers and physical addresses. It's unclear whether IndiaMART intentionally exposed the data attributes as part of the intended design of the platform or whether the data was obtained by exploiting a vulnerability in the service.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/IndiaMART.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":290,\"Name\":\"Imavex\",\"Title\":\"Imavex\",\"Domain\":\"imavex.com\",\"BreachDate\":\"2021-08-20T00:00:00.000Z\",\"AddedDate\":\"2021-08-26T05:48:29.000Z\",\"ModifiedDate\":\"2024-10-23T22:06:40.000Z\",\"PwnCount\":878209,\"Description\":\"In August 2021, the website development company \u003ca href=\\\"https://www.imavex.com/breach-information/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eImavex suffered a data breach that exposed 878 thousand unique email addresses\u003c/a\u003e. The data included user records containing names, usernames and password material with some records also containing genders and partial credit card data, including the last 4 digits of the card and expiry date. Hundreds of thousands of form submissions and orders via Imavex customers were also exposed and contained further personal information of submitters and the contents of the form. The compromised system was subsequently sunset in January 2024 and all customer data impacted by the incident was permanently deleted.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Imavex.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":540,\"Name\":\"SubaGames\",\"Title\":\"SubaGames\",\"Domain\":\"subagames.com\",\"BreachDate\":\"2016-11-01T00:00:00.000Z\",\"AddedDate\":\"2021-08-25T06:39:28.000Z\",\"ModifiedDate\":\"2021-08-25T06:44:29.000Z\",\"PwnCount\":6137666,\"Description\":\"In November 2016, the game developer \u003ca href=\\\"https://www.hackread.com/vbulletin-forums-hacked-accounts-sold-on-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSuba Games suffered a data breach\u003c/a\u003e which led to the exposure of 6.1M unique email addresses. Impacted data also included usernames and passwords, most of which appeared circulating in the breached file in plain text after being cracked from salted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SubaGames.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":179,\"Name\":\"Eatigo\",\"Title\":\"Eatigo\",\"Domain\":\"eatigo.com\",\"BreachDate\":\"2018-10-16T00:00:00.000Z\",\"AddedDate\":\"2021-08-25T03:42:31.000Z\",\"ModifiedDate\":\"2021-08-25T03:42:31.000Z\",\"PwnCount\":2789609,\"Description\":\"In October 2018, the restaurant reservation service \u003ca href=\\\"https://www.channelnewsasia.com/singapore/eatigo-data-breach-personal-information-millions-account-1307916\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEatigo suffered a data breach that exposed 2.8 million accounts\u003c/a\u003e. The data included email addresses, names, phone numbers, social media profiles, genders and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Eatigo.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":424,\"Name\":\"OrderSnapp\",\"Title\":\"OrderSnapp\",\"Domain\":\"ordersnapp.com\",\"BreachDate\":\"2020-06-29T00:00:00.000Z\",\"AddedDate\":\"2021-08-08T01:53:33.000Z\",\"ModifiedDate\":\"2021-08-08T02:11:56.000Z\",\"PwnCount\":1304447,\"Description\":\"In June 2020, the restaurant solutions provider \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/01/25/shinyhunters-wave-3-one-hacker-exposes-over-125-million-credentials/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOrderSnapp suffered a data breach\u003c/a\u003e which exposed 1.3M unique email addresses. Impacted data also included names, phone numbers, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OrderSnapp.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":376,\"Name\":\"MMGFusion\",\"Title\":\"MMG Fusion\",\"Domain\":\"mmgfusion.com\",\"BreachDate\":\"2020-12-20T00:00:00.000Z\",\"AddedDate\":\"2021-08-07T23:46:32.000Z\",\"ModifiedDate\":\"2021-08-07T23:46:32.000Z\",\"PwnCount\":2660295,\"Description\":\"In December 2020, the dental practice management service \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/02/19/dark-web-roundup-january-2021/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMMG Fusion was the victim of a data breach\u003c/a\u003e which exposed 2.6M unique email addresses. The data also included patient appointments, names, phone numbers, dates of birth, genders and physical addresses. A small number of records also included passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MMGFusion.png\",\"DataClasses\":[\"appointments\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"marital-statuses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":52,\"Name\":\"Audi\",\"Title\":\"Audi\",\"Domain\":\"audiusa.com\",\"BreachDate\":\"2019-08-14T00:00:00.000Z\",\"AddedDate\":\"2021-07-23T06:31:33.000Z\",\"ModifiedDate\":\"2021-07-23T21:57:33.000Z\",\"PwnCount\":2743539,\"Description\":\"In August 2019, \u003ca href=\\\"https://techcrunch.com/2021/06/11/volkswagen-says-a-vendors-security-lapse-exposed-3-3-million-drivers-details/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAudi USA suffered a data breach after a vendor left data unsecured and exposed on the internet\u003c/a\u003e. The data contained 2.7M unique email addresses along with names, phone numbers, physical addresses and vehicle information including VIN. In \u003ca href=\\\"https://techcrunch.com/2021/06/11/volkswagen-says-a-vendors-security-lapse-exposed-3-3-million-drivers-details/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea disclosure statement from Audi\u003c/a\u003e, they also advised some customers had driver's licenses, dates of birth, social security numbers and other personal information exposed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Audi.png\",\"DataClasses\":[\"dates-of-birth\",\"driver-s-licenses\",\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"social-security-numbers\",\"vehicle-details\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":263,\"Name\":\"Guntrader\",\"Title\":\"Guntrader\",\"Domain\":\"guntrader.uk\",\"BreachDate\":\"2021-07-17T00:00:00.000Z\",\"AddedDate\":\"2021-07-21T20:24:24.000Z\",\"ModifiedDate\":\"2021-07-21T20:24:24.000Z\",\"PwnCount\":112031,\"Description\":\"In July 2021, the United Kingdom based website \u003ca href=\\\"https://www.fieldsportschannel.tv/guntrader-co-uk-hacked-not-much-lost/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGuntrader suffered a data breach that exposed 112k unique email addresses\u003c/a\u003e. Extensive personal information was also exposed including names, phone numbers, geolocation data, IP addresses and various physical address attributes (cities for all users, complete addresses for some). Passwords stored as bcrypt hashes were also exposed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Guntrader.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":510,\"Name\":\"ShortEdition\",\"Title\":\"Short Édition\",\"Domain\":\"short-edition.com\",\"BreachDate\":\"2021-06-26T00:00:00.000Z\",\"AddedDate\":\"2021-07-19T04:49:43.000Z\",\"ModifiedDate\":\"2021-07-19T04:49:43.000Z\",\"PwnCount\":505466,\"Description\":\"In June 2021, the French publishing house of short literature \u003ca href=\\\"https://short-edition.com/en/p/cyber-attack\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShort Édition suffered a data breach that exposed 505k records\u003c/a\u003e. Impacted data included email and physical addresses, names, usernames, phone numbers, dates of birth, genders and passwords stored as either salted SHA-1 or salted SHA-512 hashes. Short Édition self-submitted the impacted data to HIBP.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ShortEdition.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":598,\"Name\":\"Vastaamo\",\"Title\":\"Vastaamo\",\"Domain\":\"vastaamo.fi\",\"BreachDate\":\"2019-03-31T00:00:00.000Z\",\"AddedDate\":\"2021-07-17T01:51:01.000Z\",\"ModifiedDate\":\"2021-08-27T05:37:20.000Z\",\"PwnCount\":30433,\"Description\":\"In October 2020, the Finnish psychotherapy service \u003ca href=\\\"https://www.wired.com/story/vastaamo-psychotherapy-patients-hack-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVastaamo was the subject of a ransomware attack targeting first the company itself, followed by their patients directly\u003c/a\u003e. The original security incident dates back to a period between late 2018 and early 2019 and exposed data including 30k unique email addresses, names, social security numbers and notes on individuals' psychotherapy sessions. This breach has been flagged as \u0026quot;sensitive\u0026quot; and is only searchable by owners of the email addresses and domains exposed in the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Vastaamo.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"personal-health-data\",\"social-security-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":477,\"Name\":\"Raychat\",\"Title\":\"Raychat\",\"Domain\":\"raychat.ir\",\"BreachDate\":\"2021-01-31T00:00:00.000Z\",\"AddedDate\":\"2021-07-04T00:52:38.000Z\",\"ModifiedDate\":\"2021-07-04T00:52:38.000Z\",\"PwnCount\":938981,\"Description\":\"In January 2021, the now defunct Iranian social media platform \u003ca href=\\\"https://www.gizmodo.com.au/2021/02/iranian-chat-app-gets-its-data-wiped-out-in-a-cyberattack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRaychat suffered a data breach that exposed 939 thousand unique email addresses\u003c/a\u003e. The data included names, IP addresses, browser user agent strings and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Raychat.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":553,\"Name\":\"Teespring\",\"Title\":\"Teespring\",\"Domain\":\"teespring.com\",\"BreachDate\":\"2020-04-01T00:00:00.000Z\",\"AddedDate\":\"2021-06-25T06:58:48.000Z\",\"ModifiedDate\":\"2021-06-25T06:58:48.000Z\",\"PwnCount\":8234193,\"Description\":\"In April 2020, the custom printed apparel website \u003ca href=\\\"https://www.zdnet.com/article/hacker-leaks-data-of-millions-of-teespring-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTeespring suffered a data breach that exposed 8.2 million customer records\u003c/a\u003e. The data included email addresses, names, geographic locations and social media IDs.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Teespring.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":648,\"Name\":\"YoteprestoCom\",\"Title\":\"yotepresto.com\",\"Domain\":\"yotepresto.com\",\"BreachDate\":\"2020-06-22T00:00:00.000Z\",\"AddedDate\":\"2021-06-25T05:04:47.000Z\",\"ModifiedDate\":\"2021-06-25T05:04:47.000Z\",\"PwnCount\":1444629,\"Description\":\"In June 2020, the Mexican lending platform \u003ca href=\\\"https://newsbeezer.com/mexicoeng/yotepresto-has-disclosed-the-emails-and-passwords-of-all-1-4-million-customers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eyotepresto.com suffered a data breach\u003c/a\u003e. Over 1.4 million customers were impacted by the breach which disclosed email and IP addresses, usernames and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/YoteprestoCom.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":590,\"Name\":\"UC\",\"Title\":\"University of California\",\"Domain\":\"universityofcalifornia.edu\",\"BreachDate\":\"2020-12-24T00:00:00.000Z\",\"AddedDate\":\"2021-06-20T07:44:34.000Z\",\"ModifiedDate\":\"2021-07-04T01:03:54.000Z\",\"PwnCount\":547422,\"Description\":\"In December 2020, \u003ca href=\\\"https://portswigger.net/daily-swig/uc-berkeley-confirms-data-breach-becomes-latest-victim-of-accellion-cyber-attack\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe University of California suffered a data breach due to vulnerability in in a third-party provider, Accellion\u003c/a\u003e. The breach exposed extensive personal data on both students and staff including 547 thousand unique email addresses, names, dates of birth, genders, social security numbers, ethnicities and other academic related data attributes. Further analysis is available in \u003ca href=\\\"https://cgorlla.github.io/project/uc\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eExploring the Impact of the UC Data Breach\u003c/a\u003e. The data was provided to HIBP courtesy of Cyril Gorlla.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/UC.png\",\"DataClasses\":[\"dates-of-birth\",\"education-levels\",\"email-addresses\",\"ethnicities\",\"genders\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\",\"social-security-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":229,\"Name\":\"Fotolog\",\"Title\":\"Fotolog\",\"Domain\":\"fotolog.com\",\"BreachDate\":\"2018-12-01T00:00:00.000Z\",\"AddedDate\":\"2021-06-15T03:20:43.000Z\",\"ModifiedDate\":\"2021-06-15T03:20:43.000Z\",\"PwnCount\":16717854,\"Description\":\"In December 2018, the photo sharing social network \u003ca href=\\\"https://www.theregister.com/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFotolog suffered a data breach\u003c/a\u003e that exposed 16.7 million unique email addresses. The data also included usernames and unsalted SHA-256 password hashes. The site was dissolved the following year and repurposed as a news website based in Brcko, Bosnia and Herzegovina.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Fotolog.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":395,\"Name\":\"NamelessMalware\",\"Title\":\"Nameless Malware\",\"Domain\":\"\",\"BreachDate\":\"2020-01-01T00:00:00.000Z\",\"AddedDate\":\"2021-06-09T10:28:14.000Z\",\"ModifiedDate\":\"2022-01-05T04:11:30.000Z\",\"PwnCount\":1121484,\"Description\":\"In January 2021, \u003ca href=\\\"http://troyhunt.com/nameless-malware-discovered-by-nordlocker-is-now-in-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNordLocker provided HIBP 1.1 million email addresses collected by nameless malware\u003c/a\u003e. The malware campaign ran between 2018 and 2020 and infected 3.25 million computers, stealing files, credentials and taking screenshots and photos using the computer's webcam. \u003ca href=\\\"https://nordlocker.com/malware-analysis/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more in NordLocker's writeup about the Nameless malware that stole 1.2 TB of private data.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":true,\"FaviconUrl\":null},{\"Id\":165,\"Name\":\"DominosIndia\",\"Title\":\"Domino's India\",\"Domain\":\"dominos.co.in\",\"BreachDate\":\"2021-03-24T00:00:00.000Z\",\"AddedDate\":\"2021-06-03T02:18:39.000Z\",\"ModifiedDate\":\"2021-06-20T03:20:56.000Z\",\"PwnCount\":22527655,\"Description\":\"In April 2021, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/dominos-india-discloses-data-breach-after-hackers-sell-data-online/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e13TB of compromised Domino's India appeared for sale on a hacking forum\u003c/a\u003e after which the company acknowledged a major data breach they dated back to March. The compromised data included 22.5 million unique email addresses, names, phone numbers, order histories and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dominos.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":302,\"Name\":\"JD\",\"Title\":\"JD\",\"Domain\":\"jd.com\",\"BreachDate\":\"2013-01-01T00:00:00.000Z\",\"AddedDate\":\"2021-06-02T07:06:02.000Z\",\"ModifiedDate\":\"2021-06-02T07:06:02.000Z\",\"PwnCount\":77449341,\"Description\":\"In 2013 (exact date unknown), the Chinese e-commerce service \u003ca href=\\\"https://ecommercechinaagency.com/jd-ecommerce-giant-made-apology-user-data-leakage/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJD suffered a data breach\u003c/a\u003e that exposed 13GB of data containing 77 million unique email addresses. The data also included usernames, phone numbers and passwords stored as SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JD.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":377,\"Name\":\"MobiFriends\",\"Title\":\"MobiFriends\",\"Domain\":\"mobifriends.com\",\"BreachDate\":\"2020-01-06T00:00:00.000Z\",\"AddedDate\":\"2021-05-23T03:16:52.000Z\",\"ModifiedDate\":\"2021-05-23T03:16:52.000Z\",\"PwnCount\":3512952,\"Description\":\"In January 2020, the Barcelona-based dating app \u003ca href=\\\"https://www.zdnet.com/article/dating-app-mobifriends-silent-on-security-breach-impacting-3-6-million-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMobiFriends suffered a data breach\u003c/a\u003e that exposed 3.5 million unique email addresses. The data also included usernames, genders, dates of birth and MD5 password hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MobiFriends.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":381,\"Name\":\"Moneycontrol\",\"Title\":\"Moneycontrol\",\"Domain\":\"moneycontrol.com\",\"BreachDate\":\"2017-09-07T00:00:00.000Z\",\"AddedDate\":\"2021-05-22T22:37:30.000Z\",\"ModifiedDate\":\"2021-05-22T22:37:30.000Z\",\"PwnCount\":762874,\"Description\":\"In April 2021, \u003ca href=\\\"https://www.opindia.com/2021/04/personal-details-of-over-seven-lakh-moneycontrol-users-up-for-sale/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehackers posted data for sale originating from the online Indian financial platform, Moneycontrol\u003c/a\u003e. The data included 763 thousand unique email addresses (allegedly a subset of a larger 40 million account breach), alongside geographic locations, phone numbers, genders, dates of birth and plain text passwords. The date of the original breach is unclear, although the breached data indicates the file was created in September 2017 and Moneycontrol has stated that the breach is \u0026quot;an old data set\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Moneycontrol.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":645,\"Name\":\"Yam\",\"Title\":\"Yam\",\"Domain\":\"yam.com\",\"BreachDate\":\"2013-06-02T00:00:00.000Z\",\"AddedDate\":\"2021-05-22T08:02:31.000Z\",\"ModifiedDate\":\"2021-05-22T08:02:31.000Z\",\"PwnCount\":13258797,\"Description\":\"In June 2013, the Taiwanese website \u003ca href=\\\"https://twitter.com/StillAzureH/status/1383234219153846276\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eYam.com suffered a data breach which was shared to a popular hacking forum in 2021\u003c/a\u003e. The data included 13 million unique email addresses alongside names, usernames, phone numbers, physical addresses, dates of birth and unsalted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Yam.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":339,\"Name\":\"Livpure\",\"Title\":\"Livpure\",\"Domain\":\"livpure.com\",\"BreachDate\":\"2020-08-29T00:00:00.000Z\",\"AddedDate\":\"2021-05-22T01:46:59.000Z\",\"ModifiedDate\":\"2021-05-23T00:18:00.000Z\",\"PwnCount\":269552,\"Description\":\"In August 2020, the Indian retailer \u003ca href=\\\"https://cloudsek.com/threatintelligence/over-a-million-pii-of-livpure-customers-leak-on-cybercrime-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLivpure suffered a data breach\u003c/a\u003e which exposed over 1 million customer purchases with 270 thousand unique email addresses. The data also included names, phone numbers, physical addresses and details of purchased items. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;white_peacock@riseup.net\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Livpure.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":142,\"Name\":\"DailyQuiz\",\"Title\":\"Daily Quiz\",\"Domain\":\"dailyquiz.me\",\"BreachDate\":\"2021-01-13T00:00:00.000Z\",\"AddedDate\":\"2021-05-21T05:15:39.000Z\",\"ModifiedDate\":\"2021-05-21T11:44:38.000Z\",\"PwnCount\":8032404,\"Description\":\"In January 2021, the quiz website \u003ca href=\\\"https://dailyquiz.me/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDaily Quiz\u003c/a\u003e suffered a data breach that exposed over 8 million unique email addresses. The data also included usernames, IP addresses and passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DailyQuiz.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":288,\"Name\":\"IIMJobs\",\"Title\":\"IIMJobs\",\"Domain\":\"iimjobs.com\",\"BreachDate\":\"2018-12-31T00:00:00.000Z\",\"AddedDate\":\"2021-05-21T04:44:18.000Z\",\"ModifiedDate\":\"2021-05-21T04:45:09.000Z\",\"PwnCount\":4216063,\"Description\":\"In December 2018, the Indian job portal \u003ca href=\\\"https://www.hackread.com/indian-job-portal-iimjobs-hacked-database-leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eIIMJobs suffered a data breach that exposed 4.1 million unique email addresses\u003c/a\u003e. The data also included names, phone numbers, geographic locations, dates of birth, job titles, job applications and cover letters plus passwords stored as unsalted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/IIMJobs.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"job-applications\",\"job-titles\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":619,\"Name\":\"WedMeGood\",\"Title\":\"WedMeGood\",\"Domain\":\"wedmegood.com\",\"BreachDate\":\"2021-01-06T00:00:00.000Z\",\"AddedDate\":\"2021-05-13T00:08:20.000Z\",\"ModifiedDate\":\"2021-05-13T00:08:20.000Z\",\"PwnCount\":1306723,\"Description\":\"In January 2021, the Indian wedding planning platform \u003ca href=\\\"https://www.thenewsminute.com/article/wedmegood-and-two-more-sites-hacked-103-crore-users-card-data-leaked-140996\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWedMeGood suffered a data breach that exposed 1.3 million customers\u003c/a\u003e. The breach exposed 41.5GB of data including email and physical addresses, names, genders, phone numbers and password hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WedMeGood.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":169,\"Name\":\"DriveSure\",\"Title\":\"DriveSure\",\"Domain\":\"drivesure.com\",\"BreachDate\":\"2020-12-19T00:00:00.000Z\",\"AddedDate\":\"2021-05-10T08:02:29.000Z\",\"ModifiedDate\":\"2021-05-10T08:02:29.000Z\",\"PwnCount\":3675099,\"Description\":\"In December 2020, the car dealership service provider \u003ca href=\\\"https://www.riskbasedsecurity.com/2021/02/01/personal-data-of-3-million-people-exposed-in-drivesure-hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDriveSure suffered a data breach\u003c/a\u003e. The incident resulted in 26GB of data being downloaded and later shared on a hacking forum. Impacted personal information included 3.6 million unique email addresses, names, phone numbers and physical addresses. Vehicle data was also exposed and included makes, models, VIN numbers and odometer readings. A small number of passwords stored as bcrypt hashes were also included in the data set.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DriveSure.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"vehicle-details\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":431,\"Name\":\"ParkMobile\",\"Title\":\"ParkMobile\",\"Domain\":\"parkmobile.io\",\"BreachDate\":\"2021-03-21T00:00:00.000Z\",\"AddedDate\":\"2021-04-30T03:07:24.000Z\",\"ModifiedDate\":\"2021-04-30T03:07:24.000Z\",\"PwnCount\":20949825,\"Description\":\"In March 2021, the mobile parking app service \u003ca href=\\\"https://krebsonsecurity.com/2021/04/parkmobile-breach-exposes-license-plate-data-mobile-numbers-of-21m-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eParkMobile suffered a data breach which exposed 21 million customers' personal data\u003c/a\u003e. The impacted data included email addresses, names, phone numbers, vehicle licence plates and passwords stored as bcrypt hashes. The following month, the data appeared on a public hacking forum where it was extensively redistributed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ParkMobile.png\",\"DataClasses\":[\"email-addresses\",\"licence-plates\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":155,\"Name\":\"Descomplica\",\"Title\":\"Descomplica\",\"Domain\":\"descomplica.com.br\",\"BreachDate\":\"2021-03-14T00:00:00.000Z\",\"AddedDate\":\"2021-04-28T08:37:04.000Z\",\"ModifiedDate\":\"2021-04-28T08:37:04.000Z\",\"PwnCount\":4845378,\"Description\":\"In March 2021, the Brazilian EdTech company \u003ca href=\\\"https://atendimento.descomplica.com.br/hc/pt-br/articles/1500003993042-FAQ-Ataque-cibern%C3%A9tico-14-03\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDescomplica suffered a data breach\u003c/a\u003e which was subsequently posted to a popular hacking forum. The data included almost 5 million email addresses, names, the first 6 and last 4 digits and the expiry date of credit cards, purchase histories and password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Descomplica.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":303,\"Name\":\"Jefit\",\"Title\":\"Jefit\",\"Domain\":\"jefit.com\",\"BreachDate\":\"2020-08-11T00:00:00.000Z\",\"AddedDate\":\"2021-04-27T23:29:31.000Z\",\"ModifiedDate\":\"2021-04-27T23:29:31.000Z\",\"PwnCount\":9052457,\"Description\":\"In August 2020, the workout tracking app \u003ca href=\\\"https://www.jefit.com/jefit-news-product-updates/jefit-data-incident-public-announcement\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJefit suffered a data breach\u003c/a\u003e. The data was subsequently sold within the hacking community and included over 9 million email and IP addresses, usernames and passwords stored as either vBulletin or argon2 hashes. Several million cracked passwords later appeared in broad circulation.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Jefit.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":185,\"Name\":\"Emotet\",\"Title\":\"Emotet\",\"Domain\":\"\",\"BreachDate\":\"2021-01-27T00:00:00.000Z\",\"AddedDate\":\"2021-04-26T22:25:15.000Z\",\"ModifiedDate\":\"2022-01-05T04:11:30.000Z\",\"PwnCount\":4324770,\"Description\":\"In January 2021, \u003ca href=\\\"https://www.troyhunt.com/data-from-the-emotet-malware-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi-and-nhtcu\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe FBI in partnership with the Dutch NHTCU, German BKA and other international law enforcement agencies brought down the world's most dangerous malware: Emotet\u003c/a\u003e. The agencies obtained data collected by the malware and provided impacted email addresses to HIBP so that impacted individuals and domain owners could assess their exposure. \u003ca href=\\\"https://www.troyhunt.com/data-from-the-emotet-malware-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi-and-nhtcu\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about the takedown and recommended actions\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":true,\"FaviconUrl\":null},{\"Id\":70,\"Name\":\"bigbasket\",\"Title\":\"bigbasket\",\"Domain\":\"bigbasket.com\",\"BreachDate\":\"2020-10-14T00:00:00.000Z\",\"AddedDate\":\"2021-04-26T04:00:10.000Z\",\"ModifiedDate\":\"2021-04-26T06:15:01.000Z\",\"PwnCount\":24500011,\"Description\":\"In October 2020, the Indian grocery platform \u003ca href=\\\"https://indianexpress.com/article/business/business-others/bigbasket-data-breach-user-details-leaked-dark-web-cyber-crime-7009578/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebigbasket suffered a data breach that exposed over 20 million customer records\u003c/a\u003e. The data was originally sold before being leaked publicly in April the following year and included email, IP and physical addresses, names, phones numbers, dates of birth passwords stored as Django(SHA-1) hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/bigbasket.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":355,\"Name\":\"MangaDex\",\"Title\":\"MangaDex\",\"Domain\":\"mangadex.org\",\"BreachDate\":\"2021-03-22T00:00:00.000Z\",\"AddedDate\":\"2021-04-25T21:38:51.000Z\",\"ModifiedDate\":\"2021-04-25T21:41:24.000Z\",\"PwnCount\":2987329,\"Description\":\"In March 2021, the manga fan site \u003ca href=\\\"https://portswigger.net/daily-swig/mangadex-website-taken-offline-following-cyber-attack-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMangaDex suffered a data breach\u003c/a\u003e that resulted in the exposure of almost 3 million subscribers. The data included email and IP addresses, usernames and passwords stored as bcrypt hashes. The data was subsequently circulated within hacking groups.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MangaDex.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":508,\"Name\":\"ShopBack\",\"Title\":\"ShopBack\",\"Domain\":\"shopback.com\",\"BreachDate\":\"2020-09-17T00:00:00.000Z\",\"AddedDate\":\"2021-04-25T05:41:24.000Z\",\"ModifiedDate\":\"2021-04-25T05:41:24.000Z\",\"PwnCount\":20529819,\"Description\":\"In September 2020, the cashback reward program \u003ca href=\\\"https://support.shopback.com.au/hc/en-us/articles/360054141274-Customer-Notice-FAQs\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShopBack suffered a data breach\u003c/a\u003e. The incident exposed over 20 million unique email addresses along with names, phone numbers, country of residence and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ShopBack.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":117,\"Name\":\"ClearVoiceSurveys\",\"Title\":\"ClearVoice Surveys\",\"Domain\":\"clearvoicesurveys.com\",\"BreachDate\":\"2015-08-23T00:00:00.000Z\",\"AddedDate\":\"2021-04-23T05:00:19.000Z\",\"ModifiedDate\":\"2021-04-23T05:00:19.000Z\",\"PwnCount\":15074786,\"Description\":\"In April 2021, the market research surveys company \u003ca href=\\\"https://www.clearvoicesurveys.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eClearVoice Surveys\u003c/a\u003e had a publicly facing database backup from 2015 taken and redistributed on a popular hacking forum. The data included 15M unique email addresses across more than 17M rows of data that also included names, physical and IP addresses, genders, dates of birth and plain text passwords. ClearVoice Surveys advised they were aware of the breach and confirmed its authenticity.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ClearVoiceSurveys.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":440,\"Name\":\"PhoneHouse\",\"Title\":\"Phone House España\",\"Domain\":\"phonehouse.es\",\"BreachDate\":\"2021-04-08T00:00:00.000Z\",\"AddedDate\":\"2021-04-22T05:59:07.000Z\",\"ModifiedDate\":\"2021-04-22T05:59:07.000Z\",\"PwnCount\":5223350,\"Description\":\"In April 2021, the Spanish retailer \u003ca href=\\\"https://thetechzone.online/cyberattack-on-phone-house-with-ransomware-and-possible-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePhone House allegedly suffered a ransomware attack that also exposed significant volumes of customer data\u003c/a\u003e. Attributed to the Babuk ransomware, a collection of data alleged to be a subset of a larger corpus was posted to a dark web site and contained 5.2M email addresses along with names, nationalities, genders, dates of birth, phone numbers and physical addresses. Phone House has been threatened with further releases if a ransom is not paid.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PhoneHouse.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"nationalities\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":209,\"Name\":\"Facebook\",\"Title\":\"Facebook\",\"Domain\":\"facebook.com\",\"BreachDate\":\"2019-08-01T00:00:00.000Z\",\"AddedDate\":\"2021-04-04T03:20:45.000Z\",\"ModifiedDate\":\"2021-04-06T09:09:21.000Z\",\"PwnCount\":509458528,\"Description\":\"In April 2021, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea large data set of over 500 million Facebook users was made freely available for download\u003c/a\u003e. Encompassing approximately 20% of Facebook's subscribers, the data was allegedly obtained by exploiting a vulnerability Facebook advises they rectified in August 2019. The primary value of the data is the association of phone numbers to identities; whilst each record included phone, only 2.5 million contained an email address. Most records contained names and genders with many also including dates of birth, location, relationship status and employer.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Facebook.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"employers\",\"genders\",\"geographic-locations\",\"names\",\"phone-numbers\",\"relationship-statuses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":592,\"Name\":\"Astoria\",\"Title\":\"Unverified Data Source\",\"Domain\":\"astoriacompany.com\",\"BreachDate\":\"2021-01-26T00:00:00.000Z\",\"AddedDate\":\"2021-03-24T01:47:35.000Z\",\"ModifiedDate\":\"2021-04-12T22:58:35.000Z\",\"PwnCount\":11498146,\"Description\":\"In January 2021, over 11M unique email addresses were discovered by Night Lion Security alongside an extensive amount of personal information including names, physical and IP addresses, phone numbers and dates of birth. Some records also contained social security numbers, driver's license details, personal financial information and health-related data, depending on where the information was sourced from. Initially attributed to Astoria Company, \u003ca href=\\\"https://astoriacompany.com/cyber-update/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethey subsequently investigated the incident and confirmed the data did not originate from their services\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"bank-account-numbers\",\"credit-status-information\",\"dates-of-birth\",\"email-addresses\",\"employers\",\"health-insurance-information\",\"income-levels\",\"ip-addresses\",\"names\",\"personal-health-data\",\"phone-numbers\",\"physical-addresses\",\"smoking-habits\",\"social-security-numbers\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":104,\"Name\":\"CardingMafia\",\"Title\":\"Carding Mafia (March 2021)\",\"Domain\":\"cardmafia.cc\",\"BreachDate\":\"2021-03-18T00:00:00.000Z\",\"AddedDate\":\"2021-03-23T05:00:29.000Z\",\"ModifiedDate\":\"2022-01-15T23:30:24.000Z\",\"PwnCount\":297744,\"Description\":\"In March 2021, the Carding Mafia forum suffered a data breach that exposed almost 300k members' email addresses. Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CardingMafia.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":621,\"Name\":\"WeLeakInfo\",\"Title\":\"WeLeakInfo\",\"Domain\":\"weleakinfo.com\",\"BreachDate\":\"2021-03-08T00:00:00.000Z\",\"AddedDate\":\"2021-03-15T22:48:25.000Z\",\"ModifiedDate\":\"2021-05-03T11:08:29.000Z\",\"PwnCount\":11788,\"Description\":\"In March 2021, \u003ca href=\\\"https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Stripe account of the now-defunct WeLeakInfo service was taken over by \u0026quot;pompompurin\u0026quot;\u003c/a\u003e after acquiring an expired domain name with an email address used to manage the account. Access to Stripe then exposed almost 12k unique email addresses from customers who'd made credit card payments in order to obtain breached data hosted by WeLeakInfo. The data was subsequently leaked publicly and also included names, payment histories, IP addresses, billing addresses, partial credit card data and the organisation making the purchase.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WeLeakInfo.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"employers\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":330,\"Name\":\"Liker\",\"Title\":\"Liker\",\"Domain\":\"liker.com\",\"BreachDate\":\"2021-03-08T00:00:00.000Z\",\"AddedDate\":\"2021-03-13T04:15:16.000Z\",\"ModifiedDate\":\"2021-03-24T01:57:46.000Z\",\"PwnCount\":465141,\"Description\":\"In March 2021, the self-proclaimed \u0026quot;kinder, smarter social network\u0026quot; \u003ca href=\\\"https://liker.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLiker\u003c/a\u003e suffered a data breach, allegedly in retaliation for the Gab data breach and scraping of data from Parler. The site remained offline after the breach which exposed 465k email addresses in addition to names, dates of birth, education levels, private messages, security questions and answers in plain text, passwords stored as bcrypt hashes and other personal data attributes. Liker did not respond when contacted about the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Liker.png\",\"DataClasses\":[\"auth-tokens\",\"dates-of-birth\",\"education-levels\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"private-messages\",\"security-questions-and-answers\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":573,\"Name\":\"TravelOK\",\"Title\":\"Travel Oklahoma\",\"Domain\":\"travelok.com\",\"BreachDate\":\"2020-12-17T00:00:00.000Z\",\"AddedDate\":\"2021-03-10T22:48:23.000Z\",\"ModifiedDate\":\"2021-03-10T22:48:23.000Z\",\"PwnCount\":637279,\"Description\":\"In December 2020, \u003ca href=\\\"https://tulsaworld.com/news/local/state-tourism-department-reports-data-breach-no-social-security-financial-data-compromised/article_105b0d18-6595-11eb-998b-1b96c12d2d14.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Oklahoma state Tourism and Recreation Department suffered a data breach\u003c/a\u003e. The incident exposed 637k email addresses across a variety of tables including age ranges against brochure orders and dates of birth against contest entries. Genders, names and physical addresses were also exposed. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;badhou3a\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TravelOK.png\",\"DataClasses\":[\"age-groups\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":238,\"Name\":\"Gab\",\"Title\":\"Gab\",\"Domain\":\"gab.com\",\"BreachDate\":\"2021-02-26T00:00:00.000Z\",\"AddedDate\":\"2021-03-03T23:03:30.000Z\",\"ModifiedDate\":\"2021-03-03T23:03:30.000Z\",\"PwnCount\":66521,\"Description\":\"In February 2021, the alt-tech social network service \u003ca href=\\\"https://www.troyhunt.com/gab-has-been-breached/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGab suffered a data breach\u003c/a\u003e. The incident exposed almost 70GB of data including 4M user accounts, a small number of private chat logs and a list of public groups and public posts made to the service. Only a small number of accounts included email addresses and / or passwords stored as bcrypt hashes with a total of 66.5k unique email addresses being exposed across the corpus of data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Gab.png\",\"DataClasses\":[\"avatars\",\"email-addresses\",\"names\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":428,\"Name\":\"Oxfam\",\"Title\":\"Oxfam\",\"Domain\":\"oxfam.org.au\",\"BreachDate\":\"2021-01-20T00:00:00.000Z\",\"AddedDate\":\"2021-03-02T07:07:00.000Z\",\"ModifiedDate\":\"2021-03-02T07:07:00.000Z\",\"PwnCount\":1834006,\"Description\":\"In January 2021, \u003ca href=\\\"https://www.oxfam.org.au/updates-suspected-data-incident/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOxfam Australia was the victim of a data breach\u003c/a\u003e which exposed 1.8M unique email addresses of supporters of the charity. The data was put up for sale on a popular hacking forum and also included names, phone numbers, addresses, genders and dates of birth. A small number of people also had partial credit card data exposed (the first 6 and last 3 digits of the card, plus card type and expiry) and in some cases the bank name, account number and BSB were also exposed. The data was subsequently made freely available on the hacking forum later the following month.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Oxfam.png\",\"DataClasses\":[\"bank-account-numbers\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"partial-credit-card-data\",\"payment-histories\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":567,\"Name\":\"Ticketcounter\",\"Title\":\"Ticketcounter\",\"Domain\":\"ticketcounter.nl\",\"BreachDate\":\"2021-02-22T00:00:00.000Z\",\"AddedDate\":\"2021-03-01T22:37:54.000Z\",\"ModifiedDate\":\"2023-06-21T20:28:24.000Z\",\"PwnCount\":1921722,\"Description\":\"In August 2020, the Dutch ticketing service \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/european-e-ticketing-platform-ticketcounter-extorted-in-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTicketcounter inadvertently published a database backup to a publicly accessible location where it was then found and downloaded in February 2021\u003c/a\u003e. The data contained 1.9M unique email addresses which were offered for sale on a hacking forum and in some cases included names, physical and IP addresses, genders, dates of birth, payment histories and bank account numbers. Ticketcounter was later held to ransom with the threat of the breached being released publicly. The data was provided to HIBP by a source who requested it be attributed to redredred@riseup.net.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ticketcounter.png\",\"DataClasses\":[\"bank-account-numbers\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"payment-histories\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":542,\"Name\":\"SuperVPNGeckoVPN\",\"Title\":\"SuperVPN \u0026 GeckoVPN\",\"Domain\":\"\",\"BreachDate\":\"2021-02-25T00:00:00.000Z\",\"AddedDate\":\"2021-02-28T22:30:29.000Z\",\"ModifiedDate\":\"2021-02-28T22:49:32.000Z\",\"PwnCount\":20339937,\"Description\":\"In February 2021, \u003ca href=\\\"https://cybernews.com/security/one-of-the-biggest-android-vpns-hacked-data-of-21-million-users-from-3-android-vpns-put-for-sale-online/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea series of \u0026quot;free\u0026quot; VPN services were breached including SuperVPN and GeckoVPN\u003c/a\u003e, exposing over 20M records. The data appeared together in a single file with a small number of records also included from FlashVPN, suggesting that all three brands may share the same platform. Impacted data also included email addresses, the country logged in from and the date and time each login occurred alongside device information including the make and model, IMSI number and serial number. The data was provided to HIBP by a source who requested it be attributed to redredred@riseup.net.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SuperVPNGeckoVPN.png\",\"DataClasses\":[\"device-information\",\"device-serial-numbers\",\"email-addresses\",\"geographic-locations\",\"imsi-numbers\",\"login-histories\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":218,\"Name\":\"FilmaiIn\",\"Title\":\"Filmai.in\",\"Domain\":\"filmai.in\",\"BreachDate\":\"2020-01-01T00:00:00.000Z\",\"AddedDate\":\"2021-02-23T08:52:26.000Z\",\"ModifiedDate\":\"2021-02-23T08:52:26.000Z\",\"PwnCount\":645786,\"Description\":\"In approximately 2019 or 2020, the Lithuanian movie streaming service \u003ca href=\\\"http://filmai.in/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFilmai.in\u003c/a\u003e suffered a data breach exposing 645k email addresses, usernames and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FilmaiIn.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":415,\"Name\":\"NurseryCam\",\"Title\":\"NurseryCam\",\"Domain\":\"nurserycam.co.uk\",\"BreachDate\":\"2021-02-12T00:00:00.000Z\",\"AddedDate\":\"2021-02-23T07:58:02.000Z\",\"ModifiedDate\":\"2021-02-23T07:58:02.000Z\",\"PwnCount\":10585,\"Description\":\"In February 2021, \u003ca href=\\\"https://www.theregister.com/2021/02/18/nurserycam_security_problems_footfallcam_ltd/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea series of egregiously bad security flaws were identified in the NurseryCam system\u003c/a\u003e designed for parents to remotely monitor their children whilst attending nursery. The flaws led to the exposure of over 10k parent records before the service was shut down. The email addresses alone were provided to Have I Been Pwned to ensure parents were properly notified of the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NurseryCam.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":438,\"Name\":\"PeoplesEnergy\",\"Title\":\"People's Energy\",\"Domain\":\"peoplesenergy.co.uk\",\"BreachDate\":\"2020-12-16T00:00:00.000Z\",\"AddedDate\":\"2021-02-23T03:25:44.000Z\",\"ModifiedDate\":\"2021-11-25T22:08:12.000Z\",\"PwnCount\":358822,\"Description\":\"In December 2020, the UK power company \u003ca href=\\\"https://www.bbc.com/news/technology-55350995\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePeople's Energy suffered a data breach\u003c/a\u003e. The breach exposed almost 7GB of files containing 359k unique email addresses along with names, phones numbers, physical addresses and dates of birth. The incident also included People's Energy staff email addresses and bcrypt password hashes (no customer passwords were exposed). The data was provided to HIBP by a source who requested it be attributed to pom@pompur.in.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PeoplesEnergy.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":402,\"Name\":\"NetGalley\",\"Title\":\"NetGalley\",\"Domain\":\"netgalley.com\",\"BreachDate\":\"2020-12-21T00:00:00.000Z\",\"AddedDate\":\"2021-02-23T01:38:21.000Z\",\"ModifiedDate\":\"2021-11-25T22:08:12.000Z\",\"PwnCount\":1436435,\"Description\":\"In December 2020, the book promotion site \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/netgalley-discloses-data-breach-after-website-was-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNetGalley suffered a data breach\u003c/a\u003e. The incident exposed 1.4 million unique email addresses alongside names, usernames, physical and IP addresses, phone numbers, dates of birth and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to pom@pompur.in.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NetGalley.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":114,\"Name\":\"CityBee\",\"Title\":\"CityBee\",\"Domain\":\"citybee.lt\",\"BreachDate\":\"2021-02-05T00:00:00.000Z\",\"AddedDate\":\"2021-02-17T00:52:52.000Z\",\"ModifiedDate\":\"2021-02-17T00:52:52.000Z\",\"PwnCount\":110156,\"Description\":\"In February 2021, the Lithuanian car-sharing service \u003ca href=\\\"https://www.reuters.com/article/us-baltic-dataprotection-idUSKBN2AG2BW\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCityBee announced they'd suffered a data breach that exposed 110k customers' personal information\u003c/a\u003e. The breach exposed names, email addresses, government issued IDs and passwords stored as unsalted SHA-1 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CityBee.png\",\"DataClasses\":[\"email-addresses\",\"government-issued-ids\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":245,\"Name\":\"Gett\",\"Title\":\"Ge.tt\",\"Domain\":\"ge.tt\",\"BreachDate\":\"2017-05-04T00:00:00.000Z\",\"AddedDate\":\"2021-02-16T06:22:20.000Z\",\"ModifiedDate\":\"2021-02-22T12:16:44.000Z\",\"PwnCount\":2481121,\"Description\":\"In May 2017, the file sharing platform \u003ca href=\\\"https://www.zdnet.com/article/127-million-user-records-from-8-companies-put-up-for-sale-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGe.tt suffered a data breach\u003c/a\u003e. The data was subsequently put up for sale on a dark web marketplace in February 2019 alongside a raft of other breaches. The Ge.tt breach included names, social media profile identifiers, SHA256 password hashes and almost 2.5M unique email addresses. The data was provided to HIBP by a source who requested it be attributed to \u003ca href=\\\"https://www.linkedin.com/company/breachdirectory/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBreachDirectory\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Gett.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":534,\"Name\":\"StoryBird\",\"Title\":\"StoryBird\",\"Domain\":\"storybird.com\",\"BreachDate\":\"2015-08-07T00:00:00.000Z\",\"AddedDate\":\"2021-02-02T00:39:58.000Z\",\"ModifiedDate\":\"2021-02-02T00:39:58.000Z\",\"PwnCount\":1047200,\"Description\":\"In August 2015, the storytelling service \u003ca href=\\\"https://www.zdnet.com/article/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStoryBird suffered a data breach\u003c/a\u003e exposing 4 million records with 1 million unique email addresses. Impacted data also included names, usernames and passwords stored as PBKDF2 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StoryBird.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":443,\"Name\":\"Pixlr\",\"Title\":\"Pixlr\",\"Domain\":\"pixlr.com\",\"BreachDate\":\"2020-10-07T00:00:00.000Z\",\"AddedDate\":\"2021-02-01T03:40:29.000Z\",\"ModifiedDate\":\"2021-02-01T03:40:29.000Z\",\"PwnCount\":1906808,\"Description\":\"In October 2020, the online photo editing application \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-posts-19-million-pixlr-user-records-for-free-on-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePixlr suffered a data breach\u003c/a\u003e exposing 1.9 million subscribers. Impacted data included names, email addresses, social media profiles, the country signed up from and passwords stored as SHA-512 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Pixlr.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":367,\"Name\":\"MeetMindful\",\"Title\":\"MeetMindful\",\"Domain\":\"meetmindful.com\",\"BreachDate\":\"2020-01-26T00:00:00.000Z\",\"AddedDate\":\"2021-01-31T02:59:06.000Z\",\"ModifiedDate\":\"2021-01-31T02:59:06.000Z\",\"PwnCount\":1422717,\"Description\":\"In early 2020, the online dating service \u003ca href=\\\"https://www.zdnet.com/article/hacker-leaks-data-of-2-28-million-dating-site-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMeetMindful suffered a data breach\u003c/a\u003e that exposed 1.4 million unique customer email addresses. Included in the data was an extensive array of personal information used to find romantic matches including physical attributes, use of alcohol, drugs and cigarettes, marital statuses, birthdates, genders and the gender being sought. Additional personal information such as names, geographical locations and IP addresses were also exposed, along with passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MeetMindful.png\",\"DataClasses\":[\"dates-of-birth\",\"drinking-habits\",\"drug-habits\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"marital-statuses\",\"names\",\"passwords\",\"physical-attributes\",\"religions\",\"sexual-orientations\",\"smoking-habits\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":84,\"Name\":\"Bonobos\",\"Title\":\"Bonobos\",\"Domain\":\"bonobos.com\",\"BreachDate\":\"2020-08-14T00:00:00.000Z\",\"AddedDate\":\"2021-01-31T00:09:25.000Z\",\"ModifiedDate\":\"2021-01-31T00:12:58.000Z\",\"PwnCount\":2811929,\"Description\":\"In August 2020, the clothing store \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/bonobos-clothing-store-suffers-a-data-breach-hacker-leaks-70gb-database/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBonobos suffered a data breach\u003c/a\u003e that exposed almost 70GB of data containing 2.8 million unique email addresses. The breach also exposed names, physical and IP addresses, phone numbers, order histories and passwords stored as salted SHA-512 hashes, including historical passwords. The breach also exposed partial credit card data including card type, the name on the card, expiry date and the last 4 digits of the card. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bonobos.png\",\"DataClasses\":[\"email-addresses\",\"historical-passwords\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":409,\"Name\":\"Nitro\",\"Title\":\"Nitro\",\"Domain\":\"gonitro.com\",\"BreachDate\":\"2020-09-28T00:00:00.000Z\",\"AddedDate\":\"2021-01-19T10:45:32.000Z\",\"ModifiedDate\":\"2021-01-19T10:45:32.000Z\",\"PwnCount\":77159696,\"Description\":\"In September 2020, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/massive-nitro-data-breach-impacts-microsoft-google-apple-more/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Nitro PDF service suffered a massive data breach which exposed over 70 million unique email addresses\u003c/a\u003e. The breach also exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Nitro.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":492,\"Name\":\"Romwe\",\"Title\":\"Romwe\",\"Domain\":\"romwe.com\",\"BreachDate\":\"2018-06-01T00:00:00.000Z\",\"AddedDate\":\"2021-01-18T09:15:42.000Z\",\"ModifiedDate\":\"2021-01-18T09:15:42.000Z\",\"PwnCount\":19531820,\"Description\":\"In mid-2018, the Hong Kong-based retailer \u003ca href=\\\"https://finance.yahoo.com/finance/news/romwe-informs-shoppers-data-security-203054849.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRomwe suffered a data breach which exposed almost 20 million customers\u003c/a\u003e. The data was subsequently sold online and includes names, phone numbers, email and IP addresses, customer geographic locations and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Romwe.png\",\"DataClasses\":[\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":304,\"Name\":\"JobAndTalent\",\"Title\":\"Jobandtalent\",\"Domain\":\"jobandtalent.com\",\"BreachDate\":\"2018-02-01T00:00:00.000Z\",\"AddedDate\":\"2021-01-17T22:31:00.000Z\",\"ModifiedDate\":\"2021-01-17T22:31:00.000Z\",\"PwnCount\":10981207,\"Description\":\"In approximately February 2018, \u003ca href=\\\"https://www.zdnet.com/article/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe employment website Jobandtalent suffered a data breach which then appeared for sale alongside other breaches a year later\u003c/a\u003e. The incident impacted 11 million subscribers and exposed their names, email and IP addresses and passwords stored as salted SHA-1 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JobAndTalent.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":253,\"Name\":\"Glofox\",\"Title\":\"Glofox\",\"Domain\":\"glofox.com\",\"BreachDate\":\"2020-03-27T00:00:00.000Z\",\"AddedDate\":\"2021-01-10T01:30:48.000Z\",\"ModifiedDate\":\"2021-01-10T01:30:48.000Z\",\"PwnCount\":2330735,\"Description\":\"In March 2020, the Irish gym management software company \u003ca href=\\\"https://www.irishtimes.com/business/technology/irish-start-up-glofox-investigates-possible-data-breach-1.4414837\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGlofox suffered a data breach which exposed 2.3M membership records\u003c/a\u003e. The data included email addresses, names, phone numbers, genders, dates of birth and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Glofox.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":248,\"Name\":\"GeniusU\",\"Title\":\"GeniusU\",\"Domain\":\"geniusu.com\",\"BreachDate\":\"2020-10-02T00:00:00.000Z\",\"AddedDate\":\"2021-01-08T21:49:21.000Z\",\"ModifiedDate\":\"2021-01-10T00:45:52.000Z\",\"PwnCount\":1301460,\"Description\":\"In November 2020, \u003ca href=\\\"https://www.databreaches.net/more-drama-on-a-forum-and-a-slew-of-new-databases-dumped/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea collection of data breaches were made public including the \u0026quot;Entrepreneur Success Platform\u0026quot;, GeniusU\u003c/a\u003e. Dating back to the previous month, the data included 1.3M names, email and IP addresses, genders, links to social media profiles and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GeniusU.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":325,\"Name\":\"Ledger\",\"Title\":\"Ledger\",\"Domain\":\"ledger.com\",\"BreachDate\":\"2020-06-25T00:00:00.000Z\",\"AddedDate\":\"2020-12-20T21:14:56.000Z\",\"ModifiedDate\":\"2020-12-20T21:14:56.000Z\",\"PwnCount\":1075241,\"Description\":\"In June 2020, the hardware crypto wallet manufacturer \u003ca href=\\\"https://www.ledger.com/addressing-the-july-2020-e-commerce-and-marketing-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLedger suffered a data breach that exposed over 1 million email addresses\u003c/a\u003e. The data was initially sold before being dumped publicly in December 2020 and included names, physical addresses and phone numbers. The data was provided to HIBP by \u003ca href=\\\"https://twitter.com/UnderTheBreach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAlon Gal, CTO of cybercrime intelligence firm Hudson Rock\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ledger.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":436,\"Name\":\"Peatix\",\"Title\":\"Peatix\",\"Domain\":\"peatix.com\",\"BreachDate\":\"2019-01-20T00:00:00.000Z\",\"AddedDate\":\"2020-12-06T22:53:53.000Z\",\"ModifiedDate\":\"2020-12-06T22:53:53.000Z\",\"PwnCount\":4227907,\"Description\":\"In January 2019, the event organising platform \u003ca href=\\\"https://www.zdnet.com/article/hacker-leaks-the-user-data-of-event-management-app-peatix/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePeatix suffered a data breach\u003c/a\u003e. The incident exposed 4.2M email addresses, names and salted password hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Peatix.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":449,\"Name\":\"PlutoTV\",\"Title\":\"Pluto TV\",\"Domain\":\"pluto.tv\",\"BreachDate\":\"2018-10-12T00:00:00.000Z\",\"AddedDate\":\"2020-12-05T22:27:36.000Z\",\"ModifiedDate\":\"2020-12-05T22:36:02.000Z\",\"PwnCount\":3225080,\"Description\":\"In October 2018, the internet television service \u003ca href=\\\"https://www.vice.com/en/article/88a8ma/pluto-tv-hacked-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePluto TV suffered a data breach\u003c/a\u003e which was then shared extensively in hacking communities. Pluto TV \u0026quot;decided not to proactively inform users of the breach\u0026quot; which contained 3.2M unique email and IP addresses, names, usernames, genders, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PlutoTV.png\",\"DataClasses\":[\"dates-of-birth\",\"device-information\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":113,\"Name\":\"Cit0day\",\"Title\":\"Cit0day\",\"Domain\":\"cit0day.in\",\"BreachDate\":\"2020-11-04T00:00:00.000Z\",\"AddedDate\":\"2020-11-19T08:07:33.000Z\",\"ModifiedDate\":\"2020-11-19T08:07:33.000Z\",\"PwnCount\":226883414,\"Description\":\"In November 2020, \u003ca href=\\\"https://www.troyhunt.com/inside-the-cit0day-breach-collection\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea collection of more than 23,000 allegedly breached websites known as Cit0day were made available for download on several hacking forums\u003c/a\u003e. The data consisted of 226M unique email address alongside password pairs, often represented as both password hashes and the cracked, plain text versions. Independent verification of the data established it contains many legitimate, previously undisclosed breaches. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":2,\"Name\":\"123RF\",\"Title\":\"123RF\",\"Domain\":\"123rf.com\",\"BreachDate\":\"2020-03-22T00:00:00.000Z\",\"AddedDate\":\"2020-11-15T00:59:50.000Z\",\"ModifiedDate\":\"2020-11-15T01:07:10.000Z\",\"PwnCount\":8661578,\"Description\":\"In March 2020, the stock photo site \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/popular-stock-photo-service-hit-by-data-breach-83m-records-for-sale/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e123RF suffered a data breach\u003c/a\u003e which impacted over 8 million subscribers and was subsequently sold online. The breach included email, IP and physical addresses, names, phone numbers and passwords stored as MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/123RF.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":276,\"Name\":\"HomeChef\",\"Title\":\"Home Chef\",\"Domain\":\"homechef.com\",\"BreachDate\":\"2020-02-10T00:00:00.000Z\",\"AddedDate\":\"2020-11-13T03:41:24.000Z\",\"ModifiedDate\":\"2020-11-13T03:41:24.000Z\",\"PwnCount\":8815692,\"Description\":\"In early 2020, the food delivery service \u003ca href=\\\"https://techcrunch.com/2020/05/20/home-chef-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHome Chef suffered a data breach\u003c/a\u003e which was subsequently sold online. The breach exposed the personal information of almost 9 million customers including names, IP addresses, post codes, the last 4 digits of credit card numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HomeChef.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":35,\"Name\":\"AnimalJam\",\"Title\":\"Animal Jam\",\"Domain\":\"animaljam.com\",\"BreachDate\":\"2020-10-12T00:00:00.000Z\",\"AddedDate\":\"2020-11-12T01:18:50.000Z\",\"ModifiedDate\":\"2020-11-12T01:18:50.000Z\",\"PwnCount\":7104998,\"Description\":\"In October 2020, the online game for kids \u003ca href=\\\"https://www.animaljam.com/en/2020databreach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAnimal Jam suffered a data breach\u003c/a\u003e which was subsequently shared through online hacking communities the following month. The data contained 46 million user accounts with over 7 million unique email addresses. Impacted data also included usernames, IP addresses and for some records, dates of birth (sometimes in partial form), physical addresses, parent names and passwords stored as PBKDF2 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AnimalJam.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":359,\"Name\":\"Mashable\",\"Title\":\"Mashable\",\"Domain\":\"mashable.com\",\"BreachDate\":\"2020-06-01T00:00:00.000Z\",\"AddedDate\":\"2020-11-10T04:33:56.000Z\",\"ModifiedDate\":\"2020-11-10T04:56:58.000Z\",\"PwnCount\":1414677,\"Description\":\"In approximately mid-2020, \u003ca href=\\\"https://portswigger.net/daily-swig/data-breach-at-mashable-leaks-users-nbsp-personal-information-online\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMashable suffered a data breach\u003c/a\u003e that subsequently turned up publicly in November 2020. The data included 1.4 million unique email addresses along with names, genders, expired auth tokens, physical locations, links to social media profiles and days and months of birth. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mashable.png\",\"DataClasses\":[\"auth-tokens\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"partial-dates-of-birth\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":321,\"Name\":\"Lazada\",\"Title\":\"Lazada RedMart\",\"Domain\":\"redmart.lazada.sg\",\"BreachDate\":\"2020-07-30T00:00:00.000Z\",\"AddedDate\":\"2020-11-10T00:58:49.000Z\",\"ModifiedDate\":\"2020-11-10T01:01:56.000Z\",\"PwnCount\":1107789,\"Description\":\"In October 2020, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/over-1m-lazada-redmart-accounts-sold-online-after-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of Lazada RedMart data breach\u003c/a\u003e containing records as recent as July 2020 and being sold via an online marketplace. In all, the data contained 1.1 million customer email addresses alongside names, phone numbers, physical addresses, partial credit card numbers and passwords stored as SHA-1 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lazada.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":301,\"Name\":\"James\",\"Title\":\"James\",\"Domain\":\"jamesdelivery.com.br\",\"BreachDate\":\"2020-03-25T00:00:00.000Z\",\"AddedDate\":\"2020-11-05T04:34:51.000Z\",\"ModifiedDate\":\"2020-11-05T04:34:51.000Z\",\"PwnCount\":1541284,\"Description\":\"In June 2020, \u003ca href=\\\"https://www.binarydefense.com/threat_watch/seller-floods-forums-with-stolen-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e14 previously undisclosed data breaches appeared for sale\u003c/a\u003e including the Brazilian delivery service, \u0026quot;James\u0026quot;. The breach occurred in March 2020 and exposed 1.5M unique email addresses, customer locations expressed in longitude and latitude and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/James.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":633,\"Name\":\"Wongnai\",\"Title\":\"Wongnai\",\"Domain\":\"wongnai.com\",\"BreachDate\":\"2020-10-28T00:00:00.000Z\",\"AddedDate\":\"2020-11-04T21:14:50.000Z\",\"ModifiedDate\":\"2020-11-05T04:42:20.000Z\",\"PwnCount\":3924454,\"Description\":\"In October 2020, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-is-selling-34-million-user-records-stolen-from-17-companies/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e17 previously undisclosed data breaches appeared for sale\u003c/a\u003e including the Thai restaurant, hotel and attraction finding service, Wongnai. The breach exposed almost 4M unique customer records from some time during 2020 along with names, phone numbers, links to social media profiles and passwords stored as MD5 hashes. The data was self-submitted to HIBP by Wongnai.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Wongnai.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":375,\"Name\":\"Minted\",\"Title\":\"Minted\",\"Domain\":\"minted.com\",\"BreachDate\":\"2020-05-06T00:00:00.000Z\",\"AddedDate\":\"2020-11-03T06:21:01.000Z\",\"ModifiedDate\":\"2020-11-03T06:21:01.000Z\",\"PwnCount\":4418182,\"Description\":\"In May 2020, the online marketplace for independent artists \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/minted-discloses-data-breach-after-5m-user-records-sold-online/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMinted suffered a data breach\u003c/a\u003e that exposed 4.4M unique customer records subsequently sold on a dark web marketplace. Exposed data also included names, physical addresses, phone numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Minted.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":461,\"Name\":\"Promofarma\",\"Title\":\"Promofarma\",\"Domain\":\"promofarma.com\",\"BreachDate\":\"2019-08-03T00:00:00.000Z\",\"AddedDate\":\"2020-11-01T07:11:46.000Z\",\"ModifiedDate\":\"2020-11-03T10:19:52.000Z\",\"PwnCount\":1277761,\"Description\":\"In August 2019, \u003ca href=\\\"https://www.zdnet.com/article/data-of-21-million-mixcloud-users-put-up-for-sale-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data breach from the Spanish online pharmacy Promofarma appeared for sale on a dark web marketplace\u003c/a\u003e. The breach exposed over 2.7M records and contained almost 1.3M unique customer email addresses. The data also included customer names and was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Promofarma.png\",\"DataClasses\":[\"email-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":531,\"Name\":\"StarTribune\",\"Title\":\"StarTribune\",\"Domain\":\"startribune.com\",\"BreachDate\":\"2019-10-10T00:00:00.000Z\",\"AddedDate\":\"2020-10-30T23:30:39.000Z\",\"ModifiedDate\":\"2020-10-31T01:01:09.000Z\",\"PwnCount\":2192857,\"Description\":\"In October 2019, the Minnesota-based news service \u003ca href=\\\"https://www.startribune.com/hacker-group-claims-to-have-stolen-star-tribune-user-information/570384542/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStarTribune suffered a data breach\u003c/a\u003e which was subsequently sold on the dark web. The breach exposed over 2 million unique email addresses alongside names, usernames, physical addresses, dates of birth, genders and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StarTribune.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":485,\"Name\":\"Reincubate\",\"Title\":\"Reincubate\",\"Domain\":\"reincubate.com\",\"BreachDate\":\"2017-05-11T00:00:00.000Z\",\"AddedDate\":\"2020-10-29T06:01:21.000Z\",\"ModifiedDate\":\"2020-10-29T06:06:15.000Z\",\"PwnCount\":616146,\"Description\":\"In October 2020, the app data company \u003ca href=\\\"https://reincubate.com/blog/security-incident-oct-2020/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eReincubate suffered a data breach\u003c/a\u003e which exposed a backup from November 2017 (the newest record in the data appeared several months earlier). The data included over 616k unique email addresses, names and passwords stored as PBKDF2 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Reincubate.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":112,\"Name\":\"Chowbus\",\"Title\":\"Chowbus\",\"Domain\":\"chowbus.com\",\"BreachDate\":\"2020-10-05T00:00:00.000Z\",\"AddedDate\":\"2020-10-06T06:07:45.000Z\",\"ModifiedDate\":\"2020-10-06T06:07:45.000Z\",\"PwnCount\":444224,\"Description\":\"In October 2020, the Asian food delivery app \u003ca href=\\\"https://www.reddit.com/r/UIUC/comments/j5fcjp/chowbus_is_hacked_leaks_800000_entries_of/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eChowbus suffered a data breach which led to over 800,000 records being emailed to customers\u003c/a\u003e. The email contained a link to a CSV file with customer data including physical addresses, names, phone numbers and over 444,000 unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Chowbus.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":632,\"Name\":\"WiziShop\",\"Title\":\"WiziShop\",\"Domain\":\"wizishop.fr\",\"BreachDate\":\"2020-07-14T00:00:00.000Z\",\"AddedDate\":\"2020-10-05T03:42:29.000Z\",\"ModifiedDate\":\"2021-11-25T22:08:12.000Z\",\"PwnCount\":2856769,\"Description\":\"In July 2020, the French e-commerce platform \u003ca href=\\\"https://www.wizishop.fr/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWiziShop\u003c/a\u003e suffered a data breach. The breach exposed 18GB worth of data including names, phone numbers, dates of birth, physical and IP addresses, SHA-1 password hashes and almost 3 million unique email addresses. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;pom@pompur.in\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WiziShop.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":204,\"Name\":\"Experian2020\",\"Title\":\"Experian (South Africa)\",\"Domain\":\"\",\"BreachDate\":\"2020-08-19T00:00:00.000Z\",\"AddedDate\":\"2020-09-01T23:39:52.000Z\",\"ModifiedDate\":\"2020-09-02T00:00:41.000Z\",\"PwnCount\":1284637,\"Description\":\"In August 2020, \u003ca href=\\\"https://www.iafrikan.com/2020/09/01/experian-data-breach-database-public-data-information-south-africa/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eExperian South Africa suffered a data breach\u003c/a\u003e which exposed the personal information of tens of millions of individuals. Only 1.3M of the records contained email addresses, whilst most contained government issued identity numbers, names, addresses, occupations and employers, amongst other person information.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Experian.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"government-issued-ids\",\"names\",\"occupations\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":337,\"Name\":\"LiveAuctioneers\",\"Title\":\"LiveAuctioneers\",\"Domain\":\"liveauctioneers.com\",\"BreachDate\":\"2020-06-19T00:00:00.000Z\",\"AddedDate\":\"2020-08-22T04:38:40.000Z\",\"ModifiedDate\":\"2020-08-22T04:54:52.000Z\",\"PwnCount\":3385862,\"Description\":\"In June 2020, the online antiques marketplace \u003ca href=\\\"https://portswigger.net/daily-swig/liveauctioneers-data-breach-millions-of-cracked-passwords-for-sale-say-researchers\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLiveAuctioneers suffered a data breach\u003c/a\u003e which was subsequently sold online then extensively redistributed in the hacking community. The data contained 3.4 million records including names, email and IP addresses, physical addresses, phones numbers and passwords stored as unsalted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LiveAuctioneers.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":588,\"Name\":\"UnicoCampania\",\"Title\":\"Unico Campania\",\"Domain\":\"unicocampania.it\",\"BreachDate\":\"2020-08-19T00:00:00.000Z\",\"AddedDate\":\"2020-08-19T23:29:21.000Z\",\"ModifiedDate\":\"2020-08-19T23:29:21.000Z\",\"PwnCount\":166031,\"Description\":\"In August 2020, the Neapolitan public transport website \u003ca href=\\\"https://www.fanpage.it/napoli/unico-campania-hackerato-il-sito-65mila-email-e-password-di-utenti-in-rete-subito-disattivati/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eUnico Campania was hacked and the data extensively circulated\u003c/a\u003e. The breach contained 166k user records with email addresses and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/UnicoCampania.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":594,\"Name\":\"UtahGunExchange\",\"Title\":\"Utah Gun Exchange\",\"Domain\":\"utahgunexchange.com\",\"BreachDate\":\"2020-07-17T00:00:00.000Z\",\"AddedDate\":\"2020-08-19T07:56:09.000Z\",\"ModifiedDate\":\"2020-08-19T08:05:00.000Z\",\"PwnCount\":235233,\"Description\":\"In July 2020, \u003ca href=\\\"https://www.forbes.com/sites/daveywinder/2020/08/15/gun-owners-beware-hacker-offers-240000-stolen-records-on-dark-web-report-utah-gun-exchange-amazon-cloud/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Utah Gun Exchange website suffered a data breach\u003c/a\u003e which included several other associated websites. In total, 235k unique email addresses were exposed before being traded online alongside names, usernames, genders, IP addresses and password hashes. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/UtahGunExchange.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":106,\"Name\":\"Catho\",\"Title\":\"Catho\",\"Domain\":\"catho.com.br\",\"BreachDate\":\"2020-03-01T00:00:00.000Z\",\"AddedDate\":\"2020-08-18T22:52:39.000Z\",\"ModifiedDate\":\"2020-08-18T22:52:39.000Z\",\"PwnCount\":1173012,\"Description\":\"In approximately March 2020, the Brazilian recruitment website \u003ca href=\\\"https://www.binarydefense.com/threat_watch/shinyhunters-serving-up-21-new-compromised-databases/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCatho was compromised and subsequently appeared alongside 20 other breached websites\u003c/a\u003e listed for sale on a dark web marketplace. The breach included almost 11 million records with 1.2 million unique email addresses. Names, usernames and plain text passwords were also exposed. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Catho.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":522,\"Name\":\"Sonicbids\",\"Title\":\"Sonicbids\",\"Domain\":\"sonicbids.com\",\"BreachDate\":\"2019-12-30T00:00:00.000Z\",\"AddedDate\":\"2020-08-18T07:39:37.000Z\",\"ModifiedDate\":\"2020-08-18T07:39:37.000Z\",\"PwnCount\":751700,\"Description\":\"In December 2019, the booking website \u003ca href=\\\"https://oag.ca.gov/system/files/Sonicbids%20-%20%20CA.pdf\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSonicbids suffered a data breach\u003c/a\u003e which they attributed to \u0026quot;a data privacy event involving our third-party cloud hosting services\u0026quot;. The breach contained 752k user records including names and usernames, email addresses and passwords stored as PBKDF2 hashes. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Sonicbids.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":658,\"Name\":\"Zoosk2020\",\"Title\":\"Zoosk (2020)\",\"Domain\":\"zoosk.com\",\"BreachDate\":\"2020-01-12T00:00:00.000Z\",\"AddedDate\":\"2020-08-07T03:46:38.000Z\",\"ModifiedDate\":\"2020-08-07T03:46:38.000Z\",\"PwnCount\":23927853,\"Description\":\"In January 2020, the online dating service \u003ca href=\\\"https://grahamcluley.com/zoosk-hacking/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZoosk suffered a data breach\u003c/a\u003e which was subsequently shared extensively across online hacking communities. The breach contained 24 million unique email addresses alongside extensive personal information including genders, sexualities, dates of birth, physical attributes such as height and weight, religions, ethnicities and political views. The breach also allegedly exposed MD5 password hashes, although the data circulating in hacking circles had this field nulled out. The breach was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zoosk.png\",\"DataClasses\":[\"dates-of-birth\",\"drinking-habits\",\"education-levels\",\"email-addresses\",\"ethnicities\",\"family-structure\",\"genders\",\"geographic-locations\",\"income-levels\",\"names\",\"nicknames\",\"physical-attributes\",\"political-views\",\"relationship-statuses\",\"religions\",\"sexual-orientations\",\"smoking-habits\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":458,\"Name\":\"ProctorU\",\"Title\":\"ProctorU\",\"Domain\":\"proctoru.com\",\"BreachDate\":\"2020-06-26T00:00:00.000Z\",\"AddedDate\":\"2020-08-06T09:37:17.000Z\",\"ModifiedDate\":\"2020-08-06T09:37:17.000Z\",\"PwnCount\":444453,\"Description\":\"In June 2020, the online exam service \u003ca href=\\\"https://www.smh.com.au/national/hackers-hit-university-online-exam-tool-20200806-p55j6h.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eProctorU suffered a data breach\u003c/a\u003e which was subsequently shared extensively across online hacking communities. The breach contained 444k user records including names, email and physical addresses, phones numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ProctorU.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":317,\"Name\":\"Kreditplus\",\"Title\":\"Kreditplus\",\"Domain\":\"kreditplus.com\",\"BreachDate\":\"2020-06-23T00:00:00.000Z\",\"AddedDate\":\"2020-08-03T03:52:51.000Z\",\"ModifiedDate\":\"2020-08-07T03:47:45.000Z\",\"PwnCount\":768890,\"Description\":\"In June 2020, the Indonesian credit service \u003ca href=\\\"https://nakedsecurity.sophos.com/2020/07/02/133m-records-for-sale-as-fruits-of-data-breach-spree-keep-raining-down/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKreditplus suffered a data breach\u003c/a\u003e which exposed 896k records containing 769k unique email addresses. The breach exposed extensive personal information including names, family makeup, information on spouses, income and expenses, religions and employment information. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Kreditplus.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"employers\",\"family-structure\",\"genders\",\"income-levels\",\"living-costs\",\"marital-statuses\",\"mothers-maiden-names\",\"names\",\"phone-numbers\",\"physical-addresses\",\"places-of-birth\",\"religions\",\"spouses-names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":578,\"Name\":\"TrueFire\",\"Title\":\"TrueFire\",\"Domain\":\"truefire.com\",\"BreachDate\":\"2020-02-21T00:00:00.000Z\",\"AddedDate\":\"2020-08-02T20:46:26.000Z\",\"ModifiedDate\":\"2020-08-02T20:46:26.000Z\",\"PwnCount\":599667,\"Description\":\"In February 2020, the guitar tuition website \u003ca href=\\\"https://guitar.com/news/industry-news/truefire-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTrueFire suffered a data breach\u003c/a\u003e which impacted 600k members. The breach exposed extensive personal information including names, email and physical addresses, account balances and unsalted MD5 password hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TrueFire.png\",\"DataClasses\":[\"account-balances\",\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":664,\"Name\":\"DecoratingTheHouse\",\"Title\":\"집꾸미기\",\"Domain\":\"ggumim.co.kr\",\"BreachDate\":\"2020-03-27T00:00:00.000Z\",\"AddedDate\":\"2020-08-02T05:34:42.000Z\",\"ModifiedDate\":\"2020-08-02T05:34:42.000Z\",\"PwnCount\":1298651,\"Description\":\"In March 2020, the Korean interior decoration website \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e???? (Decorating the House) suffered a data breach\u003c/a\u003e which impacted almost 1.3 million members. Served via the URL \u003ca href=\\\"https://www.ggumim.co.kr/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eggumim.co.kr\u003c/a\u003e, the exposed data included email addresses, names, usernames and phone numbers, all of which was subsequently shared extensively throughout online hacking communities. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DecoratingTheHouse.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":597,\"Name\":\"Vakinha\",\"Title\":\"Vakinha\",\"Domain\":\"vakinha.com.br\",\"BreachDate\":\"2020-06-22T00:00:00.000Z\",\"AddedDate\":\"2020-08-01T05:56:06.000Z\",\"ModifiedDate\":\"2020-08-01T05:56:06.000Z\",\"PwnCount\":4775203,\"Description\":\"In June 2020, the Brazilian fund raising service \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVakinha suffered a data breach\u003c/a\u003e which impacted almost 4.8 million members. The exposed data included email addresses, names, phone numbers, geographic locations and passwords stored as bcrypt hashes, all of which was subsequently shared extensively throughout online hacking communities. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Vakinha.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":267,\"Name\":\"Havenly\",\"Title\":\"Havenly\",\"Domain\":\"havenly.com\",\"BreachDate\":\"2020-06-25T00:00:00.000Z\",\"AddedDate\":\"2020-08-01T01:53:40.000Z\",\"ModifiedDate\":\"2020-08-01T01:53:40.000Z\",\"PwnCount\":1369180,\"Description\":\"In June 2020, the interior design website \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHavenly suffered a data breach\u003c/a\u003e which impacted almost 1.4 million members of the service. The exposed data included email addresses, names, phone numbers, geographic locations and passwords stored as SHA-1 hashes, all of which was subsequently shared extensively throughout online hacking communities. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Havenly.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":545,\"Name\":\"Swvl\",\"Title\":\"Swvl\",\"Domain\":\"swvl.com\",\"BreachDate\":\"2020-06-23T00:00:00.000Z\",\"AddedDate\":\"2020-07-31T06:24:42.000Z\",\"ModifiedDate\":\"2020-07-31T07:59:49.000Z\",\"PwnCount\":4195918,\"Description\":\"In June 2020, the Egyptian bus operator \u003ca href=\\\"https://portswigger.net/daily-swig/egyptian-bus-operator-swvl-hit-by-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSwvl suffered a data breach\u003c/a\u003e which impacted over 4 million members of the service. The exposed data included names, email addresses, phone numbers, profile photos, partial credit card data (type and last 4 digits) and passwords stored as bcrypt hashes, all of which was subsequently shared extensively throughout online hacking communities. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Swvl.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"profile-photos\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":42,\"Name\":\"Appen\",\"Title\":\"Appen\",\"Domain\":\"appen.com\",\"BreachDate\":\"2020-06-22T00:00:00.000Z\",\"AddedDate\":\"2020-07-30T07:00:21.000Z\",\"ModifiedDate\":\"2020-07-30T07:00:21.000Z\",\"PwnCount\":5888405,\"Description\":\"In June 2020, the AI training data company \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAppen suffered a data breach\u003c/a\u003e exposing the details of almost 5.9 million users which were subsequently sold online. Included in the breach were names, email addresses and passwords stored as bcrypt hashes. Some records also contained phone numbers, employers and IP addresses. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Appen.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":498,\"Name\":\"Scentbird\",\"Title\":\"Scentbird\",\"Domain\":\"scentbird.com\",\"BreachDate\":\"2020-06-22T00:00:00.000Z\",\"AddedDate\":\"2020-07-30T00:11:15.000Z\",\"ModifiedDate\":\"2020-07-30T00:11:15.000Z\",\"PwnCount\":5814988,\"Description\":\"In June 2020, the online fragrance service \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eScentbird suffered a data breach\u003c/a\u003e that exposed the personal information of over 5.8 million customers. Personal information including names, email addresses, genders, dates of birth, passwords stored as bcrypt hashes and indicators of password strength were all exposed. The data was provided to HIBP by \u003ca href=\\\"https://breachbase.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreachbase.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Scentbird.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"password-strengths\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":109,\"Name\":\"Chatbooks\",\"Title\":\"Chatbooks\",\"Domain\":\"chatbooks.com\",\"BreachDate\":\"2020-03-26T00:00:00.000Z\",\"AddedDate\":\"2020-07-29T21:21:46.000Z\",\"ModifiedDate\":\"2020-07-29T21:21:46.000Z\",\"PwnCount\":2520441,\"Description\":\"In March 2020, the photo print service \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/chatbooks-discloses-data-breach-after-data-sold-on-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eChatbooks suffered a data breach\u003c/a\u003e which was subsequently put up for sale on a dark web marketplace. The breach contained 15 million user records with 2.5 million unique email addresses alongside names, phone numbers, social media profiles and salted SHA-512 password hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Chatbooks.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":176,\"Name\":\"Dunzo\",\"Title\":\"Dunzo\",\"Domain\":\"dunzo.com\",\"BreachDate\":\"2020-06-19T00:00:00.000Z\",\"AddedDate\":\"2020-07-29T04:38:23.000Z\",\"ModifiedDate\":\"2020-07-29T04:38:23.000Z\",\"PwnCount\":3465259,\"Description\":\"In approximately June 2019, the Indian delivery service \u003ca href=\\\"https://www.thenewsminute.com/article/dunzo-suffers-data-breach-launches-internal-investigation-128415\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDunzo suffered a data breach\u003c/a\u003e. Exposing 3.5 million unique email addresses, the Dunzo breach also included names, phone numbers and IP addresses which were all broadly distributed online via a hacking forum. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dunzo.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":170,\"Name\":\"Drizly\",\"Title\":\"Drizly\",\"Domain\":\"drizly.com\",\"BreachDate\":\"2020-07-02T00:00:00.000Z\",\"AddedDate\":\"2020-07-28T21:45:05.000Z\",\"ModifiedDate\":\"2020-07-28T21:45:05.000Z\",\"PwnCount\":2479044,\"Description\":\"In approximately July 2020, the US-based online alcohol delivery service \u003ca href=\\\"https://techcrunch.com/2020/07/28/drizly-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDrizly suffered a data breach\u003c/a\u003e. The data was sold online before being extensively redistributed and contained 2.5 million unique email addresses alongside names, physical and IP addresses, phone numbers, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Drizly.png\",\"DataClasses\":[\"dates-of-birth\",\"device-information\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":284,\"Name\":\"Hurb\",\"Title\":\"Hurb\",\"Domain\":\"hurb.com\",\"BreachDate\":\"2019-03-14T00:00:00.000Z\",\"AddedDate\":\"2020-07-27T21:46:20.000Z\",\"ModifiedDate\":\"2020-07-27T21:46:20.000Z\",\"PwnCount\":20727771,\"Description\":\"In approximately March 2019, the online Brazilian travel agency \u003ca href=\\\"https://cybleinc.com/2020/07/24/around-43-million-user-records-belonging-to-two-online-platforms-leaked-on-darknet-for-free/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHurb (formerly Hotel Urbano) suffered a data breach\u003c/a\u003e. The data subsequently appeared online for download the following year and included over 20 million customer records with email and IP addresses, names, dates of birth, phone numbers and passwords stored as unsalted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Hurb.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":152,\"Name\":\"Dave\",\"Title\":\"Dave\",\"Domain\":\"dave.com\",\"BreachDate\":\"2020-06-28T00:00:00.000Z\",\"AddedDate\":\"2020-07-27T02:38:41.000Z\",\"ModifiedDate\":\"2020-07-27T02:38:41.000Z\",\"PwnCount\":2964182,\"Description\":\"In June 2020, the digital banking app \u003ca href=\\\"https://www.zdnet.com/article/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDave suffered a data breach\u003c/a\u003e which exposed 7.5 million rows of data and subsequently appeared for public download on a hacking forum. The breach exposed extensive personal information including almost 3 million unique email addresses alongside names, dates of birth, encrypted social security numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dave.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"social-security-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":460,\"Name\":\"Promo\",\"Title\":\"Promo\",\"Domain\":\"promo.com\",\"BreachDate\":\"2020-06-22T00:00:00.000Z\",\"AddedDate\":\"2020-07-26T02:44:11.000Z\",\"ModifiedDate\":\"2020-07-26T02:44:11.000Z\",\"PwnCount\":14610585,\"Description\":\"In July 2020, the self-proclaimed \u0026quot;World's #1 Marketing Video Maker\u0026quot; \u003ca href=\\\"https://support.promo.com/en/articles/4276475-promo-data-breach-faq\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePromo suffered a data breach\u003c/a\u003e which was then shared extensively on a hacking forum. The incident exposed 22 million records containing almost 15 million unique email addresses alongside IP addresses, genders, names and salted SHA-256 password hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Promo.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":617,\"Name\":\"Wattpad\",\"Title\":\"Wattpad\",\"Domain\":\"wattpad.com\",\"BreachDate\":\"2020-06-29T00:00:00.000Z\",\"AddedDate\":\"2020-07-19T22:49:19.000Z\",\"ModifiedDate\":\"2020-07-19T22:49:19.000Z\",\"PwnCount\":268765495,\"Description\":\"In June 2020, the user-generated stories website \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/wattpad-data-breach-exposes-account-info-for-millions-of-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWattpad suffered a huge data breach that exposed almost 270 million records\u003c/a\u003e. The data was initially sold then published on a public hacking forum where it was broadly shared. The incident exposed extensive personal information including names and usernames, email and IP addresses, genders, birth dates and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Wattpad.png\",\"DataClasses\":[\"bios\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"social-media-profiles\",\"user-website-urls\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":471,\"Name\":\"Quidd\",\"Title\":\"Quidd\",\"Domain\":\"quidd.co\",\"BreachDate\":\"2019-07-01T00:00:00.000Z\",\"AddedDate\":\"2020-06-24T11:05:34.000Z\",\"ModifiedDate\":\"2020-06-24T11:05:34.000Z\",\"PwnCount\":3805863,\"Description\":\"In 2019, online marketplace for trading stickers, cards, toys, and other collectibles \u003ca href=\\\"https://www.zdnet.com/article/account-details-for-4-million-quidd-users-shared-on-hacking-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eQuidd suffered a data breach\u003c/a\u003e. The breach exposed almost 4 million users' email addresses, usernames and passwords stored as bcrypt hashes. The data was subsequently sold then redistributed extensively via hacking forums.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Quidd.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":226,\"Name\":\"Foodora\",\"Title\":\"Foodora\",\"Domain\":\"foodora.com\",\"BreachDate\":\"2016-04-22T00:00:00.000Z\",\"AddedDate\":\"2020-06-16T02:09:33.000Z\",\"ModifiedDate\":\"2020-06-16T02:09:33.000Z\",\"PwnCount\":582578,\"Description\":\"In April 2016, the online food delivery service \u003ca href=\\\"https://www.databreachtoday.com/delivery-hero-confirms-foodora-data-breach-a-14435\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFoodora suffered a data breach\u003c/a\u003e which was then extensively redistributed online. The breach included the personal information of hundreds of thousands of customers from multiple countries including their names, delivery addresses, phone numbers and passwords stored as either a salted MD5 or a bcrypt hash.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Foodora.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":363,\"Name\":\"Mathway\",\"Title\":\"Mathway\",\"Domain\":\"mathway.com\",\"BreachDate\":\"2020-01-13T00:00:00.000Z\",\"AddedDate\":\"2020-06-05T23:59:45.000Z\",\"ModifiedDate\":\"2020-06-05T23:59:45.000Z\",\"PwnCount\":25692862,\"Description\":\"In January 2020, the math solving website \u003ca href=\\\"https://www.zdnet.com/article/25-million-user-records-leak-online-from-popular-math-app-mathway/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMathway suffered a data breach that exposed over 25M records\u003c/a\u003e. The data was subsequently sold on a dark web marketplace and included names, Google and Facebook IDs, email addresses and salted password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mathway.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"names\",\"passwords\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":656,\"Name\":\"Zoomcar\",\"Title\":\"Zoomcar\",\"Domain\":\"zoomcar.com\",\"BreachDate\":\"2018-07-01T00:00:00.000Z\",\"AddedDate\":\"2020-06-05T02:57:26.000Z\",\"ModifiedDate\":\"2020-06-05T02:57:26.000Z\",\"PwnCount\":3589795,\"Description\":\"In July 2018, the Indian self-drive car rental company \u003ca href=\\\"https://tech.economictimes.indiatimes.com/news/internet/data-of-3-5-million-zoomcar-customers-up-for-sale/75896086\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZoomcar suffered a data breach which was subsequently sold on a dark web marketplace in 2020\u003c/a\u003e. The breach exposed over 3.5M records including names, email and IP addresses, phone numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zoomcar.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":323,\"Name\":\"LeadHunter\",\"Title\":\"Lead Hunter\",\"Domain\":\"\",\"BreachDate\":\"2020-03-04T00:00:00.000Z\",\"AddedDate\":\"2020-06-03T10:55:31.000Z\",\"ModifiedDate\":\"2020-06-03T10:55:31.000Z\",\"PwnCount\":68693853,\"Description\":\"In March 2020, \u003ca href=\\\"https://www.troyhunt.com/the-unattributable-lead-hunter-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea massive trove of personal information referred to as \u0026quot;Lead Hunter\u0026quot;\u003c/a\u003e was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. The data contained 69 million unique email addresses across 110 million rows of data accompanied by additional personal information including names, phone numbers, genders and physical addresses. At the time of publishing, the breach could not be attributed to those responsible for obtaining and exposing it. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":631,\"Name\":\"Wishbone2020\",\"Title\":\"Wishbone (2020)\",\"Domain\":\"wishbone.io\",\"BreachDate\":\"2020-01-27T00:00:00.000Z\",\"AddedDate\":\"2020-05-28T03:54:44.000Z\",\"ModifiedDate\":\"2020-05-28T03:54:44.000Z\",\"PwnCount\":9705172,\"Description\":\"In January 2020, the mobile app to \u0026quot;compare anything\u0026quot; \u003ca href=\\\"https://www.infosecurity-magazine.com/news/wishbone-breach-40-million-records/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWishbone suffered another data breach\u003c/a\u003e which followed their breach from 2016. An extensive amount of personal information including almost 10M unique email addresses alongside names, phone numbers geographic locations and other personal attributes were leaked online and extensively redistributed. Passwords stored as unsalted MD5 hashes were also included in the breach. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;All3in\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Wishbone.png\",\"DataClasses\":[\"auth-tokens\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"profile-photos\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":338,\"Name\":\"LiveJournal\",\"Title\":\"LiveJournal\",\"Domain\":\"livejournal.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2020-05-26T22:05:10.000Z\",\"ModifiedDate\":\"2020-05-26T23:08:58.000Z\",\"PwnCount\":26372781,\"Description\":\"In mid-2019, \u003ca href=\\\"https://news.ycombinator.com/item?id=20426997\u0026fbclid=IwAR22KoBod2B44XzYbPziwh1RoT_M8ll3Uf8Ods7TpF8mPdSGo3PKYQEx9_k\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of an alleged LiveJournal data breach\u003c/a\u003e. This followed \u003ca href=\\\"https://twitter.com/rahaeli/status/1265316773508927488\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emultiple reports of credential abuse against Dreamwidth beginning in 2018\u003c/a\u003e, a fork of LiveJournal with a significant crossover in user base. The breach allegedly dates back to 2017 and contains 26M unique usernames and email addresses (both of which have been confirmed to exist on LiveJournal) alongside plain text passwords. An archive of the data was subsequently shared on a popular hacking forum in May 2020 and redistributed broadly. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;nano@databases.pw\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LiveJournal.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":439,\"Name\":\"PetFlow\",\"Title\":\"PetFlow\",\"Domain\":\"petflow.com\",\"BreachDate\":\"2017-12-09T00:00:00.000Z\",\"AddedDate\":\"2020-05-26T02:48:24.000Z\",\"ModifiedDate\":\"2020-05-26T02:48:24.000Z\",\"PwnCount\":990919,\"Description\":\"In December 2017, the pet care delivery service \u003ca href=\\\"https://techcrunch.com/2019/02/14/hacker-strikes-again/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePetFlow suffered a data breach which consequently appeared for sale on a dark web marketplace\u003c/a\u003e. Almost 1M accounts were impacted and exposed email addresses and passwords stored as unsalted MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;nano@databases.pw\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PetFlow.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":46,\"Name\":\"Artsy\",\"Title\":\"Artsy\",\"Domain\":\"artsy.net\",\"BreachDate\":\"2018-04-01T00:00:00.000Z\",\"AddedDate\":\"2020-05-25T20:59:10.000Z\",\"ModifiedDate\":\"2020-05-25T21:08:08.000Z\",\"PwnCount\":1079970,\"Description\":\"In April 2018, the online arts database \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eArtsy suffered a data breach which consequently appeared for sale on a dark web marketplace\u003c/a\u003e. Over 1M accounts were impacted and included IP and email addresses, names and passwords stored as salted SHA-512 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;nano@databases.pw\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Artsy.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":327,\"Name\":\"Lifebear\",\"Title\":\"Lifebear\",\"Domain\":\"lifebear.com\",\"BreachDate\":\"2019-02-28T00:00:00.000Z\",\"AddedDate\":\"2020-05-25T04:02:18.000Z\",\"ModifiedDate\":\"2020-05-25T04:02:18.000Z\",\"PwnCount\":3670561,\"Description\":\"In early 2019, the Japanese schedule app \u003ca href=\\\"https://www.zdnet.com/article/round-4-hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLifebear appeared for sale on a dark web marketplace amongst a raft of other hacked websites\u003c/a\u003e. The breach exposed almost 3.7M unique email addresses, usernames and passwords stored as salted MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;nano@databases.pw\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lifebear.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":413,\"Name\":\"NulledCH\",\"Title\":\"Nulled.ch\",\"Domain\":\"nulled.ch\",\"BreachDate\":\"2020-05-20T00:00:00.000Z\",\"AddedDate\":\"2020-05-24T07:05:43.000Z\",\"ModifiedDate\":\"2020-05-24T07:05:43.000Z\",\"PwnCount\":43491,\"Description\":\"In May 2020, the hacking forum \u003ca href=\\\"https://www.nulled.ch/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNulled.ch\u003c/a\u003e was breached and the data published to a rival hacking forum. Over 43k records were compromised and included IP and email addresses, usernames and passwords stored as salted MD5 hashes alongside the private message history of the website's admin. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;Split10\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NulledCH.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":131,\"Name\":\"db8151dd\",\"Title\":\"Covve\",\"Domain\":\"covve.com\",\"BreachDate\":\"2020-02-20T00:00:00.000Z\",\"AddedDate\":\"2020-05-15T08:06:11.000Z\",\"ModifiedDate\":\"2020-05-19T20:25:18.000Z\",\"PwnCount\":22802117,\"Description\":\"In February 2020, \u003ca href=\\\"https://www.troyhunt.com/the-unattributable-db8151dd-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea massive trove of personal information referred to as \u0026quot;db8151dd\u0026quot;\u003c/a\u003e was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. Later identified as originating from the Covve contacts app, the exposed data included extensive personal information and interactions between Covve users and their contacts. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Covve.png\",\"DataClasses\":[\"email-addresses\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":585,\"Name\":\"Ulmon\",\"Title\":\"Ulmon\",\"Domain\":\"ulmon.com\",\"BreachDate\":\"2020-01-26T00:00:00.000Z\",\"AddedDate\":\"2020-05-08T02:10:50.000Z\",\"ModifiedDate\":\"2020-05-08T02:14:52.000Z\",\"PwnCount\":777769,\"Description\":\"In January 2020, the travel app creator \u003ca href=\\\"https://www.ulmon.com/blogging/2020/5/4/information-on-ulmon-user-account-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eUlmon suffered a data breach\u003c/a\u003e. The service had almost 1.3M records with 777k unique email addresses, names, passwords stored as bcrypt hashes and in some cases, social media profile IDs, telephone numbers and bios. The data was subsequently posted to a popular hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ulmon.png\",\"DataClasses\":[\"bios\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":183,\"Name\":\"Elanic\",\"Title\":\"Elanic\",\"Domain\":\"elanic.in\",\"BreachDate\":\"2018-01-01T00:00:00.000Z\",\"AddedDate\":\"2020-05-04T23:25:28.000Z\",\"ModifiedDate\":\"2020-05-04T23:25:28.000Z\",\"PwnCount\":2325283,\"Description\":\"In January 2020, the Indian fashion marketplace \u003ca href=\\\"https://elanic.in/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eElanic\u003c/a\u003e had 2.8M records with 2.3M unique email addresses posted publicly to a popular hacking forum. Elanic confirmed that they had \u0026quot;verified the data and it was pulled from one of our test servers where this data was exposed publicly\u0026quot; and that the data was \u0026quot;old\u0026quot; (the hacking forum reported it as being from 2016-2018). When asked about disclosure to impacted customers, Elanic advised that they had \u0026quot;decided to not have as such any communication and public disclosure\u0026quot;. \",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Elanic.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":546,\"Name\":\"TaiLieu\",\"Title\":\"TaiLieu\",\"Domain\":\"tailieu.vn\",\"BreachDate\":\"2019-11-24T00:00:00.000Z\",\"AddedDate\":\"2020-05-03T23:48:08.000Z\",\"ModifiedDate\":\"2020-05-03T23:48:08.000Z\",\"PwnCount\":7327477,\"Description\":\"In November 2019, the Vietnamese education website \u003ca href=\\\"https://tailieu.vn/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTaiLieu\u003c/a\u003e allegedly suffered a data breach exposing 7.3M customer records. Impacted data included names and usernames, email addresses, dates of birth, genders and passwords stored as unsalted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e after being shared on a popular hacking forum. TaiLieu did not respond when contacted about the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TaiLieu.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":569,\"Name\":\"Tokopedia\",\"Title\":\"Tokopedia\",\"Domain\":\"tokopedia.com\",\"BreachDate\":\"2020-04-17T00:00:00.000Z\",\"AddedDate\":\"2020-05-02T23:45:21.000Z\",\"ModifiedDate\":\"2020-07-17T00:53:20.000Z\",\"PwnCount\":71443698,\"Description\":\"In April 2020, Indonesia's largest online store \u003ca href=\\\"https://www.zdnet.com/article/hacker-leaks-15-million-records-from-tokopedia-indonesias-largest-online-store/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTokopedia suffered a data breach\u003c/a\u003e. The incident resulted in 15M rows of data being posted to a popular hacking forum. An additional 76M rows were later provided to HIBP in July 2020. In total, the data included over 71M unique email addresses alongside names, genders, birth dates and passwords stored as SHA2-384 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tokopedia.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":603,\"Name\":\"Vianet\",\"Title\":\"Vianet\",\"Domain\":\"vianet.com.np\",\"BreachDate\":\"2020-04-08T00:00:00.000Z\",\"AddedDate\":\"2020-04-22T03:00:17.000Z\",\"ModifiedDate\":\"2020-04-22T03:00:17.000Z\",\"PwnCount\":94353,\"Description\":\"In April 2020, the Nepalese internet service provider \u003ca href=\\\"https://myrepublica.nagariknetwork.com/news/hackers-leak-personal-info-of-vianet-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVianet suffered a data breach\u003c/a\u003e. The attack on the ISP led to the exposure of 177k customer records including 94k unique email addresses. Also exposed were names, phone numbers and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Vianet.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":43,\"Name\":\"Aptoide\",\"Title\":\"Aptoide\",\"Domain\":\"aptoide.com\",\"BreachDate\":\"2020-04-13T00:00:00.000Z\",\"AddedDate\":\"2020-04-19T03:07:42.000Z\",\"ModifiedDate\":\"2020-04-19T03:07:42.000Z\",\"PwnCount\":20012235,\"Description\":\"In April 2020, the independent Android app store \u003ca href=\\\"https://blog.aptoide.com/aptoide-credentials-information/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAptoide suffered a data breach\u003c/a\u003e. The incident resulted in the exposure of 20M customer records which were subsequently shared online via a popular hacking forum. Impacted data included email and IP addresses, names, IP addresses and passwords stored as SHA-1 hashes without a salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Aptoide.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":281,\"Name\":\"HTCMania\",\"Title\":\"HTC Mania\",\"Domain\":\"htcmania.com\",\"BreachDate\":\"2020-01-04T00:00:00.000Z\",\"AddedDate\":\"2020-04-06T04:16:53.000Z\",\"ModifiedDate\":\"2020-04-06T04:25:18.000Z\",\"PwnCount\":1488089,\"Description\":\"In January 2020, the Spanish mobile phone forum \u003ca href=\\\"https://www.htcmania.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHTC Mania\u003c/a\u003e suffered a data breach of the vBulletin based site. The incident exposed 1.5M member email addresses, usernames, IP addresses, dates of birth and salted MD5 password hashes and password histories. Data from the breach was subsequently redistributed on popular hacking websites.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HTCMania.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"historical-passwords\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":418,\"Name\":\"OGUsers2020\",\"Title\":\"OGUsers (2020 breach)\",\"Domain\":\"ogusers.com\",\"BreachDate\":\"2020-04-02T00:00:00.000Z\",\"AddedDate\":\"2020-04-04T08:27:13.000Z\",\"ModifiedDate\":\"2020-04-04T08:27:13.000Z\",\"PwnCount\":263189,\"Description\":\"In April 2020, the account hijacking and SIM swapping forum \u003ca href=\\\"https://www.zdnet.com/article/hacking-forum-gets-hacked-for-the-second-time-in-a-year/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOGUsers suffered their second data breach in less than a year\u003c/a\u003e. As with the previous breach, the exposed data included email and IP addresses, usernames, private messages and passwords stored as salted MD5 hashes. A total of 263k email addresses across user accounts and other tables were posted to a rival hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OGUsers.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":174,\"Name\":\"DuelingNetwork\",\"Title\":\"Dueling Network\",\"Domain\":\"duelingnetwork.com\",\"BreachDate\":\"2017-03-29T00:00:00.000Z\",\"AddedDate\":\"2020-03-30T00:44:49.000Z\",\"ModifiedDate\":\"2020-03-31T07:18:51.000Z\",\"PwnCount\":6486626,\"Description\":\"In March 2017, the Flash game based on the Yu-Gi-Oh trading card game \u003ca href=\\\"https://www.vice.com/amp/en_us/article/783dkz/hacker-steals-millions-of-accounts-from-yu-gi-oh-fan-project-dueling-network\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDueling Network suffered a data breach\u003c/a\u003e. The site itself was taken offline in 2016 due to a cease-and-desist order but the forum remained online for another year. The data breach exposed usernames, IP and email addresses and passwords stored as MD5 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;burger vault\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DuelingNetwork.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":547,\"Name\":\"Tamodo\",\"Title\":\"Tamodo\",\"Domain\":\"tamodo.com\",\"BreachDate\":\"2020-02-28T00:00:00.000Z\",\"AddedDate\":\"2020-03-24T23:47:43.000Z\",\"ModifiedDate\":\"2020-03-24T23:55:46.000Z\",\"PwnCount\":494945,\"Description\":\"In February 2020, the affiliate marketing network \u003ca href=\\\"https://www.tamodo.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTamodo\u003c/a\u003e suffered a data breach which was subsequently shared on a popular hacking forum. The incident exposed almost 500k accounts including names, email addresses, dates of birth and passwords stored as bcrypt hashes. Tamodo failed to respond to multiple attempts to report the breach via published communication channels.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tamodo.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":462,\"Name\":\"PropTiger\",\"Title\":\"PropTiger\",\"Domain\":\"proptiger.com\",\"BreachDate\":\"2018-01-30T00:00:00.000Z\",\"AddedDate\":\"2020-03-24T07:21:44.000Z\",\"ModifiedDate\":\"2020-03-24T07:30:36.000Z\",\"PwnCount\":2156921,\"Description\":\"In January 2018, the Indian property website \u003ca href=\\\"https://www.proptiger.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePropTiger\u003c/a\u003e suffered a data breach which resulted in a 3.46GB database file being exposed and subsequently shared extensively on a popular hacking forum 2 years later. The exposed data contained both user records and login histories with over 2M unique customer email addresses. Exposed data also included additional personal attributes such as names, dates of birth, genders, IP addresses and passwords stored as MD5 hashes. PropTiger advised they believe the usability of the data is \u0026quot;limited\u0026quot; due to how certain data attributes were generated and stored. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PropTiger.png\",\"DataClasses\":[\"dates-of-birth\",\"device-information\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":561,\"Name\":\"HalloweenSpot\",\"Title\":\"The Halloween Spot\",\"Domain\":\"thehalloweenspot.com\",\"BreachDate\":\"2019-09-27T00:00:00.000Z\",\"AddedDate\":\"2020-03-16T05:20:32.000Z\",\"ModifiedDate\":\"2020-03-16T22:07:11.000Z\",\"PwnCount\":10653,\"Description\":\"In September 2019, the Halloween costume store \u003ca href=\\\"https://www.thehalloweenspot.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eThe Halloween Spot\u003c/a\u003e suffered a data breach. Originally misattributed to fancy dress store \u003ca href=\\\"https://www.smiffys.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSmiffys\u003c/a\u003e, the breach contained 13GB of data with over 10k unique email addresses alongside names, physical and IP addresses, phone numbers and order histories. The Halloween Spot advised customers the breach was traced back to \u0026quot;an old shipping information database\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HalloweenSpot.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":36,\"Name\":\"AnimeGame\",\"Title\":\"AnimeGame\",\"Domain\":\"animegame.me\",\"BreachDate\":\"2020-02-27T00:00:00.000Z\",\"AddedDate\":\"2020-03-09T05:52:08.000Z\",\"ModifiedDate\":\"2020-03-09T05:52:08.000Z\",\"PwnCount\":1431378,\"Description\":\"In February 2020, the gaming website \u003ca href=\\\"http://animegame.me/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAnimeGame\u003c/a\u003e suffered a data breach. The incident affected 1.4M subscribers and exposed email addresses, usernames and passwords stored as salted MD5 hashes. The data was subsequently shared on a popular hacking forum and was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AnimeGame.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":535,\"Name\":\"Straffic\",\"Title\":\"Straffic\",\"Domain\":\"straffic.io\",\"BreachDate\":\"2020-02-14T00:00:00.000Z\",\"AddedDate\":\"2020-02-27T19:28:29.000Z\",\"ModifiedDate\":\"2020-02-27T19:28:29.000Z\",\"PwnCount\":48580249,\"Description\":\"In February 2020, Israeli marketing company \u003ca href=\\\"https://www.databreachtoday.com/israeli-marketing-company-exposes-contacts-database-a-13785\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStraffic exposed a database with 140GB of personal data\u003c/a\u003e. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In \u003ca href=\\\"https://straffic.io/updates.php\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003etheir breach disclosure message\u003c/a\u003e, Straffic stated that \u0026quot;it is impossible to create a totally immune system, and these things can occur\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Straffic.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":515,\"Name\":\"Slickwraps\",\"Title\":\"Slickwraps\",\"Domain\":\"slickwraps.com\",\"BreachDate\":\"2020-02-16T00:00:00.000Z\",\"AddedDate\":\"2020-02-22T19:20:00.000Z\",\"ModifiedDate\":\"2020-02-22T19:20:00.000Z\",\"PwnCount\":857611,\"Description\":\"In February 2020, the online store for consumer electronics wraps \u003ca href=\\\"https://www.slickwraps.com/blog/update/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSlickwraps suffered a data breach\u003c/a\u003e. The incident resulted in the exposure of 858k unique email addresses across customer records and newsletter subscribers. Additional impacted data included names, physical addresses, phone numbers and purchase histories.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Slickwraps.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":368,\"Name\":\"MGM\",\"Title\":\"MGM Resorts\",\"Domain\":\"mgmresorts.com\",\"BreachDate\":\"2019-07-25T00:00:00.000Z\",\"AddedDate\":\"2020-02-20T00:52:55.000Z\",\"ModifiedDate\":\"2020-02-20T01:00:57.000Z\",\"PwnCount\":3081321,\"Description\":\"In July 2019, \u003ca href=\\\"https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMGM Resorts discovered a data breach of one of their cloud services\u003c/a\u003e. The breach included 10.6M guest records with 3.1M unique email addresses stemming back to 2017. The exposed data included email and physical addresses, names, phone numbers and dates of birth and was subsequently shared on a popular hacking forum in February 2020 where it was extensively redistributed. The data was provided to HIBP by \u003ca href=\\\"https://underthebreach.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eUnder The Breach\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MGM.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":22,\"Name\":\"AdultFriendFinder2016\",\"Title\":\"Adult FriendFinder (2016)\",\"Domain\":\"adultfriendfinder.com\",\"BreachDate\":\"2016-10-16T00:00:00.000Z\",\"AddedDate\":\"2020-02-06T23:53:53.000Z\",\"ModifiedDate\":\"2020-02-07T01:11:28.000Z\",\"PwnCount\":169746810,\"Description\":\"In October 2016, the adult entertainment company \u003ca href=\\\"https://www.zdnet.com/article/adultfriendfinder-network-hack-exposes-secrets-of-412-million-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFriend Finder Networks suffered a massive data breach\u003c/a\u003e. The incident impacted multiple separate online assets owned by the company, the largest of which was the Adult FriendFinder website alleged to be \u0026quot;the world's largest sex \u0026amp; swinger community\u0026quot;. Exposed data included usernames, passwords stored as SHA-1 hashes and 170 million unique email addresses. This incident is separate to the 2015 data breach Adult FriendFinder also suffered. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AdultFriendFinder.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"spoken-languages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":144,\"Name\":\"DailyObjects\",\"Title\":\"DailyObjects\",\"Domain\":\"dailyobjects.com\",\"BreachDate\":\"2018-01-01T00:00:00.000Z\",\"AddedDate\":\"2020-01-28T10:50:00.000Z\",\"ModifiedDate\":\"2020-01-28T10:50:00.000Z\",\"PwnCount\":464260,\"Description\":\"In approximately January 2018, a collection of more than 464k customer records from the Indian online retailer \u003ca href=\\\"https://www.dailyobjects.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDailyObjects\u003c/a\u003e were leaked online. The data included names, physical and email addresses, phone numbers and \u0026quot;pincodes\u0026quot; stored in plain text. After multiple attempts to contact them, DailyObjects responded and received a copy of the data for verification, however failed to respond to multiple contact attempts following that.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DailyObjects.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":572,\"Name\":\"Tout\",\"Title\":\"Tout\",\"Domain\":\"tout.com\",\"BreachDate\":\"2014-09-11T00:00:00.000Z\",\"AddedDate\":\"2020-01-25T06:12:28.000Z\",\"ModifiedDate\":\"2020-01-25T06:12:28.000Z\",\"PwnCount\":652683,\"Description\":\"In approximately September 2014, the now defunct social networking service \u003ca href=\\\"https://en.wikipedia.org/wiki/Tout_(company)\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTout\u003c/a\u003e suffered a data breach. The breach subsequently appeared years later and included 653k unique email addresses, names, IP addresses, the location of the user, their bio and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;nmapthis@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tout.png\",\"DataClasses\":[\"bios\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":197,\"Name\":\"EuropaJobs\",\"Title\":\"europa.jobs\",\"Domain\":\"europa.jobs\",\"BreachDate\":\"2019-08-11T00:00:00.000Z\",\"AddedDate\":\"2020-01-15T08:51:05.000Z\",\"ModifiedDate\":\"2020-01-15T08:51:05.000Z\",\"PwnCount\":226095,\"Description\":\"In August 2019, the now defunct European jobs website \u003ca href=\\\"https://webcache.googleusercontent.com/search?q=cache:Qk_zaGEqx70J:https://en.europa.jobs/+\u0026cd=1\u0026hl=en\u0026ct=clnk\u0026gl=au\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eeuropa.jobs\u003c/a\u003e (Google cache link) suffered a data breach. The incident exposed 226k unique email addresses alongside extensive personal information including names, dates of birth, job applications and passwords. The data was subsequently redistributed on a popular hacking forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EuropaJobs.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"job-applications\",\"names\",\"passwords\",\"phone-numbers\",\"spoken-languages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":445,\"Name\":\"PlanetCalypso\",\"Title\":\"Planet Calypso\",\"Domain\":\"planetcalypsoforum.com\",\"BreachDate\":\"2019-07-01T00:00:00.000Z\",\"AddedDate\":\"2020-01-12T09:48:57.000Z\",\"ModifiedDate\":\"2020-01-12T09:48:57.000Z\",\"PwnCount\":62261,\"Description\":\"In approximately July 2019, \u003ca href=\\\"http://www.planetcalypsoforum.com/forums/showthread.php?311854-ET-or-Planet-Forums-ever-hacked\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe forums for the Planet Calypso game suffered a data breach\u003c/a\u003e. The breach of the vBulletin based forum exposed email and IP addresses, usernames and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PlanetCalypso.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":94,\"Name\":\"BtoBet\",\"Title\":\"BtoBet\",\"Domain\":\"btobet.com\",\"BreachDate\":\"2019-12-26T00:00:00.000Z\",\"AddedDate\":\"2020-01-11T20:16:42.000Z\",\"ModifiedDate\":\"2020-01-11T20:28:06.000Z\",\"PwnCount\":444241,\"Description\":\"In December 2019, \u003ca href=\\\"https://www.troyhunt.com/the-difficulty-of-disclosure-surebet247-and-the-streisand-effect/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea large collection of data from Nigerian gambling company Surebet247 was sent to HIBP\u003c/a\u003e. Alongside the Surebet247, database backups from gambling sites BetAlfa, BetWay, BongoBongo and TopBet was also included. Further investigation \u003ca href=\\\"https://www.iafrikan.com/2020/01/09/btobet-sports-betting-technology-software-neuron-platform-surebet247-gambling-data-security-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eimplicated betting platform provider BtoBet as being the common source of the data\u003c/a\u003e. Impacted data included user records and extensive information on gambling histories.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BtoBet.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"financial-transactions\",\"geographic-locations\",\"ip-addresses\",\"names\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":254,\"Name\":\"GoGames\",\"Title\":\"Go Games\",\"Domain\":\"gogames.me\",\"BreachDate\":\"2015-10-24T00:00:00.000Z\",\"AddedDate\":\"2020-01-11T00:06:33.000Z\",\"ModifiedDate\":\"2020-01-11T00:06:33.000Z\",\"PwnCount\":3430083,\"Description\":\"In approximately October 2015, the manga website \u003ca href=\\\"http://gogames.me\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGo Games\u003c/a\u003e suffered a data breach. The exposed data included 3.4M customer records including email and IP addresses, usernames and passwords stored as salted MD5 hashes. Go Games did not respond when contacted about the incident. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GoGames.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":294,\"Name\":\"IndianRailways\",\"Title\":\"Indian Railways\",\"Domain\":\"indianrails.in\",\"BreachDate\":\"2019-10-28T00:00:00.000Z\",\"AddedDate\":\"2020-01-10T19:13:39.000Z\",\"ModifiedDate\":\"2020-01-10T19:13:39.000Z\",\"PwnCount\":583377,\"Description\":\"In November 2019, \u003ca href=\\\"https://medium.com/dvuln/why-you-should-choo-choo-choose-to-have-a-vulnerability-disclosure-policy-2m-accounts-exposed-7cd7eaec4da5\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe website for Indian Rail left more than 2M records exposed on an unprotected Firebase database instance\u003c/a\u003e. The exposed data included 583k unique email addresses alongside usernames and passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/IndianRailways.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":589,\"Name\":\"Universarium\",\"Title\":\"Universarium\",\"Domain\":\"universarium.org\",\"BreachDate\":\"2019-11-01T00:00:00.000Z\",\"AddedDate\":\"2020-01-03T09:40:01.000Z\",\"ModifiedDate\":\"2020-01-03T09:54:20.000Z\",\"PwnCount\":564962,\"Description\":\"In approximately November 2019, the Russian \u0026quot;Remote preparatory faculty for IT specialties\u0026quot; \u003ca href=\\\"https://universarium.org/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eUniversarium\u003c/a\u003e suffered a data breach. The incident exposed 565k email addresses and passwords in plain text. Universarium did not respond to multiple attempts to make contact over a period of many weeks. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Universarium.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":212,\"Name\":\"Factual\",\"Title\":\"Factual\",\"Domain\":\"factual.com\",\"BreachDate\":\"2017-03-22T00:00:00.000Z\",\"AddedDate\":\"2019-12-24T10:56:18.000Z\",\"ModifiedDate\":\"2019-12-24T10:56:18.000Z\",\"PwnCount\":2461696,\"Description\":\"In March 2017, a file containing 8M rows of data \u003ca href=\\\"https://www.troyhunt.com/when-is-data-public-and-2-5m-public-factual-records\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eallegedly sourced from data aggregator Factual\u003c/a\u003e was compiled and later exchanged on the premise it was a \u0026quot;breach\u0026quot;. The data contained 2.5M unique email addresses alongside business names, addresses and phone numbers. After consultation with Factual, they advised the data was \u0026quot;publicly available information about businesses and other points of interest that Factual makes available on its website and to customers\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Factual.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":661,\"Name\":\"Zynga\",\"Title\":\"Zynga\",\"Domain\":\"zynga.com\",\"BreachDate\":\"2019-09-01T00:00:00.000Z\",\"AddedDate\":\"2019-12-19T04:54:45.000Z\",\"ModifiedDate\":\"2020-01-11T00:41:51.000Z\",\"PwnCount\":172869660,\"Description\":\"In September 2019, game developer \u003ca href=\\\"https://www.cnet.com/news/words-with-friends-hack-reportedly-exposes-data-of-more-than-200m-players/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZynga (the creator of Words with Friends) suffered a data breach\u003c/a\u003e. The incident exposed 173M unique email addresses alongside usernames and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zynga.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":25,\"Name\":\"AgusiQTorrents\",\"Title\":\"AgusiQ-Torrents.pl\",\"Domain\":\"agusiq-torrents.pl\",\"BreachDate\":\"2019-09-24T00:00:00.000Z\",\"AddedDate\":\"2019-12-04T21:54:50.000Z\",\"ModifiedDate\":\"2019-12-04T21:54:50.000Z\",\"PwnCount\":90478,\"Description\":\"In September 2019, Polish torrent site \u003ca href=\\\"http://agusiq-torrents.pl/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAgusiQ-Torrents.pl\u003c/a\u003e suffered a data breach. The incident exposed 90k member records including email and IP addresses, usernames and passwords stored as MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AgusiQTorrents.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":148,\"Name\":\"PDL\",\"Title\":\"Data Enrichment Exposure From PDL Customer\",\"Domain\":\"\",\"BreachDate\":\"2019-10-16T00:00:00.000Z\",\"AddedDate\":\"2019-11-22T20:13:04.000Z\",\"ModifiedDate\":\"2019-11-22T20:13:04.000Z\",\"PwnCount\":622161052,\"Description\":\"In October 2019, \u003ca href=\\\"https://www.troyhunt.com/data-enrichment-people-data-labs-and-another-622m-email-addresses\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esecurity researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data\u003c/a\u003e. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"geographic-locations\",\"job-titles\",\"names\",\"phone-numbers\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":243,\"Name\":\"GateHub\",\"Title\":\"GateHub\",\"Domain\":\"gatehub.net\",\"BreachDate\":\"2019-06-04T00:00:00.000Z\",\"AddedDate\":\"2019-11-20T00:29:29.000Z\",\"ModifiedDate\":\"2019-12-24T13:09:23.000Z\",\"PwnCount\":1408078,\"Description\":\"In October 2019, \u003ca href=\\\"https://arstechnica.com/information-technology/2019/11/password-data-dumped-online-for-2-2-million-users-of-currency-and-gaming-sites/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e1.4M accounts from the cryptocurrency wallet service GateHub were posted to a popular hacking forum\u003c/a\u003e. GateHub had \u003ca href=\\\"https://gatehub.net/blog/gatehub-update-investigation-continues/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epreviously acknowledged a data breach in June\u003c/a\u003e, albeit with a smaller number of impacted accounts. Data from the breach included email addresses, mnemonic phrases, encrypted master keys, encrypted recovery keys and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GateHub.png\",\"DataClasses\":[\"email-addresses\",\"encrypted-keys\",\"mnemonic-phrases\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":189,\"Name\":\"EpicBot\",\"Title\":\"EpicBot\",\"Domain\":\"epicbot.com\",\"BreachDate\":\"2019-09-01T00:00:00.000Z\",\"AddedDate\":\"2019-11-19T23:29:42.000Z\",\"ModifiedDate\":\"2019-11-19T23:33:02.000Z\",\"PwnCount\":816662,\"Description\":\"In September 2019, the RuneScape bot provider \u003ca href=\\\"https://arstechnica.com/information-technology/2019/11/password-data-dumped-online-for-2-2-million-users-of-currency-and-gaming-sites/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEpicBot suffered a data breach that impacted 817k subscribers\u003c/a\u003e. Data from the breach was subsequently shared on a popular hacking forum and included usernames, email and IP addresses and passwords stored as either salted MD5 or bcrypt hashes. EpicBot did not respond when contacted about the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EpicBot.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":257,\"Name\":\"GPSUnderground\",\"Title\":\"GPS Underground\",\"Domain\":\"gpsunderground.com\",\"BreachDate\":\"2016-07-01T00:00:00.000Z\",\"AddedDate\":\"2019-11-19T06:13:42.000Z\",\"ModifiedDate\":\"2019-11-19T06:13:42.000Z\",\"PwnCount\":669584,\"Description\":\"In early 2017, \u003ca href=\\\"https://www.hackread.com/vbulletin-forums-hacked-accounts-sold-on-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGPS Underground was amongst a collection of compromised vBulletin websites that were found being sold online\u003c/a\u003e. The breach dated back to mid-2016 and included 670k records with usernames, email and IP addresses, dates of birth and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GPSUnderground.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":570,\"Name\":\"ToonDoo\",\"Title\":\"ToonDoo\",\"Domain\":\"toondoo.com\",\"BreachDate\":\"2019-08-21T00:00:00.000Z\",\"AddedDate\":\"2019-11-11T06:19:53.000Z\",\"ModifiedDate\":\"2019-11-11T06:19:53.000Z\",\"PwnCount\":6002694,\"Description\":\"In August 2019, the comic strip creation website \u003ca href=\\\"https://www.zataz.com/6-000-000-de-donnees-personnelles-piratees-pour-le-site-toondoo/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eToonDoo suffered a data breach\u003c/a\u003e. The data was subsequently redistributed on a popular hacking forum in November where the personal information of over 6M subscribers was shared. Impacted data included email and IP addresses, usernames, genders, the location of the individual and salted password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ToonDoo.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":600,\"Name\":\"Vedantu\",\"Title\":\"Vedantu\",\"Domain\":\"vedantu.com\",\"BreachDate\":\"2019-07-08T00:00:00.000Z\",\"AddedDate\":\"2019-11-01T05:13:40.000Z\",\"ModifiedDate\":\"2019-11-01T05:13:40.000Z\",\"PwnCount\":686899,\"Description\":\"In mid-2019, the Indian interactive online tutoring platform \u003ca href=\\\"https://www.vedantu.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVedantu\u003c/a\u003e suffered a data breach which exposed the personal data of 687k users. The JSON formatted database dump exposed extensive personal information including email and IP address, names, phone numbers, genders and passwords stored as bcrypt hashes. When contacted about the incident, Vedantu advised that they were aware of the breach and were in the process of informing their customers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Vedantu.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"spoken-languages\",\"time-zones\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":278,\"Name\":\"HookersNL\",\"Title\":\"Hookers.nl\",\"Domain\":\"hookers.nl\",\"BreachDate\":\"2019-10-10T00:00:00.000Z\",\"AddedDate\":\"2019-10-23T09:51:59.000Z\",\"ModifiedDate\":\"2019-10-23T09:56:08.000Z\",\"PwnCount\":290955,\"Description\":\"In October 2019, the Dutch prostitution forum \u003ca href=\\\"https://www.forbes.com/sites/thomasbrewster/2019/10/10/dutch-prostitution-site-hookersnl-hacked--250000-users-data-leaked/#3e3f231522f8\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHookers.nl suffered a data breach\u003c/a\u003e which exposed the personal information of sex workers and their customers. The IP and email addresses, usernames and either bcrypt or salted MD5 password hashes of 291k members were accessed via an unpatched vulnerability in the vBulletin forum software.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HookersNL.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":659,\"Name\":\"Zooville\",\"Title\":\"Zooville\",\"Domain\":\"zooville.org\",\"BreachDate\":\"2019-09-27T00:00:00.000Z\",\"AddedDate\":\"2019-10-19T21:22:44.000Z\",\"ModifiedDate\":\"2019-10-20T21:58:16.000Z\",\"PwnCount\":71407,\"Description\":\"In September 2019, the zoophilia and bestiality forum \u003ca href=\\\"https://www.zooville.org/threads/security-incident-and-site-rebuild-september-2019.9/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZooville suffered a data breach\u003c/a\u003e. The usernames and email addresses of 71k members were accessed via an unpatched vulnerability in the vBulletin forum software then subsequently distributed online. A second data set was later provided to HIBP which contained a complete vBulletin database dump including IP addresses, dates of birth and passwords stored as bcrypt hashes. The site administrator advised that following the breach, all data had been deleted from the forum and a new one had been stood up on the XenForo platform. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;burger vault\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zooville.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":537,\"Name\":\"StreetEasy\",\"Title\":\"StreetEasy\",\"Domain\":\"streeteasy.com\",\"BreachDate\":\"2016-06-28T00:00:00.000Z\",\"AddedDate\":\"2019-10-06T18:18:50.000Z\",\"ModifiedDate\":\"2019-10-06T18:25:03.000Z\",\"PwnCount\":988230,\"Description\":\"In approximately June 2016, the real estate website \u003ca href=\\\"https://therealdeal.com/2019/02/19/a-million-streeteasy-accounts-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStreetEasy suffered a data breach\u003c/a\u003e. In total, 988k unique email addresses were included in the breach alongside names, usernames and SHA-1 hashes of passwords, all of which appeared for sale on a dark web marketplace in February 2019. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StreetEasy.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":501,\"Name\":\"Sephora\",\"Title\":\"Sephora\",\"Domain\":\"sephora.com.au\",\"BreachDate\":\"2017-01-09T00:00:00.000Z\",\"AddedDate\":\"2019-10-06T15:14:12.000Z\",\"ModifiedDate\":\"2019-10-06T15:14:12.000Z\",\"PwnCount\":780073,\"Description\":\"In approximately January 2017, the beauty store \u003ca href=\\\"https://www.zdnet.com/article/sephora-data-breach-hits-southeast-asia-and-anz-customers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSephora suffered a data breach\u003c/a\u003e. Impacting customers in South East Asia, Australia and New Zealand, 780k unique email addresses were included in the breach alongside names, genders, dates of birth, ethnicities and other personal information. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Sephora.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ethnicities\",\"genders\",\"names\",\"physical-attributes\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":613,\"Name\":\"Wanelo\",\"Title\":\"Wanelo\",\"Domain\":\"wanelo.com\",\"BreachDate\":\"2018-12-13T00:00:00.000Z\",\"AddedDate\":\"2019-09-30T17:15:11.000Z\",\"ModifiedDate\":\"2019-10-01T05:39:41.000Z\",\"PwnCount\":23165793,\"Description\":\"In approximately December 2018, the digital mall \u003ca href=\\\"https://www.zdnet.com/article/a-hacker-has-dumped-nearly-one-billion-user-records-over-the-past-two-months/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWanelo suffered a data breach\u003c/a\u003e. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in April 2019. A total of 23 million unique email addresses were included in the breach alongside passwords stored as either MD5 or bcrypt hashes. After the initial HIBP load, further data containing names, shipping addresses and IP addresses were also provided to HIBP, albeit without direct association to the email addresses and passwords. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Wanelo.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":345,\"Name\":\"LuminPDF\",\"Title\":\"Lumin PDF\",\"Domain\":\"luminpdf.com\",\"BreachDate\":\"2019-04-01T00:00:00.000Z\",\"AddedDate\":\"2019-09-18T05:00:15.000Z\",\"ModifiedDate\":\"2019-09-18T05:00:15.000Z\",\"PwnCount\":15453048,\"Description\":\"In April 2019, the PDF management service \u003ca href=\\\"https://www.zdnet.com/article/data-of-24-3-million-lumin-pdf-users-shared-on-hacking-forum/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLumin PDF suffered a data breach\u003c/a\u003e. The breach wasn't publicly disclosed until September when 15.5M records of user data appeared for download on a popular hacking forum. The data had been left publicly exposed in a MongoDB instance after which Lumin PDF was allegedly been \u0026quot;contacted multiple times, but ignored all the queries\u0026quot;. The exposed data included names, email addresses, genders, spoken language and either a bcrypt password hash or Google auth token. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LuminPDF.png\",\"DataClasses\":[\"auth-tokens\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"spoken-languages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":312,\"Name\":\"KiwiFarms\",\"Title\":\"KiwiFarms\",\"Domain\":\"kiwifarms.net\",\"BreachDate\":\"2019-09-10T00:00:00.000Z\",\"AddedDate\":\"2019-09-17T09:48:25.000Z\",\"ModifiedDate\":\"2019-09-17T09:54:23.000Z\",\"PwnCount\":4606,\"Description\":\"In September 2019, the forum for discussing \u0026quot;lolcows\u0026quot; (people who can be milked for laughs) \u003ca href=\\\"https://kiwifarms.net/threads/dealing-with-the-compromise.60767/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKiwi Farms suffered a data breach\u003c/a\u003e. The disclosure notice advised that email and IP addresses, dates of birth and content created by members were all exposed in the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/KiwiFarms.png\",\"DataClasses\":[\"avatars\",\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":374,\"Name\":\"Minehut\",\"Title\":\"Minehut\",\"Domain\":\"minehut.com\",\"BreachDate\":\"2019-05-17T00:00:00.000Z\",\"AddedDate\":\"2019-09-17T08:27:31.000Z\",\"ModifiedDate\":\"2019-11-17T23:14:18.000Z\",\"PwnCount\":396533,\"Description\":\"In May 2019, the Minecraft server website \u003ca href=\\\"https://minehut.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMinehut\u003c/a\u003e suffered a data breach. The company advised a database backup had been obtained after which they subsequently notified all impacted users. 397k email addresses from the incident were provided to HIBP. A data set with both email addresses and bcrypt password hashes was also later provided to HIBP.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Minehut.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":609,\"Name\":\"VoidTO\",\"Title\":\"Void.to\",\"Domain\":\"void.to\",\"BreachDate\":\"2019-06-13T00:00:00.000Z\",\"AddedDate\":\"2019-09-11T06:47:08.000Z\",\"ModifiedDate\":\"2019-09-11T06:47:08.000Z\",\"PwnCount\":95431,\"Description\":\"In June 2019, the hacking website \u003ca href=\\\"https://void.to/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVoid.to\u003c/a\u003e suffered a data breach. There were 95k unique email addresses spread across 86k forum users and other tables in the database. A rival hacking website claimed responsibility for breaching the MyBB based forum which disclosed email and IP addresses, usernames, private messages and passwords stored as either salted MD5 or bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VoidTO.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":454,\"Name\":\"Poshmark\",\"Title\":\"Poshmark\",\"Domain\":\"poshmark.com\",\"BreachDate\":\"2018-05-16T00:00:00.000Z\",\"AddedDate\":\"2019-09-02T03:36:05.000Z\",\"ModifiedDate\":\"2019-09-02T03:44:37.000Z\",\"PwnCount\":36395491,\"Description\":\"In mid-2018, social commerce marketplace \u003ca href=\\\"https://techcrunch.com/2019/08/01/poshmark-confirms-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePoshmark suffered a data breach\u003c/a\u003e that exposed 36M user accounts. The compromised data included email addresses, names, usernames, genders, locations and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to \\\"JimScott.Sec@protonmail.com\\\".\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Poshmark.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":361,\"Name\":\"MastercardPricelessSpecials\",\"Title\":\"Mastercard Priceless Specials\",\"Domain\":\"specials.mastercard.de\",\"BreachDate\":\"2019-08-20T00:00:00.000Z\",\"AddedDate\":\"2019-09-01T20:37:49.000Z\",\"ModifiedDate\":\"2019-09-01T20:37:49.000Z\",\"PwnCount\":89388,\"Description\":\"In August 2019, \u003ca href=\\\"https://www.spiegel.de/netzwelt/web/mastercard-datenleck-bei-bonusprogramm-a-1282697.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe German Mastercard bonus program \u0026quot;Priceless Specials\u0026quot; suffered a data breach\u003c/a\u003e. Personal data on almost 90k program members was subsequently extensively circulated online and included names, email and IP addresses, phone numbers and partial credit card data. Following the incident, the program was subsequently suspended.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mastercard.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"phone-numbers\",\"salutations\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":641,\"Name\":\"XKCD\",\"Title\":\"XKCD\",\"Domain\":\"xkcd.com\",\"BreachDate\":\"2019-07-01T00:00:00.000Z\",\"AddedDate\":\"2019-09-01T08:58:32.000Z\",\"ModifiedDate\":\"2019-09-01T08:58:32.000Z\",\"PwnCount\":561991,\"Description\":\"In July 2019, \u003ca href=\\\"https://forums.xkcd.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe forum for webcomic XKCD\u003c/a\u003e suffered a data breach that impacted 562k subscribers. The breached phpBB forum leaked usernames, email and IP addresses and passwords stored in MD5 phpBB3 format. The data was provided to HIBP by white hat security researcher and data analyst Adam Davies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/XKCD.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":123,\"Name\":\"Coinmama\",\"Title\":\"Coinmama\",\"Domain\":\"coinmama.com\",\"BreachDate\":\"2017-08-03T00:00:00.000Z\",\"AddedDate\":\"2019-08-30T20:53:29.000Z\",\"ModifiedDate\":\"2019-08-30T20:53:29.000Z\",\"PwnCount\":478824,\"Description\":\"In August 2017, the crypto coin brokerage service \u003ca href=\\\"https://cointelegraph.com/news/major-crypto-brokerage-coinmama-reports-450-000-users-affected-by-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCoinmama suffered a data breach\u003c/a\u003e that impacted 479k subscribers. The breach was discovered in February 2019 with exposed data including email addresses, usernames and passwords stored as MD5 WordPress hashes. The data was provided to HIBP by white hat security researcher and data analyst Adam Davies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Coinmama.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":111,\"Name\":\"Chegg\",\"Title\":\"Chegg\",\"Domain\":\"chegg.com\",\"BreachDate\":\"2018-04-28T00:00:00.000Z\",\"AddedDate\":\"2019-08-16T07:24:58.000Z\",\"ModifiedDate\":\"2024-04-27T05:34:09.000Z\",\"PwnCount\":39721127,\"Description\":\"In April 2018, the textbook rental service \u003ca href=\\\"https://techcrunch.com/2018/09/26/chegg-resets-40-million-user-passwords-after-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eChegg suffered a data breach\u003c/a\u003e that impacted 40 million subscribers. The exposed data included email addresses, usernames, names and passwords stored as unsalted MD5 hashes. A small number of records also contained physical address or phone number. The data was provided to HIBP by a source who requested it be attributed to \\\"JimScott.Sec@protonmail.com\\\".\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Chegg.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":133,\"Name\":\"CrackedTO\",\"Title\":\"Cracked.to\",\"Domain\":\"cracked.to\",\"BreachDate\":\"2019-07-21T00:00:00.000Z\",\"AddedDate\":\"2019-08-12T11:18:56.000Z\",\"ModifiedDate\":\"2019-08-12T11:18:56.000Z\",\"PwnCount\":749161,\"Description\":\"In July 2019, the hacking website \u003ca href=\\\"https://cracked.to\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCracked.to\u003c/a\u003e suffered a data breach. There were 749k unique email addresses spread across 321k forum users and other tables in the database. A rival hacking website claimed responsibility for breaching the MyBB based forum which disclosed email and IP addresses, usernames, private messages and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CrackedTO.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":533,\"Name\":\"StockX\",\"Title\":\"StockX\",\"Domain\":\"stockx.com\",\"BreachDate\":\"2019-07-26T00:00:00.000Z\",\"AddedDate\":\"2019-08-10T15:34:08.000Z\",\"ModifiedDate\":\"2019-08-11T04:12:11.000Z\",\"PwnCount\":6840339,\"Description\":\"In July 2019, the fashion and sneaker trading platform \u003ca href=\\\"https://stockx.com/news/update-on-data-security-issue/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStockX suffered a data breach\u003c/a\u003e which was subsequently sold via a dark webmarketplace. The exposed data included 6.8 million unique email addresses, names, physical addresses, purchases and passwords stored as salted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StockX.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":101,\"Name\":\"Canva\",\"Title\":\"Canva\",\"Domain\":\"canva.com\",\"BreachDate\":\"2019-05-24T00:00:00.000Z\",\"AddedDate\":\"2019-08-09T14:24:01.000Z\",\"ModifiedDate\":\"2019-08-09T14:24:01.000Z\",\"PwnCount\":137272116,\"Description\":\"In May 2019, the graphic design tool website \u003ca href=\\\"https://support.canva.com/contact/customer-support/may-24-security-incident-faqs/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCanva suffered a data breach\u003c/a\u003e that impacted 137 million subscribers. The exposed data included email addresses, usernames, names, cities of residence and passwords stored as bcrypt hashes for users not using social logins. The data was provided to HIBP by a source who requested it be attributed to \\\"JimScott.Sec@protonmail.com\\\".\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Canva.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":99,\"Name\":\"CafePress\",\"Title\":\"CafePress\",\"Domain\":\"cafepress.com\",\"BreachDate\":\"2019-02-20T00:00:00.000Z\",\"AddedDate\":\"2019-08-05T01:18:43.000Z\",\"ModifiedDate\":\"2019-08-05T20:02:32.000Z\",\"PwnCount\":23205290,\"Description\":\"In February 2019, the custom merchandise retailer \u003ca href=\\\"https://www.cafepress.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCafePress\u003c/a\u003e suffered a data breach. The exposed data included 23 million unique email addresses with some records also containing names, physical addresses, phone numbers and passwords stored as SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to \\\"JimScott.Sec@protonmail.com\\\".\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CafePress.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":121,\"Name\":\"ClubPenguinRewrittenJul2019\",\"Title\":\"Club Penguin Rewritten (July 2019)\",\"Domain\":\"cprewritten.net\",\"BreachDate\":\"2019-07-27T00:00:00.000Z\",\"AddedDate\":\"2019-07-30T14:05:10.000Z\",\"ModifiedDate\":\"2019-07-30T14:05:10.000Z\",\"PwnCount\":4007909,\"Description\":\"In July 2019, the children's gaming site \u003ca href=\\\"https://community.cprewritten.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eClub Penguin Rewritten\u003c/a\u003e (CPRewritten) suffered a data breach (note: CPRewritten is an independent recreation of Disney's Club Penguin game). In addition to an earlier data breach that impacted 1.7 million accounts, the subsequent breach exposed 4 million unique email addresses alongside IP addresses, usernames and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ClubPenguinRewritten.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":37,\"Name\":\"AnimePlanet\",\"Title\":\"Anime-Planet\",\"Domain\":\"anime-planet.com\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2019-07-28T00:35:07.000Z\",\"ModifiedDate\":\"2019-07-28T00:35:07.000Z\",\"PwnCount\":368507,\"Description\":\"In approximately 2016, the anime website \u003ca href=\\\"https://www.anime-planet.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAnime-Planet\u003c/a\u003e suffered a data breach that impacted 369k subscribers. The exposed data included usernames, IP and email addresses, dates of birth and passwords stored as unsalted MD5 hashes and for newer accounts, bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AnimePlanet.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":190,\"Name\":\"EpicNPC\",\"Title\":\"EpicNPC\",\"Domain\":\"epicnpc.com\",\"BreachDate\":\"2016-01-02T00:00:00.000Z\",\"AddedDate\":\"2019-07-27T23:11:30.000Z\",\"ModifiedDate\":\"2019-07-27T23:20:02.000Z\",\"PwnCount\":408795,\"Description\":\"In January 2016, the hacked account reseller \u003ca href=\\\"https://www.epicnpc.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEpicNPC\u003c/a\u003e suffered a data breach that impacted 409k subscribers. The impacted data included usernames, IP and email addresses and passwords stored as salted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EpicNPC.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":116,\"Name\":\"ClashOfKings\",\"Title\":\"Clash of Kings\",\"Domain\":\"f.elex.com\",\"BreachDate\":\"2016-07-14T00:00:00.000Z\",\"AddedDate\":\"2019-07-27T22:03:03.000Z\",\"ModifiedDate\":\"2019-07-27T22:03:03.000Z\",\"PwnCount\":1604957,\"Description\":\"In July 2016, \u003ca href=\\\"https://www.zdnet.com/article/hacker-steals-forums-of-clash-of-kings-mobile-game/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe forum for the game \u0026quot;Clash of Kings\u0026quot; suffered a data breach\u003c/a\u003e that impacted 1.6 million subscribers. The impacted data included usernames, IP and email addresses and passwords stored as MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ClashOfKings.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":518,\"Name\":\"Snail\",\"Title\":\"Snail\",\"Domain\":\"snail.com\",\"BreachDate\":\"2015-03-14T00:00:00.000Z\",\"AddedDate\":\"2019-07-27T16:24:09.000Z\",\"ModifiedDate\":\"2019-07-27T16:24:09.000Z\",\"PwnCount\":1410899,\"Description\":\"In March 2015, the gaming website \u003ca href=\\\"https://www.technadu.com/emuparadise-1-1-million-user-data-breach/70025/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSnail suffered a data breach\u003c/a\u003e that impacted 1.4 million subscribers. The impacted data included usernames, IP and email addresses and passwords stored as unsalted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Snail.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":640,\"Name\":\"Xiaomi\",\"Title\":\"Xiaomi\",\"Domain\":\"xiaomi.cn\",\"BreachDate\":\"2012-08-01T00:00:00.000Z\",\"AddedDate\":\"2019-07-21T21:45:31.000Z\",\"ModifiedDate\":\"2019-07-21T21:45:31.000Z\",\"PwnCount\":7088010,\"Description\":\"In August 2012, \u003ca href=\\\"https://thehackernews.com/2014/10/xiaomi-data-breach-hacker.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Xiaomi user forum website suffered a data breach\u003c/a\u003e. In all, 7 million email addresses appeared in the breach although a significant portion of them were numeric aliases on the bbs_ml_as_uid.xiaomi.com domain. Usernames, IP addresses and passwords stored as salted MD5 hashes were also exposed. The data was provided with support from \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Xiaomi.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":221,\"Name\":\"FlashFlashRevolution2019\",\"Title\":\"Flash Flash Revolution (2019 breach)\",\"Domain\":\"flashflashrevolution.com\",\"BreachDate\":\"2019-07-16T00:00:00.000Z\",\"AddedDate\":\"2019-07-21T20:31:54.000Z\",\"ModifiedDate\":\"2019-07-21T20:31:54.000Z\",\"PwnCount\":1858124,\"Description\":\"In July 2019, the music-based rhythm game \u003ca href=\\\"http://www.flashflashrevolution.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFlash Flash Revolution\u003c/a\u003e suffered a data breach. The 2019 breach imapcted almost 1.9 million members and is \u003cem\u003ein addition to\u003c/em\u003e \u003ca href=\\\"http://www.flashflashrevolution.com/ffr/information-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe 2016 data breach of the same service\u003c/a\u003e. Email and IP addesses, usernames, dates of birth and salted MD5 hashes were all exposed in the breach. The data was provided with support from \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FlashFlashRevolution.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":539,\"Name\":\"StrongholdKingdoms\",\"Title\":\"Stronghold Kingdoms\",\"Domain\":\"strongholdkingdoms.com\",\"BreachDate\":\"2018-07-04T00:00:00.000Z\",\"AddedDate\":\"2019-07-21T15:36:01.000Z\",\"ModifiedDate\":\"2019-07-21T15:36:01.000Z\",\"PwnCount\":5187305,\"Description\":\"In July 2018, the massive multiplayer online game \u003ca href=\\\"https://techraptor.net/content/roll20-stronghold-kingdoms-subject-security-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStronghold Kingdoms suffered a data breach\u003c/a\u003e. Almost 5.2 million accounts were impacted by the incident which exposed emails addresses, usernames and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StrongholdKingdoms.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":240,\"Name\":\"GameSalad\",\"Title\":\"GameSalad\",\"Domain\":\"gamesalad.com\",\"BreachDate\":\"2019-02-24T00:00:00.000Z\",\"AddedDate\":\"2019-07-21T14:18:46.000Z\",\"ModifiedDate\":\"2019-07-21T14:23:46.000Z\",\"PwnCount\":1506242,\"Description\":\"In February 2019, the education and game creation website \u003ca href=\\\"https://www.zdnet.com/article/round-4-hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGame Salad suffered a data breach\u003c/a\u003e. The incident impacted 1.5M accounts and exposed email addresses, usernames, IP addresses and passwords stored as SHA-256 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GameSalad.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":44,\"Name\":\"ArmorGames\",\"Title\":\"Armor Games\",\"Domain\":\"armorgames.com\",\"BreachDate\":\"2019-01-01T00:00:00.000Z\",\"AddedDate\":\"2019-07-20T06:03:31.000Z\",\"ModifiedDate\":\"2021-04-07T06:28:50.000Z\",\"PwnCount\":10604307,\"Description\":\"In January 2019, the game portal website \u003ca href=\\\"https://techraptor.net/content/armor-games-data-breach-january-2019\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eArmor Games suffered a data breach\u003c/a\u003e. A total of 10.6 million email addresses were impacted by the breach which also exposed usernames, IP addresses, birthdays of administrator accounts and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ArmorGames.png\",\"DataClasses\":[\"bios\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":491,\"Name\":\"Roll20\",\"Title\":\"Roll20\",\"Domain\":\"roll20.net\",\"BreachDate\":\"2018-12-26T00:00:00.000Z\",\"AddedDate\":\"2019-07-19T14:26:05.000Z\",\"ModifiedDate\":\"2019-07-19T14:26:05.000Z\",\"PwnCount\":3994436,\"Description\":\"In December 2018, the tabletop role-playing games website \u003ca href=\\\"https://app.roll20.net/forum/post/7209691/roll20-security-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRoll20 suffered a data breach\u003c/a\u003e. Almost 4 million customers were impacted by the breach and had email and IP addresses, names, bcrypt hashes of passwords and the last 4 digits of credit cards exposed. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Roll20.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":47,\"Name\":\"Artvalue\",\"Title\":\"Artvalue\",\"Domain\":\"artvalue.com\",\"BreachDate\":\"2019-06-19T00:00:00.000Z\",\"AddedDate\":\"2019-07-19T13:16:52.000Z\",\"ModifiedDate\":\"2019-07-19T13:35:22.000Z\",\"PwnCount\":157692,\"Description\":\"In June 2019, the France-based art valuation website \u003ca href=\\\"http://artvalue.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eArtvalue.com\u003c/a\u003e left their 158k member subscriber base publicly exposed in a text file on their website. The exposed data included names, usernames, email addresses and passwords stored as MD5 hashes. The site operator did not respond when contacted about the incident, although the exposed file was subsequently removed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Artvalue.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"salutations\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":180,\"Name\":\"EatStreet\",\"Title\":\"EatStreet\",\"Domain\":\"eatstreet.com\",\"BreachDate\":\"2019-05-03T00:00:00.000Z\",\"AddedDate\":\"2019-07-19T11:29:35.000Z\",\"ModifiedDate\":\"2019-07-19T11:29:35.000Z\",\"PwnCount\":6353564,\"Description\":\"In May 2019, the online food ordering service \u003ca href=\\\"https://www.zdnet.com/article/eatstreet-food-ordering-service-discloses-security-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEatStreet suffered a data breach affecting 6.4 million customers\u003c/a\u003e. An extensive amount of personal data was obtained including names, phone numbers, addresses, partial credit card data and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EatStreet.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":96,\"Name\":\"BulgarianNationalRevenueAgency\",\"Title\":\"Bulgarian National Revenue Agency\",\"Domain\":\"nap.bg\",\"BreachDate\":\"2019-07-15T00:00:00.000Z\",\"AddedDate\":\"2019-07-18T18:38:49.000Z\",\"ModifiedDate\":\"2019-07-18T18:38:49.000Z\",\"PwnCount\":471167,\"Description\":\"In July 2019, \u003ca href=\\\"https://thenextweb.com/security/2019/07/16/bulgaria-tax-agency-data-leak-hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea massive data breach of the Bulgarian National Revenue Agency began circulating with data on 5 million people\u003c/a\u003e. Allegedly obtained in June, the data was broadly shared online and included taxation information alongside names, phone numbers, physical addresses and 471 thousand unique email addresses. The breach is said to have affected \u0026quot;nearly all adults in Bulgaria\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BulgarianNationalRevenueAgency.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"taxation-records\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":650,\"Name\":\"YouNow\",\"Title\":\"YouNow\",\"Domain\":\"younow.com\",\"BreachDate\":\"2019-02-15T00:00:00.000Z\",\"AddedDate\":\"2019-07-18T08:59:45.000Z\",\"ModifiedDate\":\"2019-07-18T08:59:45.000Z\",\"PwnCount\":18241518,\"Description\":\"In February 2019, \u003ca href=\\\"https://techcrunch.com/2019/02/14/hacker-strikes-again/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata from the live broadcasting service YouNow appeared for sale on a dark web marketplace\u003c/a\u003e. Whilst it's not clear what date the actual breach occurred on, the impacted data included 18M unique email addresses, IP addresses, names, usernames and links to social media profiles. As authentication is performed via social providers, no passwords were exposed in the breach. Many records didn't have associated email addresses thus the unique number is lower than the reported total number of accounts. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/YouNow.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":38,\"Name\":\"Animoto\",\"Title\":\"Animoto\",\"Domain\":\"animoto.com\",\"BreachDate\":\"2018-07-10T00:00:00.000Z\",\"AddedDate\":\"2019-07-18T05:04:08.000Z\",\"ModifiedDate\":\"2019-07-18T05:04:08.000Z\",\"PwnCount\":22437749,\"Description\":\"In July 2018, the cloud-based video making service \u003ca href=\\\"https://techcrunch.com/2018/08/20/animoto-hack-exposes-personal-information-geolocation-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAnimoto suffered a data breach\u003c/a\u003e. The breach exposed 22 million unique email addresses alongside names, dates of birth, country of origin and salted password hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Animoto.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":80,\"Name\":\"BlackSpigotMC\",\"Title\":\"BlackSpigotMC\",\"Domain\":\"blackspigot.com\",\"BreachDate\":\"2019-07-14T00:00:00.000Z\",\"AddedDate\":\"2019-07-17T18:44:17.000Z\",\"ModifiedDate\":\"2019-07-17T18:44:17.000Z\",\"PwnCount\":140029,\"Description\":\"In July 2019, the hacking website \u003ca href=\\\"https://blackspigot.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBlackSpigotMC suffered a data breach\u003c/a\u003e. The XenForo forum based site was allegedly compromised by a rival hacking website and resulted in 8.5GB of data being leaked including the database and website itself. The exposed data included 140k unique email addresses, usernames, IP addresses, genders, geographic locations and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BlackSpigotMC.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":505,\"Name\":\"SHEIN\",\"Title\":\"SHEIN\",\"Domain\":\"shein.com\",\"BreachDate\":\"2018-06-01T00:00:00.000Z\",\"AddedDate\":\"2019-07-17T13:59:41.000Z\",\"ModifiedDate\":\"2019-07-17T13:59:41.000Z\",\"PwnCount\":39086762,\"Description\":\"In June 2018, online fashion retailer \u003ca href=\\\"https://www.zdnet.com/article/shein-fashion-retailer-announces-breach-affecting-6-42-million-users/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSHEIN suffered a data breach\u003c/a\u003e. The company discovered the breach 2 months later in August then disclosed the incident another month after that. A total of 39 million unique email addresses were found in the breach alongside MD5 password hashes. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SHEIN.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":444,\"Name\":\"piZap\",\"Title\":\"piZap\",\"Domain\":\"pizap.com\",\"BreachDate\":\"2017-12-07T00:00:00.000Z\",\"AddedDate\":\"2019-07-16T05:43:27.000Z\",\"ModifiedDate\":\"2019-07-16T05:43:27.000Z\",\"PwnCount\":41817893,\"Description\":\"In approximately December 2017, the online photo editing site \u003ca href=\\\"https://www.zdnet.com/article/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epiZap suffered a data breach\u003c/a\u003e. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in February 2019. A total of 42 million unique email addresses were included in the breach alongside names, genders and links to Facebook profiles when the social media platform was used to authenticate to piZap. When accounts were created directly on piZap without using Facebook for authentication, passwords stored as SHA-1 hashes were also exposed. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/piZap.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\",\"social-media-profiles\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":403,\"Name\":\"Netlog\",\"Title\":\"Netlog\",\"Domain\":\"netlog.com\",\"BreachDate\":\"2012-11-01T00:00:00.000Z\",\"AddedDate\":\"2019-07-15T10:25:07.000Z\",\"ModifiedDate\":\"2019-07-15T10:25:07.000Z\",\"PwnCount\":49038354,\"Description\":\"In July 2018, the Belgian social networking site \u003ca href=\\\"https://oag.ca.gov/system/files/Communication%20to%20Users%20-%20FINAL_0.pdf\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNetlog identified a data breach of their systems dating back to November 2012 (PDF)\u003c/a\u003e. Although the service was discontinued in 2015, the data breach still impacted 49 million subscribers for whom email addresses and plain text passwords were exposed. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Netlog.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":200,\"Name\":\"Evite\",\"Title\":\"Evite\",\"Domain\":\"evite.com\",\"BreachDate\":\"2013-08-11T00:00:00.000Z\",\"AddedDate\":\"2019-07-14T14:51:51.000Z\",\"ModifiedDate\":\"2019-07-14T14:51:51.000Z\",\"PwnCount\":100985047,\"Description\":\"In April 2019, the social planning website for managing online invitations \u003ca href=\\\"https://www.evite.com/security/update?usource=lc\u0026lctid=1800182\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEvite identified a data breach of their systems\u003c/a\u003e. Upon investigation, they found unauthorised access to a database archive dating back to 2013. The exposed data included a total of 101 million unique email addresses, most belonging to recipients of invitations. Members of the service also had names, phone numbers, physical addresses, dates of birth, genders and passwords stored in plain text exposed. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Evite.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":370,\"Name\":\"MindJolt\",\"Title\":\"Mindjolt\",\"Domain\":\"mindjolt.com\",\"BreachDate\":\"2019-03-18T00:00:00.000Z\",\"AddedDate\":\"2019-07-13T19:21:12.000Z\",\"ModifiedDate\":\"2023-10-04T08:17:42.000Z\",\"PwnCount\":28364826,\"Description\":\"In March 2019, the online gaming website \u003ca href=\\\"https://www.zdnet.com/article/a-hacker-has-dumped-nearly-one-billion-user-records-over-the-past-two-months/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMindJolt suffered a data breach that exposed 28M unique email addresses\u003c/a\u003e. Also impacted were names and dates of birth, but no passwords. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;JimScott.Sec@protonmail.com\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mindjolt.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":654,\"Name\":\"Zhenai\",\"Title\":\"Zhenai.com\",\"Domain\":\"zhenai.com\",\"BreachDate\":\"2011-12-21T00:00:00.000Z\",\"AddedDate\":\"2019-07-11T06:31:32.000Z\",\"ModifiedDate\":\"2019-07-11T06:31:32.000Z\",\"PwnCount\":5024908,\"Description\":\"In December 2011, the Chinese dating site known as \u003ca href=\\\"http://nic.xjtu.edu.cn/info/1018/1909.htm\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZhenai.com suffered a data breach\u003c/a\u003e that impacted 5 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses and plain text passwords. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zhenai.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":625,\"Name\":\"WienerBuchereien\",\"Title\":\"Wiener Büchereien\",\"Domain\":\"\",\"BreachDate\":\"2019-06-10T00:00:00.000Z\",\"AddedDate\":\"2019-06-28T07:51:50.000Z\",\"ModifiedDate\":\"2019-06-28T07:51:50.000Z\",\"PwnCount\":224119,\"Description\":\"In June 2019, \u003ca href=\\\"https://futurezone.at/digital-life/wiener-buechereien-gehackt-daten-von-77000-nutzern-im-netz/400524190\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe library of Vienna (Wiener Büchereien) suffered a data breach\u003c/a\u003e. The compromised data included 224k unique email addresses, names, physical addresses, phone numbers and dates of birth. The breached data was subsequently posted to Twitter by the alleged perpetrator of the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WienerBuchereien.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":520,\"Name\":\"SocialEngineered\",\"Title\":\"Social Engineered\",\"Domain\":\"socialengineered.net\",\"BreachDate\":\"2019-06-13T00:00:00.000Z\",\"AddedDate\":\"2019-06-23T20:46:39.000Z\",\"ModifiedDate\":\"2019-06-25T18:06:57.000Z\",\"PwnCount\":89392,\"Description\":\"In June 2019, the \u0026quot;Art of Human Hacking\u0026quot; site \u003ca href=\\\"https://socialengineered.net\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSocial Engineered\u003c/a\u003e suffered a data breach. The breach of the MyBB forum was published on a rival hacking forum and included 89k unique email addresses spread across 55k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SocialEngineered.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":140,\"Name\":\"D3scene\",\"Title\":\"D3Scene\",\"Domain\":\"d3scene.com\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2019-06-15T15:19:11.000Z\",\"ModifiedDate\":\"2019-06-15T15:19:11.000Z\",\"PwnCount\":568827,\"Description\":\"In January 2016, the gaming website D3Scene, suffered a data breach. The compromised vBulletin forum exposed 569k million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/D3scene.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":186,\"Name\":\"Emuparadise\",\"Title\":\"Emuparadise\",\"Domain\":\"emuparadise.me\",\"BreachDate\":\"2018-04-01T00:00:00.000Z\",\"AddedDate\":\"2019-06-09T06:23:35.000Z\",\"ModifiedDate\":\"2019-06-15T15:19:53.000Z\",\"PwnCount\":1131229,\"Description\":\"In April 2018, the self-proclaimed \u0026quot;biggest retro gaming website on earth\u0026quot;, Emuparadise, suffered a data breach. The compromised vBulletin forum exposed 1.1 million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Emuparadise.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":425,\"Name\":\"OrdineAvvocatiDiRoma\",\"Title\":\"Ordine Avvocati di Roma\",\"Domain\":\"ordineavvocatiroma.it\",\"BreachDate\":\"2019-05-07T00:00:00.000Z\",\"AddedDate\":\"2019-05-26T23:24:11.000Z\",\"ModifiedDate\":\"2019-05-26T23:24:11.000Z\",\"PwnCount\":41960,\"Description\":\"In May 2019, \u003ca href=\\\"https://roma.repubblica.it/cronaca/2019/05/07/news/roma_anonymus_viola_la_mail_di_30mila_avvocati_c_e_anche_quella_di_raggi-225675248/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Lawyers Order of Rome suffered a data breach by a group claiming to be Anonymous Italy\u003c/a\u003e. Data on tens of thousands of Roman lawyers was taken from the breached system and redistributed online. The data included contact information, email addresses and email messages themselves encompassing tens of thousands of unique email addresses. A total of 42k unique addresses appeared in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OrdineAvvocatiDiRoma.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\",\"geographic-locations\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":417,\"Name\":\"OGUsers\",\"Title\":\"OGUsers (2019 breach)\",\"Domain\":\"ogusers.com\",\"BreachDate\":\"2018-12-26T00:00:00.000Z\",\"AddedDate\":\"2019-05-19T22:45:45.000Z\",\"ModifiedDate\":\"2020-04-04T08:21:10.000Z\",\"PwnCount\":161143,\"Description\":\"In May 2019, the account hijacking and SIM swapping forum \u003ca href=\\\"https://krebsonsecurity.com/2019/05/account-hijacking-forum-ogusers-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOGusers suffered a data breach\u003c/a\u003e. The breach exposed a database backup from December 2018 which was published on a rival hacking forum. There were 161k unique email addresses spread across 113k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OGUsers.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":41,\"Name\":\"Appartoo\",\"Title\":\"Appartoo\",\"Domain\":\"appartoo.com\",\"BreachDate\":\"2017-03-25T00:00:00.000Z\",\"AddedDate\":\"2019-05-02T07:07:24.000Z\",\"ModifiedDate\":\"2019-05-02T07:07:24.000Z\",\"PwnCount\":49681,\"Description\":\"In March 2017, the French Flatsharing site known as \u003ca href=\\\"https://www.appartoo.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAppartoo\u003c/a\u003e suffered a data breach. The incident exposed an extensive amount of personal information on almost 50k members including email addresses, genders, ages, private messages sent between users of the service and passwords stored as SHA-256 hashes. Appartoo advised that all subscribers were notified of the incident in early 2017.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Appartoo.png\",\"DataClasses\":[\"ages\",\"auth-tokens\",\"email-addresses\",\"employment-statuses\",\"genders\",\"ip-addresses\",\"marital-statuses\",\"names\",\"passwords\",\"physical-addresses\",\"private-messages\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":120,\"Name\":\"ClubPenguinRewritten\",\"Title\":\"Club Penguin Rewritten (January 2018)\",\"Domain\":\"cprewritten.net\",\"BreachDate\":\"2018-01-21T00:00:00.000Z\",\"AddedDate\":\"2019-04-23T05:05:16.000Z\",\"ModifiedDate\":\"2019-07-30T14:05:55.000Z\",\"PwnCount\":1688176,\"Description\":\"In January 2018, the children's gaming site \u003ca href=\\\"https://community.cprewritten.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eClub Penguin Rewritten\u003c/a\u003e (CPRewritten) suffered a data breach (note: CPRewritten is an independent recreation of Disney's Club Penguin game). The incident exposed almost 1.7 million unique email addresses alongside IP addresses, usernames and passwords stored as bcrypt hashes. When contacted, CPRewritten advised they were aware of the breach and had \u0026quot;contacted affected users\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ClubPenguinRewritten.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":382,\"Name\":\"MoreleNet\",\"Title\":\"Morele.net\",\"Domain\":\"morele.net\",\"BreachDate\":\"2018-10-10T00:00:00.000Z\",\"AddedDate\":\"2019-04-20T22:57:28.000Z\",\"ModifiedDate\":\"2019-04-20T22:57:28.000Z\",\"PwnCount\":2467304,\"Description\":\"In October 2018, the Polish e-commerce website \u003ca href=\\\"https://niebezpiecznik.pl/post/morele-potwierdza-ze-wykradziono-dane-klientow/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMorele.net suffered a data breach\u003c/a\u003e. The incident exposed almost 2.5 million unique email addresses alongside phone numbers, names and passwords stored as md5crypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MoreleNet.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":95,\"Name\":\"Bukalapak\",\"Title\":\"Bukalapak\",\"Domain\":\"bukalapak.com\",\"BreachDate\":\"2017-10-23T00:00:00.000Z\",\"AddedDate\":\"2019-04-18T01:57:35.000Z\",\"ModifiedDate\":\"2019-04-18T02:10:15.000Z\",\"PwnCount\":13369666,\"Description\":\"In March 2019, the Indonesian e-commerce website \u003ca href=\\\"https://www.bukalapak.com/blog/feature-updates/petunjuk-teknis-105502\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBukalapak discovered a data breach of the organisation's backups dating back to October 2017\u003c/a\u003e. The incident exposed approximately 13 million unique email addresses alongside IP addresses, names and passwords stored as bcrypt and salted SHA-512 hashes. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;Maxime Thalet\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bukalapak.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":150,\"Name\":\"DataCamp\",\"Title\":\"DataCamp\",\"Domain\":\"datacamp.com\",\"BreachDate\":\"2017-01-30T00:00:00.000Z\",\"AddedDate\":\"2019-04-09T04:29:55.000Z\",\"ModifiedDate\":\"2019-04-09T21:12:53.000Z\",\"PwnCount\":760561,\"Description\":\"In December 2018, the data science website \u003ca href=\\\"https://support.datacamp.com/hc/en-us/articles/360017716074-DataCamp-Security-Update-Frequently-Asked-Questions\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDataCamp suffered a data breach\u003c/a\u003e of records dating back to January 2017. The incident exposed 760k unique email and IP addresses along with names and passwords stored as bcrypt hashes. In 2019, \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe data appeared listed for sale on a dark web marketplace\u003c/a\u003e (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DataCamp.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":315,\"Name\":\"Knuddels\",\"Title\":\"Knuddels\",\"Domain\":\"knuddels.de\",\"BreachDate\":\"2018-09-05T00:00:00.000Z\",\"AddedDate\":\"2019-04-08T21:11:56.000Z\",\"ModifiedDate\":\"2019-04-08T21:11:56.000Z\",\"PwnCount\":808330,\"Description\":\"In September 2018, the German social media website \u003ca href=\\\"https://forum.knuddels.de/ubbthreads.php?ubb=showflat\u0026Number=2916081\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKnuddels suffered a data breach\u003c/a\u003e. The incident exposed 808k unique email addresses alongside usernames, real names, the city of the person and their password in plain text. Knuddels was \u003ca href=\\\"https://blog.avira.com/german-flirting-network-gets-fined-20000e-for-leaking-user-information/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esubsequently fined €20k for the breach\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Knuddels.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":154,\"Name\":\"DemonForums\",\"Title\":\"Demon Forums\",\"Domain\":\"demonforums.net\",\"BreachDate\":\"2019-02-20T00:00:00.000Z\",\"AddedDate\":\"2019-04-04T07:14:34.000Z\",\"ModifiedDate\":\"2019-04-04T07:14:34.000Z\",\"PwnCount\":52623,\"Description\":\"In February 2019, the hacking forum \u003ca href=\\\"https://demonforums.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDemon Forums\u003c/a\u003e suffered a data breach. The compromise of the vBulletin forum exposed 52k unique email addresses alongside usernames and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DemonForums.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":199,\"Name\":\"EverybodyEdits\",\"Title\":\"Everybody Edits\",\"Domain\":\"everybodyedits.com\",\"BreachDate\":\"2019-03-23T00:00:00.000Z\",\"AddedDate\":\"2019-04-03T10:50:16.000Z\",\"ModifiedDate\":\"2019-04-03T10:55:58.000Z\",\"PwnCount\":871190,\"Description\":\"In March 2019, the multiplayer platform game \u003ca href=\\\"https://everybodyedits.wordpress.com/2019/03/28/everybody-edits-data-security-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEverybody Edits suffered a data breach\u003c/a\u003e. The incident exposed 871k unique email addresses alongside usernames and IP addresses. The data was subsequently distributed online across a collection of files.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EverybodyEdits.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":297,\"Name\":\"Intelimost\",\"Title\":\"Intelimost\",\"Domain\":\"intelimost.com\",\"BreachDate\":\"2019-03-10T00:00:00.000Z\",\"AddedDate\":\"2019-04-02T20:52:19.000Z\",\"ModifiedDate\":\"2019-04-02T20:52:19.000Z\",\"PwnCount\":3073409,\"Description\":\"In March 2019, \u003ca href=\\\"https://techcrunch.com/2019/04/02/inside-a-spam-operation/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea spam operation known as \u0026quot;Intelimost\u0026quot; sent millions of emails appearing to come from people the recipients knew\u003c/a\u003e. Security researcher \u003ca href=\\\"https://securitydiscovery.com/massive-spam-operation-uncovered-in-a-database-leak/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBob Diachenko found over 3 million unique email addresses in an exposed Elasticsearch database\u003c/a\u003e, alongside plain text passwords used to access the victim's mailbox and customise the spam.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":623,\"Name\":\"Whitepages\",\"Title\":\"Whitepages\",\"Domain\":\"whitepages.com\",\"BreachDate\":\"2016-06-27T00:00:00.000Z\",\"AddedDate\":\"2019-03-27T01:50:45.000Z\",\"ModifiedDate\":\"2019-03-27T01:50:45.000Z\",\"PwnCount\":11657763,\"Description\":\"In mid-2016, the telephone and address directory service \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWhitepages was among a raft of sites that were breached and their data then sold in early-2019\u003c/a\u003e. The data included over 11 million unique email addresses alongside names and passwords stored as either a SHA-1 or bcrypt hash. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Whitepages.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":8,\"Name\":\"500px\",\"Title\":\"500px\",\"Domain\":\"500px.com\",\"BreachDate\":\"2018-07-05T00:00:00.000Z\",\"AddedDate\":\"2019-03-25T08:01:09.000Z\",\"ModifiedDate\":\"2019-03-25T08:01:09.000Z\",\"PwnCount\":14867999,\"Description\":\"In mid-2018, the online photography community \u003ca href=\\\"https://support.500px.com/hc/en-us/articles/360017752493-Security-Issue-February-2019-FAQ\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e500px suffered a data breach\u003c/a\u003e. The incident exposed almost 15 million unique email addresses alongside names, usernames, genders, dates of birth and either an MD5 or bcrypt password hash. In 2019, \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe data appeared listed for sale on a dark web marketplace\u003c/a\u003e (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/500px.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":86,\"Name\":\"Bookmate\",\"Title\":\"Bookmate\",\"Domain\":\"bookmate.com\",\"BreachDate\":\"2018-07-08T00:00:00.000Z\",\"AddedDate\":\"2019-03-22T16:25:58.000Z\",\"ModifiedDate\":\"2019-03-22T16:25:58.000Z\",\"PwnCount\":3830916,\"Description\":\"In mid-2018, the social ebook subscription service \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBookmate was among a raft of sites that were breached and their data then sold in early-2019\u003c/a\u003e. The data included almost 4 million unique email addresses alongside names, genders, dates of birth and passwords stored as salted SHA-512 hashes. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bookmate.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":266,\"Name\":\"HauteLook\",\"Title\":\"HauteLook\",\"Domain\":\"hautelook.com\",\"BreachDate\":\"2018-08-07T00:00:00.000Z\",\"AddedDate\":\"2019-03-21T21:57:32.000Z\",\"ModifiedDate\":\"2019-03-21T21:57:32.000Z\",\"PwnCount\":28510459,\"Description\":\"In mid-2018, the fashion shopping site \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHauteLook was among a raft of sites that were breached and their data then sold in early-2019\u003c/a\u003e. The data included over 28 million unique email addresses alongside names, genders, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HauteLook.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":10,\"Name\":\"8fit\",\"Title\":\"8fit\",\"Domain\":\"8fit.com\",\"BreachDate\":\"2018-07-01T00:00:00.000Z\",\"AddedDate\":\"2019-03-21T18:50:00.000Z\",\"ModifiedDate\":\"2019-03-21T18:50:00.000Z\",\"PwnCount\":15025407,\"Description\":\"In July 2018, the health and fitness service \u003ca href=\\\"https://8fit.zendesk.com/hc/en-us/articles/360017746394-Notice\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e8fit suffered a data breach\u003c/a\u003e. The data subsequently appeared for sale on a dark web marketplace in February 2019 and included over 15M unique email addresses alongside names, genders, IP addresses and passwords stored as bcrypt hashes. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/8fit.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":300,\"Name\":\"ixigo\",\"Title\":\"ixigo\",\"Domain\":\"ixigo.com\",\"BreachDate\":\"2019-01-03T00:00:00.000Z\",\"AddedDate\":\"2019-03-17T13:27:11.000Z\",\"ModifiedDate\":\"2019-03-17T13:27:11.000Z\",\"PwnCount\":17204697,\"Description\":\"In January 2019, the travel and hotel booking site \u003ca href=\\\"https://techcrunch.com/2019/02/14/hacker-strikes-again/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eixigo suffered a data breach\u003c/a\u003e. The data appeared for sale on a dark web marketplace the following month and included over 17M unique email addresses alongside names, genders, phone numbers, connections to Facebook profiles and passwords stored as MD5 hashes. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ixigo.png\",\"DataClasses\":[\"auth-tokens\",\"device-information\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"salutations\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":280,\"Name\":\"Houzz\",\"Title\":\"Houzz\",\"Domain\":\"houzz.com\",\"BreachDate\":\"2018-05-23T00:00:00.000Z\",\"AddedDate\":\"2019-03-12T20:57:35.000Z\",\"ModifiedDate\":\"2019-03-12T20:57:35.000Z\",\"PwnCount\":48881308,\"Description\":\"In mid-2018, the housing design website \u003ca href=\\\"https://help.houzz.com/s/article/security-update?language=en_US\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHouzz suffered a data breach\u003c/a\u003e. The company learned of the incident later that year then disclosed it to impacted members in February 2019. Almost 49 million unique email addresses were in the breach alongside names, IP addresses, geographic locations and either salted hashes of passwords or links to social media profiles used to authenticate to the service. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Houzz.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":601,\"Name\":\"VerificationsIO\",\"Title\":\"Verifications.io\",\"Domain\":\"verifications.io\",\"BreachDate\":\"2019-02-25T00:00:00.000Z\",\"AddedDate\":\"2019-03-09T19:29:54.000Z\",\"ModifiedDate\":\"2019-03-09T20:49:51.000Z\",\"PwnCount\":763117241,\"Description\":\"In February 2019, the email address validation service \u003ca href=\\\"https://securitydiscovery.com/800-million-emails-leaked-online-by-email-verification-service\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003everifications.io suffered a data breach\u003c/a\u003e. Discovered by \u003ca href=\\\"https://twitter.com/mayhemdayone\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBob Diachenko\u003c/a\u003e and \u003ca href=\\\"https://twitter.com/vinnytroia\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVinny Troia\u003c/a\u003e, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although \u003ca href=\\\"https://web.archive.org/web/20190227230352/https://verifications.io/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ean archived copy remains viewable\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VerificationsIO.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"employers\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":504,\"Name\":\"ShareThis\",\"Title\":\"ShareThis\",\"Domain\":\"sharethis.com\",\"BreachDate\":\"2018-07-09T00:00:00.000Z\",\"AddedDate\":\"2019-03-03T06:31:39.000Z\",\"ModifiedDate\":\"2019-03-12T21:00:14.000Z\",\"PwnCount\":40960499,\"Description\":\"In July 2018, the social bookmarking and sharing service \u003ca href=\\\"https://www.sharethis.com/data-privacy-incident/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShareThis suffered a data breach\u003c/a\u003e. The incident exposed 41 million unique email addresses alongside names and in some cases, dates of birth and password hashes. In 2019, \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe data appeared listed for sale on a dark web marketplace\u003c/a\u003e (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ShareThis.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":172,\"Name\":\"Dubsmash\",\"Title\":\"Dubsmash\",\"Domain\":\"dubsmash.com\",\"BreachDate\":\"2018-12-01T00:00:00.000Z\",\"AddedDate\":\"2019-02-25T08:35:58.000Z\",\"ModifiedDate\":\"2019-02-25T08:35:58.000Z\",\"PwnCount\":161749950,\"Description\":\"In December 2018, the video messaging service \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDubsmash suffered a data breach\u003c/a\u003e. The incident exposed 162 million unique email addresses alongside usernames and PBKDF2 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dubsmash.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"phone-numbers\",\"spoken-languages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":390,\"Name\":\"MyFitnessPal\",\"Title\":\"MyFitnessPal\",\"Domain\":\"myfitnesspal.com\",\"BreachDate\":\"2018-02-01T00:00:00.000Z\",\"AddedDate\":\"2019-02-21T19:28:46.000Z\",\"ModifiedDate\":\"2019-02-21T20:00:56.000Z\",\"PwnCount\":143606147,\"Description\":\"In February 2018, the diet and exercise service \u003ca href=\\\"https://content.myfitnesspal.com/security-information/FAQ.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMyFitnessPal suffered a data breach\u003c/a\u003e. The incident exposed 144 million unique email addresses alongside usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes (the former for earlier accounts, the latter for newer accounts). In 2019, \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe data appeared listed for sale on a dark web marketplace\u003c/a\u003e (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MyFitnessPal.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":391,\"Name\":\"MyHeritage\",\"Title\":\"MyHeritage\",\"Domain\":\"myheritage.com\",\"BreachDate\":\"2017-10-26T00:00:00.000Z\",\"AddedDate\":\"2019-02-20T21:04:04.000Z\",\"ModifiedDate\":\"2019-02-20T21:04:04.000Z\",\"PwnCount\":91991358,\"Description\":\"In October 2017, the genealogy website \u003ca href=\\\"https://blog.myheritage.com/2018/06/myheritage-statement-about-a-cybersecurity-incident/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMyHeritage suffered a data breach\u003c/a\u003e. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe data appeared listed for sale on a dark web marketplace\u003c/a\u003e (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it be attributed to \u0026quot;BenjaminBlue@exploit.im\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MyHeritage.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":208,\"Name\":\"EyeEm\",\"Title\":\"EyeEm\",\"Domain\":\"eyeem.com\",\"BreachDate\":\"2018-02-28T00:00:00.000Z\",\"AddedDate\":\"2019-02-16T07:17:45.000Z\",\"ModifiedDate\":\"2019-02-16T07:17:45.000Z\",\"PwnCount\":19611022,\"Description\":\"In February 2018, \u003ca href=\\\"https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ephotography website EyeEm suffered a data breach\u003c/a\u003e. The breach was identified among a collection of other large incidents and exposed almost 20M unique email addresses, names, usernames, bios and password hashes. The data was provided to HIBP by a source who asked for it to be attributed to \u0026quot;Kuroi'sh or Gabriel Kimiaie-Asadi Bildstein\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EyeEm.png\",\"DataClasses\":[\"bios\",\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":157,\"Name\":\"devkitPro\",\"Title\":\"devkitPro\",\"Domain\":\"devkitpro.org\",\"BreachDate\":\"2019-02-03T00:00:00.000Z\",\"AddedDate\":\"2019-02-11T07:21:44.000Z\",\"ModifiedDate\":\"2019-02-11T07:21:44.000Z\",\"PwnCount\":1508,\"Description\":\"In February 2019, \u003ca href=\\\"https://devkitpro.org/viewtopic.php?f=13\u0026t=8846\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe devkitPro forum suffered a data breach\u003c/a\u003e. The phpBB based forum had 1,508 unique email addresses exposed in the breach alongside forum posts, private messages and passwords stored as weak salted hashes. The data breach was self-submitted to HIBP by the forum operator.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/devkitPro.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"private-messages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":126,\"Name\":\"Collection1\",\"Title\":\"Collection #1\",\"Domain\":\"\",\"BreachDate\":\"2019-01-07T00:00:00.000Z\",\"AddedDate\":\"2019-01-16T21:46:07.000Z\",\"ModifiedDate\":\"2019-01-16T21:50:21.000Z\",\"PwnCount\":772904991,\"Description\":\"In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 \u003cem\u003ebillion\u003c/em\u003e records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post \u003ca href=\\\"https://www.troyhunt.com/the-773-million-record-collection-1-data-reach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eThe 773 Million Record \\\"Collection #1\\\" Data Breach\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":211,\"Name\":\"FaceUP\",\"Title\":\"FaceUP\",\"Domain\":\"faceup.dk\",\"BreachDate\":\"2013-01-01T00:00:00.000Z\",\"AddedDate\":\"2019-01-13T09:50:41.000Z\",\"ModifiedDate\":\"2019-01-13T09:50:41.000Z\",\"PwnCount\":87633,\"Description\":\"In 2013, the Danish social media site \u003ca href=\\\"https://faceup.dk/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFaceUP\u003c/a\u003e suffered a data breach. The incident exposed 87k unique email addresses alongside genders, dates of birth, names, phone numbers and passwords stored as unsalted MD5 hashes. When notified of the incident, FaceUP advised they had identified a SQL injection vulnerability at the time and forced password resets on impacted customers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FaceUP.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":145,\"Name\":\"Dangdang\",\"Title\":\"Dangdang\",\"Domain\":\"dangdang.com\",\"BreachDate\":\"2011-06-01T00:00:00.000Z\",\"AddedDate\":\"2019-01-10T11:15:51.000Z\",\"ModifiedDate\":\"2019-01-10T11:24:06.000Z\",\"PwnCount\":4848734,\"Description\":\"In 2011, the Chinese e-commerce site \u003ca href=\\\"https://www.marbridgeconsulting.com/marbridgedaily/2011-12-29/article/52564/rumor_dangdang_alipay_suffer_data_breaches\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDangdang suffered a data breach\u003c/a\u003e. The incident exposed over 4.8 million unique email addresses which were subsequently traded online over the ensuing years.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dangdang.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":60,\"Name\":\"BannerBit\",\"Title\":\"BannerBit\",\"Domain\":\"bannerbit.com\",\"BreachDate\":\"2018-12-29T00:00:00.000Z\",\"AddedDate\":\"2019-01-08T10:56:34.000Z\",\"ModifiedDate\":\"2019-01-08T10:56:34.000Z\",\"PwnCount\":213415,\"Description\":\"In approximately December 2018, the online ad platform \u003ca href=\\\"https://bannerbit.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBannerBit\u003c/a\u003e suffered a data breach. Containing 213k unique email addresses and plain text passwords, the data was provided to HIBP by a third party. Multiple attempts were made to contact BannerBit, but no response was received.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BannerBit.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":81,\"Name\":\"BlankMediaGames\",\"Title\":\"BlankMediaGames\",\"Domain\":\"blankmediagames.com\",\"BreachDate\":\"2018-12-28T00:00:00.000Z\",\"AddedDate\":\"2019-01-02T05:52:56.000Z\",\"ModifiedDate\":\"2019-01-02T06:03:19.000Z\",\"PwnCount\":7633234,\"Description\":\"In December 2018, the Town of Salem website produced by \u003ca href=\\\"https://blog.dehashed.com/town-of-salem-blankmediagames-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBlankMediaGames suffered a data breach\u003c/a\u003e. Reported to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDeHashed\u003c/a\u003e, the data contained 7.6M unique user email addresses alongside usernames, IP addresses, purchase histories and passwords stored as phpass hashes. DeHashed made multiple attempts to contact BlankMediaGames over various channels and many days but had yet to receive a response at the time of publishing.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BlankMediaGames.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"purchases\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":255,\"Name\":\"GoldSilver\",\"Title\":\"GoldSilver\",\"Domain\":\"goldsilver.com\",\"BreachDate\":\"2018-10-21T00:00:00.000Z\",\"AddedDate\":\"2018-12-27T08:49:18.000Z\",\"ModifiedDate\":\"2018-12-27T08:51:50.000Z\",\"PwnCount\":242715,\"Description\":\"In October 2018, the bullion education and dealer services site \u003ca href=\\\"https://goldsilver.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGoldSilver\u003c/a\u003e suffered a data breach that exposed 243k unique email addresses spanning customers and mailing list subscribers. An extensive amount of personal information on customers was obtained including names, addresses, phone numbers, purchases and passwords and answers to security questions stored as MD5 hashes. In a small number of cases, passport, social security numbers and partial credit card data was also exposed. The data breach and source code belonging to GoldSilver was publicly posted on a dark web service where it remained months later. When notified about the incident, GoldSilver advised that \u0026quot;all affected customers have been directly notified\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GoldSilver.png\",\"DataClasses\":[\"bank-account-numbers\",\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"passport-numbers\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"security-questions-and-answers\",\"social-security-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":358,\"Name\":\"Mappery\",\"Title\":\"Mappery\",\"Domain\":\"mappery.com\",\"BreachDate\":\"2018-12-11T00:00:00.000Z\",\"AddedDate\":\"2018-12-18T16:19:50.000Z\",\"ModifiedDate\":\"2018-12-18T16:19:50.000Z\",\"PwnCount\":205242,\"Description\":\"In December 2018, the mapping website \u003ca href=\\\"http://www.mappery.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMappery\u003c/a\u003e suffered a data breach that exposed over 205k unique email addresses. The incident also exposed usernames, the geographic location of the user and passwords stored as unsalted SHA-1 hashes. No response was received from Mappery when contacted about the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mappery.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":83,\"Name\":\"BombujEu\",\"Title\":\"Bombuj.eu\",\"Domain\":\"bombuj.eu\",\"BreachDate\":\"2018-12-07T00:00:00.000Z\",\"AddedDate\":\"2018-12-10T14:04:47.000Z\",\"ModifiedDate\":\"2018-12-10T14:04:47.000Z\",\"PwnCount\":575437,\"Description\":\"In December 2018, the Slovak website for watching movies online for free \u003ca href=\\\"https://www.bombuj.eu\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBombuj.eu\u003c/a\u003e suffered a data breach. The incident exposed over 575k unique email addresses and passwords stored as unsalted MD5 hashes. No response was received from Bombuj.eu when contacted about the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BombujEu.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":283,\"Name\":\"Hub4Tech\",\"Title\":\"Hub4Tech\",\"Domain\":\"hub4tech.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2018-12-09T22:40:51.000Z\",\"ModifiedDate\":\"2018-12-09T22:43:38.000Z\",\"PwnCount\":36916,\"Description\":\"On an unknown date in approximately 2017, the Indian training and assessment service known as \u003ca href=\\\"https://www.forumcommunity.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHub4Tech\u003c/a\u003e suffered a data breach via a SQL injection attack. The incident exposed almost 37k unique email addresses and passwords stored as unsalted MD5 hashes. No response was received from Hub4Tech when contacted about the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Hub4Tech.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":652,\"Name\":\"YouveBeenScraped\",\"Title\":\"You've Been Scraped\",\"Domain\":\"\",\"BreachDate\":\"2018-10-05T00:00:00.000Z\",\"AddedDate\":\"2018-12-06T19:11:27.000Z\",\"ModifiedDate\":\"2018-12-06T19:11:27.000Z\",\"PwnCount\":66147869,\"Description\":\"In October and November 2018, \u003ca href=\\\"https://blog.hackenproof.com/industry-news/new-report-unknown-data-scraper-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esecurity researcher Bob Diachenko identified several unprotected MongoDB instances believed to be hosted by a data aggregator\u003c/a\u003e. Containing a total of over 66M records, the owner of the data couldn't be identified but it is believed to have been scraped from LinkedIn hence the title \u0026quot;You've Been Scraped\u0026quot;. The exposed records included names, both work and personal email addresses, job titles and links to the individuals' LinkedIn profiles.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"geographic-locations\",\"job-titles\",\"names\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":24,\"Name\":\"AerServ\",\"Title\":\"AerServ\",\"Domain\":\"aerserv.com\",\"BreachDate\":\"2018-04-01T00:00:00.000Z\",\"AddedDate\":\"2018-12-06T02:58:12.000Z\",\"ModifiedDate\":\"2018-12-06T02:58:12.000Z\",\"PwnCount\":66308,\"Description\":\"In April 2018, the ad management platform known as \u003ca href=\\\"https://www.aerserv.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAerServ\u003c/a\u003e suffered a data breach. Acquired by InMobi earlier in the year, the AerServ breach impacted over 66k unique email addresses and also included contact information and passwords stored as salted SHA-512 hashes. The data was publicly posted to Twitter later in 2018 after which InMobi was notified and advised they were aware of the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AerServ.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":228,\"Name\":\"ForumCommunity\",\"Title\":\"ForumCommunity\",\"Domain\":\"forumcommunity.net\",\"BreachDate\":\"2016-06-01T00:00:00.000Z\",\"AddedDate\":\"2018-12-05T05:04:45.000Z\",\"ModifiedDate\":\"2018-12-05T07:29:20.000Z\",\"PwnCount\":776648,\"Description\":\"In approximately mid-2016, the Italian-based service for creating forums known as \u003ca href=\\\"https://www.forumcommunity.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eForumCommunity\u003c/a\u003e suffered a data breach. The incident impacted over 776k unique email addresses along with usernames and unsalted MD5 password hashes. No response was received from ForumCommunity when contacted.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ForumCommunity.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":552,\"Name\":\"Technic\",\"Title\":\"Technic\",\"Domain\":\"technicpack.net\",\"BreachDate\":\"2018-11-30T00:00:00.000Z\",\"AddedDate\":\"2018-12-04T02:32:35.000Z\",\"ModifiedDate\":\"2018-12-04T02:32:35.000Z\",\"PwnCount\":265410,\"Description\":\"In November 2018, the Minecraft modpack platform known as \u003ca href=\\\"https://www.technicpack.net/article/forums-database-breach.149\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTechnic suffered a data breach\u003c/a\u003e. Technic promptly disclosed the breach and advised that the impacted data included over 265k unique users' email and IP addresses, chat logs, private messages and \u003ca href=\\\"https://twitter.com/PedroACunha/status/1069740224497020929\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epasswords stored as bcrypt hashes with a work factor of 13\u003c/a\u003e. Technic self-submitted the breach to HIBP.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Technic.png\",\"DataClasses\":[\"chat-logs\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"time-zones\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":147,\"Name\":\"DataAndLeads\",\"Title\":\"Data \u0026 Leads\",\"Domain\":\"datanleads.com\",\"BreachDate\":\"2018-11-14T00:00:00.000Z\",\"AddedDate\":\"2018-11-28T19:32:19.000Z\",\"ModifiedDate\":\"2018-11-28T19:32:19.000Z\",\"PwnCount\":44320330,\"Description\":\"In November 2018, \u003ca href=\\\"https://blog.hackenproof.com/industry-news/new-data-breach-exposes-57-million-records\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esecurity researcher Bob Diachenko identified an unprotected database believed to be hosted by a data aggregator\u003c/a\u003e. Upon further investigation, the data was linked to marketing company \u003ca href=\\\"http://web.archive.org/web/20180925092401/https://www.datanleads.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eData \u0026amp; Leads\u003c/a\u003e. The exposed Elasticsearch instance contained over 44M unique email addresses along with names, IP and physical addresses, phone numbers and employment information. No response was received from Data \u0026amp; Leads when contacted by Bob and their site subsequently went offline.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"ip-addresses\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":17,\"Name\":\"Adapt\",\"Title\":\"Adapt\",\"Domain\":\"adapt.io\",\"BreachDate\":\"2018-11-05T00:00:00.000Z\",\"AddedDate\":\"2018-11-22T19:43:06.000Z\",\"ModifiedDate\":\"2018-11-22T19:43:06.000Z\",\"PwnCount\":9363740,\"Description\":\"In November 2018, \u003ca href=\\\"https://blog.hackenproof.com/industry-news/another-decision-makers-database-leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esecurity researcher Bob Diachenko identified an unprotected database hosted by data aggregator \u0026quot;Adapt\u0026quot;\u003c/a\u003e. A provider of \u0026quot;Fresh Quality Contacts\u0026quot;, the service exposed over 9.3M unique records of individuals and employer information including their names, employers, job titles, contact information and data relating to the employer including organisation description, size and revenue. No response was received from Adapt when contacted.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Adapt.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":282,\"Name\":\"HTHStudios\",\"Title\":\"HTH Studios\",\"Domain\":\"hthstudios.com\",\"BreachDate\":\"2018-08-24T00:00:00.000Z\",\"AddedDate\":\"2018-11-20T21:22:09.000Z\",\"ModifiedDate\":\"2020-08-07T03:20:56.000Z\",\"PwnCount\":411755,\"Description\":\"In August 2018, the adult furry interactive game creator \u003ca href=\\\"https://hthstudios.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHTH Studios\u003c/a\u003e suffered a data breach impacting multiple repositories of customer data. Several months later, the data surfaced on a popular hacking forum and included 411k unique email addresses along with physical and IP addresses, names, orders, salted SHA-1 and salted MD5 hashes. HTH Studios is aware of the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HTHStudios.png\",\"DataClasses\":[\"browser-user-agent-details\",\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":184,\"Name\":\"ElasticsearchSalesLeads\",\"Title\":\"Elasticsearch Instance of Sales Leads on AWS\",\"Domain\":\"\",\"BreachDate\":\"2018-10-29T00:00:00.000Z\",\"AddedDate\":\"2018-11-17T09:04:54.000Z\",\"ModifiedDate\":\"2018-11-18T03:30:53.000Z\",\"PwnCount\":5788169,\"Description\":\"In October 2018, \u003ca href=\\\"https://blog.hacken.io/how-sensitive-is-your-non-sensitive-data\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esecurity researcher Bob Diachenko identified multiple exposed databases with hundreds of millions of records\u003c/a\u003e. One of those datasets was an Elasticsearch instance on AWS containing sales lead data and 5.8M unique email addresses. The data contained information relating to individuals and the companies they worked for including their names, email addresses and company name and contact information. Despite best efforts, it was not possible to identify the owner of the data hence this breach as been titled \u0026quot;Elasticsearch Sales Leads\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":314,\"Name\":\"KnownCircle\",\"Title\":\"KnownCircle\",\"Domain\":\"knowncircle.com\",\"BreachDate\":\"2016-04-12T00:00:00.000Z\",\"AddedDate\":\"2018-11-17T02:33:54.000Z\",\"ModifiedDate\":\"2018-11-17T02:38:15.000Z\",\"PwnCount\":1957600,\"Description\":\"In approximately April 2016, the \u0026quot;marketing automation for agents and professional service providers\u0026quot; company \u003ca href=\\\"https://web.archive.org/web/20171020171534/https://knowncircle.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKnownCircle\u003c/a\u003e had a large volume of data obtained by an external party. The data belonging to the now defunct service appeared in JSON format and contained gigabytes of data related to the real estate and insurance sectors. The personal data in the breach appears to have primarily been used for marketing purposes, including logs of emails sent and tracking of gift cards. A small number of passwords for KnownCircle staff were also present and were stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/KnownCircle.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":478,\"Name\":\"RbxRocks\",\"Title\":\"Rbx.Rocks\",\"Domain\":\"rbx.rocks\",\"BreachDate\":\"2018-08-06T00:00:00.000Z\",\"AddedDate\":\"2018-11-07T13:26:42.000Z\",\"ModifiedDate\":\"2019-07-27T14:58:29.000Z\",\"PwnCount\":149958,\"Description\":\"In August 2018, the Roblox trading site \u003ca href=\\\"https://rbx.rocks/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRbx.Rocks\u003c/a\u003e suffered a data breach. Almost 25k records were sent to HIBP in November and included names, email addresses and passwords stored as bcrypt hashes. In July 2019, a further 125k records emerged bringing the total size of the incident to 150k. The website has since gone offline with a message stating that \u0026quot;Rbx.Rocks v2.0 is currently under construction\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RbxRocks.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":521,\"Name\":\"SIAE\",\"Title\":\"Società Italiana degli Autori ed Editori\",\"Domain\":\"siae.it\",\"BreachDate\":\"2018-11-03T00:00:00.000Z\",\"AddedDate\":\"2018-11-07T04:31:14.000Z\",\"ModifiedDate\":\"2018-11-07T04:37:11.000Z\",\"PwnCount\":14609,\"Description\":\"In November 2018, the Società Italiana degli Autori ed Editori (Italian Society of Authors and Publishers, or SIAE) \u003ca href=\\\"https://www.repubblica.it/tecnologia/sicurezza/2018/11/03/news/tecnologia_altro_attacco_di_anonplus_bucato_il_sito_della_siae_e_rubati_4_giga_di_dati-210654944/?ref=search\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked, defaced and almost 4GB of data leaked publicly via Twitter\u003c/a\u003e. The data included over 14k registered users' names, email addresses and passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SIAE.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":634,\"Name\":\"WPSandbox\",\"Title\":\"WPSandbox\",\"Domain\":\"wpsandbox.io\",\"BreachDate\":\"2018-11-04T00:00:00.000Z\",\"AddedDate\":\"2018-11-06T07:26:07.000Z\",\"ModifiedDate\":\"2018-11-06T07:26:07.000Z\",\"PwnCount\":858,\"Description\":\"In November 2018, the WordPress sandboxing service that allows people to create temporary websites \u003ca href=\\\"https://wpsandbox.io/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWP Sandbox\u003c/a\u003e discovered their service was being used to host a phishing site attempting to collect Microsoft OneDrive accounts. After identifying the malicious site, WP Sandbox took it offline, contacted the 858 people who provided information to it then self-submitted their addresses to HIBP. The phishing page requested both email addresses and passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WPSandbox.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":306,\"Name\":\"JoomlArt\",\"Title\":\"JoomlArt\",\"Domain\":\"joomlart.com\",\"BreachDate\":\"2018-01-30T00:00:00.000Z\",\"AddedDate\":\"2018-11-01T03:27:26.000Z\",\"ModifiedDate\":\"2020-08-07T03:20:30.000Z\",\"PwnCount\":22477,\"Description\":\"In January 2018, the Joomla template website \u003ca href=\\\"https://www.joomlart.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJoomlArt\u003c/a\u003e inadvertently exposed more than 22k unique customer records in a Jira ticket. The exposed data was from iJoomla and JomSocial, both services that \u003ca href=\\\"https://www.joomlart.com/blog/joomlart-acquires-ijoomla-and-jomsocial\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJoomlArt acquired the previous year\u003c/a\u003e. The data included usernames, email addresses, purchases and passwords stored as MD5 hashes. When contacted, JoomlArt advised they were aware of the incident and had previously notified impacted parties.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JoomlArt.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"payment-histories\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":347,\"Name\":\"MacForums\",\"Title\":\"Mac Forums\",\"Domain\":\"mac-forums.com\",\"BreachDate\":\"2016-07-03T00:00:00.000Z\",\"AddedDate\":\"2018-10-29T23:47:44.000Z\",\"ModifiedDate\":\"2018-10-29T23:50:37.000Z\",\"PwnCount\":326714,\"Description\":\"In July 2016, the self-proclaimed \u0026quot;Ultimate Source For Your Mac\u0026quot; website \u003ca href=\\\"https://www.mac-forums.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMac Forums\u003c/a\u003e suffered a data breach. The vBulletin-based system exposed over 326k usernames, email and IP addresses, dates of birth and passwords stored as salted MD5 hashes. The data was later discovered being traded on a popular hacking forum. Mac Forums did not respond when contacted about the incident via their contact us form.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MacForums.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":58,\"Name\":\"BabyNames\",\"Title\":\"Baby Names\",\"Domain\":\"babynames.com\",\"BreachDate\":\"2008-10-24T00:00:00.000Z\",\"AddedDate\":\"2018-10-24T06:27:03.000Z\",\"ModifiedDate\":\"2018-10-24T06:27:30.000Z\",\"PwnCount\":846742,\"Description\":\"In approximately 2008, the site to help parents name their children known as \u003ca href=\\\"https://www.babynames.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBaby Names\u003c/a\u003e suffered a data breach. The incident exposed 846k email addresses and passwords stored as salted MD5 hashes. When contacted in October 2018, Baby Names advised that \u0026quot;the breach happened at least ten years ago\u0026quot; and that members were notified at the time.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BabyNames.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":626,\"Name\":\"WifeLovers\",\"Title\":\"Wife Lovers\",\"Domain\":\"wifelovers.com\",\"BreachDate\":\"2018-10-07T00:00:00.000Z\",\"AddedDate\":\"2018-10-20T20:26:13.000Z\",\"ModifiedDate\":\"2018-10-23T06:00:07.000Z\",\"PwnCount\":1274051,\"Description\":\"In October 2018, the site dedicated to posting naked photos and other erotica of wives \u003ca href=\\\"https://arstechnica.com/information-technology/2018/10/hack-on-8-adult-websites-exposes-oodles-of-intimate-user-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWife Lovers suffered a data breach\u003c/a\u003e. The underlying database supported a total of 8 different adult websites and contained over 1.2M unique email addresses. \u003ca href=\\\"https://web.archive.org/web/20181020185005/http://wifelovers.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWife Lovers acknowledged the breach\u003c/a\u003e which impacted names, usernames, email and IP addresses and passwords hashed using the weak DEScrypt algorithm. The breach has been marked as \u0026quot;sensitive\u0026quot; due to the nature of the site.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WifeLovers.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":210,\"Name\":\"Facepunch\",\"Title\":\"Facepunch\",\"Domain\":\"facepunch.com\",\"BreachDate\":\"2016-06-03T00:00:00.000Z\",\"AddedDate\":\"2018-10-17T13:15:39.000Z\",\"ModifiedDate\":\"2018-10-17T13:31:23.000Z\",\"PwnCount\":342913,\"Description\":\"In June 2016, the game development studio \u003ca href=\\\"https://facepunch.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFacepunch\u003c/a\u003e suffered a data breach that exposed 343k users. The breached data included usernames, email and IP addresses, dates of birth and salted MD5 password hashes. Facepunch advised they were aware of the incident and had notified people at the time. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Facepunch.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":40,\"Name\":\"Apollo\",\"Title\":\"Apollo\",\"Domain\":\"apollo.io\",\"BreachDate\":\"2018-07-23T00:00:00.000Z\",\"AddedDate\":\"2018-10-05T19:14:11.000Z\",\"ModifiedDate\":\"2018-10-23T04:01:48.000Z\",\"PwnCount\":125929660,\"Description\":\"$1e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Apollo.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"geographic-locations\",\"job-titles\",\"names\",\"phone-numbers\",\"salutations\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":159,\"Name\":\"Digimon\",\"Title\":\"Digimon\",\"Domain\":\"digimon.co.in\",\"BreachDate\":\"2016-09-05T00:00:00.000Z\",\"AddedDate\":\"2018-09-28T01:34:56.000Z\",\"ModifiedDate\":\"2018-09-28T01:34:56.000Z\",\"PwnCount\":7687679,\"Description\":\"In September 2016, over 16GB of logs from a service indicated to be digimon.co.in were obtained, most likely from an unprotected Mongo DB instance. The service ceased running shortly afterwards and no information remains about the precise nature of it. Based on \u003ca href=\\\"https://twitter.com/troyhunt/status/1045178309926051840\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eenquiries made via Twitter\u003c/a\u003e, it appears to have been a mail service possibly based on PowerMTA and used for delivering spam. The logs contained information including 7.7M unique email recipients (names and addresses), mail server IP addresses, email subjects and tracking information including mail opens and clicks.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\",\"ip-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":496,\"Name\":\"SaverSpy\",\"Title\":\"SaverSpy\",\"Domain\":\"\",\"BreachDate\":\"2018-09-18T00:00:00.000Z\",\"AddedDate\":\"2018-09-25T10:59:05.000Z\",\"ModifiedDate\":\"2024-07-11T19:29:17.000Z\",\"PwnCount\":2457420,\"Description\":\"In September 2018, \u003ca href=\\\"https://www.linkedin.com/pulse/another-e-marketing-database-11-million-records-bob-diachenko/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esecurity researcher Bob Diachenko discovered a massive collection of personal details exposed in an unprotected Mongo DB instance\u003c/a\u003e. The data appears to have been used in marketing campaigns (possibly for spam purposes) but had little identifying data about it other than a description of \u0026quot;Yahoo_090618_ SaverSpy\u0026quot;. The data set provided to HIBP had almost 2.5M unique email addresses (all of which were from Yahoo!) alongside names, genders and physical addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":480,\"Name\":\"RealEstateMogul\",\"Title\":\"Real Estate Mogul\",\"Domain\":\"realestatemogul.com\",\"BreachDate\":\"2016-09-06T00:00:00.000Z\",\"AddedDate\":\"2018-09-24T05:08:57.000Z\",\"ModifiedDate\":\"2018-09-24T05:08:57.000Z\",\"PwnCount\":307768,\"Description\":\"In September 2016, the real estate investment site \u003ca href=\\\"https://realestatemogul.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eReal Estate Mogul\u003c/a\u003e had a Mongo DB instance compromised and 5GB of data downloaded by an unauthorised party. The data contained real estate listings including addresses and the names, phone numbers and 308k unique email addresses of the sellers. Real Estate Mogul was advised of the incident in September 2018 and stated that they \u0026quot;found no instance of user account credentials like usernames and passwords nor billing information within this file\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RealEstateMogul.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":398,\"Name\":\"NemoWeb\",\"Title\":\"NemoWeb\",\"Domain\":\"nemoweb.net\",\"BreachDate\":\"2016-09-04T00:00:00.000Z\",\"AddedDate\":\"2018-09-19T03:53:20.000Z\",\"ModifiedDate\":\"2018-09-24T05:09:56.000Z\",\"PwnCount\":3472916,\"Description\":\"In September 2016, almost 21GB of data from the French website used for \u0026quot;standardised and decentralized means of exchange for publishing newsgroup articles\u0026quot; \u003ca href=\\\"http://www.nemoweb.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNemoWeb\u003c/a\u003e was leaked from what appears to have been an unprotected Mongo DB. The data consisted of a large volume of emails sent to the service and included almost 3.5M unique addresses, albeit many of them auto-generated. Multiple attempts were made to contact the operators of NemoWeb but no response was received.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NemoWeb.png\",\"DataClasses\":[\"email-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":309,\"Name\":\"KayoMoe\",\"Title\":\"Kayo.moe Credential Stuffing List\",\"Domain\":\"\",\"BreachDate\":\"2018-09-11T00:00:00.000Z\",\"AddedDate\":\"2018-09-13T09:37:49.000Z\",\"ModifiedDate\":\"2018-09-13T20:12:18.000Z\",\"PwnCount\":41826763,\"Description\":\"In September 2018, a collection of almost 42 million email address and plain text password pairs was uploaded to the anonymous file sharing service \u003ca href=\\\"https://kayo.moe/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ekayo.moe\u003c/a\u003e. The operator of the service contacted HIBP to report the data which, upon further investigation, turned out to be a large credential stuffing list. For more information, read about \u003ca href=\\\"https://www.troyhunt.com/the-42m-record-kayo-moe-credential-stuffing-data\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eThe 42M Record kayo.moe Credential Stuffing Data\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":495,\"Name\":\"RussianAmerica\",\"Title\":\"Russian America\",\"Domain\":\"russianamerica.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2018-09-13T04:48:08.000Z\",\"ModifiedDate\":\"2018-09-13T04:48:08.000Z\",\"PwnCount\":182717,\"Description\":\"In approximately 2017, the website for Russian speakers in America known as \u003ca href=\\\"http://www.russianamerica.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRussian America\u003c/a\u003e suffered a data breach. The incident exposed 183k unique records including names, email addresses, phone numbers and passwords stored in both plain text and as MD5 hashes. Russian America was contacted about the breach but did not respond.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RussianAmerica.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":232,\"Name\":\"FreshMenu\",\"Title\":\"FreshMenu\",\"Domain\":\"freshmenu.com\",\"BreachDate\":\"2016-07-01T00:00:00.000Z\",\"AddedDate\":\"2018-09-10T12:27:19.000Z\",\"ModifiedDate\":\"2018-09-10T12:27:19.000Z\",\"PwnCount\":110355,\"Description\":\"In July 2016, the India-based food delivery service \u003ca href=\\\"https://www.freshmenu.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFreshMenu\u003c/a\u003e suffered a data breach. The incident exposed the personal data of over 110k customers and included their names, email addresses, phone numbers, home addresses and order histories. When advised of the incident, FreshMenu acknowledged being already aware of the breach but stated they had decided not to notify impacted customers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FreshMenu.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":396,\"Name\":\"NapsGear\",\"Title\":\"NapsGear\",\"Domain\":\"napsgear.org\",\"BreachDate\":\"2015-10-21T00:00:00.000Z\",\"AddedDate\":\"2018-09-10T11:07:00.000Z\",\"ModifiedDate\":\"2018-09-10T11:07:00.000Z\",\"PwnCount\":287071,\"Description\":\"In October 2015, the anabolic steroids retailer \u003ca href=\\\"https://thinksteroids.com/community/threads/warning-naps-customer-database-compromised.134375549/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNapsGear suffered a data breach\u003c/a\u003e. An extensive amount of personal information on 287k customers was exposed including email addresses, names, addresses, phone numbers, purchase histories and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NapsGear.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":616,\"Name\":\"Warmane\",\"Title\":\"Warmane\",\"Domain\":\"warmane.com\",\"BreachDate\":\"2016-12-01T00:00:00.000Z\",\"AddedDate\":\"2018-09-08T07:54:18.000Z\",\"ModifiedDate\":\"2018-09-08T07:57:44.000Z\",\"PwnCount\":1116256,\"Description\":\"In approximately December 2016, the online service for World of Warcraft private servers \u003ca href=\\\"https://www.warmane.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWarmane\u003c/a\u003e suffered a data breach. The incident exposed over 1.1M accounts including usernames, email addresses, dates of birth and salted MD5 password hashes. The data was subsequently extensively circulated online and was later provided to HIBP by whitehat security researcher and data analyst Adam Davies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Warmane.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":383,\"Name\":\"MortalOnline\",\"Title\":\"Mortal Online\",\"Domain\":\"mortalonline.com\",\"BreachDate\":\"2018-06-17T00:00:00.000Z\",\"AddedDate\":\"2018-08-31T05:38:46.000Z\",\"ModifiedDate\":\"2018-09-24T21:05:18.000Z\",\"PwnCount\":606637,\"Description\":\"In June 2018, the massively multiplayer online role-playing game (MMORPG) \u003ca href=\\\"https://account.mortalonline.com/breach.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMortal Online suffered a data breach\u003c/a\u003e. A file containing 570k email addresses and cracked passwords was subsequently distributed online. A larger more complete file containing 607k email addresses with original unsalted MD5 password hashes along with names, usernames and physical addresses was later provided and the original breach in HIBP was updated accordingly. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MortalOnline.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":543,\"Name\":\"SvenskaMagic\",\"Title\":\"SvenskaMagic\",\"Domain\":\"svenskamagic.com\",\"BreachDate\":\"2015-07-01T00:00:00.000Z\",\"AddedDate\":\"2018-08-30T05:05:04.000Z\",\"ModifiedDate\":\"2018-08-30T05:08:09.000Z\",\"PwnCount\":30327,\"Description\":\"Sometime in 2015, the Swedish magic website \u003ca href=\\\"https://www.svenskamagic.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSvenskaMagic\u003c/a\u003e suffered a data breach that exposed over 30k records. The compromised data included usernames, email addresses and MD5 password hashes. The data was self-submitted to HIBP by SvenskaMagic.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SvenskaMagic.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":51,\"Name\":\"AtlasQuantum\",\"Title\":\"Atlas Quantum\",\"Domain\":\"atlasquantum.com\",\"BreachDate\":\"2018-08-25T00:00:00.000Z\",\"AddedDate\":\"2018-08-27T01:42:34.000Z\",\"ModifiedDate\":\"2018-08-28T21:17:47.000Z\",\"PwnCount\":261463,\"Description\":\"In August 2018, the cryptocurrency investment platform \u003ca href=\\\"https://www.facebook.com/notes/atlas-quantum/comunicado-importante/2196456297259749/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAtlas Quantum suffered a data breach\u003c/a\u003e. The breach leaked the personal data of 261k investors on the platform including their names, phone numbers, email addresses and account balances.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AtlasQuantum.png\",\"DataClasses\":[\"account-balances\",\"email-addresses\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":527,\"Name\":\"SpyFone\",\"Title\":\"SpyFone\",\"Domain\":\"spyfone.com\",\"BreachDate\":\"2018-08-16T00:00:00.000Z\",\"AddedDate\":\"2018-08-24T04:36:24.000Z\",\"ModifiedDate\":\"2024-07-11T19:29:17.000Z\",\"PwnCount\":44109,\"Description\":\"In August 2018, the spyware company \u003ca href=\\\"https://motherboard.vice.com/en_us/article/9kmj4v/spyware-company-spyfone-terabytes-data-exposed-online-leak\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSpyFone left terabytes of data publicly exposed\u003c/a\u003e. Collected surreptitiously whilst the targets were using their devices, the data included photos, audio recordings, text messages and browsing history which were then exposed via a number of misconfigurations within SpyFone's systems. The data belonged the thousands of SpyFone customers and included 44k unique email addresses, many likely belonging to people the targeted phones had contact with.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SpyFone.png\",\"DataClasses\":[\"audio-recordings\",\"browsing-histories\",\"device-information\",\"email-addresses\",\"geographic-locations\",\"imei-numbers\",\"ip-addresses\",\"names\",\"passwords\",\"photos\",\"sms-messages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":389,\"Name\":\"MyFHA\",\"Title\":\"MyFHA\",\"Domain\":\"myfha.net\",\"BreachDate\":\"2015-02-18T00:00:00.000Z\",\"AddedDate\":\"2018-08-09T20:26:35.000Z\",\"ModifiedDate\":\"2018-08-09T20:26:35.000Z\",\"PwnCount\":972629,\"Description\":\"In approximately February 2015, the home financing website \u003ca href=\\\"https://web.archive.org/web/20180324231131/http://myfha.net/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMyFHA\u003c/a\u003e suffered a data breach which disclosed the personal information of nearly 1 million people. The data included extensive personal information relating to home financing including personal contact info, credit statuses, household incomes, loan amounts and notes on personal circumstances, often referring to legal issues, divorces and health conditions. Multiple parties contacted HIBP with the data after which MyFHA was alerted in mid-July and acknowledged the legitimacy of the breach then took the site offline.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MyFHA.png\",\"DataClasses\":[\"credit-status-information\",\"email-addresses\",\"income-levels\",\"ip-addresses\",\"loan-information\",\"names\",\"passwords\",\"personal-descriptions\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":319,\"Name\":\"Lanwar\",\"Title\":\"Lanwar\",\"Domain\":\"lanwar.com\",\"BreachDate\":\"2018-07-28T00:00:00.000Z\",\"AddedDate\":\"2018-08-08T02:57:06.000Z\",\"ModifiedDate\":\"2018-08-08T02:57:06.000Z\",\"PwnCount\":45120,\"Description\":\"In July 2018, staff of \u003ca href=\\\"https://lanwar.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Lanwar gaming site\u003c/a\u003e discovered a data breach they believe dates back to sometime over the previous several months. The data contained 45k names, email addresses, usernames and plain text passwords. A Lanwar staff member self-submitted the breach to HIBP and has also contacted the relevant authorities about the incident after identifying a phishing attempt to extort Bitcoin from a user.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lanwar.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":23,\"Name\":\"AdultFanFiction\",\"Title\":\"Adult-FanFiction.Org\",\"Domain\":\"adult-fanfiction.org\",\"BreachDate\":\"2018-05-30T00:00:00.000Z\",\"AddedDate\":\"2018-08-06T08:56:03.000Z\",\"ModifiedDate\":\"2018-08-06T08:56:03.000Z\",\"PwnCount\":186082,\"Description\":\"In May 2018, the website for sharing adult-orientated works of fiction known as \u003ca href=\\\"http://www.adult-fanfiction.org\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAdult-FanFiction.Org\u003c/a\u003e had 186k records exposed in a data breach. The data contained names, email addresses, dates of birth and passwords stored as \u003cem\u003eboth\u003c/em\u003e MD5 hashes and plain text. AFF did not respond when contacted about the breach and the site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AdultFanFiction.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":216,\"Name\":\"WhiteRoom\",\"Title\":\"Fashion Nexus\",\"Domain\":\"fashionnexus.co.uk\",\"BreachDate\":\"2018-07-09T00:00:00.000Z\",\"AddedDate\":\"2018-07-31T08:20:54.000Z\",\"ModifiedDate\":\"2018-07-31T08:20:54.000Z\",\"PwnCount\":1279263,\"Description\":\"In July 2018, UK-based ecommerce company \u003ca href=\\\"https://www.grahamcluley.com/online-fashion-shoppers-exposed-ecommerce-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFashion Nexus suffered a data breach which exposed 1.4 million records\u003c/a\u003e. Multiple websites developed by sister company White Room Solutions were impacted in the breach amongst which were sites including \u003ca href=\\\"https://jadedldn.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJaded London\u003c/a\u003e and \u003ca href=\\\"http://axparis.co.uk\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAX Paris\u003c/a\u003e. The various sites exposed in the incident included a range of different data types including names, phone numbers, addresses and passwords stored as a mix of salted MD5 and SHA-1 as well as unsalted MD5 passwords. When asked by reporter Graham Cluley if a public statement on the incident was available, a one-word response of \u0026quot;No\u0026quot; was received.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WhiteRoom.png\",\"DataClasses\":[\"browser-user-agent-details\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":324,\"Name\":\"LeagueOfLegends\",\"Title\":\"League of Legends\",\"Domain\":\"leagueoflegends.com\",\"BreachDate\":\"2012-06-11T00:00:00.000Z\",\"AddedDate\":\"2018-07-28T21:52:12.000Z\",\"ModifiedDate\":\"2018-07-28T21:52:12.000Z\",\"PwnCount\":339487,\"Description\":\"In June 2012, the multiplayer online game \u003ca href=\\\"https://www.cio.com/article/2395205/security0/european-league-of-legends-game-players-have-their-account-data-compromised.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLeague of Legends suffered a data breach\u003c/a\u003e. At the time, the service had more than 32 million registered accounts and the breach affected various personal data attributes including \u0026quot;encrypted\u0026quot; passwords. In 2018, a 339k record subset of the data emerged with email addresses, usernames and plain text passwords, likely cracked from the original cryptographically protected ones.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LeagueOfLegends.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":202,\"Name\":\"Exactis\",\"Title\":\"Exactis\",\"Domain\":\"exactis.com\",\"BreachDate\":\"2018-06-01T00:00:00.000Z\",\"AddedDate\":\"2018-07-25T20:00:44.000Z\",\"ModifiedDate\":\"2018-07-25T20:00:44.000Z\",\"PwnCount\":131577763,\"Description\":\"In June 2018, \u003ca href=\\\"https://www.wired.com/story/exactis-database-leak-340-million-records/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe marketing firm Exactis inadvertently publicly leaked 340 million records of personal data\u003c/a\u003e. Security researcher \u003ca href=\\\"https://www.nightlionsecurity.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVinny Troia of Night Lion Security\u003c/a\u003e discovered the leak contained multiple terabytes of personal information spread across hundreds of separate fields including addresses, phone numbers, family structures and extensive profiling data. The data was collected as part of Exactis' service as a \u0026quot;compiler and aggregator of premium business \u0026amp; consumer data\u0026quot; which they then sell for profiling and marketing purposes. A small subset of the exposed fields were provided to Have I Been Pwned and contained 132 million unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Exactis.png\",\"DataClasses\":[\"credit-status-information\",\"dates-of-birth\",\"education-levels\",\"email-addresses\",\"ethnicities\",\"family-structure\",\"financial-investments\",\"genders\",\"home-ownership-statuses\",\"income-levels\",\"ip-addresses\",\"marital-statuses\",\"names\",\"net-worths\",\"occupations\",\"personal-interests\",\"phone-numbers\",\"physical-addresses\",\"religions\",\"spoken-languages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":235,\"Name\":\"FunnyGames\",\"Title\":\"Funny Games\",\"Domain\":\"funny-games.biz\",\"BreachDate\":\"2018-04-28T00:00:00.000Z\",\"AddedDate\":\"2018-07-24T03:01:35.000Z\",\"ModifiedDate\":\"2018-07-24T03:01:35.000Z\",\"PwnCount\":764357,\"Description\":\"In April 2018, the online entertainment site \u003ca href=\\\"https://www.funny-games.biz/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFunny Games\u003c/a\u003e suffered a data breach that disclosed 764k records including usernames, email and IP addresses and salted MD5 password hashes. The incident was disclosed to Funny Games in July who acknowledged the breach and identified it had been caused by legacy code no longer in use. The record count in the breach constitute approximately half of the user base.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FunnyGames.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":437,\"Name\":\"Pemiblanc\",\"Title\":\"Pemiblanc\",\"Domain\":\"pemiblanc.com\",\"BreachDate\":\"2018-04-02T00:00:00.000Z\",\"AddedDate\":\"2018-07-09T22:16:26.000Z\",\"ModifiedDate\":\"2018-07-09T22:16:26.000Z\",\"PwnCount\":110964206,\"Description\":\"In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as \u003ca href=\\\"https://www.troyhunt.com/the-111-million-pemiblanc-credential-stuffing-list\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePemiblanc\u003c/a\u003e was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. \u003ca href=\\\"https://www.troyhunt.com/the-111-million-pemiblanc-credential-stuffing-list\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about the incident.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":647,\"Name\":\"Yatra\",\"Title\":\"Yatra\",\"Domain\":\"yatra.com\",\"BreachDate\":\"2013-09-01T00:00:00.000Z\",\"AddedDate\":\"2018-07-04T23:15:57.000Z\",\"ModifiedDate\":\"2018-07-04T23:15:57.000Z\",\"PwnCount\":5033997,\"Description\":\"In September 2013, the Indian bookings website known as \u003ca href=\\\"https://www.yatra.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eYatra\u003c/a\u003e had 5 million records exposed in a data breach. The data contained email and physical addresses, dates of birth and phone numbers along with both PINs and passwords stored in plain text. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Yatra.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"pins\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":329,\"Name\":\"LightsHope\",\"Title\":\"Light's Hope\",\"Domain\":\"lightshope.org\",\"BreachDate\":\"2018-06-25T00:00:00.000Z\",\"AddedDate\":\"2018-07-04T13:32:01.000Z\",\"ModifiedDate\":\"2018-07-04T13:32:01.000Z\",\"PwnCount\":30484,\"Description\":\"In June 2018, the World of Warcraft service \u003ca href=\\\"https://lightshope.org/news/forum-breach-summary-of-investigation-and-final-report\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLight's Hope suffered a data breach\u003c/a\u003e which they subsequently self-submitted to HIBP. Over 30K unique users were impacted and their exposed data included email addresses, dates of birth, private messages and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LightsHope.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":237,\"Name\":\"Gaadi\",\"Title\":\"Gaadi\",\"Domain\":\"gaadi.com\",\"BreachDate\":\"2015-05-14T00:00:00.000Z\",\"AddedDate\":\"2018-07-01T07:17:02.000Z\",\"ModifiedDate\":\"2018-07-01T07:17:02.000Z\",\"PwnCount\":4261179,\"Description\":\"In May 2015, the Indian motoring website known as \u003ca href=\\\"https://www.gaadi.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGaadi\u003c/a\u003e had 4.3 million records exposed in a data breach. The data contained usernames, email and IP addresses, genders, the city of users as well as passwords stored in both plain text and as MD5 hashes. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Gaadi.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":575,\"Name\":\"TrikSpamBotnet\",\"Title\":\"Trik Spam Botnet\",\"Domain\":\"\",\"BreachDate\":\"2018-06-12T00:00:00.000Z\",\"AddedDate\":\"2018-06-14T08:05:50.000Z\",\"ModifiedDate\":\"2022-01-05T04:11:30.000Z\",\"PwnCount\":43432346,\"Description\":\"In June 2018, the command and control server of a malicious botnet known as the \u0026quot;Trik Spam Botnet\u0026quot; \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/trik-spam-botnet-leaks-43-million-email-addresses/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas misconfigured such that it exposed the email addresses of more than 43 million people\u003c/a\u003e. The researchers who discovered the exposed Russian server believe the list of addresses was used to distribute various malware strains via malspam campaigns (emails designed to deliver malware).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"email-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":true,\"FaviconUrl\":null},{\"Id\":194,\"Name\":\"Estonia\",\"Title\":\"Estonian Citizens (via Estonian Cybercrime Bureau)\",\"Domain\":\"\",\"BreachDate\":\"2018-06-07T00:00:00.000Z\",\"AddedDate\":\"2018-06-11T09:41:17.000Z\",\"ModifiedDate\":\"2018-06-11T09:41:17.000Z\",\"PwnCount\":655161,\"Description\":\"In June 2018, \u003ca href=\\\"https://www.troyhunt.com/data-provided-by-the-estonian-central-criminal-police-is-now-searchable-on-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Cybercrime Bureau of the Estonian Central Criminal Police contacted HIBP\u003c/a\u003e and asked for assistance in making a data set of 655k email addresses searchable. The Estonian police suspected the email addresses and passwords they obtained were being used to access mailboxes, cryptocurrency exchanges, cloud service accounts and other similar online assets. They've requested that individuals who find themselves in the data set \u003cb\u003e\u003ci\u003eand also identify that cryptocurrency has been stolen\u003c/i\u003e\u003c/b\u003e contact them at \u003ca href=\\\"mailto:cybercrime@politsei.ee\\\"\u003ecybercrime@politsei.ee\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Estonia.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":135,\"Name\":\"Creative\",\"Title\":\"Creative\",\"Domain\":\"creative.com\",\"BreachDate\":\"2018-05-01T00:00:00.000Z\",\"AddedDate\":\"2018-06-07T21:00:31.000Z\",\"ModifiedDate\":\"2018-06-07T21:00:31.000Z\",\"PwnCount\":483015,\"Description\":\"In May 2018, \u003ca href=\\\"http://forums.creative.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe forum for Singaporean hardware company Creative Technology\u003c/a\u003e suffered a data breach which resulted in the disclosure of 483k unique email addresses. Running on an old version of vBulletin, the breach also disclosed usernames, IP addresses and salted MD5 password hashes. After being notified of the incident, Creative permanently shut down the forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Creative.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":334,\"Name\":\"LinuxForums\",\"Title\":\"Linux Forums\",\"Domain\":\"linuxforums.org\",\"BreachDate\":\"2018-05-01T00:00:00.000Z\",\"AddedDate\":\"2018-06-07T12:55:25.000Z\",\"ModifiedDate\":\"2024-09-04T23:38:20.000Z\",\"PwnCount\":275785,\"Description\":\"In May 2018, \u003ca href=\\\"https://web.archive.org/web/20180502093437/http://www.linuxforums.org/forum\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Linux Forums website\u003c/a\u003e suffered a data breach which resulted in the disclosure of 276k unique email addresses. Running on an old version of vBulletin, the breach also disclosed usernames, IP addresses and salted MD5 password hashes. Linux Forums did not respond to multiple attempts to contact them about the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LinuxForums.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":568,\"Name\":\"Ticketfly\",\"Title\":\"Ticketfly\",\"Domain\":\"ticketfly.com\",\"BreachDate\":\"2018-05-31T00:00:00.000Z\",\"AddedDate\":\"2018-06-03T06:14:14.000Z\",\"ModifiedDate\":\"2021-07-23T03:15:33.000Z\",\"PwnCount\":26151608,\"Description\":\"In May 2018, the website for the ticket distribution service \u003ca href=\\\"https://motherboard.vice.com/en_us/article/mbk3nx/ticketfly-website-database-hacked-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTicketfly was defaced by an attacker and was subsequently taken offline\u003c/a\u003e. The attacker allegedly requested a ransom to share details of the vulnerability with Ticketfly but did not receive a reply and subsequently posted the breached data online to a publicly accessible location. The data included over 26 million unique email addresses along with names, physical addresses and phone numbers. Whilst there were no passwords in the publicly leaked data, \u003ca href=\\\"https://support.ticketfly.com/customer/en/portal/articles/2941983-ticketfly-cyber-incident-update\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTicketfly later issued an incident update\u003c/a\u003e and stated that \u0026quot;It is possible, however, that hashed values of password credentials could have been accessed\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ticketfly.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":605,\"Name\":\"ViewFines\",\"Title\":\"ViewFines\",\"Domain\":\"viewfines.co.za\",\"BreachDate\":\"2018-05-07T00:00:00.000Z\",\"AddedDate\":\"2018-05-24T09:11:55.000Z\",\"ModifiedDate\":\"2018-05-24T09:11:55.000Z\",\"PwnCount\":777649,\"Description\":\"In May 2018, the South African website for viewing traffic fines online known as \u003ca href=\\\"https://www.iafrikan.com/2018/05/24/south-africas-viewfines-suffered-major-data-leak/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eViewFines suffered a data breach\u003c/a\u003e. Over 934k records containing 778k unique email addresses were exposed and included names, phone numbers, government issued IDs and passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ViewFines.png\",\"DataClasses\":[\"email-addresses\",\"government-issued-ids\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":607,\"Name\":\"VNG\",\"Title\":\"VNG\",\"Domain\":\"zing.vn\",\"BreachDate\":\"2015-05-19T00:00:00.000Z\",\"AddedDate\":\"2018-04-28T07:49:02.000Z\",\"ModifiedDate\":\"2018-04-28T07:49:02.000Z\",\"PwnCount\":24853850,\"Description\":\"In April 2018, \u003ca href=\\\"https://congnghe.tuoitre.vn/lo-thong-tin-hang-tram-trieu-tai-khoan-khach-hang-vng-xin-loi-20180427225719109.htm\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of a massive data breach impacting the Vietnamese company known as VNG\u003c/a\u003e after data was discovered being traded on a popular hacking forum where it was extensively redistributed. The breach dated back to an incident in May of 2015 and included of over 163 million customers. The data in the breach contained a wide range of personal attributes including usernames, birth dates, genders and home addresses along with unsalted MD5 hashes and 25 million unique email addresses. The data was provided to HIBP by \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VNG.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"marital-statuses\",\"names\",\"occupations\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":5,\"Name\":\"17173\",\"Title\":\"17173\",\"Domain\":\"17173.com\",\"BreachDate\":\"2011-12-28T00:00:00.000Z\",\"AddedDate\":\"2018-04-28T04:53:15.000Z\",\"ModifiedDate\":\"2018-04-28T04:53:15.000Z\",\"PwnCount\":7485802,\"Description\":\"In late 2011, \u003ca href=\\\"https://news.softpedia.com/news/China-Investigates-Hacking-Operations-That-Exposed-100-Million-Users-244312.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea series of data breaches in China affected up to 100 million users\u003c/a\u003e, including 7.5 million from the gaming site known as 17173. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided with support from \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/17173.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":557,\"Name\":\"TGBUS\",\"Title\":\"TGBUS\",\"Domain\":\"tgbus.com\",\"BreachDate\":\"2017-09-01T00:00:00.000Z\",\"AddedDate\":\"2018-04-28T02:02:29.000Z\",\"ModifiedDate\":\"2018-04-28T02:02:29.000Z\",\"PwnCount\":10371766,\"Description\":\"In approximately 2017, it's alleged that the Chinese gaming site known as \u003ca href=\\\"http://www.tgbus.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTGBUS\u003c/a\u003e suffered a data breach that impacted over 10 million unique subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided with support from \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TGBUS.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":289,\"Name\":\"ILikeCheats\",\"Title\":\"ILikeCheats\",\"Domain\":\"ilikecheats.net\",\"BreachDate\":\"2014-10-18T00:00:00.000Z\",\"AddedDate\":\"2018-04-22T08:18:28.000Z\",\"ModifiedDate\":\"2018-04-22T08:27:56.000Z\",\"PwnCount\":188847,\"Description\":\"In October 2014, the game cheats website known as ILikeCheats suffered a data breach that exposed 189k accounts. The vBulletin based forum leaked usernames, IP and email addresses and weak MD5 hashes of passwords. The data was provided with support from \u003ca href=\\\"https://dehashed.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edehashed.com\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ILikeCheats.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":105,\"Name\":\"CashCrate\",\"Title\":\"CashCrate\",\"Domain\":\"cashcrate.com\",\"BreachDate\":\"2016-11-17T00:00:00.000Z\",\"AddedDate\":\"2018-04-20T21:40:38.000Z\",\"ModifiedDate\":\"2018-04-20T21:40:38.000Z\",\"PwnCount\":6844490,\"Description\":\"In June 2017, news broke that \u003ca href=\\\"https://motherboard.vice.com/en_us/article/bj8pvq/hackers-steal-6-million-user-accounts-for-cash-for-surveys-site\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCashCrate had suffered a data breach exposing 6.8 million records\u003c/a\u003e. The breach of the cash-for-surveys site dated back to November 2016 and exposed names, physical addresses, email addresses and passwords stored in plain text for older accounts along with weak MD5 hashes for newer ones.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CashCrate.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":550,\"Name\":\"Taringa\",\"Title\":\"Taringa\",\"Domain\":\"taringa.net\",\"BreachDate\":\"2017-08-01T00:00:00.000Z\",\"AddedDate\":\"2018-04-19T10:11:37.000Z\",\"ModifiedDate\":\"2018-04-19T10:11:37.000Z\",\"PwnCount\":27971100,\"Description\":\"In September 2017, news broke that \u003ca href=\\\"https://thehackernews.com/2017/09/taringa-data-breach-hacking.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTaringa had suffered a data breach exposing 28 million records\u003c/a\u003e. Known as \u0026quot;The Latin American Reddit\u0026quot;, \u003ca href=\\\"https://www.taringa.net/posts/taringa/19972402/Un-mensaje-importante-sobre-la-seguridad-de-tu-cuenta.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTaringa's breach disclosure notice\u003c/a\u003e indicated the incident dated back to August that year. The exposed data included usernames, email addresses and weak MD5 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Taringa.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":517,\"Name\":\"Smogon\",\"Title\":\"Smogon\",\"Domain\":\"smogon.com\",\"BreachDate\":\"2017-09-10T00:00:00.000Z\",\"AddedDate\":\"2018-04-11T00:12:09.000Z\",\"ModifiedDate\":\"2018-04-11T00:12:09.000Z\",\"PwnCount\":386489,\"Description\":\"In April 2018, the Pokémon website known as \u003ca href=\\\"https://www.smogon.com/forums/threads/we-were-hacked-recently-you-may-potentially-want-to-change-your-passwords.3632265/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSmogon announced they'd suffered a data breach\u003c/a\u003e. The breach dated back to September 2017 and affected their XenForo based forum. The exposed data included usernames, email addresses, genders and both bcrypt and MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Smogon.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":274,\"Name\":\"HIAPK\",\"Title\":\"HiAPK\",\"Domain\":\"hiapk.com\",\"BreachDate\":\"2014-01-01T00:00:00.000Z\",\"AddedDate\":\"2018-04-01T07:13:44.000Z\",\"ModifiedDate\":\"2018-04-01T07:13:44.000Z\",\"PwnCount\":13873674,\"Description\":\"In approximately 2014, it's alleged that the Chinese Android store known as \u003ca href=\\\"http://hiapk.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHIAPK\u003c/a\u003e suffered a data breach that impacted 13.8 million unique subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided to HIBP by white hat security researcher and data analyst Adam Davies. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HIAPK.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":68,\"Name\":\"Bestialitysextaboo\",\"Title\":\"Bestialitysextaboo\",\"Domain\":\"bestialitysextaboo.com\",\"BreachDate\":\"2018-03-19T00:00:00.000Z\",\"AddedDate\":\"2018-03-29T06:10:06.000Z\",\"ModifiedDate\":\"2018-03-29T06:10:06.000Z\",\"PwnCount\":3204,\"Description\":\"In March 2018, the animal bestiality website known as \u003ca href=\\\"https://motherboard.vice.com/en_us/article/evqvpz/bestiality-website-hacked-troy-hunt-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBestialitysextaboo was hacked\u003c/a\u003e. A collection of various sites running on the same service were also compromised and details of the hack (including links to the data) were posted on a popular forum. In all, more than 3.2k unique email addresses were included alongside usernames, IP addresses, dates of birth, genders and bcrypt hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bestialitysextaboo.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":365,\"Name\":\"MDPI\",\"Title\":\"MDPI\",\"Domain\":\"mdpi.com\",\"BreachDate\":\"2016-08-30T00:00:00.000Z\",\"AddedDate\":\"2018-03-25T22:50:36.000Z\",\"ModifiedDate\":\"2018-03-25T22:50:36.000Z\",\"PwnCount\":845012,\"Description\":\"In August 2016, the Swiss scholarly open access publisher known as \u003ca href=\\\"http://mdpi.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMDPI\u003c/a\u003e had 17.5GB of data obtained from an unprotected Mongo DB instance. The data contained email exchanges between MDPI and their authors and reviewers which included 845k unique email addresses. MDPI have confirmed that the system has since been protected and that no data of a sensitive nature was impacted. As such, they concluded that notification to their subscribers was not necessary due to the fact that all their authors and reviewers are available online on their website.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MDPI.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\",\"ip-addresses\",\"names\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":225,\"Name\":\"FLVS\",\"Title\":\"Florida Virtual School\",\"Domain\":\"flvs.net\",\"BreachDate\":\"2018-02-12T00:00:00.000Z\",\"AddedDate\":\"2018-03-18T01:40:31.000Z\",\"ModifiedDate\":\"2018-03-18T01:40:31.000Z\",\"PwnCount\":542902,\"Description\":\"In March 2018, the Florida Virtual School (FLVS) \u003ca href=\\\"https://www.flvs.net/notices?source=homepage\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eposted a data breach notification to their website\u003c/a\u003e. The school had identified a data breach which had occurred sometime between 6 May 2016 and 12 Feb 2018 and an XML file containing 368k student records was subsequently found circulating. Each record contained student name, date of birth, password, grade, email \u003cem\u003eand\u003c/em\u003e parent email resulting in a total of 543k unique email addresses. Due to the prevalence of email addresses belonging to individuals who are still legally children, the data breach has been flagged as \u0026quot;sensitive\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FLVS.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"school-grades-class-levels\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":356,\"Name\":\"MangaFox\",\"Title\":\"MangaFox.me\",\"Domain\":\"mangafox.me\",\"BreachDate\":\"2016-06-01T00:00:00.000Z\",\"AddedDate\":\"2018-03-17T01:43:24.000Z\",\"ModifiedDate\":\"2018-03-17T01:43:24.000Z\",\"PwnCount\":1311610,\"Description\":\"In approximately July 2016, the manga website known as \u003ca href=\\\"http://mangafox.me\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emangafox.me\u003c/a\u003e suffered a data breach. The vBulletin based forum exposed 1.3 million accounts including usernames, email and IP addresses, dates of birth and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MangaFox.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":639,\"Name\":\"xHamster\",\"Title\":\"xHamster\",\"Domain\":\"xhamster.com\",\"BreachDate\":\"2016-11-28T00:00:00.000Z\",\"AddedDate\":\"2018-03-08T02:09:26.000Z\",\"ModifiedDate\":\"2018-03-08T02:09:26.000Z\",\"PwnCount\":377377,\"Description\":\"In November 2016, news broke that \u003ca href=\\\"https://motherboard.vice.com/en_us/article/kb7kqx/hackers-are-trading-hundreds-of-thousands-of-xhamster-porn-account-details\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehackers were trading hundreds of thousands of xHamster porn account details\u003c/a\u003e. In total, the data contained almost 380k unique user records including email addresses, usernames and unsalted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/xHamster.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":6,\"Name\":\"2844Breaches\",\"Title\":\"2,844 Separate Data Breaches\",\"Domain\":\"\",\"BreachDate\":\"2018-02-19T00:00:00.000Z\",\"AddedDate\":\"2018-02-26T10:06:02.000Z\",\"ModifiedDate\":\"2018-02-26T10:06:02.000Z\",\"PwnCount\":80115532,\"Description\":\"In February 2018, \u003ca href=\\\"https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea massive collection of almost 3,000 alleged data breaches was found online\u003c/a\u003e. Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen. Each file contained both an email address and plain text password and were consequently loaded as a single \u0026quot;unverified\u0026quot; data breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":587,\"Name\":\"UnderworldEmpire\",\"Title\":\"Underworld Empire\",\"Domain\":\"underworldempireforums.com\",\"BreachDate\":\"2017-04-25T00:00:00.000Z\",\"AddedDate\":\"2018-02-19T10:28:11.000Z\",\"ModifiedDate\":\"2018-02-19T10:28:11.000Z\",\"PwnCount\":428779,\"Description\":\"In April 2017, \u003ca href=\\\"http://underworldempireforums.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe vBulletin forum for the Underworld Empire game\u003c/a\u003e suffered a data breach that exposed 429k accounts. The data was then posted to a hacking forum in mid-February 2018 where it was made available to download. The source data contained IP and email addresses, usernames and salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/UnderworldEmpire.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":11,\"Name\":\"8tracks\",\"Title\":\"8tracks\",\"Domain\":\"8tracks.com\",\"BreachDate\":\"2017-06-27T00:00:00.000Z\",\"AddedDate\":\"2018-02-16T07:09:30.000Z\",\"ModifiedDate\":\"2019-08-25T08:52:21.000Z\",\"PwnCount\":17979961,\"Description\":\"In June 2017, the online playlists service known as \u003ca href=\\\"https://blog.8tracks.com/2017/06/27/password-security-alert/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e8Tracks suffered a data breach\u003c/a\u003e which impacted 18 million accounts. In their disclosure, 8Tracks advised that \u0026quot;the vector for the attack was an employee’s GitHub account, which was not secured using two-factor authentication\u0026quot;. Salted SHA-1 password hashes for users who \u003cem\u003edidn't\u003c/em\u003e sign up with either Google or Facebook authentication were also included. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses. The complete set of 18M records was later provided by JimScott.Sec@protonmail.com and updated in HIBP accordingly.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/8tracks.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":261,\"Name\":\"Playgar\",\"Title\":\"Guns and Robots\",\"Domain\":\"play-gar.com\",\"BreachDate\":\"2016-04-01T00:00:00.000Z\",\"AddedDate\":\"2018-02-14T22:32:25.000Z\",\"ModifiedDate\":\"2018-02-14T22:32:25.000Z\",\"PwnCount\":143569,\"Description\":\"In approximately April 2016, the gaming website \u003ca href=\\\"https://www.play-gar.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGuns and Robots\u003c/a\u003e suffered a data breach resulting in the exposure of 143k unique records. The data contained email and IP addresses, usernames and SHA-1 password hashes. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Playgar.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":53,\"Name\":\"Autocentrum\",\"Title\":\"Autocentrum.pl\",\"Domain\":\"autocentrum.pl\",\"BreachDate\":\"2018-02-04T00:00:00.000Z\",\"AddedDate\":\"2018-02-09T00:55:26.000Z\",\"ModifiedDate\":\"2018-02-09T00:55:26.000Z\",\"PwnCount\":143717,\"Description\":\"In February 2018, \u003ca href=\\\"https://niebezpiecznik.pl/post/wyciek-hasel-144-000-uzytkownikow-autocentrum-pl/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata belonging to the Polish motoring website autocentrum.pl was found online\u003c/a\u003e. The data contained 144k email addresses and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Autocentrum.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":563,\"Name\":\"TheTVDB\",\"Title\":\"TheTVDB.com\",\"Domain\":\"thetvdb.com\",\"BreachDate\":\"2017-11-21T00:00:00.000Z\",\"AddedDate\":\"2018-01-29T07:50:12.000Z\",\"ModifiedDate\":\"2018-01-29T07:50:12.000Z\",\"PwnCount\":181871,\"Description\":\"In November 2017, the open television database known as \u003ca href=\\\"https://forums.thetvdb.com/viewtopic.php?f=3\u0026t=43254\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTheTVDB.com suffered a data breach\u003c/a\u003e. The breached data was posted to a hacking forum and included 182k records with usernames, email addresses and MySQL password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TheTVDB.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":560,\"Name\":\"TheFlyOnTheWall\",\"Title\":\"The Fly on the Wall\",\"Domain\":\"theflyonthewall.com\",\"BreachDate\":\"2017-12-31T00:00:00.000Z\",\"AddedDate\":\"2018-01-15T06:42:31.000Z\",\"ModifiedDate\":\"2018-01-15T06:42:31.000Z\",\"PwnCount\":84011,\"Description\":\"In December 2017, the stock market news website \u003ca href=\\\"http://theflyonthewall.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eThe Fly on the Wall\u003c/a\u003e suffered a data breach. The data in the breach included 84k unique email addresses as well as purchase histories and credit card data. \u003ca href=\\\"https://www.troyhunt.com/streamlining-data-breach-disclosure-a-step-by-step-process\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNumerous attempts were made to contact The Fly on the Wall about the incident\u003c/a\u003e, however no responses were received.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TheFlyOnTheWall.png\",\"DataClasses\":[\"age-groups\",\"credit-cards\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":346,\"Name\":\"LyricsMania\",\"Title\":\"Lyrics Mania\",\"Domain\":\"lyricsmania.com\",\"BreachDate\":\"2017-12-21T00:00:00.000Z\",\"AddedDate\":\"2018-01-15T06:32:46.000Z\",\"ModifiedDate\":\"2018-01-15T06:32:46.000Z\",\"PwnCount\":109202,\"Description\":\"In December 2017, the song lyrics website known as \u003ca href=\\\"https://www.lyricsmania.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLyrics Mania\u003c/a\u003e suffered a data breach. The data in the breach included 109k usernames, email addresses and plain text passwords. \u003ca href=\\\"https://www.troyhunt.com/streamlining-data-breach-disclosure-a-step-by-step-process\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNumerous attempts were made to contact Lyrics Mania about the incident\u003c/a\u003e, however no responses were received.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LyricsMania.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":422,\"Name\":\"OpenCSGO\",\"Title\":\"Open CS:GO\",\"Domain\":\"opencsgo.com\",\"BreachDate\":\"2017-11-28T00:00:00.000Z\",\"AddedDate\":\"2018-01-15T06:14:55.000Z\",\"ModifiedDate\":\"2018-01-15T06:14:55.000Z\",\"PwnCount\":512311,\"Description\":\"In December 2017, the website for purchasing Counter-Strike skins known as \u003ca href=\\\"http://opencsgo.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOpen CS:GO\u003c/a\u003e (Counter-Strike: Global Offensive) suffered a data breach (address since redirects to dropgun.com). The 10GB file contained an extensive amount of personal information including email and IP addresses, phone numbers, physical addresses and purchase histories. \u003ca href=\\\"https://www.troyhunt.com/streamlining-data-breach-disclosures-a-step-by-step-process\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNumerous attempts were made to contact Open CS:GO about the incident\u003c/a\u003e, however no responses were received.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OpenCSGO.png\",\"DataClasses\":[\"avatars\",\"email-addresses\",\"ip-addresses\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"social-media-profiles\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":7,\"Name\":\"2fast4u\",\"Title\":\"2fast4u\",\"Domain\":\"2fast4u.be\",\"BreachDate\":\"2017-12-20T00:00:00.000Z\",\"AddedDate\":\"2018-01-07T08:19:39.000Z\",\"ModifiedDate\":\"2018-01-07T08:19:39.000Z\",\"PwnCount\":17706,\"Description\":\"In December 2017, the Belgian motorcycle forum \u003ca href=\\\"https://www.2fast4u.be\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e2fast4u\u003c/a\u003e discovered a data breach of their system. The breach of the vBulletin message board impacted over 17k individual users and exposed email addresses, usersnames and salted MD5 passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/2fast4u.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":279,\"Name\":\"HoundDawgs\",\"Title\":\"HoundDawgs\",\"Domain\":\"hounddawgs.org\",\"BreachDate\":\"2017-12-30T00:00:00.000Z\",\"AddedDate\":\"2018-01-03T12:48:10.000Z\",\"ModifiedDate\":\"2018-01-03T12:48:10.000Z\",\"PwnCount\":45701,\"Description\":\"In December 2017, the Danish torrent tracker known as \u003ca href=\\\"https://torrentfreak.com/popular-danish-torrent-tracker-shuts-down-after-hack-180102/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHoundDawgs suffered a data breach\u003c/a\u003e. More than 55GB of data was dumped publicly and whilst \u003ca href=\\\"https://www.flashback.org/p62770812\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethere was initially contention as to the severity of the incident\u003c/a\u003e, the data did indeed contain more than 45k unique email addresses complete extensive logs of torrenting activity, IP addresses and SHA1 passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HoundDawgs.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":33,\"Name\":\"Ancestry\",\"Title\":\"Ancestry\",\"Domain\":\"ancestry.com\",\"BreachDate\":\"2015-11-07T00:00:00.000Z\",\"AddedDate\":\"2017-12-24T04:28:45.000Z\",\"ModifiedDate\":\"2017-12-24T04:28:45.000Z\",\"PwnCount\":297806,\"Description\":\"In November 2015, an Ancestry service known as \u003ca href=\\\"https://blogs.ancestry.com/ancestry/2017/12/23/rootsweb-security-update/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRootsWeb suffered a data breach\u003c/a\u003e. The breach was not discovered until late 2017 when a file containing almost 300k email addresses and plain text passwords was identified. \",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ancestry.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":134,\"Name\":\"CrackingForum\",\"Title\":\"CrackingForum\",\"Domain\":\"crackingforum.com\",\"BreachDate\":\"2016-07-01T00:00:00.000Z\",\"AddedDate\":\"2017-12-10T20:08:30.000Z\",\"ModifiedDate\":\"2017-12-10T20:08:30.000Z\",\"PwnCount\":660305,\"Description\":\"In approximately mid-2016, the cracking community forum known as \u003ca href=\\\"http://crackingforum.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCrackingForum\u003c/a\u003e suffered a data breach. The vBulletin based forum exposed 660k email and IP addresses, usernames and salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CrackingForum.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":178,\"Name\":\"DVDShopCH\",\"Title\":\"dvd-shop.ch\",\"Domain\":\"dvd-shop.ch\",\"BreachDate\":\"2017-12-05T00:00:00.000Z\",\"AddedDate\":\"2017-12-10T04:58:09.000Z\",\"ModifiedDate\":\"2017-12-10T04:58:09.000Z\",\"PwnCount\":67973,\"Description\":\"In December 2017, the online Swiss DVD store known as \u003ca href=\\\"https://www.melani.admin.ch/melani/de/home/dokumentation/newsletter/passwoerter-von-70000-e-mail-konten-im-umlauf.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edvd-shop.ch suffered a data breach\u003c/a\u003e. The incident led to the exposure of 68k email addresses and plain text passwords. The site has since been updated to indicate that it is currently closed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DVDShopCH.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":405,\"Name\":\"Netshoes\",\"Title\":\"Netshoes\",\"Domain\":\"netshoes.com.br\",\"BreachDate\":\"2017-12-07T00:00:00.000Z\",\"AddedDate\":\"2017-12-10T04:01:03.000Z\",\"ModifiedDate\":\"2017-12-10T04:01:03.000Z\",\"PwnCount\":499836,\"Description\":\"In December 2017, the online Brazilian retailer known as \u003ca href=\\\"https://www.databreaches.net/netshoes-customer-data-possibly-hacked-500k-customers-order-info-dumped/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNetshoes had half a million records allegedly hacked from their system posted publicly\u003c/a\u003e. The company was contacted by local Brazilian media outlet Tecmundo and subsequently advised that \u003ca href=\\\"https://www.tecmundo.com.br/seguranca/125038-netshoes-invadida-meio-milhao-dados-clientes-vazam-internet.htm\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eno indications have been identified of an invasion of the company's systems\u003c/a\u003e. However, Netshoes' own systems successfully confirm the presence of matching identifiers and email addresses from the data set, indicating a high likelihood that the data originated from them.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Netshoes.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":27,\"Name\":\"AIType\",\"Title\":\"ai.type\",\"Domain\":\"aitype.com\",\"BreachDate\":\"2017-12-05T00:00:00.000Z\",\"AddedDate\":\"2017-12-08T21:31:25.000Z\",\"ModifiedDate\":\"2017-12-08T21:31:25.000Z\",\"PwnCount\":20580060,\"Description\":\"In December 2017, the virtual keyboard application \u003ca href=\\\"https://mackeepersecurity.com/post/virtual-keyboard-developer-leaked-31-million-of-client-records\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eai.type was found to have left a huge amount of data publicly facing in an unsecured MongoDB instance\u003c/a\u003e. Discovered by researchers at The Kromtech Security Center, the 577GB data set included extensive personal information including over 20 million unique email addresses, social media profiles and address book contacts. The email addresses alone were provided to HIBP to enable impacted users to assess their exposure.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AIType.png\",\"DataClasses\":[\"address-book-contacts\",\"apps-installed-on-devices\",\"cellular-network-names\",\"dates-of-birth\",\"device-information\",\"email-addresses\",\"genders\",\"geographic-locations\",\"imei-numbers\",\"imsi-numbers\",\"ip-addresses\",\"names\",\"phone-numbers\",\"profile-photos\",\"social-media-profiles\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":292,\"Name\":\"imgur\",\"Title\":\"imgur\",\"Domain\":\"imgur.com\",\"BreachDate\":\"2013-09-01T00:00:00.000Z\",\"AddedDate\":\"2017-11-25T00:00:33.000Z\",\"ModifiedDate\":\"2017-11-25T00:00:33.000Z\",\"PwnCount\":1749806,\"Description\":\"In September 2013, the online image sharing community \u003ca href=\\\"http://www.zdnet.com/article/imgur-reveals-hackers-stole-login-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eimgur suffered a data breach\u003c/a\u003e. A selection of the data containing 1.7 million email addresses and passwords surfaced more than 4 years later in November 2017. Although imgur stored passwords as SHA-256 hashes, the data in the breach contained plain text passwords suggesting that many of the original hashes had been cracked. imgur advises that they rolled over to bcrypt hashes in 2016.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/imgur.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":82,\"Name\":\"Bolt\",\"Title\":\"Bolt\",\"Domain\":\"bolt.cd\",\"BreachDate\":\"2017-03-01T00:00:00.000Z\",\"AddedDate\":\"2017-11-24T08:15:24.000Z\",\"ModifiedDate\":\"2017-11-24T08:16:45.000Z\",\"PwnCount\":995274,\"Description\":\"In approximately March 2017, the file sharing website \u003ca href=\\\"http://bolt.cd/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBolt\u003c/a\u003e suffered a data breach resulting in the exposure of 995k unique user records. The data was sourced from their vBulletin forum and contained email and IP addresses, usernames and salted MD5 password hashes. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bolt.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":611,\"Name\":\"VTightGel\",\"Title\":\"V-Tight Gel\",\"Domain\":\"vtightgel.com\",\"BreachDate\":\"2016-02-13T00:00:00.000Z\",\"AddedDate\":\"2017-11-17T07:31:16.000Z\",\"ModifiedDate\":\"2017-11-17T07:47:39.000Z\",\"PwnCount\":2013164,\"Description\":\"In approximately February 2016, data surfaced which was allegedly obtained from \u003ca href=\\\"http://vtightgel.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eV-Tight Gel (vaginal tightening gel)\u003c/a\u003e. Whilst the data set was titled V-Tight, within there were \u003ca href=\\\"https://pastebin.com/raw/pN7nyjJ7\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e50 other (predominantly wellness-related) domain names\u003c/a\u003e, most owned by the same entity. Multiple HIBP subscribers confirmed that although they couldn't recall providing data specifically to V-Tight, their personal information including name, phone and physical address was accurate. V-Tight Gel did not reply to multiple requests for comment.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VTightGel.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":453,\"Name\":\"PoliceOne\",\"Title\":\"PoliceOne\",\"Domain\":\"policeone.com\",\"BreachDate\":\"2014-07-01T00:00:00.000Z\",\"AddedDate\":\"2017-11-15T07:57:11.000Z\",\"ModifiedDate\":\"2017-11-15T07:57:11.000Z\",\"PwnCount\":709926,\"Description\":\"In February 2017, the law enforcement website \u003ca href=\\\"http://www.zdnet.com/article/police-forum-hacked-thousands-of-records-for-sale-on-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePoliceOne confirmed they'd suffered a data breach\u003c/a\u003e. The breach contained over 700k accounts which appeared for sale by a data broker and included email and IP addresses, usernames and salted MD5 password hashes. The file the data was contained in indicated the original breach dated back to July 2014.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PoliceOne.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":130,\"Name\":\"CouponMomAndArmorGames\",\"Title\":\"Coupon Mom / Armor Games\",\"Domain\":\"\",\"BreachDate\":\"2014-02-08T00:00:00.000Z\",\"AddedDate\":\"2017-11-09T23:46:52.000Z\",\"ModifiedDate\":\"2020-07-21T08:45:24.000Z\",\"PwnCount\":11010525,\"Description\":\"$1f\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CouponMomAndArmorGames.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":98,\"Name\":\"CafeMom\",\"Title\":\"CafeMom\",\"Domain\":\"cafemom.com\",\"BreachDate\":\"2014-04-10T00:00:00.000Z\",\"AddedDate\":\"2017-11-09T19:54:20.000Z\",\"ModifiedDate\":\"2017-11-09T19:55:00.000Z\",\"PwnCount\":2628148,\"Description\":\"In 2014, the social network for mothers \u003ca href=\\\"http://www.cafemom.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCafeMom\u003c/a\u003e suffered a data breach. The data surfaced alongside a number of other historical breaches including Kickstarter, Bitly and Disqus and contained 2.6 million email addresses and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CafeMom.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":476,\"Name\":\"Rankwatch\",\"Title\":\"RankWatch\",\"Domain\":\"rankwatch.com\",\"BreachDate\":\"2016-11-19T00:00:00.000Z\",\"AddedDate\":\"2017-11-03T07:04:08.000Z\",\"ModifiedDate\":\"2017-11-03T07:04:08.000Z\",\"PwnCount\":7445067,\"Description\":\"In approximately November 2016, the search engine optimisation management company \u003ca href=\\\"https://www.rankwatch.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRankWatch\u003c/a\u003e exposed a Mongo DB with no password publicly whereupon their data was exfiltrated and posted to an online forum. The data contained 7.4 million unique email addresses along with names, employers, phone numbers and job titles in a table called \u0026quot;us_emails\u0026quot;. When contacted and advised of the incident, RankWatch would not reveal the purpose of the data, where it had been acquired from and whether the data owners had consented to its collection. The forum which originally posted the data explained it as being \u0026quot;in the same vein as the modbsolutions leak\u0026quot;, \u003ca href=\\\"https://haveibeenpwned.com/PwnedWebsites#ModernBusinessSolutions\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea large list of corporate data allegedly used for spam purposes\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Rankwatch.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":305,\"Name\":\"JobStreet\",\"Title\":\"JobStreet\",\"Domain\":\"jobstreet.com\",\"BreachDate\":\"2012-03-07T00:00:00.000Z\",\"AddedDate\":\"2017-10-30T01:12:14.000Z\",\"ModifiedDate\":\"2017-10-30T01:12:14.000Z\",\"PwnCount\":3883455,\"Description\":\"In October 2017, the Malaysian website \u003ca href=\\\"https://www.lowyat.net/2017/145654/personal-data-millions-malaysians-sale-source-breach-still-unknown/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003elowyat.net ran a story on a massive set of breached data affecting millions of Malaysians\u003c/a\u003e after someone posted it for sale on their forums. The data spanned multiple separate breaches including \u003ca href=\\\"https://www.jobstreet.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe JobStreet jobs website\u003c/a\u003e which contained almost 4 million unique email addresses. The dates in the breach indicate the incident occurred in March 2012. The data later appeared freely downloadable on a Tor hidden service and contained extensive information on job seekers including names, genders, birth dates, phone numbers, physical addresses and passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JobStreet.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"government-issued-ids\",\"marital-statuses\",\"names\",\"nationalities\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":511,\"Name\":\"Shotbow\",\"Title\":\"Shotbow\",\"Domain\":\"shotbow.net\",\"BreachDate\":\"2016-05-09T00:00:00.000Z\",\"AddedDate\":\"2017-10-29T23:53:20.000Z\",\"ModifiedDate\":\"2017-10-29T23:53:20.000Z\",\"PwnCount\":1052753,\"Description\":\"In May 2016, the multiplayer server for Minecraft service \u003ca href=\\\"https://shotbow.net/forum/threads/security-data-breach-and-information-leak.346321/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eShotbow announced they'd suffered a data breach\u003c/a\u003e. The incident resulted in the exposure of over 1 million unique email addresses, usernames and salted SHA-256 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Shotbow.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":360,\"Name\":\"MasterDeeds\",\"Title\":\"Master Deeds\",\"Domain\":\"\",\"BreachDate\":\"2017-03-14T00:00:00.000Z\",\"AddedDate\":\"2017-10-18T11:01:46.000Z\",\"ModifiedDate\":\"2017-10-18T11:03:37.000Z\",\"PwnCount\":2257930,\"Description\":\"In March 2017, a 27GB database backup file named \\\"Master Deeds\\\" was sent to HIBP by a supporter of the project. Upon detailed analysis later that year, the file was found to contain the personal data of tens of millions of living and deceased South African residents. The data included extensive personal attributes such as names, addresses, ethnicities, genders, birth dates, government issued personal identification numbers and 2.2 million email addresses. At the time of publishing, \u003ca href=\\\"https://www.iafrikan.com/2017/10/18/dracore-data-sciences/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eit's alleged the data was sourced from Dracore Data Sciences\u003c/a\u003e (Dracore is yet to publicly confirm or deny the data was sourced from their systems). On 18 October 2017, the file was found to have been published to a publicly accessible web server where it was located at the root of an IP address with directory listing enabled. The file was dated 8 April 2015.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MasterDeeds.png\",\"DataClasses\":[\"dates-of-birth\",\"deceased-statuses\",\"email-addresses\",\"employers\",\"ethnicities\",\"genders\",\"government-issued-ids\",\"home-ownership-statuses\",\"job-titles\",\"names\",\"nationalities\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":618,\"Name\":\"WeHeartIt\",\"Title\":\"We Heart It\",\"Domain\":\"weheartit.com\",\"BreachDate\":\"2013-11-03T00:00:00.000Z\",\"AddedDate\":\"2017-10-14T20:14:58.000Z\",\"ModifiedDate\":\"2017-10-14T20:14:58.000Z\",\"PwnCount\":8600635,\"Description\":\"In November 2013, the image-based social network \u003ca href=\\\"http://help.weheartit.com/customer/portal/articles/2889018\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWe Heart It suffered a data breach\u003c/a\u003e. The incident wasn't discovered until October 2017 when 8.6 million user records were sent to HIBP. The data contained user names, email addresses and password hashes, 80% of which were salted SHA-256 with the remainder being MD5 with no salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WeHeartIt.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":158,\"Name\":\"DietCom\",\"Title\":\"diet.com\",\"Domain\":\"diet.com\",\"BreachDate\":\"2014-08-10T00:00:00.000Z\",\"AddedDate\":\"2017-10-13T21:37:10.000Z\",\"ModifiedDate\":\"2017-10-13T21:37:10.000Z\",\"PwnCount\":1383759,\"Description\":\"In August 2014, the diet and nutrition website \u003ca href=\\\"https://diet.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ediet.com\u003c/a\u003e suffered a data breach resulting in the exposure of 1.4 million unique user records dating back as far as 2004. The data contained email and IP addresses, usernames, plain text passwords and dietary information about the site members including eating habits, BMI and birth date. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DietCom.png\",\"DataClasses\":[\"dates-of-birth\",\"eating-habits\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"physical-attributes\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":604,\"Name\":\"VictoryPhones\",\"Title\":\"Victory Phones\",\"Domain\":\"victoryphones.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-10-11T21:01:33.000Z\",\"ModifiedDate\":\"2017-10-11T21:01:33.000Z\",\"PwnCount\":166046,\"Description\":\"In January 2017, the automated telephony services company \u003ca href=\\\"http://www.zdnet.com/article/republican-polling-firm-hacked-exposing-donor-records/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVictory Phones left a Mongo DB database publicly facing without a password\u003c/a\u003e. Subsequently, 213GB of data was downloaded by an unauthorised party including names, addresses, phone numbers and over 166k unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VictoryPhones.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":14,\"Name\":\"AbuseWithUs\",\"Title\":\"AbuseWith.Us\",\"Domain\":\"abusewith.us\",\"BreachDate\":\"2016-07-01T00:00:00.000Z\",\"AddedDate\":\"2017-10-09T11:08:45.000Z\",\"ModifiedDate\":\"2017-10-09T11:08:45.000Z\",\"PwnCount\":1372550,\"Description\":\"In 2016, the site dedicated to helping people hack email and online gaming accounts known as Abusewith.us suffered multiple data breaches. The site \u003ca href=\\\"https://krebsonsecurity.com/2017/02/who-ran-leakedsource-com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eallegedly had an administrator in common with the nefarious LeakedSource site\u003c/a\u003e, both of which have since been shut down. The exposed data included more than 1.3 million unique email addresses, often accompanied by usernames, IP addresses and plain text or hashed passwords retrieved from various sources and intended to be used to compromise the victims' accounts.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AbuseWithUs.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":160,\"Name\":\"Disqus\",\"Title\":\"Disqus\",\"Domain\":\"disqus.com\",\"BreachDate\":\"2012-07-01T00:00:00.000Z\",\"AddedDate\":\"2017-10-06T23:03:51.000Z\",\"ModifiedDate\":\"2017-10-06T23:03:51.000Z\",\"PwnCount\":17551044,\"Description\":\"In October 2017, the blog commenting service \u003ca href=\\\"https://blog.disqus.com/security-alert-user-info-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDisqus announced they'd suffered a data breach\u003c/a\u003e. The breach dated back to July 2012 but wasn't identified until years later when the data finally surfaced. The breach contained over 17.5 million unique email addresses and usernames. Users who created logins on Disqus had salted SHA1 hashes of passwords whilst users who logged in via social providers only had references to those accounts.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Disqus.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":310,\"Name\":\"Kickstarter\",\"Title\":\"Kickstarter\",\"Domain\":\"kickstarter.com\",\"BreachDate\":\"2014-02-16T00:00:00.000Z\",\"AddedDate\":\"2017-10-06T07:29:07.000Z\",\"ModifiedDate\":\"2017-10-06T07:29:07.000Z\",\"PwnCount\":5176463,\"Description\":\"In February 2014, the crowdfunding platform \u003ca href=\\\"https://www.kickstarter.com/blog/important-kickstarter-security-notice\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKickstarter announced they'd suffered a data breach\u003c/a\u003e. The breach contained almost 5.2 million unique email addresses, usernames and salted SHA1 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Kickstarter.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":76,\"Name\":\"Bitly\",\"Title\":\"Bitly\",\"Domain\":\"bitly.com\",\"BreachDate\":\"2014-05-08T00:00:00.000Z\",\"AddedDate\":\"2017-10-06T06:31:50.000Z\",\"ModifiedDate\":\"2017-10-06T08:05:10.000Z\",\"PwnCount\":9313136,\"Description\":\"In May 2014, the link management company \u003ca href=\\\"https://bitly.com/blog/urgent-security-update-regarding-your-bitly-account/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBitly announced they'd suffered a data breach\u003c/a\u003e. The breach contained over 9.3 million unique email addresses, usernames and hashed passwords, most using SHA1 with a small number using bcrypt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bitly.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":488,\"Name\":\"Reverb-Nation\",\"Title\":\"ReverbNation\",\"Domain\":\"reverbnation.com\",\"BreachDate\":\"2014-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-10-05T06:56:23.000Z\",\"ModifiedDate\":\"2017-10-05T06:56:23.000Z\",\"PwnCount\":7040725,\"Description\":\"In January 2014, the online service for assisting musicians to build their careers \u003ca href=\\\"https://www.scmagazine.com/2014-breach-prompts-reverbnation-to-notify-customers/article/532492/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eReverbNation suffered a data breach which wasn't identified until September the following year\u003c/a\u003e. The breach contained over 7 million accounts with unique email addresses and salted SHA1 passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Reverb-Nation.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":528,\"Name\":\"Staminus\",\"Title\":\"Staminus\",\"Domain\":\"staminus.net\",\"BreachDate\":\"2016-03-11T00:00:00.000Z\",\"AddedDate\":\"2017-10-05T03:58:50.000Z\",\"ModifiedDate\":\"2017-10-05T03:58:50.000Z\",\"PwnCount\":26815,\"Description\":\"In March 2016, the DDoS protection service \u003ca href=\\\"https://krebsonsecurity.com/2016/03/hackers-target-anti-ddos-firm-staminus/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eStaminus was \u0026quot;massively hacked\u0026quot;\u003c/a\u003e resulting in an outage of more than 20 hours and the disclosure of customer credentials (with unsalted MD5 hashes), support tickets, credit card numbers and other sensitive data. 27k unique email addresses were found in the data which was subsequently released to the public. Staminus is no longer in operation.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Staminus.png\",\"DataClasses\":[\"credit-cards\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"support-tickets\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":31,\"Name\":\"AKP\",\"Title\":\"AKP Emails\",\"Domain\":\"akparti.org.tr\",\"BreachDate\":\"2016-07-19T00:00:00.000Z\",\"AddedDate\":\"2017-10-01T03:52:37.000Z\",\"ModifiedDate\":\"2017-10-01T03:52:37.000Z\",\"PwnCount\":917461,\"Description\":\"In July 2016, a hacker known as Phineas Fisher \u003ca href=\\\"https://motherboard.vice.com/en_us/article/yp3n55/phineas-fisher-turkish-government-hack\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehacked Turkey's ruling party (Justice and Development Party or \u0026quot;AKP\u0026quot;) and gained access to 300k emails\u003c/a\u003e. The full contents of the emails were subsequently \u003ca href=\\\"https://wikileaks.org/akp-emails/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epublished by WikiLeaks and made searchable\u003c/a\u003e. HIBP identified over 917k unique email address patterns in the data set, including message IDs and a number of other non-user addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AKP.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":9,\"Name\":\"7k7k\",\"Title\":\"7k7k\",\"Domain\":\"7k7k.com\",\"BreachDate\":\"2011-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-09-26T21:54:01.000Z\",\"ModifiedDate\":\"2017-09-26T21:54:01.000Z\",\"PwnCount\":9121434,\"Description\":\"In approximately 2011, it's alleged that the Chinese gaming site known as \u003ca href=\\\"http://www.7k7k.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e7k7k\u003c/a\u003e suffered a data breach that impacted 9.1 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains usernames, email addresses and plain text passwords. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/7k7k.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":655,\"Name\":\"Zomato\",\"Title\":\"Zomato\",\"Domain\":\"zomato.com\",\"BreachDate\":\"2017-05-17T00:00:00.000Z\",\"AddedDate\":\"2017-09-04T21:06:46.000Z\",\"ModifiedDate\":\"2017-09-04T21:06:46.000Z\",\"PwnCount\":16472873,\"Description\":\"In May 2017, the restaurant guide website \u003ca href=\\\"https://www.hackread.com/zomato-hacked-17-million-accounts-sold-on-dark-web/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZomato was hacked\u003c/a\u003e resulting in the exposure of almost 17 million accounts. The data was consequently redistributed online and contains email addresses, usernames and salted MD5 hashes of passwords (the password hash was not present on all accounts). This data was provided to HIBP by whitehat security researcher and data analyst Adam Davies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zomato.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":352,\"Name\":\"MallCZ\",\"Title\":\"MALL.cz\",\"Domain\":\"mall.cz\",\"BreachDate\":\"2017-07-27T00:00:00.000Z\",\"AddedDate\":\"2017-09-04T12:46:39.000Z\",\"ModifiedDate\":\"2017-09-04T12:46:39.000Z\",\"PwnCount\":735405,\"Description\":\"In July 2017, the Czech Republic e-commerce site \u003ca href=\\\"https://blog.mall.cz/o-nas/q-a-vse-co-jste-chteli-vedet-o-bezpecnosti-na-mall-cz-451.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMALL.cz suffered a data breach\u003c/a\u003e after which 735k unique accounts including email addresses, names, phone numbers and passwords were later posted online. Whilst passwords were stored as hashes, \u003ca href=\\\"https://pulse.michalspacek.cz/passwords/storages/site/www.mall.cz\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea number of different algorithms of varying strength were used over time\u003c/a\u003e. All passwords included in the publicly distributed data were in plain text and were likely just those that had been successfully cracked (members with strong passwords don't appear to be included). According to MALL.cz, the breach only impacted accounts created before 2015.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MallCZ.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":420,\"Name\":\"OnlinerSpambot\",\"Title\":\"Onliner Spambot\",\"Domain\":\"\",\"BreachDate\":\"2017-08-28T00:00:00.000Z\",\"AddedDate\":\"2017-08-29T19:25:56.000Z\",\"ModifiedDate\":\"2017-08-29T19:25:56.000Z\",\"PwnCount\":711477622,\"Description\":\"In August 2017, a spambot by the name of \u003ca href=\\\"https://benkowlab.blogspot.com.au/2017/08/from-onliner-spambot-to-millions-of.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOnliner Spambot was identified by security researcher Benkow moʞuƎq\u003c/a\u003e. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled \u003ca href=\\\"https://www.troyhunt.com/inside-the-massive-711-million-record-onliner-spambot-dump\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eInside the Massive 711 Million Record Onliner Spambot Dump\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":73,\"Name\":\"BiohackMe\",\"Title\":\"Biohack.me\",\"Domain\":\"biohack.me\",\"BreachDate\":\"2016-12-02T00:00:00.000Z\",\"AddedDate\":\"2017-08-23T20:47:39.000Z\",\"ModifiedDate\":\"2017-08-23T20:47:39.000Z\",\"PwnCount\":3402,\"Description\":\"In December 2016, the forum for the biohacking website \u003ca href=\\\"https://forum.biohack.me/index.php?p=/discussion/2101/critical-website-server-compromised-read-this-action-needed\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBiohack.me suffered a data breach\u003c/a\u003e that exposed 3.4k accounts. The data included usernames, email addresses and hashed passwords along with the private messages of forum members. The data was self-submitted to HIBP by the Biohack.me operators.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BiohackMe.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"private-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":72,\"Name\":\"BinWeevils\",\"Title\":\"Bin Weevils\",\"Domain\":\"binweevils.com\",\"BreachDate\":\"2014-09-01T00:00:00.000Z\",\"AddedDate\":\"2017-08-18T07:10:57.000Z\",\"ModifiedDate\":\"2017-08-18T07:10:57.000Z\",\"PwnCount\":1287073,\"Description\":\"In September 2014, the online game \u003ca href=\\\"http://blog.binweevils.com/2014/09/important-security-update/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBin Weevils suffered a data breach\u003c/a\u003e. Whilst originally stating that only usernames and passwords had been exposed, \u003ca href=\\\"https://www.databreaches.net/data-from-2014-hack-of-childrens-online-game-bin-weevils-leaked-online-hacker-claims-20m-records/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea subsequent story on DataBreaches.net indicated that a more extensive set of personal attributes were impacted\u003c/a\u003e (comments there also suggest the data may have come from a later breach). Data matching that pattern was later provided to Have I Been Pwned by \u003ca href=\\\"https://twitter.com/akshayindia6\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e@akshayindia6\u003c/a\u003e and included almost 1.3m unique email addresses, genders, ages and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BinWeevils.png\",\"DataClasses\":[\"ages\",\"email-addresses\",\"genders\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":143,\"Name\":\"Dailymotion\",\"Title\":\"Dailymotion\",\"Domain\":\"dailymotion.com\",\"BreachDate\":\"2016-10-20T00:00:00.000Z\",\"AddedDate\":\"2017-08-07T02:51:12.000Z\",\"ModifiedDate\":\"2017-08-07T02:51:12.000Z\",\"PwnCount\":85176234,\"Description\":\"In October 2016, the video sharing platform \u003ca href=\\\"http://thehackernews.com/2016/12/dailymotion-video-hacked.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDailymotion suffered a data breach\u003c/a\u003e. The attack led to the exposure of more than 85 million user accounts and included email addresses, usernames and bcrypt hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dailymotion.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":364,\"Name\":\"MCBans\",\"Title\":\"MCBans\",\"Domain\":\"mcbans.com\",\"BreachDate\":\"2016-10-27T00:00:00.000Z\",\"AddedDate\":\"2017-07-23T05:34:55.000Z\",\"ModifiedDate\":\"2017-07-23T05:34:55.000Z\",\"PwnCount\":119948,\"Description\":\"In October 2016, the Minecraft banning service known as \u003ca href=\\\"https://www.mcbans.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMCBans\u003c/a\u003e suffered a data breach resulting in the exposure of 120k unique user records. The data contained email and IP addresses, usernames and password hashes of unknown format. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MCBans.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":57,\"Name\":\"B2BUSABusinesses\",\"Title\":\"B2B USA Businesses\",\"Domain\":\"\",\"BreachDate\":\"2017-07-18T00:00:00.000Z\",\"AddedDate\":\"2017-07-18T07:38:04.000Z\",\"ModifiedDate\":\"2017-07-18T07:38:04.000Z\",\"PwnCount\":105059554,\"Description\":\"In mid-2017, a spam list of over 105 million individuals in corporate America was discovered online. Referred to as \u0026quot;B2B USA Businesses\u0026quot;, the list categorised email addresses by employer, providing information on individuals' job titles plus their work phone numbers and physical addresses. \u003ca href=\\\"https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about spam lists in HIBP.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":198,\"Name\":\"Evermotion\",\"Title\":\"Evermotion\",\"Domain\":\"evermotion.org\",\"BreachDate\":\"2015-05-07T00:00:00.000Z\",\"AddedDate\":\"2017-07-02T13:49:09.000Z\",\"ModifiedDate\":\"2017-07-02T13:49:09.000Z\",\"PwnCount\":435510,\"Description\":\"In May 2015, the Polish 3D modelling website known as \u003ca href=\\\"https://evermotion.org/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEvermotion\u003c/a\u003e suffered a data breach resulting in the exposure of 435k unique user records. The data was sourced from a vBulletin forum and contained email addresses, usernames, dates of birth and salted MD5 hashes of passwords. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Evermotion.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":459,\"Name\":\"ProgrammingForums\",\"Title\":\"Programming Forums\",\"Domain\":\"programmingforums.org\",\"BreachDate\":\"2015-12-01T00:00:00.000Z\",\"AddedDate\":\"2017-07-01T16:42:46.000Z\",\"ModifiedDate\":\"2017-07-01T16:42:46.000Z\",\"PwnCount\":707432,\"Description\":\"In approximately late 2015, the programming forum at \u003ca href=\\\"http://www.programmingforums.org/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eprogrammingforums.org\u003c/a\u003e suffered a data breach resulting in the exposure of 707k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ProgrammingForums.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":455,\"Name\":\"Powerbot\",\"Title\":\"Powerbot\",\"Domain\":\"powerbot.org\",\"BreachDate\":\"2014-09-01T00:00:00.000Z\",\"AddedDate\":\"2017-07-01T16:12:37.000Z\",\"ModifiedDate\":\"2017-07-01T16:12:37.000Z\",\"PwnCount\":503501,\"Description\":\"In approximately September 2014, the RuneScape bot website \u003ca href=\\\"https://www.powerbot.org\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePowerbot\u003c/a\u003e suffered a data breach resulting in the exposure of over half a million unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Powerbot.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":642,\"Name\":\"XPGameSaves\",\"Title\":\"XPG\",\"Domain\":\"xpgamesaves.com\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-07-01T15:28:17.000Z\",\"ModifiedDate\":\"2017-07-01T15:28:17.000Z\",\"PwnCount\":890341,\"Description\":\"In approximately early 2016, the gaming website \u003ca href=\\\"http://www.xpgamesaves.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eXpgamesaves\u003c/a\u003e (XPG) suffered a data breach resulting in the exposure of 890k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. The site was previously reported as compromised on the \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e breached database directory. This data was provided by security researcher and data analyst, Adam Davies.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/XPGameSaves.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":122,\"Name\":\"Coachella\",\"Title\":\"Coachella\",\"Domain\":\"coachella.com\",\"BreachDate\":\"2017-02-22T00:00:00.000Z\",\"AddedDate\":\"2017-06-27T10:57:03.000Z\",\"ModifiedDate\":\"2017-06-27T10:57:03.000Z\",\"PwnCount\":599802,\"Description\":\"In February 2017, \u003ca href=\\\"https://motherboard.vice.com/en_us/article/mgkzkp/someone-is-selling-coachella-user-accounts-on-the-dark-web\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehundreds of thousands of records from the Coachella music festival were discovered being sold online\u003c/a\u003e. Allegedly taken from a combination of the main Coachella website and their vBulletin-based message board, the data included almost 600k usernames, IP and email addresses and salted hashes of passwords (MD5 in the case of the message board).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Coachella.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":206,\"Name\":\"VINs\",\"Title\":\"Exposed VINs\",\"Domain\":\"\",\"BreachDate\":\"2017-06-05T00:00:00.000Z\",\"AddedDate\":\"2017-06-09T05:35:19.000Z\",\"ModifiedDate\":\"2017-06-09T05:35:19.000Z\",\"PwnCount\":396650,\"Description\":\"In June 2017, \u003ca href=\\\"https://www.bleepingcomputer.com/news/security/car-thieves-everywhere-rejoice-as-unsecured-database-exposes-10-million-car-vins/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ean unsecured database with more than 10 million VINs (vehicle identification numbers) was discovered by researchers\u003c/a\u003e. Believed to be sourced from US car dealerships, the data included a raft of personal information and vehicle data along with 397k unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"family-structure\",\"genders\",\"names\",\"phone-numbers\",\"physical-addresses\",\"vehicle-details\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":149,\"Name\":\"DataEnrichment\",\"Title\":\"Data Enrichment Records\",\"Domain\":\"\",\"BreachDate\":\"2016-12-23T00:00:00.000Z\",\"AddedDate\":\"2017-06-08T16:23:07.000Z\",\"ModifiedDate\":\"2017-06-08T16:23:07.000Z\",\"PwnCount\":8176132,\"Description\":\"In December 2016, \u003ca href=\\\"http://www.csoonline.com/article/3149713/security/data-enrichment-records-for-200-million-people-up-for-sale-on-the-darknet.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emore than 200 million \u0026quot;data enrichment profiles\u0026quot; were found for sale on the darknet\u003c/a\u003e. The seller claimed the data was sourced from Experian and whilst that claim was rejected by the company, the data itself was found to be legitimate suggesting it may have been sourced from other legitimate locations. In total, there were more than 8 million unique email addresses in the data which also contained a raft of other personal attributes including credit ratings, home ownership status, family structure and other fields described in the story linked to above. The email addresses alone were provided to HIBP.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"buying-preferences\",\"charitable-donations\",\"credit-status-information\",\"dates-of-birth\",\"email-addresses\",\"family-structure\",\"financial-investments\",\"home-ownership-statuses\",\"income-levels\",\"job-titles\",\"marital-statuses\",\"names\",\"net-worths\",\"phone-numbers\",\"physical-addresses\",\"political-donations\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":12,\"Name\":\"Abandonia\",\"Title\":\"Abandonia (2015)\",\"Domain\":\"abandonia.com\",\"BreachDate\":\"2015-11-01T00:00:00.000Z\",\"AddedDate\":\"2017-06-05T05:56:47.000Z\",\"ModifiedDate\":\"2022-12-07T05:56:07.000Z\",\"PwnCount\":776125,\"Description\":\"In November 2015, the gaming website dedicated to classic DOS games \u003ca href=\\\"http://www.abandonia.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAbandonia\u003c/a\u003e suffered a data breach resulting in the exposure of 776k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Abandonia.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":181,\"Name\":\"Edmodo\",\"Title\":\"Edmodo\",\"Domain\":\"edmodo.com\",\"BreachDate\":\"2017-05-11T00:00:00.000Z\",\"AddedDate\":\"2017-06-01T05:59:24.000Z\",\"ModifiedDate\":\"2017-06-01T05:59:24.000Z\",\"PwnCount\":43423561,\"Description\":\"In May 2017, the education platform \u003ca href=\\\"https://motherboard.vice.com/en_us/article/hacker-steals-millions-of-user-account-details-from-education-platform-edmodo\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEdmodo was hacked\u003c/a\u003e resulting in the exposure of 77 million records comprised of over 43 million unique customer email addresses. The data was consequently published to a popular hacking forum and made freely available. The records in the breach included usernames, email addresses and bcrypt hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Edmodo.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":141,\"Name\":\"DaFont\",\"Title\":\"DaFont\",\"Domain\":\"dafont.com\",\"BreachDate\":\"2017-05-16T00:00:00.000Z\",\"AddedDate\":\"2017-05-18T20:05:28.000Z\",\"ModifiedDate\":\"2017-05-18T20:05:28.000Z\",\"PwnCount\":637340,\"Description\":\"In May 2017, \u003ca href=\\\"http://www.zdnet.com/article/font-sharing-site-dafont-hacked-thousands-of-accounts-stolen/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003efont sharing site DaFont suffered a data breach\u003c/a\u003e resulting in the exposure of 637k records. Allegedly due to a SQL injection vulnerability exploited by multiple parties, the exposed data included usernames, email addresses and passwords stored as MD5 without a salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DaFont.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":66,\"Name\":\"Bell2017\",\"Title\":\"Bell (2017 breach)\",\"Domain\":\"bell.ca\",\"BreachDate\":\"2017-05-15T00:00:00.000Z\",\"AddedDate\":\"2017-05-16T01:49:31.000Z\",\"ModifiedDate\":\"2017-05-16T01:49:31.000Z\",\"PwnCount\":2231256,\"Description\":\"In May 2017, \u003ca href=\\\"http://www.cbc.ca/beta/news/technology/bell-data-breach-customer-names-phone-numbers-emails-leak-1.4116608\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Bell telecommunications company in Canada suffered a data breach\u003c/a\u003e resulting in the exposure of millions of customer records. The data was consequently leaked online with a message from the attacker stating that they were \u0026quot;releasing a significant portion of Bell.ca's data due to the fact that they have failed to cooperate with us\u0026quot; and included a threat to leak more. The impacted data included over 2 million unique email addresses and 153k survey results dating back to 2011 and 2012. There were also 162 Bell employee records with more comprehensive personal data including names, phone numbers and plain text \u0026quot;passcodes\u0026quot;. Bell suffered another breach in 2014 which exposed 40k records.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bell.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"job-titles\",\"names\",\"passwords\",\"phone-numbers\",\"spoken-languages\",\"survey-results\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":205,\"Name\":\"ExploitIn\",\"Title\":\"Exploit.In\",\"Domain\":\"\",\"BreachDate\":\"2016-10-13T00:00:00.000Z\",\"AddedDate\":\"2017-05-06T07:03:18.000Z\",\"ModifiedDate\":\"2017-05-06T07:03:18.000Z\",\"PwnCount\":593427119,\"Description\":\"In late 2016, a huge list of email address and password pairs appeared in a \u0026quot;combo list\u0026quot; referred to as \u0026quot;Exploit.In\u0026quot;. The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for \u0026quot;credential stuffing\u0026quot;, that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read \u003ca href=\\\"https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePassword reuse, credential stuffing and another billion records in Have I Been Pwned\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":39,\"Name\":\"AntiPublic\",\"Title\":\"Anti Public Combo List\",\"Domain\":\"\",\"BreachDate\":\"2016-12-16T00:00:00.000Z\",\"AddedDate\":\"2017-05-04T22:07:38.000Z\",\"ModifiedDate\":\"2017-05-04T22:07:38.000Z\",\"PwnCount\":457962538,\"Description\":\"In December 2016, a huge list of email address and password pairs appeared in a \u0026quot;combo list\u0026quot; referred to as \u0026quot;Anti Public\u0026quot;. The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for \u0026quot;credential stuffing\u0026quot;, that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read \u003ca href=\\\"https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePassword reuse, credential stuffing and another billion records in Have I Been Pwned\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":487,\"Name\":\"RetinaX\",\"Title\":\"Retina-X\",\"Domain\":\"retinax.com\",\"BreachDate\":\"2017-02-23T00:00:00.000Z\",\"AddedDate\":\"2017-04-30T01:51:55.000Z\",\"ModifiedDate\":\"2024-07-11T19:29:17.000Z\",\"PwnCount\":71153,\"Description\":\"In February 2017, the mobile device monitoring software developer Retina-X was hacked and customer data downloaded before being wiped from their servers. The incident was covered in the Motherboard article titled \u003ca href=\\\"https://motherboard.vice.com/en_us/article/inside-stalkerware-surveillance-market-flexispy-retina-x\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eInside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones\u003c/a\u003e. The service, used to monitor mobile devices, had 71k email addresses and MD5 hashes with no salt exposed. Retina-X \u003ca href=\\\"http://www.phonesheriff.com/blog/retina-x-studios-server-breached-by-hackers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edisclosed the incident in a blog post\u003c/a\u003e on April 27, 2017.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RetinaX.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":473,\"Name\":\"R2-2017\",\"Title\":\"R2 (2017 forum breach)\",\"Domain\":\"r2games.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-04-25T11:04:29.000Z\",\"ModifiedDate\":\"2017-04-25T11:04:29.000Z\",\"PwnCount\":1023466,\"Description\":\"In early 2017, the forum for the gaming website \u003ca href=\\\"http://www.csoonline.com/article/3192246/security/r2games-compromised-again-over-one-million-accounts-exposed.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eR2 Games was hacked\u003c/a\u003e. R2 had previously appeared on HIBP in 2015 after a prior incident. This one exposed over 1 million unique user accounts and corresponding MD5 password hashes with no salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/R2Games.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":217,\"Name\":\"FashionFantasyGame\",\"Title\":\"FashionFantasyGame\",\"Domain\":\"fashionfantasygame.com\",\"BreachDate\":\"2016-12-01T00:00:00.000Z\",\"AddedDate\":\"2017-04-20T10:33:38.000Z\",\"ModifiedDate\":\"2017-04-20T10:33:38.000Z\",\"PwnCount\":2357872,\"Description\":\"In late 2016, the fashion gaming website \u003ca href=\\\"http://www.zdnet.com/article/amid-data-breach-responsibility-thrown-to-the-wind/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFashion Fantasy Game suffered a data breach\u003c/a\u003e. The incident exposed 2.3 million unique user accounts and corresponding MD5 password hashes with no salt. The data was contributed to Have I Been Pwned courtesy of rip@creep.im.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FashionFantasyGame.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":649,\"Name\":\"Youku\",\"Title\":\"Youku\",\"Domain\":\"youku.com\",\"BreachDate\":\"2016-12-01T00:00:00.000Z\",\"AddedDate\":\"2017-04-15T11:02:35.000Z\",\"ModifiedDate\":\"2017-04-15T11:02:35.000Z\",\"PwnCount\":91890110,\"Description\":\"In late 2016, the online Chinese video service \u003ca href=\\\"http://www.youku.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eYouku\u003c/a\u003e suffered a data breach. The incident exposed 92 million unique user accounts and corresponding MD5 password hashes. The data was contributed to Have I Been Pwned courtesy of rip@creep.im.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Youku.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":269,\"Name\":\"HealthNowNetworks\",\"Title\":\"Health Now Networks\",\"Domain\":\"healthnow.co\",\"BreachDate\":\"2017-03-25T00:00:00.000Z\",\"AddedDate\":\"2017-04-07T18:37:15.000Z\",\"ModifiedDate\":\"2017-04-07T18:37:15.000Z\",\"PwnCount\":321920,\"Description\":\"In March 2017, the telemarketing service \u003ca href=\\\"https://www.databreaches.net/leak-of-diabetic-patients-data-highlights-risks-of-giving-info-to-telemarketers\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHealth Now Networks left a database containing hundreds of thousands of medical records exposed\u003c/a\u003e. There were over 900,000 records in total containing significant volumes of personal information including names, dates of birth, various medical conditions and operator notes on the individuals' health. The data included over 320k unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HealthNowNetworks.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"health-insurance-information\",\"ip-addresses\",\"names\",\"personal-health-data\",\"phone-numbers\",\"physical-addresses\",\"security-questions-and-answers\",\"social-connections\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":75,\"Name\":\"BitcoinTalk\",\"Title\":\"Bitcoin Talk\",\"Domain\":\"bitcointalk.org\",\"BreachDate\":\"2015-05-22T00:00:00.000Z\",\"AddedDate\":\"2017-03-27T23:45:41.000Z\",\"ModifiedDate\":\"2017-03-27T23:45:41.000Z\",\"PwnCount\":501407,\"Description\":\"In May 2015, the Bitcoin forum \u003ca href=\\\"https://www.cryptocoinsnews.com/bitcoin-exchange-btc-e-bitcointalk-forum-breaches-details-revealed/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBitcoin Talk was hacked\u003c/a\u003e and over 500k unique email addresses were exposed. The attack led to the exposure of a raft of personal data including usernames, email and IP addresses, genders, birth dates, security questions and MD5 hashes of their answers plus hashes of the passwords themselves.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BitcoinTalk.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"passwords\",\"security-questions-and-answers\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":201,\"Name\":\"Evony\",\"Title\":\"Evony\",\"Domain\":\"evony.com\",\"BreachDate\":\"2016-06-01T00:00:00.000Z\",\"AddedDate\":\"2017-03-25T23:43:45.000Z\",\"ModifiedDate\":\"2017-03-25T23:43:45.000Z\",\"PwnCount\":29396116,\"Description\":\"In June 2016, the online multiplayer game \u003ca href=\\\"http://securityaffairs.co/wordpress/52260/data-breach/evony-data-breach.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEvony was hacked\u003c/a\u003e and over 29 million unique accounts were exposed. The attack led to the exposure of usernames, email and IP addresses and MD5 hashes of passwords (without salt).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Evony.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":275,\"Name\":\"HLTV\",\"Title\":\"HLTV\",\"Domain\":\"hltv.org\",\"BreachDate\":\"2016-06-19T00:00:00.000Z\",\"AddedDate\":\"2017-03-22T08:58:10.000Z\",\"ModifiedDate\":\"2017-03-22T08:58:10.000Z\",\"PwnCount\":611070,\"Description\":\"In June 2016, the \u0026quot;home of competitive Counter Strike\u0026quot; website \u003ca href=\\\"http://www.hltv.org/news/18087-security-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHLTV was hacked\u003c/a\u003e and 611k accounts were exposed. The attack led to the exposure of names, usernames, email addresses and bcrypt hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HLTV.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":544,\"Name\":\"SweClockers\",\"Title\":\"SweClockers.com\",\"Domain\":\"sweclockers.com\",\"BreachDate\":\"2015-04-01T00:00:00.000Z\",\"AddedDate\":\"2017-03-22T02:01:20.000Z\",\"ModifiedDate\":\"2018-07-27T21:59:04.000Z\",\"PwnCount\":254867,\"Description\":\"In early 2015, the Swedish tech news site \u003ca href=\\\"http://www.sweclockers.com/nyhet/20800-sweclockers-drabbas-av-dataintrang\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSweClockers was hacked\u003c/a\u003e and 255k accounts were exposed. The attack led to the exposure of usernames, email addresses and salted hashes of passwords stored with a combination of MD5 and SHA512.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SweClockers.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":571,\"Name\":\"TorrentInvites\",\"Title\":\"Torrent Invites\",\"Domain\":\"torrent-invites.com\",\"BreachDate\":\"2013-12-12T00:00:00.000Z\",\"AddedDate\":\"2017-03-22T01:14:11.000Z\",\"ModifiedDate\":\"2017-03-22T01:14:11.000Z\",\"PwnCount\":352120,\"Description\":\"In December 2013, the torrent site \u003ca href=\\\"https://www.reddit.com/r/trackers/comments/1sqqf7/torrentinvites_hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTorrent Invites was hacked\u003c/a\u003e and over 352k accounts were exposed. The vBulletin forum contained usernames, email and IP addresses, birth dates and salted MD5 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TorrentInvites.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":136,\"Name\":\"CrimeAgencyVBulletin\",\"Title\":\"CrimeAgency vBulletin Hacks\",\"Domain\":\"\",\"BreachDate\":\"2017-01-19T00:00:00.000Z\",\"AddedDate\":\"2017-03-21T03:12:40.000Z\",\"ModifiedDate\":\"2017-03-21T03:12:40.000Z\",\"PwnCount\":942044,\"Description\":\"In January 2016, \u003ca href=\\\"http://news.softpedia.com/news/vbulletin-hack-exposes-820-000-accounts-from-126-forums-513416.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea large number of unpatched vBulletin forums were compromised by an actor known as \u0026quot;CrimeAgency\u0026quot;\u003c/a\u003e. A total of 140 forums had data including usernames, email addresses and passwords (predominantly stored as salted MD5 hashes), extracted and then distributed. Refer to \u003ca href=\\\"https://troyhunt.com/i-just-added-another-140-data-breaches-to-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe complete list of the forums\u003c/a\u003e for further information on which sites were impacted.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CrimeAgencyVBulletin.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":524,\"Name\":\"Soundwave\",\"Title\":\"Soundwave\",\"Domain\":\"soundwave.com\",\"BreachDate\":\"2015-07-16T00:00:00.000Z\",\"AddedDate\":\"2017-03-17T22:36:34.000Z\",\"ModifiedDate\":\"2017-03-17T22:36:34.000Z\",\"PwnCount\":130705,\"Description\":\"In approximately mid 2015, the music tracking app \u003ca href=\\\"http://www.soundwave.com/help/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSoundwave suffered a data breach\u003c/a\u003e. The breach stemmed from an incident whereby \u0026quot;production data had been used to populate the test database\u0026quot; and was then inadvertently exposed in a MongoDB. The data contained 130k records and included email addresses, dates of birth, genders and MD5 hashes of passwords without a salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Soundwave.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"names\",\"passwords\",\"social-connections\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":630,\"Name\":\"Wishbone\",\"Title\":\"Wishbone (2016)\",\"Domain\":\"wishbone.io\",\"BreachDate\":\"2016-08-07T00:00:00.000Z\",\"AddedDate\":\"2017-03-15T19:29:52.000Z\",\"ModifiedDate\":\"2020-05-28T03:55:18.000Z\",\"PwnCount\":2247314,\"Description\":\"In August 2016, the mobile app to \u0026quot;compare anything\u0026quot; known as \u003ca href=\\\"https://motherboard.vice.com/en_us/article/popular-teen-quiz-app-wishbone-has-been-hacked-exposing-tons-of-user-information\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWishbone suffered a data breach\u003c/a\u003e. The data contained 9.4 million records with 2.2 million unique email addresses and was allegedly a subset of the complete data set. The exposed data included genders, birthdates, email addresses and phone numbers for an audience predominantly composed of teenagers and young adults.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Wishbone.png\",\"DataClasses\":[\"auth-tokens\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":404,\"Name\":\"NetProspex\",\"Title\":\"NetProspex\",\"Domain\":\"netprospex.com\",\"BreachDate\":\"2016-09-01T00:00:00.000Z\",\"AddedDate\":\"2017-03-15T01:57:04.000Z\",\"ModifiedDate\":\"2017-03-15T01:57:04.000Z\",\"PwnCount\":33698126,\"Description\":\"In 2016, a list of over 33 million individuals in corporate America sourced from Dun \u0026 Bradstreet's NetProspex service \u003ca href=\\\"https://www.troyhunt.com/weve-lost-control-of-our-personal-data-including-33m-netprospex-records\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas leaked online\u003c/a\u003e. D\u0026B believe the targeted marketing data was lost by a customer who purchased it from them. It contained extensive personal and corporate information including names, email addresses, job titles and general information about the employer.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NetProspex.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":532,\"Name\":\"SterKinekor\",\"Title\":\"Ster-Kinekor\",\"Domain\":\"sterkinekor.co.za\",\"BreachDate\":\"2017-03-09T00:00:00.000Z\",\"AddedDate\":\"2017-03-13T10:13:16.000Z\",\"ModifiedDate\":\"2017-03-13T10:13:16.000Z\",\"PwnCount\":1619544,\"Description\":\"In 2016, the South African cinema company \u003ca href=\\\"http://blog.roguecode.co.za/sterkinekor-vulnerability-download-millions-accounts\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSter-Kinekor had a security flaw\u003c/a\u003e which leaked a large amount of customer data via an enumeration vulnerability in the API of their old website. Whilst more than 6 million accounts were leaked by the flaw, the exposed data only contained 1.6 million unique email addresses. The data also included extensive personal information such as names, addresses, birthdates, genders and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SterKinekor.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"spoken-languages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":93,\"Name\":\"BTCE\",\"Title\":\"BTC-E\",\"Domain\":\"btc-e.com\",\"BreachDate\":\"2014-10-01T00:00:00.000Z\",\"AddedDate\":\"2017-03-12T03:21:52.000Z\",\"ModifiedDate\":\"2017-03-12T03:21:52.000Z\",\"PwnCount\":568340,\"Description\":\"In October 2014, \u003ca href=\\\"https://www.databreaches.net/bitcoin-exchange-btc-e-and-bitcointalk-forum-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Bitcoin exchange BTC-E was hacked\u003c/a\u003e and 568k accounts were exposed. The data included email and IP addresses, wallet balances and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BTCE.png\",\"DataClasses\":[\"account-balances\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":489,\"Name\":\"RiverCityMedia\",\"Title\":\"River City Media Spam List\",\"Domain\":\"rivercitymediaonline.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-03-08T23:49:53.000Z\",\"ModifiedDate\":\"2017-03-08T23:49:53.000Z\",\"PwnCount\":393430309,\"Description\":\"In January 2017, \u003ca href=\\\"https://web.archive.org/web/20170426084052/https://mackeeper.com/blog/post/339-spammergate-the-fall-of-an-empire\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea massive trove of data from River City Media was found exposed online\u003c/a\u003e. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":336,\"Name\":\"LittleMonsters\",\"Title\":\"Little Monsters\",\"Domain\":\"littlemonsters.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-03-07T20:39:08.000Z\",\"ModifiedDate\":\"2017-03-07T20:39:08.000Z\",\"PwnCount\":995698,\"Description\":\"In approximately January 2017, \u003ca href=\\\"https://www.heise.de/security/meldung/Little-Monsters-Nutzerdaten-aus-Lady-Gagas-Social-Network-sollen-geleakt-sein-3646447.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Lady Gaga fan site known as \u0026quot;Little Monsters\u0026quot; suffered a data breach that impacted 1 million accounts\u003c/a\u003e. The data contained usernames, email addresses, dates of birth and bcrypt hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LittleMonsters.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":119,\"Name\":\"CloudPets\",\"Title\":\"CloudPets\",\"Domain\":\"cloudpets.com\",\"BreachDate\":\"2017-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-02-27T20:57:29.000Z\",\"ModifiedDate\":\"2017-02-27T20:57:29.000Z\",\"PwnCount\":583503,\"Description\":\"In January, the maker of teddy bears that record children's voices and sends them to family and friends via the internet \u003ca href=\\\"https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCloudPets left their database publicly exposed and it was subsequently downloaded by external parties\u003c/a\u003e (the data was also subject to 3 different ransom demands). 583k records were provided to HIBP via a data trader and included email addresses and bcrypt hashes, but the full extent of user data exposed by the system was over 821k records and also included children's names and references to portrait photos and voice recordings.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CloudPets.png\",\"DataClasses\":[\"email-addresses\",\"family-members-names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":234,\"Name\":\"Funimation\",\"Title\":\"Funimation\",\"Domain\":\"funimation.com\",\"BreachDate\":\"2016-07-01T00:00:00.000Z\",\"AddedDate\":\"2017-02-20T00:43:26.000Z\",\"ModifiedDate\":\"2017-02-20T00:43:26.000Z\",\"PwnCount\":2491103,\"Description\":\"In July 2016, the anime site \u003ca href=\\\"https://www.funimation.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFunimation\u003c/a\u003e suffered a data breach that impacted 2.5 million accounts. The data contained usernames, email addresses, dates of birth and salted SHA1 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Funimation.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":182,\"Name\":\"Elance\",\"Title\":\"Elance\",\"Domain\":\"elance.com\",\"BreachDate\":\"2009-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-02-18T02:54:48.000Z\",\"ModifiedDate\":\"2017-02-18T02:54:48.000Z\",\"PwnCount\":1291178,\"Description\":\"Sometime in 2009, staffing platform \u003ca href=\\\"http://www.ibtimes.co.uk/elance-data-breach-hacker-leaks-1-3-million-accounts-staffing-platform-1605368\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eElance suffered a data breach that impacted 1.3 million accounts\u003c/a\u003e. Appearing online 8 years later, the data contained usernames, email addresses, phone numbers and SHA1 hashes of passwords, amongst other personal data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Elance.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"geographic-locations\",\"passwords\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":657,\"Name\":\"Zoosk\",\"Title\":\"Zoosk (2011)\",\"Domain\":\"zoosk.com\",\"BreachDate\":\"2011-01-01T00:00:00.000Z\",\"AddedDate\":\"2017-02-08T07:59:39.000Z\",\"ModifiedDate\":\"2020-08-06T21:54:13.000Z\",\"PwnCount\":52578183,\"Description\":\"In approximately 2011, an alleged breach of the dating website \u003ca href=\\\"https://www.zoosk.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eZoosk\u003c/a\u003e began circulating. Comprised of almost 53 million records, the data contained email addresses and plain text passwords. However, during extensive verification in May 2016 \u003ca href=\\\"https://www.troyhunt.com/heres-how-i-verify-data-breaches/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eno evidence could be found that the data was indeed sourced from the dating service\u003c/a\u003e. This breach has consequently been flagged as \u003ca href=\\\"https://www.troyhunt.com/introducing-fabricated-data-breaches-to-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003efabricated\u003c/a\u003e; it's highly unlikely the data was sourced from Zoosk.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Zoosk.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":true,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":308,\"Name\":\"JustDate\",\"Title\":\"Justdate.com\",\"Domain\":\"justdate.com\",\"BreachDate\":\"2016-09-29T00:00:00.000Z\",\"AddedDate\":\"2017-02-07T01:28:41.000Z\",\"ModifiedDate\":\"2017-02-07T01:28:41.000Z\",\"PwnCount\":24451312,\"Description\":\"An alleged breach of the dating website \u003ca href=\\\"http://www.justdate.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eJustdate.com\u003c/a\u003e began circulating in approximately September 2016. Comprised of over 24 million records, the data contained various personal attributes such as email addresses, dates of birth and physical locations. However, upon verification with HIBP subscribers, only a fraction of the data was found to be accurate and no account owners recalled using the Justdate.com service. This breach has consequently been flagged as \u003ca href=\\\"https://www.troyhunt.com/introducing-fabricated-data-breaches-to-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003efabricated\u003c/a\u003e; it's highly unlikely the data was sourced from Justdate.com.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/JustDate.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"names\"],\"IsVerified\":false,\"IsFabricated\":true,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":277,\"Name\":\"HongFire\",\"Title\":\"HongFire\",\"Domain\":\"hongfire.com\",\"BreachDate\":\"2015-03-01T00:00:00.000Z\",\"AddedDate\":\"2017-02-05T20:36:21.000Z\",\"ModifiedDate\":\"2017-02-05T20:36:21.000Z\",\"PwnCount\":999991,\"Description\":\"In March 2015, the anime and manga forum \u003ca href=\\\"http://www.hongfire.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHongFire\u003c/a\u003e suffered a data breach. The hack of their vBulletin forum led to the exposure of 1 million accounts along with email and IP addresses, usernames, dates of birth and salted MD5 passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HongFire.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":231,\"Name\":\"FreedomHostingII\",\"Title\":\"Freedom Hosting II\",\"Domain\":\"fhostingesps6bly.onion\",\"BreachDate\":\"2017-01-31T00:00:00.000Z\",\"AddedDate\":\"2017-02-05T10:06:58.000Z\",\"ModifiedDate\":\"2017-02-05T10:06:58.000Z\",\"PwnCount\":380830,\"Description\":\"In January 2017, the free hidden service host \u003ca href=\\\"http://www.theverge.com/2017/2/3/14497992/freedom-hosting-ii-hacked-anonymous-dark-web-tor\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFreedom Hosting II suffered a data breach\u003c/a\u003e. The attack allegedly took down 20% of dark web sites running behind Tor hidden services with the attacker claiming that of the 10,613 impacted sites, more than 50% of the content was child pornography. The hack led to the exposure of MySQL databases for the sites which included a vast amount of information on the hidden services Freedom Hosting II was managing. The impacted data classes far exceeds those listed for the breach and differ between the thousands of impacted sites.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FreedomHostingII.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":107,\"Name\":\"CDProjektRed\",\"Title\":\"CD Projekt RED\",\"Domain\":\"cdprojektred.com\",\"BreachDate\":\"2016-03-01T00:00:00.000Z\",\"AddedDate\":\"2017-01-31T06:40:09.000Z\",\"ModifiedDate\":\"2017-01-31T06:40:09.000Z\",\"PwnCount\":1871373,\"Description\":\"In March 2016, \u003ca href=\\\"http://forums.cdprojektred.com/forum/en/the-witcher-series/news-aa/7248610-important-potential-unauthorized-access-to-the-forums%E2%80%99-data\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePolish game developer CD Projekt RED suffered a data breach\u003c/a\u003e. The hack of their forum led to the exposure of almost 1.9 million accounts along with usernames, email addresses and salted SHA1 passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CDProjektRed.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":465,\"Name\":\"PSPISO\",\"Title\":\"PSP ISO\",\"Domain\":\"pspiso.com\",\"BreachDate\":\"2015-09-25T00:00:00.000Z\",\"AddedDate\":\"2017-01-29T07:28:23.000Z\",\"ModifiedDate\":\"2017-01-29T07:28:23.000Z\",\"PwnCount\":1274070,\"Description\":\"In approximately September 2015, the PlayStation PSP forum known as \u003ca href=\\\"http://www.pspiso.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePSP ISO\u003c/a\u003e was hacked and almost 1.3 million accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PSPISO.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":637,\"Name\":\"Xbox360ISO\",\"Title\":\"Xbox 360 ISO\",\"Domain\":\"xbox360iso.com\",\"BreachDate\":\"2015-09-25T00:00:00.000Z\",\"AddedDate\":\"2017-01-29T07:20:52.000Z\",\"ModifiedDate\":\"2017-01-29T07:20:52.000Z\",\"PwnCount\":1296959,\"Description\":\"In approximately September 2015, the XBOX 360 forum known as \u003ca href=\\\"http://www.xbox360iso.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eXBOX360 ISO\u003c/a\u003e was hacked and 1.2 million accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Xbox360ISO.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":411,\"Name\":\"NonNudeGirls\",\"Title\":\"Non Nude Girls\",\"Domain\":\"nonnudegirls.org\",\"BreachDate\":\"2013-05-21T00:00:00.000Z\",\"AddedDate\":\"2017-01-25T06:38:36.000Z\",\"ModifiedDate\":\"2017-01-25T06:38:36.000Z\",\"PwnCount\":75383,\"Description\":\"In May 2013, the non-consensual voyeurism site \u003ca href=\\\"http://www.ibtimes.co.uk/upskirt-porn-website-hit-massive-data-leak-exposing-nearly-180000-voyeurs-1602756\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e\u0026quot;Non Nude Girls\u0026quot; suffered a data breach\u003c/a\u003e. The hack of the vBulletin forum led to the exposure of over 75k accounts along with email and IP addresses, names and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NonNudeGirls.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":558,\"Name\":\"TheCandidBoard\",\"Title\":\"The Candid Board\",\"Domain\":\"thecandidboard.com\",\"BreachDate\":\"2015-09-03T00:00:00.000Z\",\"AddedDate\":\"2017-01-22T08:33:43.000Z\",\"ModifiedDate\":\"2017-01-22T08:33:43.000Z\",\"PwnCount\":178201,\"Description\":\"In September 2015, the non-consensual voyeurism site \u003ca href=\\\"http://www.ibtimes.co.uk/upskirt-porn-website-hit-massive-data-leak-exposing-nearly-180000-voyeurs-1602756\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e\u0026quot;The Candid Board\u0026quot; suffered a data breach\u003c/a\u003e. The hack of the vBulletin forum led to the exposure of over 178k accounts along with email and IP addresses, dates of birth and salted passwords hashed with MD5.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TheCandidBoard.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":385,\"Name\":\"MrExcel\",\"Title\":\"MrExcel\",\"Domain\":\"mrexcel.com\",\"BreachDate\":\"2016-12-05T00:00:00.000Z\",\"AddedDate\":\"2017-01-22T07:39:17.000Z\",\"ModifiedDate\":\"2017-01-22T07:39:17.000Z\",\"PwnCount\":366140,\"Description\":\"In December 2016, the forum for the Microsoft Excel tips and solutions site \u003ca href=\\\"http://www.mrexcel.com/details-of-data-breach-at-mrexcel-com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMr Excel suffered a data breach\u003c/a\u003e. The hack of the vBulletin forum led to the exposure of over 366k accounts along with email and IP addresses, dates of birth and salted passwords hashed with MD5. The owner of the MrExcel forum subsequently self-submitted the data to HIBP.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MrExcel.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"social-connections\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":192,\"Name\":\"Eroticy\",\"Title\":\"Eroticy\",\"Domain\":\"eroticy.com\",\"BreachDate\":\"2015-06-01T00:00:00.000Z\",\"AddedDate\":\"2017-01-10T02:19:56.000Z\",\"ModifiedDate\":\"2017-01-10T02:19:56.000Z\",\"PwnCount\":1370175,\"Description\":\"In mid-2016, it's alleged that the adult website known as \u003ca href=\\\"http://eroticy.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEroticy\u003c/a\u003e was hacked. Almost 1.4 million unique accounts were found circulating in late 2016 which contained a raft of personal information ranging from email addresses to phone numbers to plain text passwords. Whilst many HIBP subscribers confirmed their data was legitimate, the actual source of the breach remains inconclusive. \u003ca href=\\\"https://www.troyhunt.com/a-data-breach-investigation-blow-by-blow\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eA detailed account of the data has been published\u003c/a\u003e in the hope of identifying the origin of the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Eroticy.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"payment-histories\",\"phone-numbers\",\"physical-addresses\",\"usernames\",\"website-activity\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":468,\"Name\":\"QIP\",\"Title\":\"QIP\",\"Domain\":\"qip.ru\",\"BreachDate\":\"2011-06-01T00:00:00.000Z\",\"AddedDate\":\"2017-01-08T22:23:19.000Z\",\"ModifiedDate\":\"2017-01-08T22:23:19.000Z\",\"PwnCount\":26183992,\"Description\":\"In mid-2011, the Russian instant messaging service known as \u003ca href=\\\"http://securityaffairs.co/wordpress/51118/data-breach/qip-data-breach.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eQIP (Quiet Internet Pager) suffered a data breach\u003c/a\u003e. The attack resulted in the disclosure of over 26 million unique accounts including email addresses and passwords with the data eventually appearing in public years later.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/QIP.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":452,\"Name\":\"PokemonNegro\",\"Title\":\"Pokémon Negro\",\"Domain\":\"pokemonnegro.com\",\"BreachDate\":\"2016-10-01T00:00:00.000Z\",\"AddedDate\":\"2017-01-03T20:45:24.000Z\",\"ModifiedDate\":\"2017-01-03T20:45:24.000Z\",\"PwnCount\":830155,\"Description\":\"In approximately October 2016, the Spanish Pokémon site \u003ca href=\\\"http://pokemonnegro.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePokémon Negro\u003c/a\u003e suffered a data breach. The attack resulted in the disclosure of 830k accounts including email and IP addresses along with plain text passwords. Pokémon Negro did not respond when contacted about the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PokemonNegro.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":146,\"Name\":\"DaniWeb\",\"Title\":\"DaniWeb\",\"Domain\":\"daniweb.com\",\"BreachDate\":\"2015-12-01T00:00:00.000Z\",\"AddedDate\":\"2016-12-28T23:12:16.000Z\",\"ModifiedDate\":\"2016-12-28T23:12:16.000Z\",\"PwnCount\":1131636,\"Description\":\"In late 2015, the technology and social site \u003ca href=\\\"https://www.daniweb.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDaniWeb\u003c/a\u003e suffered a data breach. The attack resulted in the disclosure of 1.1 million accounts including email and IP addresses which were also accompanied by salted MD5 hashes of passwords. However, DaniWeb have advised that \u0026quot;the breached password hashes and salts are incorrect\u0026quot; and that they have since switched to new infrastructure and software.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DaniWeb.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":662,\"Name\":\"Parapa\",\"Title\":\"Пара Па\",\"Domain\":\"parapa.mail.ru\",\"BreachDate\":\"2016-08-08T00:00:00.000Z\",\"AddedDate\":\"2016-12-28T07:03:17.000Z\",\"ModifiedDate\":\"2016-12-28T07:03:17.000Z\",\"PwnCount\":4946850,\"Description\":\"In August 2016, \u003ca href=\\\"http://www.zdnet.com/article/over-25-million-accounts-stolen-after-mail-ru-forums-raided-by-hackers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Russian gaming site known as Пара Па (or parapa.mail.ru) was hacked\u003c/a\u003e along with a number of other forums on the Russian mail provider, mail.ru. The vBulletin forum contained 4.9 million accounts including usernames, email addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Parapa.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":137,\"Name\":\"CrossFire\",\"Title\":\"Cross Fire\",\"Domain\":\"cfire.mail.ru\",\"BreachDate\":\"2016-08-08T00:00:00.000Z\",\"AddedDate\":\"2016-12-28T00:29:28.000Z\",\"ModifiedDate\":\"2016-12-28T00:29:28.000Z\",\"PwnCount\":12865609,\"Description\":\"In August 2016, \u003ca href=\\\"http://www.zdnet.com/article/over-25-million-accounts-stolen-after-mail-ru-forums-raided-by-hackers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Russian gaming forum known as Cross Fire (or cfire.mail.ru) was hacked\u003c/a\u003e along with a number of other forums on the Russian mail provider, mail.ru. The vBulletin forum contained 12.8 million accounts including usernames, email addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CrossFire.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":596,\"Name\":\"uuu9\",\"Title\":\"uuu9\",\"Domain\":\"uuu9.com\",\"BreachDate\":\"2016-09-06T00:00:00.000Z\",\"AddedDate\":\"2016-12-27T10:05:41.000Z\",\"ModifiedDate\":\"2016-12-27T10:05:41.000Z\",\"PwnCount\":7485802,\"Description\":\"In September 2016, data was allegedly obtained from the Chinese website known as \u003ca href=\\\"http://www.uuu9.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003euuu9.com\u003c/a\u003e and contained 7.5M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses and user names. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/uuu9.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":87,\"Name\":\"BotOfLegends\",\"Title\":\"Bot of Legends\",\"Domain\":\"botoflegends.com\",\"BreachDate\":\"2014-11-13T00:00:00.000Z\",\"AddedDate\":\"2016-12-27T08:24:52.000Z\",\"ModifiedDate\":\"2016-12-27T08:24:52.000Z\",\"PwnCount\":238373,\"Description\":\"In November 2014, the forum for \u003ca href=\\\"http://botoflegends.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBot of Legends\u003c/a\u003e suffered a data breach. The IP.Board forum contained 238k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BotOfLegends.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":426,\"Name\":\"OVH\",\"Title\":\"OVH\",\"Domain\":\"ovh.com\",\"BreachDate\":\"2015-05-01T00:00:00.000Z\",\"AddedDate\":\"2016-12-27T07:49:12.000Z\",\"ModifiedDate\":\"2016-12-27T07:49:12.000Z\",\"PwnCount\":452899,\"Description\":\"In mid-2015, the forum for the hosting provider known as \u003ca href=\\\"https://www.ovh.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOVH\u003c/a\u003e suffered a data breach. The vBulletin forum contained 453k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OVH.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":311,\"Name\":\"Kimsufi\",\"Title\":\"Kimsufi\",\"Domain\":\"kimsufi.com\",\"BreachDate\":\"2015-05-01T00:00:00.000Z\",\"AddedDate\":\"2016-12-27T07:05:43.000Z\",\"ModifiedDate\":\"2016-12-27T07:05:43.000Z\",\"PwnCount\":504565,\"Description\":\"In mid-2015, the forum for the providers of affordable dedicated servers known as \u003ca href=\\\"https://www.kimsufi.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKimsufi\u003c/a\u003e suffered a data breach. The vBulletin forum contained over half a million accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Kimsufi.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":196,\"Name\":\"Ethereum\",\"Title\":\"Ethereum\",\"Domain\":\"ethereum.org\",\"BreachDate\":\"2016-12-16T00:00:00.000Z\",\"AddedDate\":\"2016-12-20T23:56:26.000Z\",\"ModifiedDate\":\"2016-12-20T23:56:26.000Z\",\"PwnCount\":16431,\"Description\":\"In December 2016, the forum for the public blockchain-based distributed computing platform \u003ca href=\\\"https://blog.ethereum.org/2016/12/19/security-alert-12192016-ethereum-org-forums-database-compromised/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEthereum suffered a data breach\u003c/a\u003e. The database contained over 16k unique email addresses along with IP addresses, private forum messages and (mostly) bcrypt hashed passwords. \u003ca href=\\\"https://www.troyhunt.com/the-ethereum-forum-was-hacked-and-theyve-voluntarily-submitted-the-data-to-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eEthereum elected to self-submit the data to HIBP\u003c/a\u003e, providing the service with a list of email addresses impacted by the incident.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Ethereum.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":472,\"Name\":\"QuinStreet\",\"Title\":\"QuinStreet\",\"Domain\":\"quinstreet.com\",\"BreachDate\":\"2015-12-14T00:00:00.000Z\",\"AddedDate\":\"2016-12-17T07:44:31.000Z\",\"ModifiedDate\":\"2016-12-17T07:44:31.000Z\",\"PwnCount\":4907802,\"Description\":\"In approximately late 2015, the maker of \u0026quot;performance marketing products\u0026quot; \u003ca href=\\\"http://quinstreet.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eQuinStreet\u003c/a\u003e had a number of their online assets compromised. The attack impacted 28 separate sites, predominantly technology forums such as \u003ca href=\\\"http://quinstreet.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eflashkit.com\u003c/a\u003e, \u003ca href=\\\"http://quinstreet.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ecodeguru.com\u003c/a\u003e and \u003ca href=\\\"http://quinstreet.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewebdeveloper.com\u003c/a\u003e (\u003ca href=\\\"http://pastebin.com/raw/6p50GgCV\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eview a full list of sites\u003c/a\u003e). QuinStreet advised that impacted users have been notified and passwords reset. The data contained details on over 4.9 million people and included email addresses, dates of birth and salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/QuinStreet.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":433,\"Name\":\"PayAsUGym\",\"Title\":\"PayAsUGym\",\"Domain\":\"payasugym.com\",\"BreachDate\":\"2016-12-15T00:00:00.000Z\",\"AddedDate\":\"2016-12-17T06:45:44.000Z\",\"ModifiedDate\":\"2016-12-17T06:45:44.000Z\",\"PwnCount\":400260,\"Description\":\"In December 2016, \u003ca href=\\\"https://twitter.com/real_1x0123/status/809443917984911364\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ean attacker breached PayAsUGym's website\u003c/a\u003e exposing over 400k customers' personal data. The data was consequently leaked publicly and broadly distributed via Twitter. The leaked data contained personal information including email addresses and passwords hashed using MD5 without a salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PayAsUGym.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"phone-numbers\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":497,\"Name\":\"SCDailyPhoneSpamList\",\"Title\":\"SC Daily Phone Spam List\",\"Domain\":\"data4marketers.com\",\"BreachDate\":\"2015-04-14T00:00:00.000Z\",\"AddedDate\":\"2016-11-24T06:04:34.000Z\",\"ModifiedDate\":\"2016-11-24T06:04:34.000Z\",\"PwnCount\":32939105,\"Description\":\"In early 2015, a spam list known as \u003ca href=\\\"http://www.data4marketers.com/2015APRspecials.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSC Daily Phone\u003c/a\u003e emerged containing almost 33M identities. The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. \u003ca href=\\\"https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about spam lists in HIBP.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":525,\"Name\":\"SpecialKSpamList\",\"Title\":\"Special K Data Feed Spam List\",\"Domain\":\"data4marketers.com\",\"BreachDate\":\"2015-10-07T00:00:00.000Z\",\"AddedDate\":\"2016-11-24T00:18:27.000Z\",\"ModifiedDate\":\"2016-11-24T00:18:27.000Z\",\"PwnCount\":30741620,\"Description\":\"In mid to late 2015, a spam list known as the \u003ca href=\\\"http://www.data4marketers.com/d4m_SpecialKfeed2015.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eSpecial K Data Feed\u003c/a\u003e was discovered containing almost 31M identities. The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. \u003ca href=\\\"https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about spam lists in HIBP.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":true,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":246,\"Name\":\"GeekedIn\",\"Title\":\"GeekedIn\",\"Domain\":\"geekedin.net\",\"BreachDate\":\"2016-08-15T00:00:00.000Z\",\"AddedDate\":\"2016-11-17T19:44:24.000Z\",\"ModifiedDate\":\"2022-03-06T05:21:27.000Z\",\"PwnCount\":1073164,\"Description\":\"In August 2016, the technology recruitment site GeekedIn left a MongoDB database exposed and over 8M records were extracted by an unknown third party. The breached data was originally scraped from GitHub in violation of their terms of use and contained information exposed in public profiles, including over 1 million members' email addresses. Full details on the incident (including how impacted members can see their leaked data) are covered in the blog post on \u003ca href=\\\"https://www.troyhunt.com/8-million-github-profiles-were-leaked-from-geekedins-mongodb-heres-how-to-see-yours\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e8 million GitHub profiles were leaked from GeekedIn's MongoDB - here's how to see yours\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GeekedIn.png\",\"DataClasses\":[\"email-addresses\",\"geographic-locations\",\"names\",\"professional-skills\",\"usernames\",\"years-of-professional-experience\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":45,\"Name\":\"ArmyForceOnline\",\"Title\":\"Army Force Online\",\"Domain\":\"armyforceonline.com\",\"BreachDate\":\"2016-05-18T00:00:00.000Z\",\"AddedDate\":\"2016-11-10T03:24:38.000Z\",\"ModifiedDate\":\"2020-08-07T03:19:40.000Z\",\"PwnCount\":1531235,\"Description\":\"In May 2016, the online gaming site \u003ca href=\\\"http://armyforceonline.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eArmy Force Online\u003c/a\u003e suffered a data breach that exposed 1.5M accounts. The breached data was found being regularly traded online and included usernames, email and IP addresses and MD5 passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ArmyForceOnline.png\",\"DataClasses\":[\"avatars\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":163,\"Name\":\"Dodonew\",\"Title\":\"Dodonew.com\",\"Domain\":\"dodonew.com\",\"BreachDate\":\"2011-12-01T00:00:00.000Z\",\"AddedDate\":\"2016-11-10T00:26:01.000Z\",\"ModifiedDate\":\"2016-11-10T00:26:01.000Z\",\"PwnCount\":8718404,\"Description\":\"In late 2011, data was allegedly obtained from the Chinese website known as \u003ca href=\\\"http://dodonew.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDodonew.com\u003c/a\u003e and contained 8.7M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses and user names. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dodonew.png\",\"DataClasses\":[\"email-addresses\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":342,\"Name\":\"Lookbook\",\"Title\":\"Lookbook\",\"Domain\":\"lookbook.nu\",\"BreachDate\":\"2012-08-24T00:00:00.000Z\",\"AddedDate\":\"2016-11-08T09:03:44.000Z\",\"ModifiedDate\":\"2016-11-08T09:03:44.000Z\",\"PwnCount\":1074948,\"Description\":\"In August 2012, the fashion site \u003ca href=\\\"https://www.hackread.com/hacker-selling-million-lookbook-accounts/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLookbook suffered a data breach\u003c/a\u003e. The data later appeared listed for sale in June 2016 and included 1.1 million usernames, email and IP addresses, birth dates and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lookbook.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":110,\"Name\":\"CheapAssGamer\",\"Title\":\"CheapAssGamer.com\",\"Domain\":\"cheapassgamer.com\",\"BreachDate\":\"2015-07-01T00:00:00.000Z\",\"AddedDate\":\"2016-11-08T01:58:39.000Z\",\"ModifiedDate\":\"2016-11-08T01:58:39.000Z\",\"PwnCount\":444767,\"Description\":\"In approximately mid-2015, the forum for \u003ca href=\\\"https://www.cheapassgamer.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCheapAssGamer.com\u003c/a\u003e suffered a data breach. The database from the IP.Board based forum contained 445k accounts including usernames, email and IP addresses and salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CheapAssGamer.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":29,\"Name\":\"Aipai\",\"Title\":\"Aipai.com\",\"Domain\":\"aipai.com\",\"BreachDate\":\"2016-09-27T00:00:00.000Z\",\"AddedDate\":\"2016-11-07T21:55:29.000Z\",\"ModifiedDate\":\"2016-11-07T21:55:29.000Z\",\"PwnCount\":6496778,\"Description\":\"In September 2016, data allegedly obtained from the Chinese gaming website known as \u003ca href=\\\"http://aipai.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAipai.com\u003c/a\u003e and containing 6.5M accounts was leaked online. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses and MD5 password hashes. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Aipai.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":115,\"Name\":\"CivilOnline\",\"Title\":\"Civil Online\",\"Domain\":\"co188.com\",\"BreachDate\":\"2011-07-10T00:00:00.000Z\",\"AddedDate\":\"2016-11-07T20:41:52.000Z\",\"ModifiedDate\":\"2016-11-07T20:41:52.000Z\",\"PwnCount\":7830195,\"Description\":\"In mid-2011, data was allegedly obtained from the Chinese engineering website known as \u003ca href=\\\"http://www.co188.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCivil Online\u003c/a\u003e and contained 7.8M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email and IP addresses, user names and MD5 password hashes. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CivilOnline.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":177,\"Name\":\"Duowan\",\"Title\":\"Duowan.com\",\"Domain\":\"duowan.com\",\"BreachDate\":\"2011-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-11-07T12:53:19.000Z\",\"ModifiedDate\":\"2016-11-07T12:53:19.000Z\",\"PwnCount\":2639894,\"Description\":\"In approximately 2011, data was allegedly obtained from the Chinese gaming website known as \u003ca href=\\\"http://www.duowan.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDuowan.com\u003c/a\u003e and contained 2.6M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses, user names and plain text passwords. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Duowan.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":614,\"Name\":\"WarInc\",\"Title\":\"War Inc.\",\"Domain\":\"thewarinc.com\",\"BreachDate\":\"2012-07-04T00:00:00.000Z\",\"AddedDate\":\"2016-11-07T11:07:25.000Z\",\"ModifiedDate\":\"2016-11-07T11:07:25.000Z\",\"PwnCount\":1020136,\"Description\":\"In mid-2012, the real-time strategy game \u003ca href=\\\"http://thewarinc.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWar Inc.\u003c/a\u003e suffered a data breach. The attack resulted in the exposure of over 1 million accounts including usernames, email addresses and salted MD5 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WarInc.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":188,\"Name\":\"EpicGames\",\"Title\":\"Epic Games\",\"Domain\":\"epicgames.com\",\"BreachDate\":\"2016-08-11T00:00:00.000Z\",\"AddedDate\":\"2016-11-07T10:19:34.000Z\",\"ModifiedDate\":\"2016-11-07T10:19:34.000Z\",\"PwnCount\":251661,\"Description\":\"In August 2016, \u003ca href=\\\"http://www.zdnet.com/article/epic-games-unreal-engine-forums-hacked-in-latest-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Epic Games forum suffered a data breach\u003c/a\u003e, allegedly due to a SQL injection vulnerability in vBulletin. The attack resulted in the exposure of 252k accounts including usernames, email addresses and salted MD5 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/EpicGames.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":591,\"Name\":\"UnrealEngine\",\"Title\":\"Unreal Engine\",\"Domain\":\"unrealengine.com\",\"BreachDate\":\"2016-08-11T00:00:00.000Z\",\"AddedDate\":\"2016-11-07T09:04:54.000Z\",\"ModifiedDate\":\"2016-11-07T09:04:54.000Z\",\"PwnCount\":530147,\"Description\":\"In August 2016, \u003ca href=\\\"http://www.zdnet.com/article/epic-games-unreal-engine-forums-hacked-in-latest-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Unreal Engine Forum suffered a data breach\u003c/a\u003e, allegedly due to a SQL injection vulnerability in vBulletin. The attack resulted in the exposure of 530k accounts including usernames, email addresses and salted MD5 hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/UnrealEngine.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":272,\"Name\":\"HeroesOfGaia\",\"Title\":\"Heroes of Gaia\",\"Domain\":\"heroesofgaia.com\",\"BreachDate\":\"2013-01-04T00:00:00.000Z\",\"AddedDate\":\"2016-11-07T08:11:03.000Z\",\"ModifiedDate\":\"2016-11-07T08:11:03.000Z\",\"PwnCount\":179967,\"Description\":\"In early 2013, the online fantasy multiplayer game \u003ca href=\\\"http://hog.playsnail.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHeroes of Gaia\u003c/a\u003e suffered a data breach. The newest records in the data set indicate a breach date of 4 January 2013 and include usernames, IP and email addresses but no passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HeroesOfGaia.png\",\"DataClasses\":[\"browser-user-agent-details\",\"email-addresses\",\"ip-addresses\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":595,\"Name\":\"uTorrent\",\"Title\":\"uTorrent\",\"Domain\":\"utorrent.com\",\"BreachDate\":\"2016-01-14T00:00:00.000Z\",\"AddedDate\":\"2016-11-05T22:32:39.000Z\",\"ModifiedDate\":\"2016-11-05T22:32:39.000Z\",\"PwnCount\":395044,\"Description\":\"In early 2016, the forum for the uTorrent BitTorrent client \u003ca href=\\\"https://torrentfreak.com/utorrent-forums-hacked-passwords-compromised-160608/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach\u003c/a\u003e which came to light later in the year. The database from the IP.Board based forum contained 395k accounts including usernames, email addresses and MD5 password hashes without a salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/uTorrent.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":475,\"Name\":\"Rambler\",\"Title\":\"Rambler\",\"Domain\":\"rambler.ru\",\"BreachDate\":\"2014-03-01T00:00:00.000Z\",\"AddedDate\":\"2016-11-01T09:33:34.000Z\",\"ModifiedDate\":\"2016-11-01T09:33:34.000Z\",\"PwnCount\":91436280,\"Description\":\"In late 2016, a data dump of almost 100M accounts from Rambler, sometimes referred to as \u0026quot;The Russian Yahoo\u0026quot;, \u003ca href=\\\"http://www.zdnet.com/article/russian-portal-email-provider-rambler-hacked-98-million-accounts-leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas discovered being traded online\u003c/a\u003e. The data set provided to Have I Been Pwned included 91M unique usernames (which also form part of Rambler email addresses) and plain text passwords. According to Rambler, the data dates back to March 2014.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Rambler.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":379,\"Name\":\"ModernBusinessSolutions\",\"Title\":\"Modern Business Solutions\",\"Domain\":\"modbsolutions.com\",\"BreachDate\":\"2016-10-08T00:00:00.000Z\",\"AddedDate\":\"2016-10-12T09:09:11.000Z\",\"ModifiedDate\":\"2016-10-12T09:09:11.000Z\",\"PwnCount\":58843488,\"Description\":\"In October 2016, a large Mongo DB file containing tens of millions of accounts \u003ca href=\\\"https://twitter.com/0x2Taylor/status/784544208879292417\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas shared publicly on Twitter\u003c/a\u003e (the file has since been removed). The database contained over 58M unique email addresses along with IP addresses, names, home addresses, genders, job titles, dates of birth and phone numbers. The data was subsequently \u003ca href=\\\"http://news.softpedia.com/news/hacker-steals-58-million-user-records-from-data-storage-provider-509190.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eattributed to \u0026quot;Modern Business Solutions\u0026quot;\u003c/a\u003e, a company that provides data storage and database hosting solutions. They've yet to acknowledge the incident or explain how they came to be in possession of the data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ModernBusinessSolutions.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":250,\"Name\":\"GFAN\",\"Title\":\"GFAN\",\"Domain\":\"gfan.com\",\"BreachDate\":\"2016-10-10T00:00:00.000Z\",\"AddedDate\":\"2016-10-10T16:32:34.000Z\",\"ModifiedDate\":\"2016-10-10T16:32:34.000Z\",\"PwnCount\":22526334,\"Description\":\"In October 2016, data surfaced that was allegedly obtained from the Chinese website known as \u003ca href=\\\"http://www.gfan.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGFAN\u003c/a\u003e and contained 22.5M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email and IP addresses, user names and salted and hashed passwords. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GFAN.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":400,\"Name\":\"NetEase\",\"Title\":\"NetEase\",\"Domain\":\"163.com\",\"BreachDate\":\"2015-10-19T00:00:00.000Z\",\"AddedDate\":\"2016-10-09T06:13:31.000Z\",\"ModifiedDate\":\"2016-10-09T06:13:31.000Z\",\"PwnCount\":234842089,\"Description\":\"In October 2015, the Chinese site known as \u003ca href=\\\"http://www.163.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNetEase\u003c/a\u003e (located at \u003ca href=\\\"http://www.163.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e163.com\u003c/a\u003e) was \u003ca href=\\\"http://news.mydrivers.com/1/452/452173.htm\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ereported as having suffered a data breach that impacted hundreds of millions of subscribers\u003c/a\u003e. Whilst there is evidence that the data itself is legitimate (multiple HIBP subscribers confirmed a password they use is in the data), due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses and plain text passwords. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NetEase.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":548,\"Name\":\"Taobao\",\"Title\":\"Taobao\",\"Domain\":\"taobao.com\",\"BreachDate\":\"2012-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-10-08T10:53:23.000Z\",\"ModifiedDate\":\"2016-10-08T10:53:23.000Z\",\"PwnCount\":21149008,\"Description\":\"In approximately 2012, it's alleged that the Chinese shopping site known as \u003ca href=\\\"https://www.taobao.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTaobao\u003c/a\u003e suffered a data breach that impacted over 21 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses and plain text passwords. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Taobao.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":3,\"Name\":\"126\",\"Title\":\"126\",\"Domain\":\"126.com\",\"BreachDate\":\"2012-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-10-08T07:46:05.000Z\",\"ModifiedDate\":\"2016-10-08T07:46:05.000Z\",\"PwnCount\":6414191,\"Description\":\"In approximately 2012, it's alleged that the Chinese email service known as \u003ca href=\\\"http://126.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e126\u003c/a\u003e suffered a data breach that impacted 6.4 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as \u0026quot;unverified\u0026quot;. The data in the breach contains email addresses and plain text passwords. \u003ca href=\\\"https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead more about Chinese data breaches in Have I Been Pwned.\u003c/a\u003e\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/126.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":50,\"Name\":\"Aternos\",\"Title\":\"Aternos\",\"Domain\":\"aternos.org\",\"BreachDate\":\"2015-12-06T00:00:00.000Z\",\"AddedDate\":\"2016-10-01T23:42:56.000Z\",\"ModifiedDate\":\"2016-10-01T23:42:56.000Z\",\"PwnCount\":1436486,\"Description\":\"In December 2015, the service for creating and running free Minecraft servers known as \u003ca href=\\\"https://twitter.com/AternosStatus/status/696121828360716288\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAternos suffered a data breach that impacted 1.4 million subscribers\u003c/a\u003e. The data included usernames, email and IP addresses and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Aternos.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":326,\"Name\":\"Leet\",\"Title\":\"Leet\",\"Domain\":\"leet.cc\",\"BreachDate\":\"2016-09-10T00:00:00.000Z\",\"AddedDate\":\"2016-09-30T22:00:48.000Z\",\"ModifiedDate\":\"2016-09-30T22:00:48.000Z\",\"PwnCount\":5081689,\"Description\":\"In August 2016, the service for creating and running Pocket Minecraft edition servers known as \u003ca href=\\\"http://news.softpedia.com/news/data-for-6-million-minecraft-gamers-stolen-from-leet-cc-servers-507445.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLeet was reported as having suffered a data breach that impacted 6 million subscribers\u003c/a\u003e. The incident reported by Softpedia had allegedly taken place earlier in the year, although the data set sent to HIBP was dated as recently as early September but contained only 2 million subscribers. The data included usernames, email and IP addresses and SHA512 hashes. A further 3 million accounts were obtained and added to HIBP several days after the initial data was loaded bringing the total to over 5 million.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Leet.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":287,\"Name\":\"iDressup\",\"Title\":\"i-Dressup\",\"Domain\":\"i-dressup.com\",\"BreachDate\":\"2016-07-15T00:00:00.000Z\",\"AddedDate\":\"2016-09-26T20:14:51.000Z\",\"ModifiedDate\":\"2016-09-26T20:14:51.000Z\",\"PwnCount\":2191565,\"Description\":\"In June 2016, the teen social site known as \u003ca href=\\\"http://arstechnica.com/security/2016/09/social-hangout-site-for-teens-leaks-millions-of-plaintext-passwords/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ei-Dressup was hacked\u003c/a\u003e and over 2 million user accounts were exposed. At the time the hack was reported, the i-Dressup operators were not contactable and the underlying SQL injection flaw remained open, allegedly exposing a total of 5.5 million accounts. The breach included email addresses and passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/iDressup.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":256,\"Name\":\"gPotato\",\"Title\":\"gPotato\",\"Domain\":\"gpotato.com\",\"BreachDate\":\"2007-07-12T00:00:00.000Z\",\"AddedDate\":\"2016-09-24T21:37:43.000Z\",\"ModifiedDate\":\"2016-09-24T21:37:43.000Z\",\"PwnCount\":2136520,\"Description\":\"In July 2007, the multiplayer game portal known as \u003ca href=\\\"https://web.archive.org/web/20070710161412/http://gpotato.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003egPotato\u003c/a\u003e (link to archive of the site at that time) suffered a data breach and over 2 million user accounts were exposed. The site later merged into the \u003ca href=\\\"http://www.webzen.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWebzen portal\u003c/a\u003e where the original accounts still exist today. The exposed data included usernames, email and IP addresses, MD5 hashes and personal attributes such as gender, birth date, physical address and security questions and answers stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/gPotato.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"security-questions-and-answers\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":241,\"Name\":\"GameTuts\",\"Title\":\"GameTuts\",\"Domain\":\"game-tuts.com\",\"BreachDate\":\"2015-03-01T00:00:00.000Z\",\"AddedDate\":\"2016-09-23T23:59:38.000Z\",\"ModifiedDate\":\"2016-09-23T23:59:38.000Z\",\"PwnCount\":2064274,\"Description\":\"Likely in early 2015, the video game website GameTuts suffered a data breach and over 2 million user accounts were exposed. The site later \u003ca href=\\\"https://twitter.com/TeamModio/status/756705841168916486\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eshut down in July 2016\u003c/a\u003e but was identified as having been hosted on a vBulletin forum. The exposed data included usernames, email and IP addresses and salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GameTuts.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":320,\"Name\":\"Lastfm\",\"Title\":\"Last.fm\",\"Domain\":\"last.fm\",\"BreachDate\":\"2012-03-22T00:00:00.000Z\",\"AddedDate\":\"2016-09-20T20:00:49.000Z\",\"ModifiedDate\":\"2016-09-20T20:00:49.000Z\",\"PwnCount\":37217682,\"Description\":\"In March 2012, the music website \u003ca href=\\\"https://techcrunch.com/2016/09/01/43-million-passwords-hacked-in-last-fm-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLast.fm was hacked\u003c/a\u003e and 43 million user accounts were exposed. Whilst \u003ca href=\\\"http://www.last.fm/passwordsecurity\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLast.fm knew of an incident back in 2012\u003c/a\u003e, the scale of the hack was not known until the data was released publicly in September 2016. The breach included 37 million unique email addresses, usernames and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lastfm.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":378,\"Name\":\"MoDaCo\",\"Title\":\"MoDaCo\",\"Domain\":\"modaco.com\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-09-20T07:32:50.000Z\",\"ModifiedDate\":\"2016-09-20T07:32:50.000Z\",\"PwnCount\":879703,\"Description\":\"In approximately January 2016, the UK based Android community known as \u003ca href=\\\"http://www.modaco.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMoDaCo\u003c/a\u003e suffered a data breach which exposed 880k subscriber identities. The data included email and IP addresses, usernames and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MoDaCo.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":195,\"Name\":\"eThekwiniMunicipality\",\"Title\":\"eThekwini Municipality\",\"Domain\":\"eservices.durban.gov.za\",\"BreachDate\":\"2016-09-07T00:00:00.000Z\",\"AddedDate\":\"2016-09-15T00:01:47.000Z\",\"ModifiedDate\":\"2016-09-15T00:01:47.000Z\",\"PwnCount\":81830,\"Description\":\"In September 2016, \u003ca href=\\\"http://eservices.durban.gov.za\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe new eThekwini eServices website\u003c/a\u003e in South Africa was launched with a number of security holes that lead to \u003ca href=\\\"http://mybroadband.co.za/news/security/179064-ethekwini-municipality-leaking-private-details-of-over-300000-residents.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe leak of over 98k residents' personal information and utility bills\u003c/a\u003e across 82k unique email addresses. Emails were sent prior to launch containing passwords in plain text and the site allowed anyone to download utility bills without sufficient authentication. Various methods of customer data enumeration was possible and phishing attacks began appearing the day after launch.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/eThekwiniMunicipality.png\",\"DataClasses\":[\"dates-of-birth\",\"deceased-date\",\"email-addresses\",\"genders\",\"government-issued-ids\",\"names\",\"passport-numbers\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"utility-bills\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":484,\"Name\":\"BlueSnapRegpack\",\"Title\":\"Regpack\",\"Domain\":\"bluesnap.com\",\"BreachDate\":\"2016-05-20T00:00:00.000Z\",\"AddedDate\":\"2016-09-13T04:35:05.000Z\",\"ModifiedDate\":\"2016-09-13T04:35:05.000Z\",\"PwnCount\":104977,\"Description\":\"$20\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BlueSnapRegpack.png\",\"DataClasses\":[\"browser-user-agent-details\",\"credit-card-cvv\",\"email-addresses\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"phone-numbers\",\"physical-addresses\",\"purchases\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":118,\"Name\":\"ClixSense\",\"Title\":\"ClixSense\",\"Domain\":\"clixsense.com\",\"BreachDate\":\"2016-09-04T00:00:00.000Z\",\"AddedDate\":\"2016-09-11T06:37:25.000Z\",\"ModifiedDate\":\"2016-09-11T06:37:25.000Z\",\"PwnCount\":2424784,\"Description\":\"In September 2016, the paid-to-click site \u003ca href=\\\"http://cybercashworldwide.com/clixsense-has-been-hacked\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eClixSense suffered a data breach\u003c/a\u003e which exposed 2.4 million subscriber identities. The breached data was then posted online by the attackers who claimed it was a subset of a larger data breach totalling 6.6 million records. The leaked data was extensive and included names, physical, email and IP addresses, genders and birth dates, account balances and passwords stored as plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ClixSense.png\",\"DataClasses\":[\"account-balances\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"payment-histories\",\"payment-methods\",\"physical-addresses\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":450,\"Name\":\"Pokebip\",\"Title\":\"Pokébip\",\"Domain\":\"pokebip.com\",\"BreachDate\":\"2015-07-28T00:00:00.000Z\",\"AddedDate\":\"2016-09-09T04:43:00.000Z\",\"ModifiedDate\":\"2016-09-09T04:43:00.000Z\",\"PwnCount\":657001,\"Description\":\"In July 2015, the French Pokémon site \u003ca href=\\\"https://www.pokebip.com/news3382__message_de_securite_de_l_equipe_pokebip_.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePokébip suffered a data breach\u003c/a\u003e which exposed 657k subscriber identities. The data included email and IP addresses, usernames and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Pokebip.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"time-zones\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":162,\"Name\":\"DLH\",\"Title\":\"DLH.net\",\"Domain\":\"dlh.net\",\"BreachDate\":\"2016-07-31T00:00:00.000Z\",\"AddedDate\":\"2016-09-07T13:29:25.000Z\",\"ModifiedDate\":\"2016-09-07T13:29:25.000Z\",\"PwnCount\":3264710,\"Description\":\"In July 2016, the gaming news site \u003ca href=\\\"http://www.zdnet.com/article/millions-of-steam-game-keys-stolen-after-site-hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDLH.net suffered a data breach\u003c/a\u003e which exposed 3.3M subscriber identities. Along with the keys used to redeem and activate games on the Steam platform, the breach also resulted in the exposure of email addresses, birth dates and salted MD5 password hashes. The data was donated to Have I Been Pwned by data breach monitoring service \u003ca href=\\\"https://vigilante.pw/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DLH.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"names\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":203,\"Name\":\"Experian\",\"Title\":\"Experian (2015)\",\"Domain\":\"experian.com\",\"BreachDate\":\"2015-09-16T00:00:00.000Z\",\"AddedDate\":\"2016-09-06T23:49:00.000Z\",\"ModifiedDate\":\"2020-11-22T05:42:00.000Z\",\"PwnCount\":7196890,\"Description\":\"In September 2015, the US based credit bureau and consumer data broker \u003ca href=\\\"http://krebsonsecurity.com/2015/10/experian-breach-affects-15-million-consumers/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eExperian suffered a data breach\u003c/a\u003e that impacted 15 million customers who had applied for financing from T-Mobile. An alleged data breach was subsequently circulated containing personal information including names, physical and email addresses, birth dates and various other personal attributes. Multiple Have I Been Pwned subscribers verified portions of the data as being accurate, but the actual source of it was inconclusive therefor this breach has been flagged as \u0026quot;unverified\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Experian.png\",\"DataClasses\":[\"credit-status-information\",\"dates-of-birth\",\"email-addresses\",\"ethnicities\",\"family-structure\",\"genders\",\"home-ownership-statuses\",\"income-levels\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"purchasing-habits\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":220,\"Name\":\"FlashFlashRevolution\",\"Title\":\"Flash Flash Revolution (2016 breach)\",\"Domain\":\"flashflashrevolution.com\",\"BreachDate\":\"2016-02-01T00:00:00.000Z\",\"AddedDate\":\"2016-09-06T08:08:29.000Z\",\"ModifiedDate\":\"2019-07-21T16:28:59.000Z\",\"PwnCount\":1771845,\"Description\":\"In February 2016, the music-based rhythm game known as \u003ca href=\\\"http://www.flashflashrevolution.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFlash Flash Revolution\u003c/a\u003e was hacked and 1.8M accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FlashFlashRevolution.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":421,\"Name\":\"Onverse\",\"Title\":\"Onverse\",\"Domain\":\"onverse.com\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-09-06T06:28:30.000Z\",\"ModifiedDate\":\"2016-09-06T06:28:30.000Z\",\"PwnCount\":800157,\"Description\":\"In January 2016, the online virtual world known as \u003ca href=\\\"http://www.onverse.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOnverse\u003c/a\u003e was hacked and 800k accounts were exposed. Along with email and IP addresses, the site also exposed salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Onverse.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":627,\"Name\":\"WIIUISO\",\"Title\":\"WIIU ISO\",\"Domain\":\"wiiuiso.com\",\"BreachDate\":\"2015-09-25T00:00:00.000Z\",\"AddedDate\":\"2016-09-06T05:51:12.000Z\",\"ModifiedDate\":\"2016-09-06T05:51:12.000Z\",\"PwnCount\":458155,\"Description\":\"In September 2015, the Nintendo Wii U forum known as \u003ca href=\\\"http://www.wiiuiso.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWIIU ISO\u003c/a\u003e was hacked and 458k accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WIIUISO.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":502,\"Name\":\"ServerPact\",\"Title\":\"ServerPact\",\"Domain\":\"serverpact.com\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-09-06T04:21:06.000Z\",\"ModifiedDate\":\"2016-09-06T04:21:06.000Z\",\"PwnCount\":73587,\"Description\":\"In mid-2015, the Dutch Minecraft site \u003ca href=\\\"https://twitter.com/serverpact/status/772534083788365829\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eServerPact was hacked\u003c/a\u003e and 73k accounts were exposed. Along with birth dates, email and IP addresses, the site also exposed SHA1 password hashes with the username as the salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ServerPact.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":91,\"Name\":\"Brazzers\",\"Title\":\"Brazzers\",\"Domain\":\"brazzers.com\",\"BreachDate\":\"2013-04-01T00:00:00.000Z\",\"AddedDate\":\"2016-09-05T10:02:23.000Z\",\"ModifiedDate\":\"2016-09-05T10:02:23.000Z\",\"PwnCount\":790724,\"Description\":\"In April 2013, the adult website known as \u003ca href=\\\"https://motherboard.vice.com/read/nearly-800000-brazzers-porn-site-accounts-exposed-in-forum-hack\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBrazzers was hacked\u003c/a\u003e and 790k accounts were exposed publicly. Each record included a username, email address and password stored in plain text. The breach was brought to light by the \u003ca href=\\\"https://vigilante.pw\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVigilante.pw\u003c/a\u003e data breach reporting site in September 2016.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Brazzers.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":171,\"Name\":\"Dropbox\",\"Title\":\"Dropbox\",\"Domain\":\"dropbox.com\",\"BreachDate\":\"2012-07-01T00:00:00.000Z\",\"AddedDate\":\"2016-08-31T00:19:19.000Z\",\"ModifiedDate\":\"2016-08-31T00:19:19.000Z\",\"PwnCount\":68648009,\"Description\":\"In mid-2012, Dropbox suffered a data breach which exposed the stored credentials of tens of millions of their customers. In August 2016, \u003ca href=\\\"https://motherboard.vice.com/read/dropbox-forces-password-resets-after-user-credentials-exposed\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethey forced password resets for customers they believed may be at risk\u003c/a\u003e. A large volume of data totalling over 68 million records \u003ca href=\\\"https://motherboard.vice.com/read/hackers-stole-over-60-million-dropbox-accounts\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas subsequently traded online\u003c/a\u003e and included email addresses and salted hashes of passwords (half of them SHA1, half of them bcrypt).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dropbox.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":298,\"Name\":\"Interpals\",\"Title\":\"InterPals\",\"Domain\":\"interpals.net\",\"BreachDate\":\"2015-11-04T00:00:00.000Z\",\"AddedDate\":\"2016-08-30T11:22:42.000Z\",\"ModifiedDate\":\"2016-08-30T11:22:42.000Z\",\"PwnCount\":3439414,\"Description\":\"In late 2015, the online penpal site InterPals had their website hacked and 3.4 million accounts exposed. The compromised data included email addresses, geographical locations, birthdates and salted hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Interpals.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":408,\"Name\":\"Nihonomaru\",\"Title\":\"Nihonomaru\",\"Domain\":\"nihonomaru.net\",\"BreachDate\":\"2015-12-01T00:00:00.000Z\",\"AddedDate\":\"2016-08-30T09:54:55.000Z\",\"ModifiedDate\":\"2016-08-30T09:54:55.000Z\",\"PwnCount\":1697282,\"Description\":\"In late 2015, the anime community known as Nihonomaru had their vBulletin forum hacked and 1.7 million accounts exposed. The compromised data included email and IP addresses, usernames and salted hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Nihonomaru.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":372,\"Name\":\"MinecraftWorldMap\",\"Title\":\"Minecraft World Map\",\"Domain\":\"minecraftworldmap.com\",\"BreachDate\":\"2016-01-15T00:00:00.000Z\",\"AddedDate\":\"2016-08-29T01:07:38.000Z\",\"ModifiedDate\":\"2016-08-29T01:07:38.000Z\",\"PwnCount\":71081,\"Description\":\"In approximately January 2016, the Minecraft World Map site designed for sharing maps created for the game was hacked and over 71k user accounts were exposed. The data included usernames, email and IP addresses along with salted and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MinecraftWorldMap.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":259,\"Name\":\"GTAGaming\",\"Title\":\"GTAGaming\",\"Domain\":\"gtagaming.com\",\"BreachDate\":\"2016-08-01T00:00:00.000Z\",\"AddedDate\":\"2016-08-23T20:41:17.000Z\",\"ModifiedDate\":\"2016-08-23T20:41:17.000Z\",\"PwnCount\":197184,\"Description\":\"In August 2016, the Grand Theft Auto forum \u003ca href=\\\"https://motherboard.vice.com/read/grand-theft-auto-fan-site-hacked\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGTAGaming was hacked and nearly 200k user accounts were leaked\u003c/a\u003e. The vBulletin based forum included usernames, email addresses and password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GTAGaming.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":555,\"Name\":\"Teracod\",\"Title\":\"Teracod\",\"Domain\":\"teracod.org\",\"BreachDate\":\"2016-05-28T00:00:00.000Z\",\"AddedDate\":\"2016-08-22T11:21:27.000Z\",\"ModifiedDate\":\"2016-08-22T11:21:27.000Z\",\"PwnCount\":97151,\"Description\":\"In May 2015, almost 100k user records were extracted from the Hungarian torrent site known as Teracod. The data was later discovered being torrented itself and included email addresses, passwords, private messages between members and the peering history of IP addresses using the service.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Teracod.png\",\"DataClasses\":[\"avatars\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"payment-histories\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":636,\"Name\":\"xat\",\"Title\":\"xat\",\"Domain\":\"xat.com\",\"BreachDate\":\"2015-11-04T00:00:00.000Z\",\"AddedDate\":\"2016-08-05T06:53:35.000Z\",\"ModifiedDate\":\"2016-08-05T06:53:35.000Z\",\"PwnCount\":5968783,\"Description\":\"In November 2015, the online chatroom known as \u003ca href=\\\"http://xat.com/databreach.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e\u0026quot;xat\u0026quot; was hacked\u003c/a\u003e and 6 million user accounts were exposed. Used as a chat engine on websites, the leaked data included usernames, email and IP addresses along with hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/xat.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":615,\"Name\":\"Warframe\",\"Title\":\"Warframe\",\"Domain\":\"warframe.com\",\"BreachDate\":\"2014-11-24T00:00:00.000Z\",\"AddedDate\":\"2016-07-21T02:25:49.000Z\",\"ModifiedDate\":\"2016-07-21T02:25:49.000Z\",\"PwnCount\":819478,\"Description\":\"In November 2014, the online game \u003ca href=\\\"http://motherboard.vice.com/read/gaming-site-warframe-hacked\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWarframe was hacked\u003c/a\u003e and 819k unique email addresses were exposed. Allegedly due to a SQL injection flaw in Drupal, the attack exposed usernames, email addresses and data in a \\\"pass\\\" column which adheres to the salted SHA12 password hashing pattern used by Drupal 7. Digital Extremes (the developers of Warframe), asserts the salted hashes are of \\\"alias names\\\" rather than passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Warframe.png\",\"DataClasses\":[\"email-addresses\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":576,\"Name\":\"Trillian\",\"Title\":\"Trillian\",\"Domain\":\"trillian.im\",\"BreachDate\":\"2015-12-27T00:00:00.000Z\",\"AddedDate\":\"2016-07-15T11:14:44.000Z\",\"ModifiedDate\":\"2016-07-15T11:14:44.000Z\",\"PwnCount\":3827238,\"Description\":\"In December 2015, the instant messaging application \u003ca href=\\\"https://www.trillian.im/help/trillian-blog-and-forums-security-incident/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTrillian suffered a data breach\u003c/a\u003e. The breach became known in July 2016 and exposed various personal data attributes including names, email addresses and passwords stored as salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Trillian.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":4,\"Name\":\"17Media\",\"Title\":\"17\",\"Domain\":\"17app.co\",\"BreachDate\":\"2016-04-19T00:00:00.000Z\",\"AddedDate\":\"2016-07-08T01:55:03.000Z\",\"ModifiedDate\":\"2016-07-08T01:55:03.000Z\",\"PwnCount\":4009640,\"Description\":\"In April 2016, customer data obtained from the streaming app known as \u0026quot;17\u0026quot; \u003ca href=\\\"http://motherboard.vice.com/read/another-day-another-hack-millions-of-user-accounts-for-streaming-app-17\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eappeared listed for sale on a Tor hidden service marketplace\u003c/a\u003e. The data contained over 4 million unique email addresses along with IP addresses, usernames and passwords stored as unsalted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/17Media.png\",\"DataClasses\":[\"device-information\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":399,\"Name\":\"Neopets\",\"Title\":\"Neopets\",\"Domain\":\"neopets.com\",\"BreachDate\":\"2013-05-05T00:00:00.000Z\",\"AddedDate\":\"2016-07-07T23:00:10.000Z\",\"ModifiedDate\":\"2016-07-07T23:00:10.000Z\",\"PwnCount\":26892897,\"Description\":\"In May 2016, \u003ca href=\\\"http://motherboard.vice.com/read/neopets-hack-another-day-another-hack-tens-of-millions-of-neopets-accounts\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea set of breached data originating from the virtual pet website \u0026quot;Neopets\u0026quot; was found being traded online\u003c/a\u003e. Allegedly hacked \u0026quot;several years earlier\u0026quot;, the data contains sensitive personal information including birthdates, genders and names as well as almost 27 million unique email addresses. Passwords were stored in plain text and IP addresses were also present in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Neopets.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":59,\"Name\":\"Badoo\",\"Title\":\"Badoo\",\"Domain\":\"badoo.com\",\"BreachDate\":\"2013-06-01T00:00:00.000Z\",\"AddedDate\":\"2016-07-06T08:16:03.000Z\",\"ModifiedDate\":\"2016-07-06T08:16:03.000Z\",\"PwnCount\":112005531,\"Description\":\"In June 2016, \u003ca href=\\\"http://motherboard.vice.com/read/another-day-another-hack-user-accounts-of-dating-site-badoo\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ea data breach allegedly originating from the social website Badoo was found to be circulating amongst traders\u003c/a\u003e. Likely obtained several years earlier, the data contained 112 million unique email addresses with personal data including names, birthdates and passwords stored as MD5 hashes. Whilst there are many indicators suggesting Badoo did indeed suffer a data breach, \u003ca href=\\\"https://www.troyhunt.com/introducing-unverified-breaches-to-have-i-been-pwned\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe legitimacy of the data could not be emphatically proven\u003c/a\u003e so this breach has been categorised as \u0026quot;unverified\u0026quot;.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Badoo.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":291,\"Name\":\"iMesh\",\"Title\":\"iMesh\",\"Domain\":\"imesh.com\",\"BreachDate\":\"2013-09-22T00:00:00.000Z\",\"AddedDate\":\"2016-07-02T05:42:13.000Z\",\"ModifiedDate\":\"2016-07-02T05:42:13.000Z\",\"PwnCount\":49467477,\"Description\":\"In September 2013, the media and file sharing client known as \u003ca href=\\\"http://www.ibtimes.co.uk/imesh-hack-more-51-million-user-records-former-filesharing-site-sale-dark-web-1565185\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eiMesh was hacked and approximately 50M accounts were exposed\u003c/a\u003e. The data was later put up for sale on a dark market website in mid-2016 and included email and IP addresses, usernames and salted MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/iMesh.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":566,\"Name\":\"Tianya\",\"Title\":\"Tianya\",\"Domain\":\"tianya.cn\",\"BreachDate\":\"2011-12-26T00:00:00.000Z\",\"AddedDate\":\"2016-06-30T03:39:05.000Z\",\"ModifiedDate\":\"2016-06-30T03:39:05.000Z\",\"PwnCount\":29020808,\"Description\":\"In December 2011, \u003ca href=\\\"http://thehackernews.com/2011/12/tianya-chinas-biggest-online-forum-40.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eChina's largest online forum known as Tianya was hacked\u003c/a\u003e and tens of millions of accounts were obtained by the attacker. The leaked data included names, usernames and email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tianya.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":388,\"Name\":\"MuslimMatch\",\"Title\":\"Muslim Match\",\"Domain\":\"muslimmatch.com\",\"BreachDate\":\"2016-06-24T00:00:00.000Z\",\"AddedDate\":\"2016-06-29T19:08:15.000Z\",\"ModifiedDate\":\"2020-08-07T23:29:01.000Z\",\"PwnCount\":149830,\"Description\":\"In June 2016, \u003ca href=\\\"https://motherboard.vice.com/read/hacked-private-messages-from-dating-site-muslim-match\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Muslim Match dating website had 150k email addresses exposed\u003c/a\u003e. The data included private chats and messages between relationship seekers and numerous other personal attributes including passwords hashed with MD5.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MuslimMatch.png\",\"DataClasses\":[\"chat-logs\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"private-messages\",\"user-statuses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":624,\"Name\":\"WHMCS\",\"Title\":\"WHMCS\",\"Domain\":\"whmcs.com\",\"BreachDate\":\"2012-05-21T00:00:00.000Z\",\"AddedDate\":\"2016-06-28T23:47:07.000Z\",\"ModifiedDate\":\"2016-06-28T23:47:07.000Z\",\"PwnCount\":134047,\"Description\":\"In May 2012, the web hosting, billing and automation company \u003ca href=\\\"http://news.softpedia.com/news/UGNazi-Leaks-1-7-GB-of-Data-from-WHMCS-Servers-270914.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWHMCS suffered a data breach\u003c/a\u003e that exposed 134k email addresses. The breach included extensive information about customers and payment histories including partial credit card numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WHMCS.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\",\"employers\",\"ip-addresses\",\"names\",\"partial-credit-card-data\",\"passwords\",\"payment-histories\",\"physical-addresses\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":584,\"Name\":\"Uiggy\",\"Title\":\"Uiggy\",\"Domain\":\"uiggy.com\",\"BreachDate\":\"2016-06-01T00:00:00.000Z\",\"AddedDate\":\"2016-06-27T08:07:18.000Z\",\"ModifiedDate\":\"2016-06-27T08:07:18.000Z\",\"PwnCount\":2682650,\"Description\":\"In June 2016, the Facebook application known as \u003ca href=\\\"http://www.uiggy.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eUiggy\u003c/a\u003e was hacked and 4.3M accounts were exposed, 2.7M of which had email addresses against them. The leaked accounts also exposed names, genders and the Facebook ID of the owners.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Uiggy.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"names\",\"social-connections\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":606,\"Name\":\"VK\",\"Title\":\"VK\",\"Domain\":\"vk.com\",\"BreachDate\":\"2012-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-06-09T09:16:36.000Z\",\"ModifiedDate\":\"2016-06-09T09:16:36.000Z\",\"PwnCount\":93338602,\"Description\":\"In approximately 2012, the Russian social media site known as \u003ca href=\\\"http://motherboard.vice.com/read/another-day-another-hack-100-million-accounts-for-vk-russias-facebook\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVK was hacked\u003c/a\u003e and almost 100 million accounts were exposed. The data emerged in June 2016 where it was being sold via a dark market website and included names, phone numbers email addresses and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VK.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":77,\"Name\":\"BitTorrent\",\"Title\":\"BitTorrent\",\"Domain\":\"bittorrent.com\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-06-08T10:49:24.000Z\",\"ModifiedDate\":\"2016-06-08T10:49:24.000Z\",\"PwnCount\":34235,\"Description\":\"In January 2016, the forum for the popular torrent software \u003ca href=\\\"https://motherboard.vice.com/read/another-day-another-hack-user-accounts-for-bittorrents-forum-hacking\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBitTorrent was hacked\u003c/a\u003e. The IP.Board based forum stored passwords as weak SHA1 salted hashes and the breached data also included usernames, email and IP addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BitTorrent.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":393,\"Name\":\"MySpace\",\"Title\":\"MySpace\",\"Domain\":\"myspace.com\",\"BreachDate\":\"2008-07-01T00:00:00.000Z\",\"AddedDate\":\"2016-05-31T00:12:29.000Z\",\"ModifiedDate\":\"2016-05-31T00:12:29.000Z\",\"PwnCount\":359420698,\"Description\":\"In approximately 2008, \u003ca href=\\\"http://motherboard.vice.com/read/427-million-myspace-passwords-emails-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMySpace suffered a data breach that exposed almost 360 million accounts\u003c/a\u003e. In May 2016 the data was offered up for sale on the \u0026quot;Real Deal\u0026quot; dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but \u003ca href=\\\"https://www.troyhunt.com/dating-the-ginormous-myspace-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eanalysis of the data suggests it was 8 years before being made public\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MySpace.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":580,\"Name\":\"Tumblr\",\"Title\":\"tumblr\",\"Domain\":\"tumblr.com\",\"BreachDate\":\"2013-02-28T00:00:00.000Z\",\"AddedDate\":\"2016-05-29T22:59:04.000Z\",\"ModifiedDate\":\"2016-05-29T22:59:04.000Z\",\"PwnCount\":65469298,\"Description\":\"In early 2013, \u003ca href=\\\"https://staff.tumblr.com/post/144263069415/we-recently-learned-that-a-third-party-had\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003etumblr suffered a data breach\u003c/a\u003e which resulted in the exposure of over 65 million accounts. The data was later put up for sale on a dark market website and included email addresses and passwords stored as salted SHA1 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tumblr.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":224,\"Name\":\"Fling\",\"Title\":\"Fling\",\"Domain\":\"fling.com\",\"BreachDate\":\"2011-03-10T00:00:00.000Z\",\"AddedDate\":\"2016-05-28T23:08:07.000Z\",\"ModifiedDate\":\"2016-05-28T23:08:07.000Z\",\"PwnCount\":40767652,\"Description\":\"In 2011, the self-proclaimed \u0026quot;World's Best Adult Social Network\u0026quot; website known as Fling \u003ca href=\\\"http://motherboard.vice.com/read/another-day-another-hack-passwords-and-sexual-desires-for-dating-site-fling\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked and more than 40 million accounts obtained by the attacker\u003c/a\u003e. The breached data included highly sensitive personal attributes such as sexual orientation and sexual interests as well as email addresses and passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Fling.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"phone-numbers\",\"sexual-fetishes\",\"sexual-orientations\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":236,\"Name\":\"FurAffinity\",\"Title\":\"Fur Affinity\",\"Domain\":\"furaffinity.net\",\"BreachDate\":\"2016-05-17T00:00:00.000Z\",\"AddedDate\":\"2016-05-27T09:36:18.000Z\",\"ModifiedDate\":\"2016-05-27T09:36:18.000Z\",\"PwnCount\":1270564,\"Description\":\"In May 2016, the Fur Affinity website for people with an interest in anthropomorphic animal characters (also known as \\\"furries\\\") \u003ca href=\\\"http://motherboard.vice.com/read/another-day-another-hack-furry-site-hacked-content-deleted\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked\u003c/a\u003e. The attack exposed 1.2M email addresses (many accounts had a different \\\"first\\\" and \\\"last\\\" email against them) and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FurAffinity.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":332,\"Name\":\"LinkedIn\",\"Title\":\"LinkedIn\",\"Domain\":\"linkedin.com\",\"BreachDate\":\"2012-05-05T00:00:00.000Z\",\"AddedDate\":\"2016-05-21T21:35:40.000Z\",\"ModifiedDate\":\"2016-05-21T21:35:40.000Z\",\"PwnCount\":164611595,\"Description\":\"In May 2016, \u003ca href=\\\"https://www.troyhunt.com/observations-and-thoughts-on-the-linkedin-data-breach\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLinkedIn had 164 million email addresses and passwords exposed\u003c/a\u003e. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LinkedIn.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":493,\"Name\":\"RosebuttBoard\",\"Title\":\"Rosebutt Board\",\"Domain\":\"rosebuttboard.com\",\"BreachDate\":\"2016-05-09T00:00:00.000Z\",\"AddedDate\":\"2016-05-10T07:37:46.000Z\",\"ModifiedDate\":\"2016-05-10T07:37:46.000Z\",\"PwnCount\":107303,\"Description\":\"Some time prior to May 2016, \u003ca href=\\\"https://motherboard.vice.com/read/rosebuttboard-ip-board\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe forum known as \u0026quot;Rosebutt Board\u0026quot; was hacked\u003c/a\u003e and 107k accounts were exposed. The self-described \u0026quot;top one board for anal fisting, prolapse, huge insertions and rosebutt fans\u0026quot; had email and IP addresses, usernames and weakly stored salted MD5 password hashes hacked from the IP.Board based forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/RosebuttBoard.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":414,\"Name\":\"Nulled\",\"Title\":\"Nulled.cr\",\"Domain\":\"nulled.cr\",\"BreachDate\":\"2016-05-06T00:00:00.000Z\",\"AddedDate\":\"2016-05-09T11:28:01.000Z\",\"ModifiedDate\":\"2020-05-24T07:00:23.000Z\",\"PwnCount\":599080,\"Description\":\"In May 2016, the cracking community forum known as \u003ca href=\\\"http://nulled.cr/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNulled.cr\u003c/a\u003e was hacked and 599k user accounts were leaked publicly. The compromised data included email and IP addresses, weak salted MD5 password hashes and hundreds of thousands of private messages between members.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Nulled.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":467,\"Name\":\"QatarNationalBank\",\"Title\":\"Qatar National Bank\",\"Domain\":\"qnb.com\",\"BreachDate\":\"2015-07-01T00:00:00.000Z\",\"AddedDate\":\"2016-05-01T01:06:35.000Z\",\"ModifiedDate\":\"2016-05-01T01:06:35.000Z\",\"PwnCount\":88678,\"Description\":\"In July 2015, the Qatar National Bank \u003ca href=\\\"http://www.theregister.co.uk/2016/04/25/breaking_qatar_bank_hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach\u003c/a\u003e which exposed 15k documents totalling 1.4GB and detailing more than 100k accounts with passwords and PINs. The incident was made public some 9 months later in April 2016 when the documents appeared publicly on a file sharing site. Analysis of the breached data suggests \u003ca href=\\\"http://blog.trendmicro.co.uk/qatar-bank-breach-lifts-the-veil-on-targeted-attack-strategies/#more-520\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe attack began by exploiting a SQL injection flaw\u003c/a\u003e in the bank's website.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/QatarNationalBank.png\",\"DataClasses\":[\"bank-account-numbers\",\"customer-feedback\",\"dates-of-birth\",\"financial-transactions\",\"genders\",\"geographic-locations\",\"government-issued-ids\",\"ip-addresses\",\"marital-statuses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"pins\",\"security-questions-and-answers\",\"spoken-languages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":328,\"Name\":\"Lifeboat\",\"Title\":\"Lifeboat\",\"Domain\":\"lbsg.net\",\"BreachDate\":\"2016-01-01T00:00:00.000Z\",\"AddedDate\":\"2016-04-25T21:51:50.000Z\",\"ModifiedDate\":\"2016-04-25T21:51:50.000Z\",\"PwnCount\":7089395,\"Description\":\"In January 2016, the Minecraft community known as Lifeboat \u003ca href=\\\"https://motherboard.vice.com/read/another-day-another-hack-7-million-emails-and-hashed-passwords-for-minecraft\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked and more than 7 million accounts leaked\u003c/a\u003e. Lifeboat knew of the incident for three months before the breach was made public but elected not to advise customers. The leaked data included usernames, email addresses and passwords stored as straight MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Lifeboat.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":64,\"Name\":\"BeautifulPeople\",\"Title\":\"Beautiful People\",\"Domain\":\"beautifulpeople.com\",\"BreachDate\":\"2015-11-11T00:00:00.000Z\",\"AddedDate\":\"2016-04-25T10:05:34.000Z\",\"ModifiedDate\":\"2016-04-25T10:05:34.000Z\",\"PwnCount\":1100089,\"Description\":\"In November 2015, the dating website \u003ca href=\\\"http://www.forbes.com/sites/thomasbrewster/2016/04/25/beautiful-people-hack-sexual-preference-location-addresses/#26a2cdf7559f\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBeautiful People was hacked\u003c/a\u003e and over 1.1M accounts were leaked. The data was being traded in underground circles and included a huge amount of personal information related to dating.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BeautifulPeople.png\",\"DataClasses\":[\"beauty-ratings\",\"car-ownership-statuses\",\"dates-of-birth\",\"drinking-habits\",\"education-levels\",\"email-addresses\",\"genders\",\"geographic-locations\",\"home-ownership-statuses\",\"income-levels\",\"ip-addresses\",\"job-titles\",\"names\",\"passwords\",\"personal-descriptions\",\"personal-interests\",\"physical-attributes\",\"sexual-orientations\",\"smoking-habits\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":577,\"Name\":\"TruckersMP\",\"Title\":\"TruckersMP\",\"Domain\":\"truckersmp.com\",\"BreachDate\":\"2016-02-25T00:00:00.000Z\",\"AddedDate\":\"2016-04-24T21:27:05.000Z\",\"ModifiedDate\":\"2016-04-24T21:27:05.000Z\",\"PwnCount\":83957,\"Description\":\"In February 2016, the online trucking simulator mod \u003ca href=\\\"http://truckersmp.com/en_US/blog/8\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTruckersMP suffered a data breach\u003c/a\u003e which exposed 84k user accounts. In a first for \\\"Have I Been Pwned\\\", \u003ca href=\\\"https://www.troyhunt.com/100-data-breaches-later-have-i-been-pwned-gets-its-first-self-submission/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe breached data was self-submitted directly by the organisation that was breached itself\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TruckersMP.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":397,\"Name\":\"NaughtyAmerica\",\"Title\":\"Naughty America\",\"Domain\":\"naughtyamerica.com\",\"BreachDate\":\"2016-03-14T00:00:00.000Z\",\"AddedDate\":\"2016-04-24T06:14:42.000Z\",\"ModifiedDate\":\"2016-04-24T06:14:42.000Z\",\"PwnCount\":1398630,\"Description\":\"In March 2016, the adult website \u003ca href=\\\"http://www.forbes.com/sites/thomasbrewster/2016/04/14/naughty-america-fappening-hacked-porn-sites/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNaughty America was hacked and the data consequently sold online\u003c/a\u003e. The breach included data from numerous systems with various personal identity attributes, the largest of which had passwords stored as easily crackable MD5 hashes. There were 1.4 million unique email addresses in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NaughtyAmerica.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":362,\"Name\":\"Mate1\",\"Title\":\"Mate1.com\",\"Domain\":\"mate1.com\",\"BreachDate\":\"2016-02-29T00:00:00.000Z\",\"AddedDate\":\"2016-04-14T23:37:15.000Z\",\"ModifiedDate\":\"2016-04-14T23:37:15.000Z\",\"PwnCount\":27393015,\"Description\":\"In February 2016, the dating site \u003ca href=\\\"http://motherboard.vice.com/read/hacker-claims-to-have-sold-27m-dating-site-passwords-mate1-com-hell-forum\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emate1.com suffered a huge data breach\u003c/a\u003e resulting in the disclosure of over 27 million subscribers' information. The data included deeply personal information about their private lives including drug and alcohol habits, incomes levels and sexual fetishes as well as passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mate1.png\",\"DataClasses\":[\"astrological-signs\",\"dates-of-birth\",\"drinking-habits\",\"drug-habits\",\"education-levels\",\"email-addresses\",\"ethnicities\",\"fitness-levels\",\"genders\",\"geographic-locations\",\"income-levels\",\"job-titles\",\"names\",\"parenting-plans\",\"passwords\",\"personal-descriptions\",\"physical-attributes\",\"political-views\",\"relationship-statuses\",\"religions\",\"sexual-fetishes\",\"travel-habits\",\"usernames\",\"website-activity\",\"work-habits\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":128,\"Name\":\"COMELEC\",\"Title\":\"COMELEC (Philippines Voters)\",\"Domain\":\"comelec.gov.ph\",\"BreachDate\":\"2016-03-27T00:00:00.000Z\",\"AddedDate\":\"2016-04-14T02:24:32.000Z\",\"ModifiedDate\":\"2016-04-14T02:24:32.000Z\",\"PwnCount\":228605,\"Description\":\"In March 2016, \u003ca href=\\\"http://www.comelec.gov.ph/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Philippines Commission of Elections website\u003c/a\u003e (COMELEC) was \u003ca href=\\\"http://www.rappler.com/nation/politics/elections/2016/127256-comelec-website-hacked-anonymous-philippines\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eattacked and defaced\u003c/a\u003e, allegedly by Anonymous Philippines. Shortly after, \u003ca href=\\\"http://www.theregister.co.uk/2016/04/07/philippine_voter_data_breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edata on 55 million Filipino voters was leaked publicly\u003c/a\u003e and included sensitive information such as genders, marital statuses, height and weight and biometric fingerprint data. The breach only included 228k email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/COMELEC.png\",\"DataClasses\":[\"biometric-data\",\"dates-of-birth\",\"email-addresses\",\"family-members-names\",\"genders\",\"job-titles\",\"marital-statuses\",\"names\",\"passport-numbers\",\"phone-numbers\",\"physical-addresses\",\"physical-attributes\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":559,\"Name\":\"TheFappening\",\"Title\":\"The Fappening\",\"Domain\":\"thefappening.so\",\"BreachDate\":\"2015-12-01T00:00:00.000Z\",\"AddedDate\":\"2016-04-13T01:08:20.000Z\",\"ModifiedDate\":\"2016-04-13T01:08:20.000Z\",\"PwnCount\":179030,\"Description\":\"In December 2015, the forum for discussing naked celebrity photos known as \u0026quot;The Fappening\u0026quot; (named after the iCloud leaks of 2014) was compromised and 179k accounts were leaked. Exposed member data included usernames, email addresses and salted hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TheFappening.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":55,\"Name\":\"Avast\",\"Title\":\"Avast\",\"Domain\":\"avast.com\",\"BreachDate\":\"2014-05-26T00:00:00.000Z\",\"AddedDate\":\"2016-03-12T22:08:58.000Z\",\"ModifiedDate\":\"2016-03-12T22:08:58.000Z\",\"PwnCount\":422959,\"Description\":\"In May 2014, \u003ca href=\\\"https://www.grahamcluley.com/2014/05/avast-forum-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Avast anti-virus forum was hacked\u003c/a\u003e and 423k member records were exposed. The Simple Machines Based forum included usernames, emails and password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Avast.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":343,\"Name\":\"LOTR\",\"Title\":\"Lord of the Rings Online\",\"Domain\":\"lotro.com\",\"BreachDate\":\"2013-08-01T00:00:00.000Z\",\"AddedDate\":\"2016-03-12T12:46:03.000Z\",\"ModifiedDate\":\"2016-03-12T12:46:03.000Z\",\"PwnCount\":1141278,\"Description\":\"In August 2013, the interactive video game \u003ca href=\\\"https://www.lotro.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eLord of the Rings Online\u003c/a\u003e suffered a data breach that exposed over 1.1M players' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LOTR.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":175,\"Name\":\"DDO\",\"Title\":\"Dungeons \u0026 Dragons Online\",\"Domain\":\"ddo.com\",\"BreachDate\":\"2013-04-02T00:00:00.000Z\",\"AddedDate\":\"2016-03-12T10:59:56.000Z\",\"ModifiedDate\":\"2016-03-12T10:59:56.000Z\",\"PwnCount\":1580933,\"Description\":\"In April 2013, the interactive video game \u003ca href=\\\"https://www.ddo.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDungeons \u0026amp; Dragons Online\u003c/a\u003e suffered a data breach that exposed almost 1.6M players' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/DDO.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":551,\"Name\":\"Solomid\",\"Title\":\"Team SoloMid\",\"Domain\":\"solomid.net\",\"BreachDate\":\"2014-12-22T00:00:00.000Z\",\"AddedDate\":\"2016-03-09T13:04:08.000Z\",\"ModifiedDate\":\"2016-03-09T13:04:08.000Z\",\"PwnCount\":442166,\"Description\":\"In December 2014, the electronic sports organisation known as \u003ca href=\\\"http://www.dailydot.com/esports/null-consolidated-team-solomid-hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eTeam SoloMid was hacked\u003c/a\u003e and 442k members accounts were leaked. The accounts included email and IP addresses, usernames and salted hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Solomid.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":353,\"Name\":\"Malwarebytes\",\"Title\":\"Malwarebytes\",\"Domain\":\"malwarebytes.org\",\"BreachDate\":\"2014-11-15T00:00:00.000Z\",\"AddedDate\":\"2016-03-09T11:15:43.000Z\",\"ModifiedDate\":\"2016-03-09T11:15:43.000Z\",\"PwnCount\":111623,\"Description\":\"In November 2014, the \u003ca href=\\\"http://www.scmagazine.com/malwarebytes-forum-hacked/article/385187/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMalwarebytes forum was hacked\u003c/a\u003e and 111k member records were exposed. The IP.Board forum included email and IP addresses, birth dates and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Malwarebytes.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":373,\"Name\":\"Minefield\",\"Title\":\"Minefield\",\"Domain\":\"minefield.fr\",\"BreachDate\":\"2015-06-28T00:00:00.000Z\",\"AddedDate\":\"2016-03-09T08:18:43.000Z\",\"ModifiedDate\":\"2016-03-09T08:18:43.000Z\",\"PwnCount\":188343,\"Description\":\"In June 2015, the French Minecraft server known as \u003ca href=\\\"https://www.minefield.fr\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMinefield\u003c/a\u003e was hacked and 188k member records were exposed. The IP.Board forum included email and IP addresses, birth dates and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Minefield.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":500,\"Name\":\"Seedpeer\",\"Title\":\"Seedpeer\",\"Domain\":\"seedpeer.eu\",\"BreachDate\":\"2015-07-12T00:00:00.000Z\",\"AddedDate\":\"2016-03-09T02:49:28.000Z\",\"ModifiedDate\":\"2016-03-09T02:49:28.000Z\",\"PwnCount\":281924,\"Description\":\"In July 2015, the torrent site Seedpeer was hacked and 282k member records were exposed. The data included usernames, email addresses and passwords stored as weak MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Seedpeer.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":541,\"Name\":\"SumoTorrent\",\"Title\":\"Sumo Torrent\",\"Domain\":\"sumotorrent.sx\",\"BreachDate\":\"2014-06-21T00:00:00.000Z\",\"AddedDate\":\"2016-03-09T01:23:23.000Z\",\"ModifiedDate\":\"2016-03-09T01:23:23.000Z\",\"PwnCount\":285191,\"Description\":\"In June 2014, the torrent site Sumo Torrent was hacked and 285k member records were exposed. The data included IP addresses, email addresses and passwords stored as weak MD5 hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SumoTorrent.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":628,\"Name\":\"WildStar\",\"Title\":\"WildStar\",\"Domain\":\"wildstar-online.com\",\"BreachDate\":\"2015-07-11T00:00:00.000Z\",\"AddedDate\":\"2016-03-06T21:41:16.000Z\",\"ModifiedDate\":\"2016-03-06T21:41:16.000Z\",\"PwnCount\":738556,\"Description\":\"In July 2015, the IP.Board forum for the gaming website \u003ca href=\\\"http://www.wildstar-online.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWildStar\u003c/a\u003e suffered a data breach that exposed over 738k forum members' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WildStar.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":15,\"Name\":\"AcneOrg\",\"Title\":\"Acne.org\",\"Domain\":\"acne.org\",\"BreachDate\":\"2014-11-25T00:00:00.000Z\",\"AddedDate\":\"2016-03-06T11:07:41.000Z\",\"ModifiedDate\":\"2016-03-06T11:07:41.000Z\",\"PwnCount\":432943,\"Description\":\"In November 2014, the acne website \u003ca href=\\\"http://www.acne.org/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eacne.org\u003c/a\u003e suffered a data breach that exposed over 430k forum members' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AcneOrg.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":313,\"Name\":\"KMRU\",\"Title\":\"KM.RU\",\"Domain\":\"km.ru\",\"BreachDate\":\"2016-02-29T00:00:00.000Z\",\"AddedDate\":\"2016-03-03T06:12:04.000Z\",\"ModifiedDate\":\"2016-03-03T06:12:04.000Z\",\"PwnCount\":1476783,\"Description\":\"In February 2016, the Russian portal and email service \u003ca href=\\\"http://km.ru\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eKM.RU\u003c/a\u003e was the target of an attack which was consequently \u003ca href=\\\"https://www.reddit.com/r/pwned/comments/47u1bf/operation_wrath_of_anakin_evolved\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edetailed on Reddit\u003c/a\u003e. Allegedly protesting \u0026quot;the foreign policy of Russia in regards to Ukraine\u0026quot;, KM.RU was one of several Russian sites in the breach and impacted almost 1.5M accounts including sensitive personal information.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/KMRU.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"recovery-email-addresses\",\"security-questions-and-answers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":351,\"Name\":\"MajorGeeks\",\"Title\":\"MajorGeeks\",\"Domain\":\"majorgeeks.com\",\"BreachDate\":\"2015-11-15T00:00:00.000Z\",\"AddedDate\":\"2016-03-03T02:45:09.000Z\",\"ModifiedDate\":\"2016-03-03T02:45:09.000Z\",\"PwnCount\":269548,\"Description\":\"In November 2015, almost 270k accounts from the \u003ca href=\\\"http://www.majorgeeks.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMajorGeeks\u003c/a\u003e support forum were breached. The accounts were being actively sold and traded online and included email addresses, salted password hashes and IP addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MajorGeeks.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":410,\"Name\":\"Nival\",\"Title\":\"Nival\",\"Domain\":\"nival.com\",\"BreachDate\":\"2016-02-29T00:00:00.000Z\",\"AddedDate\":\"2016-03-03T00:32:49.000Z\",\"ModifiedDate\":\"2016-03-03T00:32:49.000Z\",\"PwnCount\":1535473,\"Description\":\"In February 2016, the Russian gaming company \u003ca href=\\\"http://nival.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNival\u003c/a\u003e was the target of an attack which was consequently \u003ca href=\\\"https://www.reddit.com/r/pwned/comments/47u1bf/operation_wrath_of_anakin_evolved\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edetailed on Reddit\u003c/a\u003e. Allegedly protesting \u0026quot;the foreign policy of Russia in regards to Ukraine\u0026quot;, Nival was one of several Russian sites in the breach and impacted over 1.5M accounts including sensitive personal information.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Nival.png\",\"DataClasses\":[\"avatars\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"spoken-languages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":299,\"Name\":\"iPmart\",\"Title\":\"iPmart\",\"Domain\":\"ipmart-forum.com\",\"BreachDate\":\"2015-07-01T00:00:00.000Z\",\"AddedDate\":\"2016-02-23T10:13:22.000Z\",\"ModifiedDate\":\"2016-02-23T10:13:22.000Z\",\"PwnCount\":2460787,\"Description\":\"During 2015, the \u003ca href=\\\"http://ipmart-forum.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eiPmart forum\u003c/a\u003e (now known as Mobi NUKE) was hacked and over 2 million forum members' details were exposed. The vBulletin forum included IP addresses, birth dates and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. A further 368k accounts were added to \u0026quot;Have I Been Pwned\u0026quot; in March 2016 bringing the total to over 2.4M.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/iPmart.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":514,\"Name\":\"SkTorrent\",\"Title\":\"SkTorrent\",\"Domain\":\"sktorrent.eu\",\"BreachDate\":\"2016-02-19T00:00:00.000Z\",\"AddedDate\":\"2016-02-23T03:30:49.000Z\",\"ModifiedDate\":\"2016-02-23T03:30:49.000Z\",\"PwnCount\":117070,\"Description\":\"In February 2016, the Slovak torrent tracking site SkTorrent \u003ca href=\\\"http://tech.sme.sk/c/20099331/hackeri-ukradli-na-slovensku-118-tisic-identit.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked and over 117k records leaked online\u003c/a\u003e. The data dump included usernames, email addresses and passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SkTorrent.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":335,\"Name\":\"LinuxMint\",\"Title\":\"Linux Mint\",\"Domain\":\"linuxmint.com\",\"BreachDate\":\"2016-02-21T00:00:00.000Z\",\"AddedDate\":\"2016-02-22T01:28:08.000Z\",\"ModifiedDate\":\"2016-02-22T01:28:08.000Z\",\"PwnCount\":144989,\"Description\":\"In February 2016, the website for the Linux distro known as Linux Mint \u003ca href=\\\"http://thehackernews.com/2016/02/linux-mint-hack.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked and the ISO infected with a backdoor\u003c/a\u003e. The site also ran a phpBB forum which was subsequently put up for sale complete with almost 145k email addresses, passwords and other personal subscriber information.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LinuxMint.png\",\"DataClasses\":[\"avatars\",\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"time-zones\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":474,\"Name\":\"R2Games\",\"Title\":\"R2Games\",\"Domain\":\"r2games.com\",\"BreachDate\":\"2015-11-01T00:00:00.000Z\",\"AddedDate\":\"2016-02-09T12:20:35.000Z\",\"ModifiedDate\":\"2016-02-09T12:20:35.000Z\",\"PwnCount\":22281337,\"Description\":\"In late 2015, the gaming website \u003ca href=\\\"https://www.r2games.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eR2Games\u003c/a\u003e was hacked and more than 2.1M personal records disclosed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. A further 11M accounts were added to \\\"Have I Been Pwned\\\" in March 2016 and another 9M in July 2016 bringing the total to over 22M.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/R2Games.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":127,\"Name\":\"Comcast\",\"Title\":\"Comcast\",\"Domain\":\"comcast.net\",\"BreachDate\":\"2015-11-08T00:00:00.000Z\",\"AddedDate\":\"2016-02-08T21:41:43.000Z\",\"ModifiedDate\":\"2016-02-08T21:41:43.000Z\",\"PwnCount\":616882,\"Description\":\"In November 2015, the US internet and cable TV provider Comcast \u003ca href=\\\"http://www.ibtimes.co.uk/comcast-data-breach-590000-customer-passwords-go-sale-dark-web-1528026\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach that exposed 590k customer email addresses and plain text passwords\u003c/a\u003e. A further 27k accounts appeared with home addresses with the entire data set being sold on underground forums.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Comcast.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":448,\"Name\":\"Plex\",\"Title\":\"Plex\",\"Domain\":\"plex.tv\",\"BreachDate\":\"2015-07-02T00:00:00.000Z\",\"AddedDate\":\"2016-02-08T01:35:48.000Z\",\"ModifiedDate\":\"2016-02-08T01:35:48.000Z\",\"PwnCount\":327314,\"Description\":\"In July 2015, the discussion forum for Plex media centre \u003ca href=\\\"https://blog.plex.tv/2015/07/02/security-notice-forum-user-password-resets\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked and over 327k accounts exposed\u003c/a\u003e. The IP.Board forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Plex.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":638,\"Name\":\"Xbox-Scene\",\"Title\":\"Xbox-Scene\",\"Domain\":\"xboxscene.com\",\"BreachDate\":\"2015-02-01T00:00:00.000Z\",\"AddedDate\":\"2016-02-07T20:26:56.000Z\",\"ModifiedDate\":\"2016-02-07T20:26:56.000Z\",\"PwnCount\":432552,\"Description\":\"In approximately February 2015, the Xbox forum known as \u003ca href=\\\"http://xboxscene.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eXbox-Scene\u003c/a\u003e was hacked and more than 432k accounts were exposed. The IP.Board forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Xbox-Scene.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":464,\"Name\":\"PS3Hax\",\"Title\":\"PS3Hax\",\"Domain\":\"ps3hax.net\",\"BreachDate\":\"2015-07-01T00:00:00.000Z\",\"AddedDate\":\"2016-02-07T04:44:49.000Z\",\"ModifiedDate\":\"2016-02-07T04:44:49.000Z\",\"PwnCount\":447410,\"Description\":\"In approximately July 2015, the Sony Playstation hacks and mods forum known as \u003ca href=\\\"http://www.ps3hax.net\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePS3Hax\u003c/a\u003e was hacked and more than 447k accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PS3Hax.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":466,\"Name\":\"PSX-Scene\",\"Title\":\"PSX-Scene\",\"Domain\":\"psx-scene.com\",\"BreachDate\":\"2015-02-01T00:00:00.000Z\",\"AddedDate\":\"2016-02-07T03:46:46.000Z\",\"ModifiedDate\":\"2016-02-07T03:46:46.000Z\",\"PwnCount\":341118,\"Description\":\"In approximately February 2015, the Sony Playstation forum known as \u003ca href=\\\"http://psx-scene.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePSX-Scene\u003c/a\u003e was hacked and more than 340k accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PSX-Scene.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":427,\"Name\":\"OwnedCore\",\"Title\":\"OwnedCore\",\"Domain\":\"OwnedCore.com\",\"BreachDate\":\"2013-08-01T00:00:00.000Z\",\"AddedDate\":\"2016-02-06T02:53:13.000Z\",\"ModifiedDate\":\"2016-02-06T02:53:13.000Z\",\"PwnCount\":880331,\"Description\":\"In approximately August 2013, the World of Warcraft exploits forum known as \u003ca href=\\\"http://www.ownedcore.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eOwnedCore\u003c/a\u003e was hacked and more than 880k accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/OwnedCore.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":239,\"Name\":\"GamerzPlanet\",\"Title\":\"Gamerzplanet\",\"Domain\":\"gamerzplanet.net\",\"BreachDate\":\"2015-10-23T00:00:00.000Z\",\"AddedDate\":\"2016-02-05T20:12:26.000Z\",\"ModifiedDate\":\"2016-02-05T20:12:26.000Z\",\"PwnCount\":1217166,\"Description\":\"In approximately October 2015, the online gaming forum known as \u003ca href=\\\"http://gamerzplanet.net\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGamerzplanet\u003c/a\u003e was hacked and more than 1.2M accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/GamerzPlanet.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":273,\"Name\":\"HeroesOfNewerth\",\"Title\":\"Heroes of Newerth\",\"Domain\":\"heroesofnewerth.com\",\"BreachDate\":\"2012-12-17T00:00:00.000Z\",\"AddedDate\":\"2016-01-24T16:27:23.000Z\",\"ModifiedDate\":\"2016-01-24T16:27:23.000Z\",\"PwnCount\":8089103,\"Description\":\"In December 2012, the multiplayer online battle arena game known as \u003ca href=\\\"http://www.heroesofnewerth.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHeroes of Newerth\u003c/a\u003e \u003ca href=\\\"https://www.reddit.com/r/HeroesofNewerth/comments/14zj2p/i_am_the_guy_who_hacked_hon/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e was hacked\u003c/a\u003e and over 8 million accounts extracted from the system. The compromised data included usernames, email addresses and passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HeroesOfNewerth.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":599,\"Name\":\"VBulletin\",\"Title\":\"vBulletin\",\"Domain\":\"vbulletin.com\",\"BreachDate\":\"2015-11-03T00:00:00.000Z\",\"AddedDate\":\"2016-01-24T13:15:11.000Z\",\"ModifiedDate\":\"2016-01-24T13:15:11.000Z\",\"PwnCount\":518966,\"Description\":\"In November 2015, the forum software maker \u003ca href=\\\"http://www.theregister.co.uk/2015/11/03/vbulletin_forum_software_hacked_defaced/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003evBulletin suffered a serious data breach\u003c/a\u003e. The attack lead to the release of both forum user and customer accounts totalling almost 519k records. The breach included email addresses, birth dates, security questions and answers for customers and salted hashes of passwords for both sources.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VBulletin.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"homepage-urls\",\"instant-messenger-identities\",\"ip-addresses\",\"passwords\",\"security-questions-and-answers\",\"spoken-languages\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":242,\"Name\":\"Gamigo\",\"Title\":\"Gamigo\",\"Domain\":\"gamigo.com\",\"BreachDate\":\"2012-03-01T00:00:00.000Z\",\"AddedDate\":\"2016-01-18T16:26:24.000Z\",\"ModifiedDate\":\"2016-01-18T16:26:24.000Z\",\"PwnCount\":8243604,\"Description\":\"In March 2012, the German online game publisher Gamigo \u003ca href=\\\"http://www.zdnet.com/article/8-24-million-gamigo-passwords-leaked-after-hack/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked\u003c/a\u003e and more than 8 million accounts publicly leaked. The breach included email addresses and passwords stored as weak MD5 hashes with no salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Gamigo.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":407,\"Name\":\"NexusMods\",\"Title\":\"Nexus Mods\",\"Domain\":\"nexusmods.com\",\"BreachDate\":\"2013-07-22T00:00:00.000Z\",\"AddedDate\":\"2016-01-17T17:18:47.000Z\",\"ModifiedDate\":\"2016-01-17T17:18:47.000Z\",\"PwnCount\":5915013,\"Description\":\"In December 2015, the game modding site Nexus Mods \u003ca href=\\\"http://www.nexusmods.com/games/news/12670/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ereleased a statement notifying users that they had been hacked\u003c/a\u003e. They subsequently dated the hack as having occurred in July 2013 although there is evidence to suggest the data was being traded months in advance of that. The breach contained usernames, email addresses and passwords stored as a salted hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NexusMods.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":34,\"Name\":\"AndroidForums\",\"Title\":\"Android Forums\",\"Domain\":\"androidforums.com\",\"BreachDate\":\"2011-10-30T00:00:00.000Z\",\"AddedDate\":\"2015-12-20T06:47:19.000Z\",\"ModifiedDate\":\"2020-08-07T23:29:01.000Z\",\"PwnCount\":745355,\"Description\":\"In October 2011, the Android Forums website \u003ca href=\\\"http://www.pcworld.com/article/259201/online_android_forum_hacked_user_data_accessed.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked\u003c/a\u003e and 745k user accounts were subsequently leaked publicly. The compromised data included email addresses, user birth dates and passwords stored as a salted MD5 hash.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AndroidForums.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"homepage-urls\",\"instant-messenger-identities\",\"ip-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":401,\"Name\":\"Neteller\",\"Title\":\"Neteller\",\"Domain\":\"neteller.com\",\"BreachDate\":\"2010-05-17T00:00:00.000Z\",\"AddedDate\":\"2015-11-30T10:26:47.000Z\",\"ModifiedDate\":\"2015-11-30T10:26:47.000Z\",\"PwnCount\":3619948,\"Description\":\"In May 2010, the e-wallet service known as Neteller \u003ca href=\\\"http://www.forbes.com/sites/thomasbrewster/2015/11/30/paysafe-optimal-neteller-moneybookers-gambling-cyberattacks-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach which exposed over 3.6M customers\u003c/a\u003e. The breach was not discovered until October 2015 and included names, email addresses, home addresses and account balances.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Neteller.png\",\"DataClasses\":[\"account-balances\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"security-questions-and-answers\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":380,\"Name\":\"MoneyBookers\",\"Title\":\"Money Bookers\",\"Domain\":\"moneybookers.com\",\"BreachDate\":\"2009-01-01T00:00:00.000Z\",\"AddedDate\":\"2015-11-30T09:21:55.000Z\",\"ModifiedDate\":\"2015-11-30T09:21:55.000Z\",\"PwnCount\":4483605,\"Description\":\"Sometime in 2009, the e-wallet service known as Money Bookers \u003ca href=\\\"http://www.forbes.com/sites/thomasbrewster/2015/11/30/paysafe-optimal-neteller-moneybookers-gambling-cyberattacks-data-breach/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach which exposed almost 4.5M customers\u003c/a\u003e. Now called Skrill, the breach was not discovered until October 2015 and included names, email addresses, home addresses and IP addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MoneyBookers.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":610,\"Name\":\"VTech\",\"Title\":\"VTech\",\"Domain\":\"vtechda.com\",\"BreachDate\":\"2015-11-13T00:00:00.000Z\",\"AddedDate\":\"2015-11-25T07:00:57.000Z\",\"ModifiedDate\":\"2015-11-25T07:00:57.000Z\",\"PwnCount\":4833678,\"Description\":\"In November 2015, \u003ca href=\\\"http://www.troyhunt.com/2015/11/when-children-are-breached-inside.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehackers extracted more than 4.8 million parents' and 227k children's accounts from VTech's Learning Lodge website\u003c/a\u003e. The Hong Kong company produces learning products for children including software sold via the compromised website. The data breach exposed extensive personal details including home addresses, security questions and answers and passwords stored as weak MD5 hashes. Furthermore, children's details including names, ages, genders and associations to their parents' records were also exposed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/VTech.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"family-members-names\",\"genders\",\"ip-addresses\",\"names\",\"passwords\",\"physical-addresses\",\"security-questions-and-answers\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":true,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":230,\"Name\":\"FoxyBingo\",\"Title\":\"Foxy Bingo\",\"Domain\":\"foxybingo.com\",\"BreachDate\":\"2008-04-04T00:00:00.000Z\",\"AddedDate\":\"2015-11-22T01:05:05.000Z\",\"ModifiedDate\":\"2015-11-22T01:05:05.000Z\",\"PwnCount\":252216,\"Description\":\"In April 2007, the online gambling site \u003ca href=\\\"https://www.foxybingo.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eFoxy Bingo\u003c/a\u003e was hacked and 252,000 accounts were obtained by the hackers. The breached records \u003ca href=\\\"http://www.itpro.co.uk/637279/gambler-busted-flogging-stolen-data-to-gaming-firms\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewere subsequently sold and traded\u003c/a\u003e and included personal information data such as plain text passwords, birth dates and home addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FoxyBingo.png\",\"DataClasses\":[\"account-balances\",\"browser-user-agent-details\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":78,\"Name\":\"BlackHatWorld\",\"Title\":\"Black Hat World\",\"Domain\":\"blackhatworld.com\",\"BreachDate\":\"2014-06-23T00:00:00.000Z\",\"AddedDate\":\"2015-11-03T22:20:17.000Z\",\"ModifiedDate\":\"2015-11-03T22:20:17.000Z\",\"PwnCount\":777387,\"Description\":\"In June 2014, the search engine optimisation forum \u003ca href=\\\"http://www.blackhatworld.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBlack Hat World\u003c/a\u003e had three quarters of a million accounts breached from their system. The breach included various personally identifiable attributes which were publicly released in a MySQL database script.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BlackHatWorld.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"instant-messenger-identities\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":349,\"Name\":\"Mac-Torrents\",\"Title\":\"Mac-Torrents\",\"Domain\":\"mac-torrents.com\",\"BreachDate\":\"2015-10-31T00:00:00.000Z\",\"AddedDate\":\"2015-10-31T23:54:26.000Z\",\"ModifiedDate\":\"2015-10-31T23:54:26.000Z\",\"PwnCount\":93992,\"Description\":\"In October 2015, the torrent site \u003ca href=\\\"http://www.mac-torrents.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMac-Torrents\u003c/a\u003e was hacked and almost 94k usernames, email addresses and passwords were leaked. The passwords were hashed with MD5 and no salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mac-Torrents.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":219,\"Name\":\"FFShrine\",\"Title\":\"Final Fantasy Shrine\",\"Domain\":\"ffshrine.org\",\"BreachDate\":\"2015-09-18T00:00:00.000Z\",\"AddedDate\":\"2015-10-31T12:43:58.000Z\",\"ModifiedDate\":\"2015-10-31T12:43:58.000Z\",\"PwnCount\":620677,\"Description\":\"In September 2015, \u003ca href=\\\"http://ffshrine.org\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Final Fantasy discussion forum known as FFShrine\u003c/a\u003e was breached and the data dumped publicly. Approximately 620k records were released containing email addresses, IP addresses and salted hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/FFShrine.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":441,\"Name\":\"PHPFreaks\",\"Title\":\"PHP Freaks\",\"Domain\":\"phpfreaks.com\",\"BreachDate\":\"2015-10-27T00:00:00.000Z\",\"AddedDate\":\"2015-10-30T14:19:52.000Z\",\"ModifiedDate\":\"2015-10-30T14:19:52.000Z\",\"PwnCount\":173891,\"Description\":\"In October 2015, the PHP discussion board \u003ca href=\\\"http://forums.phpfreaks.com/topic/298874-alert-the-phpfreaks-forum-members-data-appears-to-have-been-stolen\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePHP Freaks was hacked\u003c/a\u003e and 173k user accounts were publicly leaked. The breach included multiple personal data attributes as well as salted and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PHPFreaks.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":1,\"Name\":\"000webhost\",\"Title\":\"000webhost\",\"Domain\":\"000webhost.com\",\"BreachDate\":\"2015-03-01T00:00:00.000Z\",\"AddedDate\":\"2015-10-26T23:35:45.000Z\",\"ModifiedDate\":\"2017-12-10T21:44:27.000Z\",\"PwnCount\":14936670,\"Description\":\"In approximately March 2015, the free web hosting provider \u003ca href=\\\"http://www.troyhunt.com/2015/10/breaches-traders-plain-text-passwords.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e000webhost suffered a major data breach\u003c/a\u003e that exposed almost 15 million customer records. The data was sold and traded before 000webhost was alerted in October. The breach included names, email addresses and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/000webhost.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":384,\"Name\":\"MPGH\",\"Title\":\"MPGH\",\"Domain\":\"mpgh.net\",\"BreachDate\":\"2015-10-22T00:00:00.000Z\",\"AddedDate\":\"2015-10-26T03:20:20.000Z\",\"ModifiedDate\":\"2015-10-26T03:20:20.000Z\",\"PwnCount\":3122898,\"Description\":\"In October 2015, the multiplayer game hacking website \u003ca href=\\\"http://www.mpgh.net\\\"\u003eMPGH was hacked\u003c/a\u003e and 3.1 million user accounts disclosed. The vBulletin forum breach contained usernames, email addresses, IP addresses and salted hashes of passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MPGH.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":429,\"Name\":\"PaddyPower\",\"Title\":\"Paddy Power\",\"Domain\":\"paddypower.com\",\"BreachDate\":\"2010-10-25T00:00:00.000Z\",\"AddedDate\":\"2015-10-11T01:26:05.000Z\",\"ModifiedDate\":\"2015-10-11T01:26:05.000Z\",\"PwnCount\":590954,\"Description\":\"In October 2010, the Irish bookmaker \u003ca href=\\\"http://www.telegraph.co.uk/technology/internet-security/11005558/Irish-government-disappointed-over-Paddy-Power-hack.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePaddy Power suffered a data breach\u003c/a\u003e that exposed 750,000 customer records with nearly 600,000 unique email addresses. The breach was not disclosed until July 2014 and contained extensive personal information including names, addresses, phone numbers and plain text security questions and answers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PaddyPower.png\",\"DataClasses\":[\"account-balances\",\"dates-of-birth\",\"email-addresses\",\"ip-addresses\",\"names\",\"phone-numbers\",\"physical-addresses\",\"security-questions-and-answers\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":394,\"Name\":\"MyVidster\",\"Title\":\"MyVidster\",\"Domain\":\"myvidster.com\",\"BreachDate\":\"2015-08-15T00:00:00.000Z\",\"AddedDate\":\"2015-10-10T07:06:17.000Z\",\"ModifiedDate\":\"2015-10-10T07:06:17.000Z\",\"PwnCount\":19863,\"Description\":\"In August 2015, the social video sharing and bookmarking site \u003ca href=\\\"https://www.reddit.com/r/pwned/comments/3h4tud/myvidstercom_hacked_1_million_member_database/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMyVidster was hacked\u003c/a\u003e and nearly 20,000 accounts were dumped online. The dump included usernames, email addresses and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MyVidster.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":432,\"Name\":\"Patreon\",\"Title\":\"Patreon\",\"Domain\":\"patreon.com\",\"BreachDate\":\"2015-10-01T00:00:00.000Z\",\"AddedDate\":\"2015-10-02T02:29:20.000Z\",\"ModifiedDate\":\"2021-08-10T06:52:47.000Z\",\"PwnCount\":2330382,\"Description\":\"In October 2015, the crowdfunding site \u003ca href=\\\"http://www.zdnet.com/article/patreon-hacked-anonymous-patrons-exposed/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePatreon was hacked\u003c/a\u003e and over 16GB of data was released publicly. The dump included almost 14GB of database records with more than 2.3M unique email addresses, millions of personal messages and passwords stored as bcrypt hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Patreon.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"payment-histories\",\"physical-addresses\",\"private-messages\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":48,\"Name\":\"AshleyMadison\",\"Title\":\"Ashley Madison\",\"Domain\":\"ashleymadison.com\",\"BreachDate\":\"2015-07-19T00:00:00.000Z\",\"AddedDate\":\"2015-08-18T20:55:05.000Z\",\"ModifiedDate\":\"2015-08-18T20:55:05.000Z\",\"PwnCount\":30811934,\"Description\":\"In July 2015, the infidelity website Ashley Madison \u003ca href=\\\"http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a serious data breach\u003c/a\u003e. The attackers threatened Ashley Madison with the full disclosure of the breach unless the service was shut down. One month later, the database was dumped including more than 30M unique email addresses. This breach has been classed as \u0026quot;sensitive\u0026quot; and is not publicly searchable, although individuals may discover if they've been impacted by \u003ca href=\\\"https://haveibeenpwned.com/NotifyMe\\\"\u003eregistering for notifications\u003c/a\u003e. \u003ca href=\\\"http://www.troyhunt.com/2015/07/heres-how-im-going-to-handle-ashley.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRead about this approach in detail\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AshleyMadison.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"ethnicities\",\"genders\",\"names\",\"passwords\",\"payment-histories\",\"phone-numbers\",\"physical-addresses\",\"security-questions-and-answers\",\"sexual-orientations\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":643,\"Name\":\"XSplit\",\"Title\":\"XSplit\",\"Domain\":\"xsplit.com\",\"BreachDate\":\"2013-11-07T00:00:00.000Z\",\"AddedDate\":\"2015-08-08T04:28:48.000Z\",\"ModifiedDate\":\"2015-08-08T04:28:48.000Z\",\"PwnCount\":2983472,\"Description\":\"In November 2013, the makers of gaming live streaming and recording software \u003ca href=\\\"https://www.xsplit.com/blog/xsplit-password-reset-alert\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eXSplit was compromised in an online attack\u003c/a\u003e. The data breach leaked almost 3M names, email addresses, usernames and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/XSplit.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":651,\"Name\":\"YouPorn\",\"Title\":\"YouPorn\",\"Domain\":\"youporn.com\",\"BreachDate\":\"2012-02-21T00:00:00.000Z\",\"AddedDate\":\"2015-07-30T05:32:00.000Z\",\"ModifiedDate\":\"2018-05-20T05:24:11.000Z\",\"PwnCount\":1327567,\"Description\":\"In February 2012, the adult website YouPorn \u003ca href=\\\"http://www.huffingtonpost.com/2012/02/22/youporn-hacked-email-addresses-passwords_n_1294502.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehad over 1.3M user accounts exposed in a data breach\u003c/a\u003e. The publicly released data included both email addresses and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/YouPorn.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":265,\"Name\":\"HackingTeam\",\"Title\":\"Hacking Team\",\"Domain\":\"hackingteam.com\",\"BreachDate\":\"2015-07-06T00:00:00.000Z\",\"AddedDate\":\"2015-07-12T23:52:27.000Z\",\"ModifiedDate\":\"2015-07-12T23:52:27.000Z\",\"PwnCount\":32310,\"Description\":\"In July 2015, the Italian security firm \u003ca href=\\\"http://hackingteam.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHacking Team\u003c/a\u003e suffered a major data breach that resulted in over 400GB of their data being \u003ca href=\\\"http://www.techtimes.com/articles/68204/20150711/hacking-team-hacked-400gb-data-dump-state-surveillance-exposes-dirty.htm\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eposted online via a torrent\u003c/a\u003e. The data searchable on \u0026quot;Have I Been Pwned?\u0026quot; is from 189GB worth of PST mail folders in the dump. The contents of the PST files is \u003ca href=\\\"https://wikileaks.org/hackingteam/emails\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esearchable on Wikileaks\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HackingTeam.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":270,\"Name\":\"Hemmakvall\",\"Title\":\"Hemmakväll\",\"Domain\":\"hemmakvall.se\",\"BreachDate\":\"2015-07-08T00:00:00.000Z\",\"AddedDate\":\"2015-07-09T09:23:52.000Z\",\"ModifiedDate\":\"2015-07-09T09:23:52.000Z\",\"PwnCount\":47297,\"Description\":\"In July 2015, the Swedish video store chain \u003ca href=\\\"http://www.hemmakvall.se/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eHemmakväll\u003c/a\u003e \u003ca href=\\\"http://www.dn.se/ekonomi/hemmakvall-hackat-50000-kunders-uppgifter-pa-vift/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewas hacked\u003c/a\u003e and nearly 50k records dumped publicly. The disclosed data included various attributes of their customers including email and physical addresses, names and phone numbers. Passwords were also leaked, stored with a weak MD5 hashing algorithm.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Hemmakvall.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":392,\"Name\":\"myRepoSpace\",\"Title\":\"myRepoSpace\",\"Domain\":\"myrepospace.com\",\"BreachDate\":\"2015-07-06T00:00:00.000Z\",\"AddedDate\":\"2015-07-08T08:44:51.000Z\",\"ModifiedDate\":\"2015-07-08T08:44:51.000Z\",\"PwnCount\":252751,\"Description\":\"In July 2015, the Cydia repository known as \u003ca href=\\\"https://myrepospace.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emyRepoSpace\u003c/a\u003e was hacked and \u003ca href=\\\"https://www.reddit.com/r/jailbreak/comments/3c9qr1/discussion_myrepospace_user_data_leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003euser data leaked publicly\u003c/a\u003e. Cydia is designed to facilitate the installation of apps on jailbroken iOS devices. The repository service was allegedly hacked by \u003ca href=\\\"https://twitter.com/its_not_herpes\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e@its_not_herpes\u003c/a\u003e and \u003ca href=\\\"https://twitter.com/0x8badfl00d\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e0x8badfl00d\u003c/a\u003e in retaliation for the service refusing to remove pirated tweaks.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/myRepoSpace.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":371,\"Name\":\"MinecraftPocketEditionForum\",\"Title\":\"Minecraft Pocket Edition Forum\",\"Domain\":\"minecraftpeforum.net\",\"BreachDate\":\"2015-05-24T00:00:00.000Z\",\"AddedDate\":\"2015-06-30T09:19:43.000Z\",\"ModifiedDate\":\"2015-06-30T09:19:43.000Z\",\"PwnCount\":16034,\"Description\":\"In May 2015, the \u003ca href=\\\"http://www.databreaches.net/minecraft-pocket-edition-forum-hacked-dumped/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMinecraft Pocket Edition forum was hacked\u003c/a\u003e and over 16k accounts were dumped public. Allegedly hacked by \u003ca href=\\\"https://twitter.com/rmsg0d\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e@rmsg0d\u003c/a\u003e, the forum data included numerous personal pieces of data for each user. The forum has subsequently been decommissioned.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MinecraftPocketEditionForum.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":406,\"Name\":\"NextGenUpdate\",\"Title\":\"NextGenUpdate\",\"Domain\":\"nextgenupdate.com\",\"BreachDate\":\"2014-04-22T00:00:00.000Z\",\"AddedDate\":\"2015-06-05T04:12:29.000Z\",\"ModifiedDate\":\"2015-06-05T04:12:29.000Z\",\"PwnCount\":1194597,\"Description\":\"Early in 2014, the video game website \u003ca href=\\\"http://www.nextgenupdate.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eNextGenUpdate\u003c/a\u003e reportedly \u003ca href=\\\"https://leakforums.org/thread-265363\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach\u003c/a\u003e that disclosed almost 1.2 million accounts. Amongst the data breach was usernames, email addresses, IP addresses and salted and hashed passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/NextGenUpdate.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":386,\"Name\":\"mSpy\",\"Title\":\"mSpy\",\"Domain\":\"mspy.com\",\"BreachDate\":\"2015-05-14T00:00:00.000Z\",\"AddedDate\":\"2015-05-28T18:09:16.000Z\",\"ModifiedDate\":\"2024-07-11T19:29:17.000Z\",\"PwnCount\":699793,\"Description\":\"In May 2015, the \u0026quot;monitoring\u0026quot; software known as \u003ca href=\\\"http://www.mspy.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emSpy\u003c/a\u003e suffered a \u003ca href=\\\"http://krebsonsecurity.com/2015/05/mobile-spy-software-maker-mspy-hacked-customer-data-leaked/#more-30913\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003emajor data breach\u003c/a\u003e. The software (allegedly often used to spy on unsuspecting victims), stored extensive personal information within their online service which after being breached, was made freely available on the internet.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/mSpy.png\",\"DataClasses\":[\"device-usage-tracking-data\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":21,\"Name\":\"AdultFriendFinder\",\"Title\":\"Adult FriendFinder (2015)\",\"Domain\":\"adultfriendfinder.com\",\"BreachDate\":\"2015-05-21T00:00:00.000Z\",\"AddedDate\":\"2015-05-22T06:03:44.000Z\",\"ModifiedDate\":\"2020-02-07T01:11:13.000Z\",\"PwnCount\":3867997,\"Description\":\"In May 2015, the adult hookup site \u003ca href=\\\"http://www.bbc.com/news/business-32839196\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAdult FriendFinder was hacked\u003c/a\u003e and nearly 4 million records dumped publicly. The data dump included extremely sensitive personal information about individuals and their relationship statuses and sexual preferences combined with personally identifiable information.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AdultFriendFinder.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"races\",\"relationship-statuses\",\"sexual-orientations\",\"spoken-languages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":663,\"Name\":\"SprashivaiRu\",\"Title\":\"Спрашивай.ру\",\"Domain\":\"sprashivai.ru\",\"BreachDate\":\"2015-05-11T00:00:00.000Z\",\"AddedDate\":\"2015-05-12T23:50:08.000Z\",\"ModifiedDate\":\"2015-05-12T23:50:08.000Z\",\"PwnCount\":3474763,\"Description\":\"In May 2015, \u003ca href=\\\"http://sprashivai.ru/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eСпрашивай.ру\u003c/a\u003e (a the Russian website for anonymous reviews) was \u003ca href=\\\"http://tjournal.ru/p/sprashivairu-passwords-leak\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ereported to have had 6.7 million user details exposed\u003c/a\u003e by a hacker known as \u0026quot;w0rm\u0026quot;. Intended to be a site for expressing anonymous opinions, the leaked data included email addresses, birth dates and other personally identifiable data about almost 3.5 million unique email addresses found in the leak.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/SprashivaiRu.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"passwords\",\"spoken-languages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":554,\"Name\":\"TRAI\",\"Title\":\"Telecom Regulatory Authority of India\",\"Domain\":\"trai.gov.in\",\"BreachDate\":\"2015-04-27T00:00:00.000Z\",\"AddedDate\":\"2015-04-27T11:21:59.000Z\",\"ModifiedDate\":\"2015-04-27T11:21:59.000Z\",\"PwnCount\":107776,\"Description\":\"In April 2015, the Telecom Regulatory Authority of India (TRAI) \u003ca href=\\\"http://www.dnaindia.com/scitech/report-email-savetheinternet-net-neutrality-campaign-public-privacy-spam-phishing-2081037\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epublished tens of thousand of emails\u003c/a\u003e sent by Indian citizens supporting net neutrality as part of the SaveTheInternet campaign. The published data included lists of emails including the sender's name and email address as well as the contents of the email as well, often with signatures including other personal data.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/TRAI.png\",\"DataClasses\":[\"email-addresses\",\"email-messages\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":529,\"Name\":\"StarNet\",\"Title\":\"StarNet\",\"Domain\":\"starnet.md\",\"BreachDate\":\"2015-02-26T00:00:00.000Z\",\"AddedDate\":\"2015-04-11T06:35:46.000Z\",\"ModifiedDate\":\"2015-04-11T06:35:46.000Z\",\"PwnCount\":139395,\"Description\":\"In February 2015, the Moldavian ISP \u0026quot;StarNet\u0026quot; \u003ca href=\\\"http://www.moldova.org/the-database-of-an-internet-provider-from-moldova-was-stolen-and-published/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehad it's database published online\u003c/a\u003e. The dump included nearly 140k email addresses, many with personal details including contact information, usage patterns of the ISP and even passport numbers.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/StarNet.png\",\"DataClasses\":[\"customer-interactions\",\"dates-of-birth\",\"email-addresses\",\"genders\",\"ip-addresses\",\"mac-addresses\",\"names\",\"passport-numbers\",\"passwords\",\"phone-numbers\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":469,\"Name\":\"QuantumBooter\",\"Title\":\"Quantum Booter\",\"Domain\":\"quantumbooter.net\",\"BreachDate\":\"2014-03-18T00:00:00.000Z\",\"AddedDate\":\"2015-04-04T06:40:05.000Z\",\"ModifiedDate\":\"2015-04-04T06:40:05.000Z\",\"PwnCount\":48592,\"Description\":\"In March 2014, the \u003ca href=\\\"http://www.webopedia.com/TERM/B/booter_services.html\\\"\u003ebooter service\u003c/a\u003e Quantum Booter (also referred to as Quantum Stresser) suffered a breach which lead to the disclosure of their internal database. The leaked data included private discussions relating to malicious activity Quantum Booter users were performing against online adversaries, including the IP addresses of those using the service to mount DDoS attacks.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/QuantumBooter.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":565,\"Name\":\"ThisHabboForum\",\"Title\":\"ThisHabbo Forum\",\"Domain\":\"thishabboforum.com\",\"BreachDate\":\"2014-01-01T00:00:00.000Z\",\"AddedDate\":\"2015-03-28T05:35:28.000Z\",\"ModifiedDate\":\"2015-03-28T05:35:28.000Z\",\"PwnCount\":612414,\"Description\":\"In 2014, the ThisHabbo forum (a fan site for Habbo.com, a Finnish social networking site) \u003ca href=\\\"https://www.google.com/search?q=\\\"thishabbo_forum.txt\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eappeared among a list of compromised sites\u003c/a\u003e which has subsequently been removed from the internet. Whilst the actual date of the exploit is not clear, the breached data includes usernames, email addresses, IP addresses and salted hashes of passwords. A further 584k records were added from a more comprehensive breach file provided in October 2016.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/ThisHabboForum.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":222,\"Name\":\"Flashback\",\"Title\":\"Flashback\",\"Domain\":\"flashback.se\",\"BreachDate\":\"2015-02-11T00:00:00.000Z\",\"AddedDate\":\"2015-02-12T05:42:12.000Z\",\"ModifiedDate\":\"2015-02-12T05:42:12.000Z\",\"PwnCount\":40256,\"Description\":\"In February 2015, \u003ca href=\\\"http://www.flashback.se/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethe Swedish forum known as Flashback\u003c/a\u003e had sensitive internal data on 40k members published via the tabloid newspaper \u003ca href=\\\"http://www.aftonbladet.se/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eAftonbladet\u003c/a\u003e. The data was \u003ca href=\\\"http://swedishsurveyor.com/2015/02/11/the-inquisition/\\\"\u003eallegedly sold to them via Researchgruppen\u003c/a\u003e (The Research Group) \u003ca href=\\\"http://www.technologyreview.com/photoessay/533426/the-troll-hunters/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ewho have a history of exposing otherwise anonymous users\u003c/a\u003e, primarily those who they believe participate in \u0026quot;troll like\u0026quot; behaviour. The compromised data includes social security numbers, home and email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Flashback.png\",\"DataClasses\":[\"email-addresses\",\"government-issued-ids\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":132,\"Name\":\"CrackCommunity\",\"Title\":\"Crack Community\",\"Domain\":\"crackcommunity.com\",\"BreachDate\":\"2013-09-09T00:00:00.000Z\",\"AddedDate\":\"2015-02-03T06:30:05.000Z\",\"ModifiedDate\":\"2015-02-03T06:30:05.000Z\",\"PwnCount\":19210,\"Description\":\"In late 2013, the \u003ca href=\\\"http://crackcommunity.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eCrack Community\u003c/a\u003e forum specialising in cracks for games was compromised and over 19k accounts published online. Built on the MyBB forum platform, the compromised data included email addresses, IP addresses and salted MD5 passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CrackCommunity.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":340,\"Name\":\"LizardSquad\",\"Title\":\"Lizard Squad\",\"Domain\":\"lizardstresser.su\",\"BreachDate\":\"2015-01-16T00:00:00.000Z\",\"AddedDate\":\"2015-01-18T01:24:24.000Z\",\"ModifiedDate\":\"2015-01-18T01:24:24.000Z\",\"PwnCount\":13451,\"Description\":\"In January 2015, the hacker collective known as \u0026quot;Lizard Squad\u0026quot; created a DDoS service by the name of \u0026quot;Lizard Stresser\u0026quot; which could be procured to mount attacks against online targets. Shortly thereafter, the service \u003ca href=\\\"https://krebsonsecurity.com/2015/01/another-lizard-arrested-lizard-lair-hacked/\\\"\u003esuffered a data breach\u003c/a\u003e which resulted in the public disclosure of over 13k user accounts including passwords stored in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LizardSquad.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":164,\"Name\":\"Dominos\",\"Title\":\"Domino's\",\"Domain\":\"pizza.dominos.be\",\"BreachDate\":\"2014-06-13T00:00:00.000Z\",\"AddedDate\":\"2015-01-04T03:03:34.000Z\",\"ModifiedDate\":\"2015-01-04T03:03:34.000Z\",\"PwnCount\":648231,\"Description\":\"In June 2014, \u003ca href=\\\"http://www.welivesecurity.com/2014/06/16/dominos-pizza-hacked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eDomino's Pizza in France and Belgium was hacked\u003c/a\u003e by a group going by the name \u0026quot;Rex Mundi\u0026quot; and their customer data held to ransom. Domino's refused to pay the ransom and six months later, the attackers \u003ca href=\\\"http://cyberintelligence.in/rex-mundi-hackers-leaked-data-dominos-accord-easypay/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ereleased the data\u003c/a\u003e along with troves of other hacked accounts. Amongst the customer data was passwords stored with a weak MD5 hashing algorithm and no salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Dominos.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":26,\"Name\":\"AhaShare\",\"Title\":\"AhaShare.com\",\"Domain\":\"ahashare.com\",\"BreachDate\":\"2013-05-30T00:00:00.000Z\",\"AddedDate\":\"2014-11-06T21:47:52.000Z\",\"ModifiedDate\":\"2014-11-06T21:47:52.000Z\",\"PwnCount\":180468,\"Description\":\"In May 2013, the torrent site \u003ca href=\\\"http://www.ahashare.com\\\"\u003eAhaShare.com\u003c/a\u003e suffered a breach which resulted in more than 180k user accounts being published publicly. The breach included a raft of personal information on registered users plus despite assertions of not distributing personally identifiable information, the site also leaked the IP addresses used by the registered identities.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AhaShare.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"geographic-locations\",\"ip-addresses\",\"partial-dates-of-birth\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":646,\"Name\":\"Yandex\",\"Title\":\"Yandex Dump\",\"Domain\":\"forum.btcsec.com\",\"BreachDate\":\"2014-09-07T00:00:00.000Z\",\"AddedDate\":\"2014-09-12T04:50:32.000Z\",\"ModifiedDate\":\"2014-09-12T04:50:32.000Z\",\"PwnCount\":1186564,\"Description\":\"In September 2014, \u003ca href=\\\"http://habrahabr.ru/post/235949/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003enews broke of a massive leak of accounts from Yandex\u003c/a\u003e, the Russian search engine giants who also provides email services. The purported million \u0026quot;breached\u0026quot; accounts were disclosed at the same time as nearly 5M mail.ru accounts with \u003ca href=\\\"http://globalvoicesonline.org/2014/09/10/russia-email-yandex-mailru-passwords-hacking/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eboth companies claiming the credentials were acquired via phishing scams\u003c/a\u003e rather than being obtained as a result of direct attacks against their services.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Yandex.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":350,\"Name\":\"MailRu\",\"Title\":\"mail.ru Dump\",\"Domain\":\"mail.ru\",\"BreachDate\":\"2014-09-10T00:00:00.000Z\",\"AddedDate\":\"2014-09-12T04:50:22.000Z\",\"ModifiedDate\":\"2018-01-09T03:38:56.000Z\",\"PwnCount\":16630988,\"Description\":\"In September 2014, several large dumps of user accounts appeared on the \u003ca href=\\\"https://forum.btcsec.com/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eRussian Bitcoin Security Forum\u003c/a\u003e including one with nearly 5M email addresses and passwords, predominantly on the mail.ru domain. Whilst \u003ca href=\\\"http://globalvoicesonline.org/2014/09/10/russia-email-yandex-mailru-passwords-hacking/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eunlikely to be the result of a direct attack against mail.ru\u003c/a\u003e, the credentials were confirmed by many as legitimate for other services they had subscribed to. Further data allegedly valid for mail.ru and containing email addresses and plain text passwords was added in January 2018 bringing to total to more than 16M records. The incident was also then flagged as \u0026quot;unverified\u0026quot;, a concept that was \u003ca href=\\\"https://www.troyhunt.com/introducing-unverified-breaches-to-have-i-been-pwned/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eintroduced after the initial data load in 2014\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MailRu.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":false,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":74,\"Name\":\"BTSec\",\"Title\":\"Bitcoin Security Forum Gmail Dump\",\"Domain\":\"forum.btcsec.com\",\"BreachDate\":\"2014-01-09T00:00:00.000Z\",\"AddedDate\":\"2014-09-10T20:30:11.000Z\",\"ModifiedDate\":\"2014-09-10T20:30:11.000Z\",\"PwnCount\":4789599,\"Description\":\"In September 2014, a large dump of nearly 5M usernames and passwords was \u003ca href=\\\"https://forum.btcsec.com/index.php?/topic/9426-gmail-meniai-parol/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eposted to a Russian Bitcoin forum\u003c/a\u003e. Whilst commonly reported as 5M \u0026quot;Gmail passwords\u0026quot;, the dump also contained 123k yandex.ru addresses. Whilst the origin of the breach remains unclear, the breached credentials were \u003ca href=\\\"http://web.archive.org/web/20140910190920/http://www.reddit.com/r/netsec/comments/2fz13q/5_millions_of_gmail_passwords_leaked_rus_most/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003econfirmed by multiple source as correct\u003c/a\u003e, albeit a number of years old.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BTSec.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":451,\"Name\":\"PokemonCreed\",\"Title\":\"Pokémon Creed\",\"Domain\":\"pokemoncreed.net\",\"BreachDate\":\"2014-08-08T00:00:00.000Z\",\"AddedDate\":\"2014-08-10T00:03:59.000Z\",\"ModifiedDate\":\"2014-08-10T00:03:59.000Z\",\"PwnCount\":116465,\"Description\":\"In August 2014, the Pokémon RPG website \u003ca href=\\\"http://pokemoncreed.net\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePokémon Creed\u003c/a\u003e was hacked after a dispute with rival site, \u003ca href=\\\"http://pkmndusk.in\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ePokémon Dusk\u003c/a\u003e. In a \u003ca href=\\\"https://www.facebook.com/ramandeep.s.dehal/posts/749666358442465\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epost on Facebook\u003c/a\u003e, \u0026quot;Cruz Dusk\u0026quot; announced the hack then pasted the dumped MySQL database on \u003ca href=\\\"http://pkmndusk.in\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003epkmndusk.in\u003c/a\u003e. The breached data included over 116k usernames, email addresses and plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PokemonCreed.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"ip-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":295,\"Name\":\"Insanelyi\",\"Title\":\"Insanelyi\",\"Domain\":\"insanelyi.com\",\"BreachDate\":\"2014-07-22T00:00:00.000Z\",\"AddedDate\":\"2014-07-22T22:56:15.000Z\",\"ModifiedDate\":\"2014-07-22T22:56:15.000Z\",\"PwnCount\":104097,\"Description\":\"In July 2014, the iOS forum \u003ca href=\\\"http://insanelyi.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eInsanelyi\u003c/a\u003e was \u003ca href=\\\"http://securityaffairs.co/wordpress/26835/hacking/hacked-bigboss-cydia.html?utm_content=bufferc7e16\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehacked by an attacker known as Kim Jong-Cracks\u003c/a\u003e. A popular source of information for users of jailbroken iOS devices running Cydia, the Insanelyi breach disclosed over 104k users' emails addresses, user names and weakly hashed passwords (salted MD5).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Insanelyi.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":344,\"Name\":\"LoungeBoard\",\"Title\":\"Lounge Board\",\"Domain\":\"loungeboard.net\",\"BreachDate\":\"2013-08-01T00:00:00.000Z\",\"AddedDate\":\"2014-07-06T10:22:01.000Z\",\"ModifiedDate\":\"2014-07-06T10:22:01.000Z\",\"PwnCount\":45018,\"Description\":\"At some point in 2013, 45k accounts were \u003ca href=\\\"http://leak.sx/thread-186921\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreached from the Lounge Board \\\"General Discussion Forum\\\" and then dumped publicly\u003c/a\u003e. Lounge Board was a MyBB forum launched in 2012 and discontinued in mid 2013 (the last activity in the logs was from August 2013).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/LoungeBoard.png\",\"DataClasses\":[\"email-addresses\",\"ip-addresses\",\"names\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":602,\"Name\":\"Verified\",\"Title\":\"Verified\",\"Domain\":\"verified.cm\",\"BreachDate\":\"2014-01-10T00:00:00.000Z\",\"AddedDate\":\"2014-07-06T04:16:37.000Z\",\"ModifiedDate\":\"2014-07-06T04:16:37.000Z\",\"PwnCount\":16919,\"Description\":\"In January 2014, \u003ca href=\\\"http://securityaffairs.co/wordpress/21120/cyber-crime/verified-communities-hacked.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eone of the largest communities of Eastern Europe cybercriminals known as \\\"Verified\\\" was hacked\u003c/a\u003e. The breach exposed nearly 17k users of the vBulletin forum including their personal messages and other potentially personally identifiable information.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Verified.png\",\"DataClasses\":[\"email-addresses\",\"historical-passwords\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":49,\"Name\":\"AstroPID\",\"Title\":\"Astropid\",\"Domain\":\"astropid.com\",\"BreachDate\":\"2013-12-19T00:00:00.000Z\",\"AddedDate\":\"2014-07-06T03:49:45.000Z\",\"ModifiedDate\":\"2014-07-06T03:49:45.000Z\",\"PwnCount\":5788,\"Description\":\"In December 2013, the vBulletin forum for the social engineering site known as \\\"AstroPID\\\" was breached and \u003ca href=\\\"https://www.sinister.ly/Thread-40-Compromised-databases\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eleaked publicly\u003c/a\u003e. The site provided tips on fraudulently obtaining goods and services, often by providing a legitimate \\\"PID\\\" or Product Information Description. The breach resulted in nearly 6k user accounts and over 220k private messages between forum members being exposed.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/AstroPID.png\",\"DataClasses\":[\"email-addresses\",\"instant-messenger-identities\",\"ip-addresses\",\"names\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":354,\"Name\":\"MangaTraders\",\"Title\":\"Manga Traders\",\"Domain\":\"mangatraders.com\",\"BreachDate\":\"2014-06-09T00:00:00.000Z\",\"AddedDate\":\"2014-06-10T03:49:45.000Z\",\"ModifiedDate\":\"2019-05-13T12:24:00.000Z\",\"PwnCount\":855249,\"Description\":\"In June 2014, the Manga trading website \u003ca href=\\\"http://www.mangatraders.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eMangatraders.com\u003c/a\u003e had the usernames and passwords of over 900k users \u003ca href=\\\"http://boards.4chan.org/a/thread/108603065/mangatraders-has-been-hacked-emails-and-passwords\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eleaked on the internet\u003c/a\u003e (approximately 855k of the emails were unique). The passwords were weakly hashed with a single iteration of MD5 leaving them vulnerable to being easily cracked.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MangaTraders.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":629,\"Name\":\"Win7Vista\",\"Title\":\"Win7Vista Forum\",\"Domain\":\"win7vista.com\",\"BreachDate\":\"2013-09-03T00:00:00.000Z\",\"AddedDate\":\"2014-06-01T10:01:32.000Z\",\"ModifiedDate\":\"2014-06-01T10:01:32.000Z\",\"PwnCount\":202683,\"Description\":\"In September 2013, the \u003ca href=\\\"http://www.win7vista.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWin7Vista\u003c/a\u003e Windows forum (since renamed to the \\\"Beyond Windows 9\\\" forum) was hacked and later \u003ca href=\\\"http://leak.sx/thread-186933\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehad its internal database dumped\u003c/a\u003e. The dump included over 200k members’ personal information and other internal data extracted from the forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Win7Vista.png\",\"DataClasses\":[\"email-addresses\",\"instant-messenger-identities\",\"ip-addresses\",\"names\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":100,\"Name\":\"CannabisForum\",\"Title\":\"Cannabis.com\",\"Domain\":\"cannabis.com\",\"BreachDate\":\"2014-02-05T00:00:00.000Z\",\"AddedDate\":\"2014-06-01T07:55:24.000Z\",\"ModifiedDate\":\"2014-06-01T07:55:24.000Z\",\"PwnCount\":227746,\"Description\":\"In February 2014, the vBulletin forum for the Marijuana site cannabis.com was breached and \u003ca href=\\\"https://www.google.com/search?q=%22cannabisforum.tar%22\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eleaked publicly\u003c/a\u003e. Whilst there has been no public attribution of the breach, the leaked data included over 227k accounts and nearly 10k private messages between users of the forum.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/CannabisForum.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"historical-passwords\",\"instant-messenger-identities\",\"ip-addresses\",\"passwords\",\"private-messages\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":264,\"Name\":\"HackForums\",\"Title\":\"hackforums.net\",\"Domain\":\"hackforums.net\",\"BreachDate\":\"2011-06-25T00:00:00.000Z\",\"AddedDate\":\"2014-05-11T10:30:43.000Z\",\"ModifiedDate\":\"2014-05-11T10:30:43.000Z\",\"PwnCount\":191540,\"Description\":\"In June 2011, the hacktivist group known as \\\"LulzSec\\\" leaked \u003ca href=\\\"http://www.forbes.com/sites/andygreenberg/2011/06/25/lulzsec-says-goodbye-dumping-nato-att-gamer-data/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eone final large data breach they titled \\\"50 days of lulz\\\"\u003c/a\u003e. The compromised data came from sources such as AT\u0026T, Battlefield Heroes and the \u003ca href=\\\"http://hackforums.net\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehackforums.net website\u003c/a\u003e. The leaked Hack Forums data included credentials and personal information of nearly 200,000 registered forum users.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/HackForums.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"instant-messenger-identities\",\"ip-addresses\",\"passwords\",\"social-connections\",\"spoken-languages\",\"time-zones\",\"user-website-urls\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":97,\"Name\":\"BusinessAcumen\",\"Title\":\"Business Acumen Magazine\",\"Domain\":\"businessacumen.biz\",\"BreachDate\":\"2014-04-25T00:00:00.000Z\",\"AddedDate\":\"2014-05-11T04:25:48.000Z\",\"ModifiedDate\":\"2014-05-11T04:25:48.000Z\",\"PwnCount\":26596,\"Description\":\"In April 2014, the Australian \\\"Business Acumen Magazine\\\" website was \u003ca href=\\\"http://1337mir.com/cracked/2014/04/businessacumen-biz-hacked-26000-user-password-leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehacked by an attacker known as 1337MiR\u003c/a\u003e. The breach resulted in over 26,000 accounts being exposed including usernames, email addresses and password stored with a weak cryptographic hashing algorithm (MD5 with no salt).\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BusinessAcumen.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":233,\"Name\":\"Fridae\",\"Title\":\"Fridae\",\"Domain\":\"fridae.asia\",\"BreachDate\":\"2014-05-02T00:00:00.000Z\",\"AddedDate\":\"2014-05-06T02:48:35.000Z\",\"ModifiedDate\":\"2014-05-06T02:48:35.000Z\",\"PwnCount\":35368,\"Description\":\"In May 2014, over 25,000 user accounts were breached from the Asian lesbian, gay, bisexual and transgender website known as \\\"Fridae\\\". The attack which was \u003ca href=\\\"https://twitter.com/Survela/status/463327706361659392\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eannounced on Twitter\u003c/a\u003e appears to have been \u003ca href=\\\"http://pastebin.com/ipFKjv6z\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eorchestrated by Deletesec\u003c/a\u003e who claim that \\\"Digital weapons shall annihilate all secrecy within governments and corporations\\\". The exposed data included password stored in plain text. \",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Fridae.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":71,\"Name\":\"BigMoneyJobs\",\"Title\":\"BigMoneyJobs\",\"Domain\":\"bigmoneyjobs.com\",\"BreachDate\":\"2014-04-03T00:00:00.000Z\",\"AddedDate\":\"2014-04-08T05:44:10.000Z\",\"ModifiedDate\":\"2014-04-08T05:44:10.000Z\",\"PwnCount\":36789,\"Description\":\"In April 2014, the job site \u003ca href=\\\"http://www.bigmoneyjobs.com\\\"\u003ebigmoneyjobs.com\u003c/a\u003e was \u003ca href=\\\"https://twitter.com/ProbablyOnion2/status/451477310319779841\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehacked by an attacker known as \u0026quot;ProbablyOnion\u0026quot;\u003c/a\u003e. The attack resulted in the \u003ca href=\\\"http://news.softpedia.com/news/BigMoneyJobs-Hacked-Details-of-36-000-Users-Leaked-Online-436250.shtml?utm_source=twitterfeed\u0026utm_medium=twitter\u0026utm_campaign=information_security\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eexposure of over 36,000 user accounts\u003c/a\u003e including email addresses, usernames and passwords which were stored in plain text. The attack was allegedly mounted by exploiting a SQL injection vulnerability.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BigMoneyJobs.png\",\"DataClasses\":[\"career-levels\",\"education-levels\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"salutations\",\"user-website-urls\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":89,\"Name\":\"Boxee\",\"Title\":\"Boxee\",\"Domain\":\"forums.boxee.com\",\"BreachDate\":\"2014-03-29T00:00:00.000Z\",\"AddedDate\":\"2014-03-30T13:07:16.000Z\",\"ModifiedDate\":\"2014-03-30T13:07:16.000Z\",\"PwnCount\":158093,\"Description\":\"In March 2014, the home theatre PC software maker Boxee had their forums compromised in an attack. The attackers obtained the entire vBulletin MySQL database and promptly posted it for download on the Boxee forum itself. The data included 160k users, password histories, private messages and a variety of other data exposed across nearly 200 publicly exposed tables.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Boxee.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"geographic-locations\",\"historical-passwords\",\"instant-messenger-identities\",\"ip-addresses\",\"passwords\",\"private-messages\",\"user-website-urls\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":271,\"Name\":\"Hemmelig\",\"Title\":\"hemmelig.com\",\"Domain\":\"hemmelig.com\",\"BreachDate\":\"2011-12-21T00:00:00.000Z\",\"AddedDate\":\"2014-03-25T07:23:52.000Z\",\"ModifiedDate\":\"2014-03-25T07:23:52.000Z\",\"PwnCount\":28641,\"Description\":\"In December 2011, Norway's largest online sex shop hemmelig.com was \u003ca href=\\\"http://www.dazzlepod.com/hemmelig/?page=93\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ehacked by a collective calling themselves \u0026quot;Team Appunity\u0026quot;\u003c/a\u003e. The attack exposed over 28,000 usernames and email addresses along with nicknames, gender, year of birth and unsalted MD5 password hashes.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Hemmelig.png\",\"DataClasses\":[\"email-addresses\",\"genders\",\"nicknames\",\"partial-dates-of-birth\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":true,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":586,\"Name\":\"IGF\",\"Title\":\"UN Internet Governance Forum\",\"Domain\":\"intgovforum.org\",\"BreachDate\":\"2014-02-20T00:00:00.000Z\",\"AddedDate\":\"2014-02-23T04:32:08.000Z\",\"ModifiedDate\":\"2014-02-23T04:32:08.000Z\",\"PwnCount\":3200,\"Description\":\"In February 2014, the Internet Governance Forum (formed by the United Nations for policy dialogue on issues of internet governance) was \u003ca href=\\\"http://www.cyberwarnews.info/2014/02/20/united-nations-internet-governance-forum-hacked-3215-accounts-leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eattacked by hacker collective known as Deletesec\u003c/a\u003e. Although tasked with \u0026quot;ensuring the security and stability of the Internet\u0026quot;, the IGF’s website was still breached and resulted in the leak of 3,200 email addresses, names, usernames and cryptographically stored passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/IGF.png\",\"DataClasses\":[\"email-addresses\",\"names\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":387,\"Name\":\"MuslimDirectory\",\"Title\":\"Muslim Directory\",\"Domain\":\"muslimdirectory.co.uk\",\"BreachDate\":\"2014-02-17T00:00:00.000Z\",\"AddedDate\":\"2014-02-23T03:09:38.000Z\",\"ModifiedDate\":\"2014-02-23T03:09:38.000Z\",\"PwnCount\":37784,\"Description\":\"In February 2014, the UK guide to services and business known as the Muslim Directory was \u003ca href=\\\"http://www.cyberwarnews.info/2014/02/17/muslim-directory-hacked-38903-user-credentials-leaked/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eattacked by the hacker known as @th3inf1d3l\u003c/a\u003e. The data was consequently dumped publicly and included the web accounts of tens of thousands of users which contained data including their names, home address, age group, email, website activity and password in plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/MuslimDirectory.png\",\"DataClasses\":[\"age-groups\",\"email-addresses\",\"employers\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"website-activity\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":526,\"Name\":\"Spirol\",\"Title\":\"Spirol\",\"Domain\":\"spirol.com\",\"BreachDate\":\"2014-02-22T00:00:00.000Z\",\"AddedDate\":\"2014-02-22T20:47:56.000Z\",\"ModifiedDate\":\"2014-02-22T20:47:56.000Z\",\"PwnCount\":55622,\"Description\":\"In February 2014, Connecticut based Spirol Fastening Solutions \u003ca href=\\\"http://news.softpedia.com/news/Details-of-70-000-Users-Leaked-by-Hackers-From-Systems-of-SPIROL-International-428669.shtml\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuffered a data breach that exposed over 70,000 customer records\u003c/a\u003e. The attack was allegedly mounted by exploiting a SQL injection vulnerability which yielded data from Spirol’s CRM system ranging from customers’ names, companies, contact information and over 55,000 unique email addresses.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Spirol.png\",\"DataClasses\":[\"email-addresses\",\"employers\",\"job-titles\",\"names\",\"phone-numbers\",\"physical-addresses\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":227,\"Name\":\"Forbes\",\"Title\":\"Forbes\",\"Domain\":\"forbes.com\",\"BreachDate\":\"2014-02-15T00:00:00.000Z\",\"AddedDate\":\"2014-02-15T11:24:42.000Z\",\"ModifiedDate\":\"2014-02-15T11:24:42.000Z\",\"PwnCount\":1057819,\"Description\":\"In February 2014, the Forbes website \u003ca href=\\\"http://news.cnet.com/8301-1009_3-57618945-83/syrian-electronic-army-hacks-forbes-steals-user-data\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esuccumbed to an attack that leaked over 1 million user accounts\u003c/a\u003e. The attack was attributed to the Syrian Electronic Army, allegedly as retribution for a perceived \\\"Hate of Syria\\\". The attack not only leaked user credentials, but also resulted in the posting of fake news stories to forbes.com.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Forbes.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"user-website-urls\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":556,\"Name\":\"Tesco\",\"Title\":\"Tesco\",\"Domain\":\"tesco.com\",\"BreachDate\":\"2014-02-12T00:00:00.000Z\",\"AddedDate\":\"2014-02-13T21:19:24.000Z\",\"ModifiedDate\":\"2014-02-13T21:19:24.000Z\",\"PwnCount\":2239,\"Description\":\"In February 2014, \u003ca href=\\\"http://www.bbc.co.uk/news/technology-26171130\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eover 2,000 Tesco accounts with usernames, passwords and loyalty card balances appeared on Pastebin\u003c/a\u003e. Whilst the source of the breach is not clear, many confirmed the credentials were valid for Tesco and indeed \u003ca href=\\\"http://www.troyhunt.com/2012/07/lessons-in-website-security-anti.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e they have a history of poor online security\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Tesco.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"reward-program-balances\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":65,\"Name\":\"Bell\",\"Title\":\"Bell (2014 breach)\",\"Domain\":\"bell.ca\",\"BreachDate\":\"2014-02-01T00:00:00.000Z\",\"AddedDate\":\"2014-02-01T23:57:10.000Z\",\"ModifiedDate\":\"2014-02-01T23:57:10.000Z\",\"PwnCount\":20902,\"Description\":\"In February 2014, \u003ca href=\\\"http://news.softpedia.com/news/Hackers-Claim-to-Have-Breached-Bell-Canada-s-Systems-422952.shtml?utm_medium=twitter\u0026utm_source=FredToadster\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eBell Canada suffered a data breach via the hacker collective known as NullCrew\u003c/a\u003e. The breach included data from multiple locations within Bell and exposed email addresses, usernames, user preferences and a number of unencrypted passwords and credit card data from 40,000 records containing just over 20,000 unique email addresses and usernames.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Bell.png\",\"DataClasses\":[\"credit-cards\",\"genders\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":635,\"Name\":\"WPT\",\"Title\":\"WPT Amateur Poker League\",\"Domain\":\"wptapl.com\",\"BreachDate\":\"2014-01-04T00:00:00.000Z\",\"AddedDate\":\"2014-02-01T02:57:21.000Z\",\"ModifiedDate\":\"2014-02-01T02:57:21.000Z\",\"PwnCount\":148366,\"Description\":\"In January 2014, the \u003ca href=\\\"http://www.wptapl.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eWorld Poker Tour (WPT) Amateur Poker League website\u003c/a\u003e was hacked by the Twitter user @smitt3nz. The attack resulted in the public disclosure of 175,000 accounts including 148,000 email addresses. The plain text password for each account was also included in the breach.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/WPT.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":62,\"Name\":\"BattlefieldHeroes\",\"Title\":\"Battlefield Heroes\",\"Domain\":\"battlefieldheroes.com\",\"BreachDate\":\"2011-06-26T00:00:00.000Z\",\"AddedDate\":\"2014-01-23T13:10:29.000Z\",\"ModifiedDate\":\"2014-01-23T13:10:29.000Z\",\"PwnCount\":530270,\"Description\":\"In June 2011 as part of a final breached data dump, the hacker collective \u0026quot;LulzSec\u0026quot; \u003ca href=\\\"http://www.rockpapershotgun.com/2011/06/26/lulzsec-over-release-battlefield-heroes-data\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eobtained and released over half a million usernames and passwords from the game Battlefield Heroes\u003c/a\u003e. The passwords were stored as MD5 hashes with no salt and many were easily converted back to their plain text versions.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/BattlefieldHeroes.png\",\"DataClasses\":[\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":519,\"Name\":\"Snapchat\",\"Title\":\"Snapchat\",\"Domain\":\"snapchat.com\",\"BreachDate\":\"2014-01-01T00:00:00.000Z\",\"AddedDate\":\"2014-01-02T00:00:00.000Z\",\"ModifiedDate\":\"2014-01-02T00:00:00.000Z\",\"PwnCount\":4609615,\"Description\":\"In January 2014 just one week after \u003ca href=\\\"http://gibsonsec.org/snapchat/fulldisclosure/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eGibson Security detailed vulnerabilities in the service\u003c/a\u003e, Snapchat had 4.6 million usernames and phone number exposed. The attack involved \u003ca href=\\\"http://www.troyhunt.com/2014/01/searching-snapchat-data-breach-with.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebrute force enumeration of a large number of phone numbers\u003c/a\u003e against the Snapchat API in what appears to be a response to Snapchat's assertion that such an attack was \u0026quot;theoretical\u0026quot;. Consequently, the breach enabled individual usernames (which are often used across other services) to be resolved to phone numbers which users usually wish to keep private.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Snapchat.png\",\"DataClasses\":[\"geographic-locations\",\"phone-numbers\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":442,\"Name\":\"PixelFederation\",\"Title\":\"Pixel Federation\",\"Domain\":\"pixelfederation.com\",\"BreachDate\":\"2013-12-04T00:00:00.000Z\",\"AddedDate\":\"2013-12-06T00:00:00.000Z\",\"ModifiedDate\":\"2013-12-06T00:00:00.000Z\",\"PwnCount\":38108,\"Description\":\"In December 2013, a \u003ca href=\\\"http://www.cyberwarnews.info/2013/12/04/pixel-federation-hacked-38000-user-credentials-leaked\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ebreach of the web-based game community based in Slovakia\u003c/a\u003e exposed over 38,000 accounts which were promptly posted online. The breach included email addresses and unsalted MD5 hashed passwords, many of which were easily converted back to plain text.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/PixelFederation.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":20,\"Name\":\"Adobe\",\"Title\":\"Adobe\",\"Domain\":\"adobe.com\",\"BreachDate\":\"2013-10-04T00:00:00.000Z\",\"AddedDate\":\"2013-12-04T00:00:00.000Z\",\"ModifiedDate\":\"2022-05-15T23:52:49.000Z\",\"PwnCount\":152445165,\"Description\":\"In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, \u003cem\u003eencrypted\u003c/em\u003e password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also \u003ca href=\\\"http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003edisclosed much about the passwords\u003c/a\u003e adding further to the risk that hundreds of millions of Adobe customers already faced.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Adobe.png\",\"DataClasses\":[\"email-addresses\",\"password-hints\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":244,\"Name\":\"Gawker\",\"Title\":\"Gawker\",\"Domain\":\"gawker.com\",\"BreachDate\":\"2010-12-11T00:00:00.000Z\",\"AddedDate\":\"2013-12-04T00:00:00.000Z\",\"ModifiedDate\":\"2013-12-04T00:00:00.000Z\",\"PwnCount\":1247574,\"Description\":\"In December 2010, Gawker was attacked by the hacker collective \u0026quot;Gnosis\u0026quot; in retaliation for what was reported to be a feud between Gawker and 4Chan. Information about Gawkers 1.3M users was published along with the data from Gawker's other web presences including Gizmodo and Lifehacker. Due to the prevalence of password reuse, many victims of the breach \u003ca href=\\\"http://www.troyhunt.com/2011/01/why-your-apps-security-design-could.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003ethen had their Twitter accounts compromised to send Acai berry spam\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Gawker.png\",\"DataClasses\":[\"email-addresses\",\"passwords\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":523,\"Name\":\"Sony\",\"Title\":\"Sony\",\"Domain\":\"sony.com\",\"BreachDate\":\"2011-06-02T00:00:00.000Z\",\"AddedDate\":\"2013-12-04T00:00:00.000Z\",\"ModifiedDate\":\"2013-12-04T00:00:00.000Z\",\"PwnCount\":37103,\"Description\":\"In 2011, Sony suffered breach after breach after breach \u0026mdash; it was a \u003cem\u003every\u003c/em\u003e bad year for them. The breaches spanned various areas of the business ranging from the PlayStation network all the way through to the motion picture arm, Sony Pictures. A SQL Injection vulnerability in \u003ca href=\\\"http://www.sonypictures.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003esonypictures.com\u003c/a\u003e lead to \u003ca href=\\\"http://www.troyhunt.com/2011/06/brief-sony-password-analysis.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003etens of thousands of accounts across multiple systems being exposed\u003c/a\u003e complete with plain text passwords.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Sony.png\",\"DataClasses\":[\"dates-of-birth\",\"email-addresses\",\"genders\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":644,\"Name\":\"Yahoo\",\"Title\":\"Yahoo\",\"Domain\":\"yahoo.com\",\"BreachDate\":\"2012-07-11T00:00:00.000Z\",\"AddedDate\":\"2013-12-04T00:00:00.000Z\",\"ModifiedDate\":\"2013-12-04T00:00:00.000Z\",\"PwnCount\":453427,\"Description\":\"In July 2012, Yahoo! had their online publishing service \u0026quot;Voices\u0026quot; compromised via a SQL injection attack. The breach resulted in the disclosure of nearly half a million usernames and passwords stored in plain text. The breach showed that of the compromised accounts, a staggering \u003ca href=\\\"http://www.troyhunt.com/2012/07/what-do-sony-and-yahoo-have-in-common.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003e59% of people who also had accounts in the Sony breach reused their passwords across both services\u003c/a\u003e.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Yahoo.png\",\"DataClasses\":[\"email-addresses\",\"passwords\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":536,\"Name\":\"Stratfor\",\"Title\":\"Stratfor\",\"Domain\":\"stratfor.com\",\"BreachDate\":\"2011-12-24T00:00:00.000Z\",\"AddedDate\":\"2013-12-04T00:00:00.000Z\",\"ModifiedDate\":\"2013-12-04T00:00:00.000Z\",\"PwnCount\":859777,\"Description\":\"In December 2011, \u0026quot;Anonymous\u0026quot; \u003ca href=\\\"http://www.troyhunt.com/2011/12/5-website-security-lessons-courtesy-of.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eattacked the global intelligence company known as \u0026quot;Stratfor\u0026quot;\u003c/a\u003e and consequently disclosed a veritable treasure trove of data including hundreds of gigabytes of email and tens of thousands of credit card details which were promptly used by the attackers to make charitable donations (among other uses). The breach also included 860,000 user accounts complete with email address, time zone, some internal system data and MD5 hashed passwords with no salt.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Stratfor.png\",\"DataClasses\":[\"credit-cards\",\"email-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null},{\"Id\":608,\"Name\":\"Vodafone\",\"Title\":\"Vodafone\",\"Domain\":\"vodafone.is\",\"BreachDate\":\"2013-11-30T00:00:00.000Z\",\"AddedDate\":\"2013-11-30T00:00:00.000Z\",\"ModifiedDate\":\"2019-05-13T12:22:01.000Z\",\"PwnCount\":56021,\"Description\":\"In November 2013, \u003ca href=\\\"http://thehackernews.com/2013/11/vodafone-iceland-hacked-and-exposed.html\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"\u003eVodafone in Iceland suffered an attack\u003c/a\u003e attributed to the Turkish hacker collective \u0026quot;Maxn3y\u0026quot;. The data was consequently publicly exposed and included user names, email addresses, social security numbers, SMS message, server logs and passwords from a variety of different internal sources.\",\"LogoPath\":\"https://haveibeenpwned.com/Content/Images/PwnedLogos/Vodafone.png\",\"DataClasses\":[\"credit-cards\",\"email-addresses\",\"government-issued-ids\",\"ip-addresses\",\"names\",\"passwords\",\"phone-numbers\",\"physical-addresses\",\"purchases\",\"sms-messages\",\"usernames\"],\"IsVerified\":true,\"IsFabricated\":false,\"IsSensitive\":false,\"IsRetired\":false,\"IsSpamList\":false,\"IsMalware\":false,\"FaviconUrl\":null}]}]\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"17:[\"$\",\"html\",null,{\"lang\":\"en\",\"children\":[[\"$\",\"body\",null,{\"className\":\"__className_d65c78 __variable_d65c78 __variable_373ca7\",\"data-ga4-measurement-id\":\"G-CXG8K4KW4P\",\"data-node-env\":\"production\",\"children\":[\"$\",\"$L21\",null,{\"session\":null,\"children\":[\"$\",\"$Lf\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L10\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[\"$\",\"div\",null,{\"className\":\"not-found_wrapper__gDToA\",\"children\":[[\"$\",\"$L13\",null,{\"src\":{\"src\":\"/_next/static/media/404.06ebad17.svg\",\"height\":191,\"width\":214,\"blurWidth\":0,\"blurHeight\":0},\"alt\":\"\"}],[\"$\",\"h1\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"\u003cspan\u003e404\u003c/span\u003e Page not found\"}}],[\"$\",\"p\",null,{\"children\":\"We’re sorry, the page you’re looking for no longer exists.\"}],[\"$\",\"$L22\",null,{\"children\":\"Go back\"}]]}],\"notFoundStyles\":[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/f0fb21e407a12b17.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]]}]}]}],[\"$\",\"$L23\",null,{}],[\"$\",\"$L24\",null,{\"channel\":\"production\",\"experimentationId\":\"guest-adbb47f0-f54f-40ce-8099-071f76d30b30\"}],[\"$\",\"$L25\",null,{\"gaId\":\"G-CXG8K4KW4P\",\"nonce\":\"becb8074-9e67-474f-b861-2b4a2f1edf7d\",\"debugMode\":false}]]}]\n18:[[\"$\",\"meta\",\"0\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}],[\"$\",\"meta\",\"1\",{\"charSet\":\"utf-8\"}],[\"$\",\"title\",\"2\",{\"children\":\"Data Breach Database — Mozilla Monitor\"}],[\"$\",\"meta\",\"3\",{\"name\":\"description\",\"content\":\"Find out if you’ve been part of a data breach with Mozilla Monitor. We’ll help you understand what to do next and continuously monitor for any new breaches.\"}],[\"$\",\"meta\",\"4\",{\"property\":\"og:title\",\"content\":\"All Breaches Detected by Mozilla Monitor\"}],[\"$\",\"meta\",\"5\",{\"property\":\"og:description\",\"content\":\"Browse the complete list of known breaches detected by Mozilla Monitor, then find out if your information was expose"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"d.\"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:url\",\"content\":\"https://monitor.mozilla.org/breaches\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:site_name\",\"content\":\"Mozilla Monitor\"}],[\"$\",\"meta\",\"8\",{\"property\":\"og:image\",\"content\":\"https://monitor.mozilla.org/images/og-image.webp\"}],[\"$\",\"meta\",\"9\",{\"property\":\"og:type\",\"content\":\"website\"}],[\"$\",\"meta\",\"10\",{\"name\":\"twitter:card\",\"content\":\"summary_large_image\"}],[\"$\",\"meta\",\"11\",{\"name\":\"twitter:title\",\"content\":\"All Breaches Detected by Mozilla Monitor\"}],[\"$\",\"meta\",\"12\",{\"name\":\"twitter:description\",\"content\":\"Browse the complete list of known breaches detected by Mozilla Monitor, then find out if your information was exposed.\"}],[\"$\",\"meta\",\"13\",{\"name\":\"twitter:image\",\"content\":\"https://monitor.mozilla.org/images/og-image.webp\"}],[\"$\",\"link\",\"14\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"48x48\"}],[\"$\",\"meta\",\"15\",{\"name\":\"next-size-adjust\"}]]\nd:null\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"26:I[90815,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"5863\",\"static/chunks/5863-2b60776be84b3b88.js\",\"5347\",\"static/chunks/5347-da9a1ea5f765e3fc.js\",\"3265\",\"static/chunks/app/(proper_react)/layout-bff485c534519c98.js\"],\"L10nProvider\"]\n50:I[52731,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"5863\",\"static/chunks/5863-2b60776be84b3b88.js\",\"5347\",\"static/chunks/5347-da9a1ea5f765e3fc.js\",\"3265\",\"static/chunks/app/(proper_react)/layout-bff485c534519c98.js\"],\"ReactAriaI18nProvider\"]\n51:I[92784,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"5863\",\"static/chunks/5863-2b60776be84b3b88.js\",\"5347\",\"static/chunks/5347-da9a1ea5f765e3fc.js\",\"3265\",\"static/chunks/app/(proper_react)/layout-bff485c534519c98.js\"],\"CountryCodeProvider\"]\n52:I[64455,[\"605\",\"static/chunks/605-2e4b9c1a816ed366.js\",\"4337\",\"static/chunks/4337-1a2f93607eb7f680.js\",\"5138\",\"static/chunks/5138-fda9f644adc5bac6.js\",\"5863\",\"static/chunks/5863-2b60776be84b3b88.js\",\"5347\",\"static/chunks/5347-da9a1ea5f765e3fc.js\",\"3265\",\"static/chunks/app/(proper_react)/layout-bff485c534519c98.js\"],\"PageLoadEvent\"]\n27:T5af,# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n### Dialog window that allows a user to add a new email address to be monitored\n\nadd-email-add-another-heading = Add another email address\n\n# $total is the number of emails a user is allowed to add\nadd-email-your-account-includes =\n {\n $total -\u003e\n [one] Your account includes monitoring of { $total } email address. Add a new email address to see if it’s been involved in a breach.\n *[other] Your account includes monitoring of up to { $total } email addresses. Add"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1," a new email address to see if it’s been involved in a breach.\n }\n\nadd-email-address-input-label = Email address\nadd-email-send-verification-button = Send verification link\n\n# $email is the newly added email address. $settings-href is the URL for the Settings page. HTML tags should not be translated, e.g. `\u003ca\u003e`\n# This string will be deprecated when the new Plus plan is live.\nadd-email-verify-the-link = Verify the link sent to { $email } to add it to { -brand-fx-monitor }. Manage all email addresses in \u003ca { $settings-href }\u003eSettings\u003c/a\u003e.\n# Variables:\n# $email (string) - An email address submitted by the user for monitoring, e.g. `example@example.com`\nadd-email-verify-the-link-2 = Verify the link sent to \u003cb\u003e{ $email }\u003c/b\u003e to add it to { -brand-mozilla-monitor }.\n28:T2873,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Strings for the main app\n\n## The following messages are brand and should be kept entirely in English\n## unless otherwise indicated.\n\n-product-name = Mozilla Monitor\n-product-short-name = Monitor\n-brand-name = Firefox\n-brand-HIBP = Have I Been Pwned\n-brand-fxa = Firefox Account\n-brand-pocket = Pocket\n-brand-lockwise = Firefox Lockwise\n-brand-firefox = Firefox\n-brand-monitor = Monitor\n-brand-fx-monitor = Mozilla Monitor\n-brand-mozilla = Mozilla\n-brand-premium = Premium\n-brand-monitor-premium = Monitor Premium\n-brand-mozilla-foundation = Mozilla Foundation\n-brand-github = GitHub\n-brand-mozilla-vpn = Mozilla VPN\n-brand-relay = Firefox Relay\n-brand-mozilla-monitor = Mozilla Monitor\n-brand-monitor-plus = Monitor Plus\n\n##\n\nerror-not-subscribed = This email address is not subscribed to { -product-name }.\nerror-hibp-throttled = Too many connections to { -brand-HIBP }.\nerror-hibp-connect = Error connecting to { -brand-HIBP }.\n\nuser-add-invalid-email = Invalid Email\nuser-add-too-many-emails = You are monitoring the maximum number of email addresses.\nuser-add-duplicate-email = This email has already been added to { -product-name }.\nuser-add-verification-email-just-sent = Another verification email can’t be sent this quickly. Please try again later.\nuser-add-unknown-error = Something went wrong adding another email address. Please try again later.\nuser-delete-unknown-error = Something went wrong removing an email address. Please try again later.\n\nuser-verify-token-error = Verification token is required.\n\n# compromised-data = the kind of user data exposed to hackers in data breach.\ncompromised-data = Compromised data:\n\n# Breach data provided by Have I Been Pwned.\n# Variables:\n# $hibp-link (String) - Link to Have I Been Pwned\nhibp-attribution = Breach data provided by { $hibp-link }\n\nshow-all = Show All\n\nsign-out = Sign Out\n\n# Manage Firefox Account, link to page where account holders can change their account settings.\nmanage-fxa = Manage { -brand-fxa }\n\n# Link title\npreferences = Preferences\n\n# Link title\nhome = Home\n\n# Link title\nsecurity-tips = Security Tips\n\n# Link title\nmore-about-this-breach = More about this breach\n\nmonitor-several-emails = Monitor several emails\n\nwebsite-breach = Website Breach\nsensitive-breach = Sensitive Website Breach\ndata-aggregator-breach = Data Aggregator Breach\n\nwhat-data = What data was compromised:\n\nsensitive-sites = How does { -product-name } treat sensitive sites?\nsensitive-sites-copy = { -product-name } only reveals accounts associated with these\n types of breaches after an email address has been verified. This means you’re the\n only person who can see if your information was in this breach (unless someone\n else has access to your email account).\n\ndelayed-reporting-headline = Why did it take so long to report this breach?\ndelayed-reporting-copy = It can sometimes take months or years for credentials exposed\n in a data breach to appear on the dark web. Breaches get added to our database as\n soon as they have been discovered and verified.\n\nfxm-warns-you = { -product-name } warns you if your email address has been exposed\n in an online data breach. See if your information has been exposed, learn how\n to better protect your online accounts, and get alerted if your email address\n appears in a new breach.\n\nwhat-is-data-agg = What is a data aggregator?\nwhat-is-data-agg-blurb = Data aggregators, or data brokers, collect information from public\n records and buy it from other companies. They compile this data to sell it to companies\n for marketing purposes. Victims of these breaches are less likely to experience financial\n fraud, but hackers could use this data to impersonate or profile them.\n\navoid-personal-info = Avoid using personal info in passwords\n\nsend-verification = Send Verification Link\n\n# This string is a header on the user preferences page and\n# appears above a check-box list of user options which allow\n# the user to choose whether or not they want to receive breach\n# alerts for all of their monitored email addresses to a single\n# email address.\nbreach-summary = Breach Summary\n\n##\n\nbreach-alert-subject = { -product-name } found your email in a new data breach\n\n# This string is displayed under a large numeral that indicates the total number\n# of data breaches that exposed a user’s password. Don’t add $passwords to\n# your localization, because it would result in the number showing twice.\npasswords-exposed =\n { $passwords -\u003e\n [one] Password exposed across all breaches\n *[other] Passwords exposed across all breaches\n }\n\n# This string is displayed under a large numeral that indicates the total number\n# of data breaches that have exposed the user’s information. Don’t add $breaches to\n# your localization, because it would result in the number showing twice.\nknown-data-breaches-exposed =\n { $breaches -\u003e\n [one] Known data breach has exposed your info\n *[other] Known data breaches have exposed your info\n }\n\nwhat-is-a-website-breach = What is a website breach?\nwebsite-breach-blurb = A website data breach happens when cyber criminals steal, copy, or expose personal information from online accounts. It’s usually a result of hackers finding a weak spot in the website’s security. Breaches can also happen when account information gets leaked by accident.\n\n# This is a section headline on the breach detail page that appears above\n# a short summary about the breach.\nbreach-overview-title = Overview\n\n# This is a standardized breach overview blurb that appears on all breach detail pages.\n# $breachTitle is the name of the breached company or website.\n# $breachDate and $addedDate are calendar dates.\nbreach-overview-new = On { $breachDate }, { $breachTitle } was breached. Once the breach was discovered and verified, it was added to our database on { $addedDate }.\n\n# Title that appears in the mobile menu bar and opens the mobile menu when clicked.\nmenu = Menu\n\n# This is part of a confirmation message that appears after a user has submitted\n# the form to add an additional email to Firefox Monitor.\n# Variables:\n# $userEmail (String) - User email address\nverify-the-link = Verify the link sent to { $userEmail } to add it to { -product-name }.\n\n## These are part of a confirmation page that appears after a user has verified\n## an additional email to Firefox Monitor.\n\n# This string is a label for the calendar date a breach is added to the database\n# and is followed by that date.\nbreach-added-label = Breach added:\n\n# Section headline\nrec-section-headline = What to do for this breach\nrec-section-subhead = We recommend you take these steps to keep your personal info safe and protect your digital identity.\n\n# Section headline\nrec-section-headline-no-pw = What to do to protect your personal info\nrec-section-subhead-no-pw = Though passwords weren’t exposed in this breach, there are still steps you can take to better protect your personal info.\n\n##\n\n# A status indicator that appears in the top right corner of new breach cards\nnew-breach = New\n\n##\n\n# “account” can be localized, “Mozilla” must be treated as a brand,\n# and kept in English.\n-brand-mozilla-account = Mozilla account\n\nopen-in-new-tab-alt = Open link in a new tab\n\n## Search Engine Optimization\n\nmeta-desc-2 = Find out if you’ve been part of a data breach with { -brand-fx-monitor }. We’ll help you understand what to do next and continuously monitor for any new breaches.\n\n## Header\n\n# Deprecated\nbrand-fx-monitor = { -brand-fx-monitor }\nsign-in = Sign In\nbrand-mozilla-monitor = { -brand-fx-monitor }\n\n## Site navigation\n\nmobile-menu-label = Main menu\n\nmain-nav-button-collapse-label = Collapse menu\nmain-nav-button-collapse-tooltip = Collapse menu\nmain-nav-button-expand-label = Expand menu\nmain-nav-button-expand-tooltip = Expand menu\nmain-nav-label = Navigation\nmain-nav-link-home-label = Home\nmain-nav-link-dashboard-label = Dashboard\nmain-nav-link-settings-label = Settings\nmain-nav-link-faq-label = FAQs\nmain-nav-link-faq-tooltip = Frequently asked questions\n\n## User menu\n\nuser-menu-trigger-label = Open user menu\nuser-menu-trigger-tooltip = Profile\nuser-menu-manage-fxa-label = Manage your { -brand-mozilla-account }\nuser-menu-settings-label = Settings\nuser-menu-settings-tooltip = Configure { -brand-mozilla-monitor }\nuser-menu-help-label = Help and support\nuser-menu-help-tooltip = Get help using { -brand-mozilla-monitor }\nuser-menu-signout-label = Sign out\nuser-menu-signout-tooltip = Sign out of { -brand-mozilla-monitor }\n\n## Footer\n\nmozilla = { -brand-mozilla }\nterms-of-service = Terms of Service\nprivacy-notice = Privacy Notice\ngithub = { -brand-github }\nfooter-nav-recent-breaches = Recent Data Breaches\nfooter-external-link-faq-label = FAQs\nfooter-external-link-faq-tooltip = Frequently asked questions\n\n## Error page\n\n# Variables:\n# $errorCode (number) - \"404\"\nerror-page-error-404-title = { $errorCode } Page not found\nerror-page-error-404-copy = We’re sorry, the page you’re looking for no longer exists.\nerror-page-error-404-cta-button = Go back\n# Variables:\n# $errorCode (number) - the status code of the error, e.g. 403\nerror-page-error-other-title = { $errorCode } Something went wrong\n\n## Breach overview page\n\nall-breaches-headline-3 = Data Breach Database\nall-breaches-lead = We monitor all known data breaches to find out if your personal information was compromised. Here’s a complete list of all of the breaches that have been reported since 2007.\nsearch-breaches = Search Breaches\n\n# the kind of user data exposed to hackers in data breach.\nexposed-data = Exposed data:\n\n## Public breach detail page\n\nfind-out-if-2 = Find out if you were involved in this breach\nfind-out-if-description = We’ll help you quickly see if your email address was exposed in this breach, and understand what to do next.\n\nbreach-detail-cta-signup = Check for breaches\n\n## Firefox Monitor -\u003e Mozilla Monitor rebrand banner\n\nbanner-monitor-rebrand-text = \u003cb\u003e{ -brand-mozilla-monitor }\u003c/b\u003e: New name, look and even more ways to \u003cb\u003ereclaim your privacy\u003c/b\u003e.\nbanner-monitor-rebrand-dismiss-button-label = OK\nbanner-monitor-rebrand-dismiss-button-tooltip = Dismiss\n\nloading-accessibility = Loading\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"29:T1f46,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nbreach-all-meta-page-title = Data Breach Database — { -brand-fx-monitor }\nbreach-all-meta-social-title = All Breaches Detected by { -brand-fx-monitor }\nbreach-all-meta-social-description = Browse the complete list of known breaches detected by { -brand-fx-monitor }, then find out if your information was exposed.\n\n# Variables:\n# $company (String) - Name of the company that was breached, e.g. \"PHP Freaks\"\nbreach-detail-meta-page-title = { $company } Data Breach – { -brand-fx-monitor }\n# Variables:\n# $company (String) - Name of the company that was breached, e.g. \"PHP Freaks\"\nbreach-detail-meta-social-title = Were you affected by the { $company } Data Breach?\nbreach-detail-meta-social-description = Use { -brand-fx-monitor } to find out if your personal information was exposed in this breach, and understand what to do next.\n\n## Links that we might refer to when prompting the user to make changes after a breach\n\nbreach-checklist-link-firefox-relay = { -brand-relay }\nbreach-checklist-link-password-manager = { -brand-firefox } Password Manager\nbreach-checklist-link-mozilla-vpn = { -brand-mozilla-vpn }\n\n## Prompts the user for changes when there is a breach detected of password\n\nbreach-checklist-pw-header-text = Update your passwords and enable two-factor authentication (2FA).\n\n# The `breached-company-link` tags will be replaced with link tags or stripped if no link is available.\n# Variables:\n# $passwordManagerLink (string) - a link to the password manager documentation, with { -breach-checklist-link-password-manager } as the label\nbreach-checklist-pw-body-text = In most cases, we’d recommend that you change your password on the company’s website. But \u003cb\u003etheir website may be down or contain malicious content\u003c/b\u003e, so use caution if you \u003cbreached-company-link\u003evisit the site\u003c/breached-company-link\u003e. For added protection, make sure you’re using unique passwords for all accounts, so that any leaked passwords can’t be used to access other accounts. { $passwordManagerLink } can help you securely keep track of all of your passwords.\n\n## Prompts the user for changes when there is a breach detected of email\n\n# Variables:\n# $firefoxRelayLink (string) - a link to Firefox Relay, with { -breach-checklist-link-firefox-relay } as the label\nbreach-checklist-email-header-2 = Protect your email with an email masking service like { $firefoxRelayLink }.\nbreach-checklist-email-body = This can hide your true email address while forwarding emails to your real inbox.\n\n## Prompts the user for changes when there is a breach detected of social security number\n\n# Credit reports list your bill payment history, loans, current debt, and other financial information.\n# They show where you work and live and whether you've been sued, arrested, or filed for bankruptcy.\nbreach-checklist-ssn-header = Monitor your credit report for accounts, loans, or credit cards you don’t recognize.\n# A security freeze prevents prospective creditors from accessing your credit file.\n# Creditors typically won't offer you credit if they can't access your credit reporting file,\n# so a security freeze, also called a credit freeze, prevents you or others from opening accounts in your name.\n# This will only be shown to users in the US.\n# Variables:\n# $equifaxLink (string) - a link to the Equifax website\n# $experianLink (string) - a link to the Experian website\n# $transUnionLink (string) - a link to the TransUnion website\nbreach-checklist-ssn-body-2 = You can also consider freezing your credit on { $equifaxLink }, { $experianLink } and { $transUnionLink } to stop scammers from opening new accounts in your name. It’s free and won’t affect your credit score.\n\n## Prompts the user for changes when there is a breach detected of credit card\n\nbreach-checklist-cc-header = Report this breach to your credit card issuer and request a new card with a new number.\nbreach-checklist-cc-body = You should also review your credit card statements for unrecognized charges.\n\n## Prompts the user for changes when there is a breach detected of bank account\n\nbreach-checklist-bank-header = Notify your bank immediately that your account number has been compromised.\nbreach-checklist-bank-body = Doing so faster could give you more legal protections to help you recover any losses. You’ll also want to check your accounts for any unrecognized charges.\n\n## Prompts the user for changes when there is a breach detected of pin\n\nbreach-checklist-pin-header = Notify your card issuer and change your PIN immediately.\nbreach-checklist-pin-body = Make sure your new PIN, or any other PIN, doesn’t include easily guessed numbers such as your birth date or address.\n\n## Prompts the user for changes when there is a breach detected of IP address\n\n# Variables:\n# $mozillaVpnLink (string) - a link to the Mozilla VPN website, with { -breach-checklist-link-mozilla-vpn } as the label\nbreach-checklist-ip-header-2 = Use the internet privately with a VPN, such as { $mozillaVpnLink }.\nbreach-checklist-ip-body = Your IP address (Internet Protocol address) pinpoints your location and internet service provider. A VPN can hide your real IP address so you can use the internet privately.\n\n## Prompts the user for changes when there is a breach detected of physical address\n\nbreach-checklist-address-header = Change any passwords or PINs that include any part of your address.\nbreach-checklist-address-body = Addresses are easy to find in public records and can make those passwords and PINs easy to guess.\n\n## Prompts the user for changes when there is a breach detected of date of birth\n\nbreach-checklist-dob-header = Change any passwords or PINs that include your date of birth.\nbreach-checklist-dob-body = Birth dates are easy to find in public records, and people who find it could easily guess your PIN.\n\n## Prompts the user for changes when there is a breach detected of phone number\n\n# Variables:\n# $firefoxRelayLink (string) - a link to Firefox Relay, with { -breach-checklist-link-firefox-relay } as the label\nbreach-checklist-phone-header-2 = Protect your phone number with a masking service like { $firefoxRelayLink }, which hides your true phone number.\n\n## Prompts the user for changes when there is a breach detected of security questions\n\nbreach-checklist-sq-header-text = Update your security questions.\n\n# The `breached-company-link` tags will be replaced with link tags or stripped if no link is available.\nbreach-checklist-sq-body-text = In most cases, we’d recommend that you update your security questions on the company’s website. But \u003cb\u003etheir website may be down or contain malicious content\u003c/b\u003e, so use caution if you \u003cbreached-company-link\u003evisit the site\u003c/breached-company-link\u003e. For added protection, update these security questions on any important accounts where you’ve used them, and create unique passwords for all accounts.\n\n## Prompts the user for changes when there is a breach detected of historical password\n\nbreach-checklist-hp-header = Create unique, strong passwords for any account where you’ve re-used passwords.\n# Variables:\n# $passwordManagerLink (string) - a link to the password manager documentation, with { -breach-checklist-link-password-manager } as the label\nbreach-checklist-hp-body-2 = A password manager like { $passwordManagerLink } (which is free and built-in to the { -brand-firefox } browser) can help you keep track of all your passwords and access them securely from all your devices.\n\n## Prompts the user for changes when there is a breach detected of other types\n\n# Variables:\n# $breachDate (String) - Date of the breach\n# $companyName (String) - Name of the company where the breach occurred\nbreach-checklist-general-header = Reach out to { $companyName } to inform them about this breach and ask for specific steps you can take.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"2a:T20ed,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Chart summarizing total exposures\n\n# The number inside \u003cnr\u003e will be displayed in a large font,\n# the label inside \u003clabel\u003e will be shown underneath, in a smaller font.\n# Variables:\n# $nr (number) - Number of unresolved exposures for the user\nexposure-chart-heading = { $nr -\u003e\n [one] \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eexposure\u003c/label\u003e\n *[other] \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eexposures\u003c/label\u003e\n}\n# Variables:\n# $nr (number) - Number of fixed exposures found for the user\nexposure-chart-heading-fixed = \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eFixed\u003c/label\u003e\nexposure-chart-legend-heading-type = Exposure\nexposure-chart-legend-heading-nr = Number\n# Variables:\n# $nr (number) - Number of a particular type of exposure found for the user\nexposure-chart-legend-value-nr = { $nr }×\nexposure-chart-caption = This chart shows how many times your info is actively exposed.\n# Variables:\n# $total_fixed_exposures_num (number) - Number of fixed exposures\n# $total_exposures_num (number) - Number of total exposures\nexposure-chart-caption-fixed = This chart shows the total exposures that are fixed ({ $total_fixed_exposures_num } out of { $total_exposures_num })\nexposure-chart-returning-user-upgrade-prompt = Home address, family members and more are not yet included.\nexposure-chart-returning-user-upgrade-prompt-cta = Start a free scan\nexposure-chart-scan-in-progress-prompt = \u003cb\u003eScan in progress:\u003c/b\u003e address, family members, and more are not yet included.\n\nmodal-active-number-of-exposures-title = About your number of active exposures\n# Variables:\n# $limit (number) - Number of email addresses included in the plan\nmodal-active-number-of-exposures-part-one-all =\n { $limit -\u003e\n [one] This chart includes the total number of times we found each type of data exposed across all data breaches for the { $limit } email address that you are currently monitoring.\n *[other] This chart includes the total number of times we found each type of data exposed across all data breaches for up to { $limit } email addresses that you are currently monitoring.\n }\nmodal-active-number-of-exposures-part-two = For example, if you have 10 exposures of your phone number, that might mean one phone number is exposed across 10 different sites, or it could mean 2 different phone numbers were exposed across 5 different sites.\nmodal-active-number-of-exposures-part-three-all = Once they are resolved, they will be added to your total number of fixed exposures on the Fixed page.\nmodal-fixed-number-of-exposures-title = About your number of fixed exposures\nmodal-fixed-number-of-exposures-all = This chart includes the total number of data breaches that have been fixed for all email addresses you’re currently monitoring. Once exposures are marked as fixed, they’ll be added to the total here.\n\nmodal-cta-ok = OK\nmodal-cta-got-it = Got it\nopen-modal-alt = Open modal\nclose-modal-alt = Close modal\nopen-tooltip-alt = Open tooltip\n\nprogress-card-heres-what-we-fixed-headline-all = Here’s what you fixed\nprogress-card-manually-fixed-headline = Manually fixed\n\ndashboard-tab-label-action-needed = Action needed\ndashboard-tab-label-fixed = Fixed\ndashboard-exposures-all-fixed-label = All fixed here!\n\n\ndashboard-exposures-area-headline = View all sites where your info is exposed\n# Note: this line precedes dashboard-exposures-area-description-all-line2.\n# Variables:\n# $exposures_unresolved_num (number) - the unresolved number of exposures the user has.\ndashboard-exposures-area-description-all-line1 = {\n $exposures_unresolved_num -\u003e\n [one] We found { $exposures_unresolved_num } exposure of your data.\n *[other] We found { $exposures_unresolved_num } exposures of your data.\n}\n\n# Note: this line follows dashboard-exposures-area-description-all-line1.\n# Variables:\n# $data_breach_unresolved_num (number) - the unresolved number of data breaches the user has.\ndashboard-exposures-area-description-all-line2 = {\n $data_breach_unresolved_num -\u003e\n [one] It appeared in { $data_breach_unresolved_num } data breach.\n *[other] It appeared across { $data_breach_unresolved_num } data breaches.\n}\ndashboard-fixed-area-headline-all = View all exposures that are fixed\n\n# This is the label on a button that opens a popover menu, which shows a menu to adjust filters for the listed exposures.\ndashboard-exposures-filter = Filter\ndashboard-exposures-filter-company = Company\ndashboard-exposures-filter-date-found = Date found\ndashboard-exposures-filter-date-found-last-seven-days = Last 7 days\ndashboard-exposures-filter-date-found-last-thirty-days = Last 30 days\ndashboard-exposures-filter-date-found-last-year = Last year\ndashboard-exposures-filter-status = Status\npopover-open-filter-settings-alt = Select filters\ndashboard-exposures-filter-show-all = Show all\ndashboard-exposures-filter-show-results = Show results\ndashboard-exposures-filter-reset = Reset\n\n## Top banner on the dashboard\n\ndashboard-top-banner-section-label = Dashboard summary\ndashboard-top-banner-scan-in-progress-title = Your scan is still in progress\n\ndashboard-top-banner-your-data-is-protected-title = Your data is protected\ndashboard-top-banner-your-data-is-protected-cta = See what’s fixed\n\ndashboard-top-banner-lets-keep-protecting-title = Let’s keep protecting your data\n# Variables:\n# $exposures_unresolved_num is the remaining number of exposures the user has to resolve.\ndashboard-top-banner-lets-keep-protecting-description =\n { $exposures_unresolved_num -\u003e\n [one] You still have { $exposures_unresolved_num } exposure left to fix. Keep going and protect yourself. We’ll guide you step-by-step.\n *[other] You still have { $exposures_unresolved_num } exposures left to fix. Keep going and protect yourself. We’ll guide you step-by-step.\n }\ndashboard-top-banner-lets-keep-protecting-cta = Let’s keep going\n\ndashboard-top-banner-protect-your-data-title = Let’s protect your data\ndashboard-top-banner-protect-your-data-cta = Let’s fix it\n\n# Note: this line is followed by `dashboard-top-banner-non-us-protect-your-data-description-line1`.\n# Variables:\n# $exposures_unresolved_num (number) - the total number of exposures the user has.\ndashboard-top-banner-non-us-protect-your-data-description-line1 = {\n $exposures_unresolved_num -\u003e\n [one] We found { $exposures_unresolved_num } exposure of your data.\n *[other] We found { $exposures_unresolved_num } exposures of your data.\n}\n# Note: this line is preceded by `dashboard-top-banner-non-us-protect-your-data-description-line1`.\n# Variables:\n# $data_breach_unresolved_num (number) - the total number of data breaches the user has.\ndashboard-top-banner-non-us-protect-your-data-description-line2 = {\n $data_breach_unresolved_num -\u003e\n [one] It appeared in { $data_breach_unresolved_num } data breach. We’ll guide you step-by-step on how to fix it.\n *[other] It appeared across { $data_breach_unresolved_num } data breaches. We’ll guide you step-by-step on how to fix it.\n}\n\ndashboard-top-banner-no-exposures-found-title = No exposures found\ndashboard-top-banner-non-us-no-exposures-found-description = Great news! We searched all known data breaches and found no exposures. We’ll keep monitoring your email address and will alert you if a new breach occurs.\ndashboard-no-exposures-label = No exposures found\n\n# Variables:\n# $exposures_resolved_num is the number of exposures the user has resolved.\ndashboard-top-banner-non-us-your-data-is-protected-description =\n { $exposures_resolved_num -\u003e\n [one] Great work, the exposure of your data is fixed! We’ll keep monitoring and will alert you of any new exposures.\n *[other] Great work, all { $exposures_resolved_num } exposures of your data are fixed! We’ll keep monitoring and will alert you of any new exposures.\n }\n\ndashboard-top-banner-monitor-more-cta = Monitor more emails\n\n# About Exposure Indicators Modal\n\nmodal-exposure-status-description-all = We search for exposures in all known data breaches.\n Your exposures will have one of the following statuses:\nmodal-exposure-indicator-title = Exposure statuses\nmodal-exposure-indicator-action-needed = Advanced or manual action is needed by you to complete an action.\nmodal-exposure-indicator-fixed = The exposure has been resolved and there’s no action for you to take.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"2b:T17bd,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Breach Data Classes\n\naccount-balances = Account balances\naddress-book-contacts = Address book contacts\nage-groups = Age groups\nages = Ages\n# Refers to medical appointments.\nappointments = Appointments\napps-installed-on-devices = Apps installed on devices\nastrological-signs = Astrological signs\naudio-recordings = Audio recordings\nauth-tokens = Auth tokens\navatars = Avatars\nbank-account-numbers = Bank account numbers\nbeauty-ratings = Beauty ratings\nbiometric-data = Biometric data\n# This string is the shortened version of \"Biographies\", and\n# refers to biographical data about a user.\nbios = Bios\nbrowser-user-agent-details = Browser user agent details\nbrowsing-histories = Browsing histories\nbuying-preferences = Buying preferences\ncar-ownership-statuses = Car ownership statuses\ncareer-levels = Career levels\ncellular-network-names = Cellular network names\ncharitable-donations = Charitable donations\nchat-logs = Chat logs\ncitizenship-statuses = Citizenship statuses\nclothing-sizes = Clothing sizes\ncredit-card-cvv = Credit card CVV\ncredit-cards = Credit cards\ncredit-status-information = Credit status information\ncryptocurrency-wallet-hashes = Cryptocurrency wallet hashes\ncustomer-feedback = Customer feedback\ncustomer-interactions = Customer interactions\ndates-of-birth = Dates of birth\ndeceased-date = Deceased date\ndeceased-statuses = Deceased statuses\n# Instructions that you can set up in online shopping services to get your orders\n# delivered (e.g. deliver to a specific neighbor, entrance location, etc.).\ndelivery-instructions = Delivery instructions\ndevice-information = Device information\ndevice-serial-numbers = Device serial numbers\ndevice-usage-tracking-data = Device usage tracking data\ndrinking-habits = Drinking habits\ndriver-s-licenses = Driver’s licenses\ndrug-habits = Drug habits\neating-habits = Eating habits\neducation-levels = Education levels\nemail-addresses = Email addresses\nemail-messages = Email messages\nemployers = Employers\nemployment-statuses = Employment statuses\nencrypted-keys = Encrypted keys\nethnicities = Ethnicities\nfamily-members-names = Family members’ names\nfamily-plans = Family plans\nfamily-structure = Family structure\nfinancial-investments = Financial investments\nfinancial-transactions = Financial transactions\nfitness-levels = Fitness levels\nflights-taken = Flights taken\ngenders = Genders\ngeographic-locations = Geographic locations\ngovernment-issued-ids = Government issued IDs\nhealth-insurance-information = Health insurance information\nhistorical-passwords = Historical passwords\nhiv-statuses = HIV statuses\nhome-loan-information = Home loan information\nhome-ownership-statuses = Home ownership statuses\nhomepage-urls = Homepage URLs\nimei-numbers = IMEI numbers\nimsi-numbers = IMSI numbers\nincome-levels = Income levels\ninstant-messenger-identities = Instant messenger identities\nip-addresses = IP addresses\njob-applications = Job applications\njob-titles = Job titles\n# This string refers to vehicle license plates.\nlicence-plates = License Plates\nliving-costs = Living costs\n# This string refers to financial loans.\nloan-information = Loan information\nlogin-histories = Login histories\nloyalty-program-details = Loyalty program details\nmac-addresses = MAC addresses\nmarital-statuses = Marital statuses\n# Mnemonic phrases are a group of words used to access the content of cryptocurrency wallets.\nmnemonic-phrases = Mnemonic phrases\nmothers-maiden-names = Mothers maiden names\nnames = Names\nnationalities = Nationalities\nnet-worths = Net worths\nnicknames = Nicknames\n# no data classes found\nnone-data-class = None\noccupations = Occupations\n# various data classes grouped together\nother-data-class = Other\nparenting-plans = Parenting plans\npartial-credit-card-data = Partial credit card data\npartial-dates-of-birth = Partial dates of birth\npartial-phone-numbers = Partial phone numbers\npassport-numbers = Passport numbers\npassword-hints = Password hints\npassword-strengths = Password strengths\npasswords = Passwords\npayment-histories = Payment histories\npayment-methods = Payment methods\npersonal-descriptions = Personal descriptions\npersonal-health-data = Personal health data\npersonal-interests = Personal interests\nphone-numbers = Phone numbers\nphotos = Photos\nphysical-addresses = Physical addresses\nphysical-attributes = Physical attributes\npins = PINs\nplaces-of-birth = Places of birth\npolitical-donations = Political donations\npolitical-views = Political views\nprivate-messages = Private messages\nprofessional-skills = Professional skills\nprofile-photos = Profile photos\npurchases = Purchases\npurchasing-habits = Purchasing habits\nraces = Races\nrecovery-email-addresses = Recovery email addresses\nrelationship-statuses = Relationship statuses\nreligions = Religions\nreward-program-balances = Reward program balances\nsalutations = Salutations\nschool-grades-class-levels = School grades (class levels)\nsecurity-questions-and-answers = Security questions and answers\nsexual-fetishes = Sexual fetishes\nsexual-orientations = Sexual orientations\nsmoking-habits = Smoking habits\nsms-messages = SMS messages\nsocial-connections = Social connections\nsocial-media-profiles = Social media profiles\nsocial-security-numbers = Social security numbers\nspoken-languages = Spoken languages\nspouses-names = Spouses names\nsupport-tickets = Support tickets\nsurvey-results = Survey results\ntaxation-records = Taxation records\ntelecommunications-carrier = Telecommunications carriers\ntime-zones = Time zones\ntravel-habits = Travel habits\nuser-statuses = User statuses\nuser-website-urls = User website URLs\nusernames = Usernames\nutility-bills = Utility bills\nvehicle-details = Vehicle details\nvehicle-identification-numbers-vins = Vehicle identification numbers (VINs)\nwebsite-activity = Website activity\nwork-habits = Work habits\nyears-of-birth = Years of birth\nyears-of-professional-experience = Years of professional experience\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"2c:Tfd5,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n## Email headers\n\nemail-header-logo-alt = { -brand-mozilla-monitor }\nemail-header-button-sign-in = Sign in\n\n## Email footers\n\nemail-footer-support-heading = Questions about { -brand-mozilla-monitor }?\nemail-footer-support-content = Visit our \u003csupport-link\u003eSupport Center\u003c/support-link\u003e for help\nemail-footer-trigger-transactional = You’re receiving this email as a subscriber of { -brand-mozilla-monitor }.\nemail-footer-source-hibp = Breach data provided by \u003chibp-link\u003e{ -brand-HIBP }\u003c/hibp-link\u003e\nemail-footer-logo-mozilla-alt = { -brand-mozilla }\nemail-footer-meta-privacy-notice = Privacy\n\n# Firefox Relay is a product name and should not be translated.\n-product-name-relay = Firefox Relay\n# Mozilla VPN is a product name and should not be translated.\n-product-name-vpn = Mozilla VPN\n\n# A link to legal information about mozilla products.\nlegal = Legal\n\n# Button text\nverify-email-cta = Verify Email\n\n# Headline of verification email\nemail-link-expires = This link expires in 24 hours\n\n##\n\n# Subject line of email\nemail-subject-found-breaches = { -product-name } found your info in these breaches\n\n# Subject line of email\nemail-subject-no-breaches = { -product-name } found no known breaches\n\n# Subject line of email\nemail-subject-verify = Verify your email for { -product-name }\n\nfxm-warns-you-no-breaches = { -product-name } warns you about data breaches involving your personal info.\n So far, no breaches were found. We’ll send you an alert if your email address appears in a new breach.\n\nemail-breach-alert-blurb =\n { -product-name } warns you about data breaches involving your personal info.\n We just received details about another company’s data breach.\n\n## 2022 email template. HTML tags should not be translated, e.g. `\u003ca\u003e`\n\n# Have I Been Pwned attribution\n# Variables:\n# $hibp-link-attr (String) - Link to Have I Been Pwned\nemail-2022-hibp-attribution = Breach data provided by \u003ca { $hibp-link-attr }\u003e{ -brand-HIBP }\u003c/a\u003e\n\n## Verification email\n\nemail-verify-heading = Safeguard your data, starting right now\nemail-verify-subhead = Verify your email to start protecting your data after a breach.\nemail-verify-simply-click = Simply click the link below to finish verifying your account.\n\n## Breach report\n\nemail-breach-summary = Here’s your data breach summary\n# Variables:\n# $email-address (string) - Email address, bolded\nemail-breach-detected = Search results for your { $email-address } account have detected that your email may have been exposed. We recommend you act now to resolve this breach.\n# Deprecated after the redesigned breach alert email is launched\n# Variables:\n# $email-address (string) - Email address\nemail-breach-detected-2 = Search results for your \u003cb\u003e{ $email-address }\u003c/b\u003e account have detected that your email may have been exposed. We recommend you act now to resolve this breach.\nemail-dashboard-cta = Go to Dashboard\n\n## Breach alert\n\n# Deprecated after the redesigned breach alert email is launched\nemail-spotted-new-breach = We’ve spotted a new data breach\n\n## Redesigned breach alert email\n\nemail-breach-alert-all-subject = New data breach detected\nemail-breach-alert-all-preview = We’ll guide you through the steps to resolve it.\nemail-breach-alert-all-hero-heading = You’ve been in a new data breach\nemail-breach-alert-all-hero-subheading = Don’t worry, we can help you resolve this exposure\nemail-breach-alert-all-lead = { -brand-mozilla-monitor } discovered the following data breach that includes your personal information:\nemail-breach-alert-all-source-title = Breach source:\nemail-breach-alert-all-data-points-title = Your exposed data:\nemail-breach-alert-all-next-steps-lead = We’ll guide you step-by-step on how to resolve this data breach.\nemail-breach-alert-all-next-steps-cta-label = Let’s get started\nemail-breach-alert-all-next-steps-button-dashboard = Go to Dashboard\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"2d:T7b0,# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nchevron-alt = Exposure details\n\nexposure-card-exposure-type = Exposure type\nexposure-card-date-found = Date of the exposure\n\n# Status Pill\n\nstatus-pill-action-needed = Action needed\nstatus-pill-progress = In progress\nstatus-pill-fixed = Fixed\n\n# Exposure Card\n\nexposure-card-family-members = Family members\nexposure-card-email = Email\nexposure-card-phone-number = Phone number\nexposure-card-address = Address\nexposure-card-credit-card = Credit Card\nexposure-card-password = Password\nexposure-card-ip-address = IP Address\nexposure-card-other = Other\n# Variables:\n# $data_breach_company is the company associated with the data breach.\n# $data_breach_date is the date of the data breach.\nexposure-card-description-data-breach-action-needed = Your information was exposed in the \u003cdata_breach_link\u003e{ $data_breach_company } data breach on { $data_breach_date }.\u003c/data_breach_link\u003e We’ll walk you through the steps to fix it.\nexposure-card-description-data-breach-fixed = You’ve taken the steps needed to fix \u003cdata_breach_link\u003ethis breach\u003c/data_breach_link\u003e. We’ll continually monitor for data breaches and alert you of any new exposures.\nexposure-card-your-exposed-info = Your exposed info:\nexposure-card-exposure-type-data-broker = Info for sale\nexposure-card-exposure-type-data-breach = Data breach\nexposure-card-cta = Fix all exposures\nexposure-card-label-company-logo = Company logo\nexposure-card-label-company = Company\n# Status of the exposure card, could be In Progress, Fixed or Action Needed\nexposure-card-label-status = Status\n# Variables:\n# $category_label is the data breach exposure type that was leaked. Eg. Email, IP Address.\n# $count is the number of times that the data type was leaked.\nexposure-card-label-and-count = { $category_label }: { $count }\n2e:T347c,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nfix-flow-nav-high-risk-data-breaches = High risk data breaches\nfix-flow-nav-leaked-passwords = Leaked passwords\nfix-flow-nav-security-recommendations = Security recommendations\n\nguided-resolution-flow-exit = Return to dashboard\nguided-resolution-flow-next-arrow = Go to next step\nguided-resolution-flow-step-navigation-label = Guided steps\n\n# Celebration screens\n\n## Shared CTA labels\n\nfix-flow-celebration-next-label = Let’s keep going\nfix-flow-celebration-next-recommendations-label = See recommendations\nfix-flow-celebration-next-dashboard-label = Go to your Dashboard\n\n## High-risk flow\n\nfix-flow-celebration-high-risk-title = You’ve fixed your high risk exposures!\nfix-flow-celebration-high-risk-description-in-progress = Doing this work can feel like a lot, but it’s important to do so to keep yourself safe. Keep up the good work.\nfix-flow-celebration-high-risk-description-done = Doing this work can feel like a lot, but it’s important to do so to keep yourself safe.\nfix-flow-celebration-high-risk-description-next-passwords = Now let’s fix your exposed passwords.\nfix-flow-celebration-high-risk-description-next-security-questions = Now let’s fix your exposed security questions.\nfix-flow-celebration-high-risk-description-next-security-recommendations = Next, we’ll give you personalized security recommendations based on what data of yours has been exposed.\nfix-flow-celebration-high-risk-description-next-dashboard = You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n## Leaked passwords and security questions flow\n\nfix-flow-celebration-leaked-passwords-title = Your passwords are now protected!\nfix-flow-celebration-security-questions-title = Your security questions are protected!\nfix-flow-celebration-leaked-passwords-description-next-security-questions = Now let’s review and update your exposed security questions.\nfix-flow-celebration-leaked-passwords-description-next-security-recommendations = Next, we’ll give you personalized security recommendations based on what data of yours has been exposed.\nfix-flow-celebration-leaked-passwords-description-next-dashboard = Nicely done! You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n## Security recommendations flow\n\nfix-flow-celebration-security-recommendations-title = You’ve completed all your recommendations!\nfix-flow-celebration-security-recommendations-description-next-dashboard = Nicely done! You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n# High Risk Data Breaches\n\nhigh-risk-breach-heading = Here’s what to do\nhigh-risk-breach-subheading = This requires access to your sensitive info, so you’ll need to manually fix it.\n# Variables\n# $num_breaches is the number of breaches where the high risk data was found.\nhigh-risk-breach-summary = { $num_breaches -\u003e\n [one] It appeared in { $num_breaches } data breach:\n *[other] It appeared in { $num_breaches } data breaches:\n}\n# Variables\n# $breach_name is the name of the breach where the high risk data was found.\n# $breach_date is the date when the breach occurred.\n# An example of this string is Twitter on 13/09/18.\nhigh-risk-breach-name-and-date = { $breach_name } \u003cbreach_date\u003eon { $breach_date }\u003c/breach_date\u003e\nhigh-risk-breach-mark-as-fixed = Mark as fixed\nhigh-risk-breach-skip = Skip for now\n# Variables:\n# $estimated_time is the estimated time it would take for a user to complete breach resolution steps. It not be singular, and the + is meant as \"or more\".\n# An example of this string is Your estimated time: 15+ minutes.\nhigh-risk-breach-estimated-time = { $estimated_time -\u003e\n *[other] Your estimated time: { $estimated_time }+ minutes\n}\n\n# Credit Card Breaches\n\nhigh-risk-breach-credit-card-title = Your credit card number was exposed\nhigh-risk-breach-credit-card-description = Anyone who gets it can make unauthorized purchases that you may be liable for. Act now to prevent financial harm.\nhigh-risk-breach-credit-card-step-one = If you still have this card, contact the issuer to report it stolen.\nhigh-risk-breach-credit-card-step-two = Request a new card with a new number.\nhigh-risk-breach-credit-card-step-three = Check your accounts for unauthorized charges.\n\n# Bank Account Breaches\n\nhigh-risk-breach-bank-account-title = Your bank account was exposed\nhigh-risk-breach-bank-account-description = Taking action as soon as possible could give you more legal protections to help you recover any losses.\nhigh-risk-breach-bank-account-step-one = Notify your bank immediately that your account number has been compromised.\nhigh-risk-breach-bank-account-step-two = Change your account number.\nhigh-risk-breach-bank-account-step-three = Check your accounts for unauthorized charges.\n\n# Social Security Number Breaches\n\nhigh-risk-breach-social-security-title = Your social security number was exposed\nhigh-risk-breach-social-security-description = Scammers can open up new loans or credit cards with your social security number. Act fast to prevent financial harm.\nhigh-risk-breach-social-security-step-one = Protect yourself by \u003clink_to_info\u003esetting up a fraud alert or freezing your credit.\u003c/link_to_info\u003e\nhigh-risk-breach-social-security-step-two = \u003clink_to_info\u003eCheck your credit report\u003c/link_to_info\u003e for unrecognized accounts.\n\n# Social Security Number Modal\n\nssn-modal-title = About fraud alerts and credit freezes\nssn-modal-description-fraud-part-one = \u003cb\u003eA fraud alert\u003c/b\u003e requires businesses to verify your identity before it issues new credit in your name. It’s free, lasts one year, and won’t negatively affect your credit score.\nssn-modal-description-fraud-part-two = To set one up, contact any one of the three credit bureaus. You don’t have to contact all three.\nssn-modal-description-freeze-credit-part-one = \u003cb\u003eFreezing your credit\u003c/b\u003e prevents anyone from opening a new account in your name. It’s free and won’t negatively affect your credit score, but you’ll need to unfreeze it before opening any new accounts.\nssn-modal-description-freeze-credit-part-two = To freeze your credit, contact each of the three credit bureaus — \u003cequifax_link\u003eEquifax\u003c/equifax_link\u003e, \u003cexperian_link\u003eExperian\u003c/experian_link\u003e, and \u003ctransunion_link\u003eTransUnion\u003c/transunion_link\u003e.\nssn-modal-learn-more = Learn more about fraud alerts and credit freezes\nssn-modal-ok = OK\n\n# PIN Breaches\n\nhigh-risk-breach-pin-title = Your PIN was exposed\nhigh-risk-breach-pin-description = Taking action as soon as possible could give you more legal protections to help you recover any losses.\nhigh-risk-breach-pin-step-one = Notify your bank immediately that your PIN has been compromised.\nhigh-risk-breach-pin-step-two = Change your PIN anywhere you’ve used the same one.\nhigh-risk-breach-pin-step-three = Check your accounts for unauthorized charges.\n\n# No high risk breaches found\n\nhigh-risk-breach-none-title = Great news, we didn’t find any high risk data breaches\n# Variables\n# $email_list is list of emails that the user is monitoring for breaches. E.g. john@yahoo.com, ali@gmail.com, sam@hotmail.com\nhigh-risk-breach-none-description = We detect data breaches based on your email address, and we didn’t find any high risk data breaches for { $email_list }.\nhigh-risk-breach-none-sub-description-part-one = High risk data breaches include:\nhigh-risk-breach-none-sub-description-ssn = Social security number\nhigh-risk-breach-none-sub-description-bank-account = Bank account info\nhigh-risk-breach-none-sub-description-cc-number = Credit card numbers\nhigh-risk-breach-none-sub-description-pin = PINs\nhigh-risk-breach-none-continue = Continue\n\n# Security recommendations\n\nsecurity-recommendation-steps-label = Security recommendations\nsecurity-recommendation-steps-title = Here’s our advice:\nsecurity-recommendation-steps-cta-label = Got it!\n\n# Phone security recommendation\n\nsecurity-recommendation-phone-title = Protect your phone number\n# $num_breaches is the number of breaches where the phone number was found.\nsecurity-recommendation-phone-summary = { $num_breaches -\u003e\n [one] Your phone number was exposed in { $num_breaches } data breach:\n *[other] Your phone number was exposed in { $num_breaches } data breaches:\n}\nsecurity-recommendation-phone-description = Unfortunately you can’t take it back. But there are steps you can take to make sure you stay safe.\nsecurity-recommendation-phone-step-one = Block spam numbers to prevent more junk calls\nsecurity-recommendation-phone-step-two = Don’t click on links in texts from unknown senders; if it appears to be from a trusted source, call directly to confirm\n\n# Email security recommendation\n\nsecurity-recommendation-email-title = Protect your email address\n# $num_breaches is the number of breaches where the email address was found.\nsecurity-recommendation-email-summary = { $num_breaches -\u003e\n [one] Your email address was exposed in { $num_breaches } data breach:\n *[other] Your email address was exposed in { $num_breaches } data breaches:\n}\nsecurity-recommendation-email-description = Unfortunately you can’t fix this. But there are steps you can take to protect yourself.\nsecurity-recommendation-email-step-one = Don’t click on links in emails from unknown senders; if it appears to be from trusted source, call directly to confirm\nsecurity-recommendation-email-step-two = Be aware of \u003clink_to_info\u003ephishing scams\u003c/link_to_info\u003e\nsecurity-recommendation-email-step-three = Mark suspicious emails as spam and block the sender\nsecurity-recommendation-email-step-four = Use \u003clink_to_info\u003e{ -brand-relay } email masks\u003c/link_to_info\u003e to protect your email in the future\n\n# IP security recommendation\n\nsecurity-recommendation-ip-title = Use a VPN for added privacy\n# $num_breaches is the number of breaches where the IP address was found.\nsecurity-recommendation-ip-summary = { $num_breaches -\u003e\n [one] Your IP address was exposed in { $num_breaches } data breach:\n *[other] Your IP address was exposed in { $num_breaches } data breaches:\n}\nsecurity-recommendation-ip-description = Your IP address pinpoints your location and internet service provider. Hackers could use this information to find your location or try to connect to your devices.\nsecurity-recommendation-ip-step-one = Use a VPN (such as \u003clink_to_info\u003e{ -brand-mozilla-vpn }\u003c/link_to_info\u003e) to hide your real IP address and use the internet privately.\n\n# Leaked Passwords\n\n# Variables\n# $breach_name is the name of the breach where the leaked password was found.\nleaked-passwords-title = Your { $breach_name } password was exposed\n# Variables\n# $breach_date is the date when the breach occurred.\nleaked-passwords-summary = It appeared in a data breach on { $breach_date }.\nleaked-passwords-description = Scammers can access your account and will likely try to use it on other accounts to see if you’ve used the same password. Change it anywhere you’ve used it to protect yourself.\nleaked-passwords-steps-title = Here’s what to do\nleaked-passwords-steps-subtitle = This requires access to your account, so you’ll need to manually fix it.\n# Variables\n# $breach_name is the name of the breach where the leaked password was found.\n# $emails_affected are the emails associated with the breach.\nleaked-passwords-step-one = Change your password for \u003cb\u003e{ $emails_affected }\u003c/b\u003e on \u003clink_to_breach_site\u003e{ $breach_name }\u003c/link_to_breach_site\u003e.\nleaked-passwords-step-two = Change it anywhere else you’ve used it.\nleaked-passwords-mark-as-fixed = Mark as fixed\nleaked-passwords-skip = Skip for now\n# Variables\n# $estimated_time is the amount of time it would take for a user to manually resolve a leaked password breach. It will always be a number greater than 1.\n# \"Est.\" is shortform for \"Estimated\".\n# \"mins\" is shortform for \"minutes\".\nleaked-passwords-estimated-time = { $estimated_time -\u003e\n *[other] Est. time to complete: { $estimated_time } mins per site\n}\n\n# Leaked Security Questions\n\nleaked-security-questions-title = Your security questions were exposed\n# Variables\n# $breach_name is the name of the breach where the leaked security questions were found.\n# $breach_date is the date when the breach occurred.\n# An example of this string is Twitter on 13/09/18.\nleaked-security-questions-summary = They appeared in a data breach on { $breach_name } on { $breach_date }.\nleaked-security-questions-description = Scammers can use these to access your accounts, and any other site where you’ve used the same security questions. Update them now to protect your accounts.\nleaked-security-questions-steps-title = Here’s what to do\nleaked-security-questions-steps-subtitle = This requires access to your account, so you’ll need to manually fix it.\n# Variables\n# $breach_name is the name of the breach where the security questions were found.\n# $email_affected is the email associated with the breach.\nleaked-security-questions-step-one = Update your security questions for \u003cb\u003e{ $email_affected }\u003c/b\u003e on \u003clink_to_breach_site\u003e{ $breach_name }\u003c/link_to_breach_site\u003e.\nleaked-security-questions-step-two = Update them on any other site where you used the same security questions. Be sure to use different security questions for every account.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"2f:T1194,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\npublic-nav-name = { -brand-mozilla-monitor }\n\nlanding-all-hero-title = Find where your private info is exposed — and take it back\nlanding-all-hero-lead = We scan data breaches to see if your data has been leaked and give you steps to fix it.\n\nlanding-all-hero-emailform-input-placeholder = yourname@example.com\nlanding-all-hero-emailform-input-label = Enter your email address to check for data breach exposures.\nlanding-all-hero-emailform-submit-label = Get free scan\nlanding-all-hero-emailform-submit-sign-up-label = Sign up to get free scan\n\n# This is a label underneath a big number \"14\" - it's an image that demos Monitor.\nlanding-all-hero-image-chart-label = exposures\n\n# Value Proposition\n\nlanding-all-value-prop-fix-exposures = We’ll help you fix your exposures\nlanding-all-value-prop-fix-exposures-description = Our mission is to put control of your personal data back in your hands. We’ll help you resolve data breaches and keep your info private — and we’ll \u003cprivacy_link\u003erespect your privacy\u003c/privacy_link\u003e in the process.\nlanding-all-value-prop-info-at-risk = What info could be at risk?\nlanding-all-value-prop-info-at-risk-description = Data leaks are unfortunately part of our digital lives. Your passwords, contact details, financial information, and other personal info can be exposed, putting you at risk of identity theft.\n\n# Quote\n\nlanding-all-quote = \u003cdata_breaches\u003eData breaches\u003c/data_breaches\u003e happen every 11 minutes, exposing your private information — but don’t worry, we can help.\n\n# Non-US FAQ\n\nlanding-all-faq-title = Frequently asked questions\n# FAQ is an acronym for Frequently Asked Questions\nlanding-all-faq-see-all = See all FAQs\nlanding-all-data-breach-definition-qn = What exactly is a data breach?\nlanding-all-data-breach-definition-ans = A data breach happens when personal or private information gets exposed, stolen or copied without permission. These security incidents can result from cyber attacks on websites, apps or any database where people’s personal information resides. A data breach can also happen accidentally, like if someone’s login credentials get posted publicly.\nlanding-all-data-breach-next-steps-qn = I just found out I’m in a data breach. What do I do next?\nlanding-all-data-breach-next-steps-ans = Visit { -brand-mozilla-monitor } to learn what to do after a data breach and get guided steps to resolve exposures of your personal info. Hackers rely on people reusing passwords, so it’s important to create strong, unique passwords for all your accounts. Keep your passwords in a safe place that only you have access to; this could be the same place where you store important documents or a password manager.\nlanding-all-data-breach-info-qn = What information gets exposed in data breaches?\nlanding-all-data-breach-info-ans = Not all breaches expose all the same info. It just depends on what hackers can access. Many data breaches expose email addresses and passwords. Others expose more sensitive information such as credit card numbers, PIN numbers, and social security numbers.\nlanding-all-close-faq-alt = Close\n\n# Social proof\n\n# Variables\n# $num_users is the number of users in the millions.\nlanding-all-social-proof-title = { $num_users -\u003e\n *[other] Trusted by { $num_users } million people worldwide\n}\n# Variables\n# $num_countries is the number of countries available.\nlanding-all-social-proof-description = { $num_countries -\u003e\n *[other] Since 2018, we’ve helped people in { $num_countries } countries protect their data when it has been exposed.\n}\nlanding-all-social-proof-press = As seen in\n\n# Here's How We Help\n\nlanding-all-help-protect-you = Here’s how we help protect you\nlanding-all-help-protect-you-description = We believe in your right to privacy, so data breach monitoring protection is always free.\nlanding-all-help-protect-you-feature-one = We’ll search for you in all known data breaches\nlanding-all-help-protect-you-feature-two = We’ll guide you through the steps to resolve each breach\nlanding-all-help-protect-you-feature-three = We’ll continuously monitor and send you alerts for any new breaches\nlanding-all-help-protect-you-cta = Sign up for breach alerts\n\nlanding-all-get-started = Scan your email to get started\nlanding-all-take-back-data = Take back control of your data\n\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"30:T16e4,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Recommendation subhead\nrec-ssn-subhead = Review your credit reports\n# Link title\nrec-ssn-cta = Request credit reports\nrec-ssn =\n You get three free credit reports a year by law.\n Requesting and reviewing them does not affect your credit.\n Look for accounts, loans, or credit cards you don’t recognize.\n\n# Recommendation subhead\nrec-pw-1-subhead = Change your password\n# Link title\nrec-pw-1-cta = Change password for this site\nrec-pw-1-2 =\n Make this password unique and different from any others you use.\n A good strategy to follow is to combine two or more unrelated\n words to create an entire passphrase, and include numbers and symbols.\n\n# Recommendation subhead\nrec-pw-2-subhead = Update other logins using the same password\n# Link title\nrec-pw-2-cta-fx = View logins in { -brand-name }\nrec-pw-2 =\n Reusing passwords turns a single data breach into many. Now that this\n password is out there, hackers could use it to get in to other accounts.\n\n# Recommendation subhead\nrec-pw-3-subhead = Use a password manager to take your passwords everywhere\n# Link title\nrec-pw-3-cta = Get { -brand-lockwise }\nrec-pw-3-fx =\n Use { -brand-lockwise } to securely access the passwords you’ve saved in\n { -brand-name } from anywhere — even outside of the browser.\nrec-pw-3-non-fx =\n Use { -brand-lockwise } to keep track of all your different\n passwords and access them securely from your phone or tablet.\n\n# Recommendation subhead\nrec-pw-4-subhead = Set up two-factor authentication (2FA)\n# Link title\nrec-pw-4-cta = See sites that offer 2FA\nrec-pw-4 =\n Many websites offer 2FA as an extra security measure. This requires\n another piece of information to log in to your account, such as a\n one-time code you receive via text.\n\n# Recommendation subhead\nrec-bank-acc-subhead = Monitor your bank statements\nrec-bank-acc =\n Check your bank statements for suspicious activity or unusual\n charges. Notify your bank if you see anything you don’t recognize\n\n# Recommendation subhead\nrec-cc-subhead = Monitor your credit card statements\nrec-cc =\n Look out for strange charges on your credit card. You may want\n to request a new card with a new number from your credit card issuer.\n\n# Recommendation subhead\nrec-email-mask-subhead = Use an email mask\nrec-email-cta = Try { -brand-relay }\nrec-email =\n Giving out your real email address makes it easier for hackers or trackers to\n find your passwords or target you online. A service like { -brand-relay }\n hides your real email address while forwarding emails to your real inbox.\n\n# Recommendation subhead\nrec-ip-subhead-2 = Use a VPN to mask your IP address\n\n# Recommendation subhead\nrec-moz-vpn-cta = Try { -brand-mozilla-vpn }\nrec-moz-vpn-update-2 =\n Your Internet Protocol address (IP address) pinpoints your location\n and internet service provider. A service like { -brand-mozilla-vpn }\n masks your IP address to hide your location.\n\nrec-hist-pw-subhead = Avoid reusing passwords\n# Link title\nrec-hist-pw-cta-fx = View logins in { -brand-name }\nrec-hist-pw =\n Use unique, strong passwords for every account. If one password gets\n exposed in a data breach, you’ll only need to update that one login.\n\n# Recommendation subhead\nrec-sec-qa-subhead = Create unique answers for security questions\nrec-sec-qa =\n Many websites ask the same questions. If one answer gets exposed, the\n information is out. Create long, random answers and store them somewhere safe.\n\n# Recommendation subhead\nrec-phone-num-subhead = Avoid sharing your phone number\nrec-phone-num =\n Try to avoid giving out your phone number when signing up for new\n accounts or services. If a phone number isn’t required, don’t enter it.\n\n# Recommendation subhead\nrec-dob-subhead = Avoid using personal info in PINs\nrec-dob =\n Because your date of birth is easy to find in public records,\n it’s best to avoid using it in passwords and PINs. People who\n know your birthday could also very easily guess your PIN.\n\n# Recommendation subhead\nrec-pins-subhead = Strengthen the security of your PINs\nrec-pins =\n A strong PIN does not contain personal info, such as your date of birth\n or address. It should be a number only you know and can’t be easily guessed.\n\n# Recommendation subhead\nrec-address-subhead = Avoid using addresses in passwords\nrec-address =\n Using addresses or the street where you grew up weaken your\n passwords. Since it’s easy to find this info publicly, it makes these\n passwords easy to guess.\n\n# Recommendation subhead\nrec-gen-1-subhead = Use unique, strong passwords for every account\n# Link title\nrec-gen-1-cta = How to create strong passwords\nrec-gen-1 =\n Password reuse puts all your accounts at risk. This means that if\n one password gets exposed, hackers have the keys to many accounts.\n\n# Recommendation subhead\nrec-gen-2-subhead = Store passwords in a safe place\n# Link title\nrec-gen-2-cta = Myths about password managers\nrec-gen-2 =\n Put your login details in a secure place only you can access, such as a\n password manager. This also makes it easy to keep track of all your different passwords.\n\n# Recommendation subhead\nrec-gen-3-subhead = Be cautious about giving out personal information\n# Link title\nrec-gen-3-cta = Read more security tips\nrec-gen-3 =\n Don’t hand out personal data if you don’t have to. If you are asked to\n enter or give out your email address, ZIP code, or phone number, you can say no.\n\n# Recommendation subhead\nrec-gen-4-subhead = Update software and apps regularly\nrec-gen-4 =\n Updating your smartphone apps, browsers, and operating systems makes your\n devices more secure. These updates fix bugs, software vulnerabilities, and security problems.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"31:Tcee,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Settings page\n\nsettings-page-title = { -product-short-name } Settings\n\n## Breach alert preferences\n\nsettings-alert-email-preferences-title = Email preferences\nsettings-alert-email-preferences-subtitle = Tell us which emails you’d like to receive.\nsettings-alert-preferences-allow-breach-alerts-title = Instant breach alerts\nsettings-alert-preferences-allow-breach-alerts-subtitle = These alerts are sent immediately once a data breach is detected\nsettings-alert-preferences-option-one = Send breach alerts to the affected email address\nsettings-alert-preferences-option-two = Send all breach alerts to the primary email address\n\n## Monitored email addresses\n\n# Variables:\n# $email (string) - Email address\nsettings-email-list-title = Monitored email addresses\n# Variables:\n# $limit (number) - Number of email addresses included in the plan\nsettings-email-limit-info =\n {\n $limit -\u003e\n [one] Your account includes monitoring of up to { $limit } email.\n *[other] Your account includes monitoring of up to { $limit } emails.\n }\nsettings-email-verification-callout = Email verification required\nsettings-resend-email-verification-link = Resend verification email\nsettings-add-email-button = Add email address\nsettings-remove-email-button-label = Remove\n# Variables:\n# $emailAddress (string) - The email address to remove, e.g. `billnye@example.com`\nsettings-remove-email-button-tooltip = Stop monitoring { $emailAddress }\n\n# This string is shown beneath each of the user’s email addresses to indicate\n# how many known breaches that email address was found in.\n# Variables:\n# $breachCount (number) - Number of breaches\nsettings-email-number-of-breaches-info =\n {\n $breachCount -\u003e\n [one] Appears in { $breachCount } known breach.\n *[other] Appears in { $breachCount } known breaches.\n }\n\n## Delete Monitor account\n\nsettings-delete-monitor-free-account-title = Delete { -brand-monitor } account\nsettings-delete-monitor-free-account-description = This will permanently delete your { -brand-monitor } account and turn off all notifications.\nsettings-delete-monitor-free-account-cta-label = Delete account\nsettings-delete-monitor-free-account-dialog-title = Your { -brand-monitor } account will be permanently deleted\nsettings-delete-monitor-free-account-dialog-lead-v2 = All of your { -brand-monitor } account information will be deleted and we’ll no longer monitor for new data breaches. This will not delete your { -brand-mozilla-account }.\nsettings-delete-monitor-free-account-dialog-cta-label = Delete account\nsettings-delete-monitor-free-account-dialog-cancel-button-label = Never mind, take me back\nsettings-delete-monitor-account-confirmation-toast-label-2 = Your { -brand-monitor } account is now deleted.\nsettings-delete-monitor-account-confirmation-toast-dismiss-label = Dismiss\n\n## Monthly Monitor Report\n\nsettings-alert-preferences-allow-monthly-monitor-report-title = Monthly { -brand-monitor } report\nsettings-alert-preferences-allow-monthly-monitor-report-subtitle = A monthly update of new exposures, what’s been fixed, and what needs your attention.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"32:T40ba,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nplus-indicator-label-active = Automatic data removal: On\nplus-indicator-label-inactive = Automatic data removal: Off\nplus-indicator-scan-date-label = Last scan:\n\nuser-menu-contact-label = Contact us\nuser-menu-contact-tooltip = Contact { -brand-monitor-plus } support\n\n# Variables:\n# $limit (number) - Number of email addresses included in the plan\nmodal-active-number-of-exposures-part-one-premium =\n { $limit -\u003e\n [one] This chart includes the total number of times we found each type of data exposed across all data broker profiles and all data breaches for the { $limit } email address that you are currently monitoring.\n *[other] This chart includes the total number of times we found each type of data exposed across all data broker profiles and all data breaches for up to { $limit } email addresses that you are currently monitoring.\n }\nmodal-active-number-of-exposures-part-three-premium = This chart does not include any exposures that are in progress of being auto-removed. Once your exposures are fixed, they will be added to your total number of fixed exposures on the Fixed page.\nmodal-fixed-number-of-exposures-part-one = This chart includes the total number of exposures that have been fixed across all data broker profiles and data breaches.\nmodal-fixed-number-of-exposures-part-two = It does not include any exposures that are in progress of being auto-removed. Once they are fully removed, they’ll be added to the total here.\n\nprogress-card-auto-removed-headline = Auto-removed\nprogress-card-in-progress-headline = In progress\nprogress-card-locked-alt = Only available with { -brand-monitor-plus }\n\nprogress-card-heres-what-we-fixed-headline-premium = Here’s what we fixed\n\n# Here’s What We Fixed Modal\n\nmodal-heres-what-we-fixed-title = About what we fixed\nmodal-heres-what-we-fixed-description-part-one = \u003cb\u003eManually fixed\u003c/b\u003e includes anything you’ve fixed yourself. All data breaches that require access to your accounts need\n to be fixed manually, even if you’ve subscribed to { -brand-monitor-plus }.\nmodal-heres-what-we-fixed-description-part-two = \u003cb\u003eAuto-removed\u003c/b\u003e includes any exposures from data broker profiles that we’ve removed for you. This is available only for\n { -brand-monitor-plus } subscribers.\nmodal-heres-what-we-fixed-description-part-three = \u003cb\u003eIn Progress\u003c/b\u003e includes anything that we are currently working on fixing.\n\ndashboard-exposures-filter-exposure-type = Exposure type\ndashboard-exposures-filter-exposure-type-info-for-sale = Your info for sale\ndashboard-exposures-filter-exposure-type-data-breach = Data breach\ndashboard-exposures-filter-exposure-removal-time-title = Removal time\ndashboard-exposures-filter-exposure-removal-time-label-7 = Up to 7 days\ndashboard-exposures-filter-exposure-removal-time-label-13 = 8–13 days\ndashboard-exposures-filter-exposure-removal-time-label-60 = 14–60 days\ndashboard-exposures-filter-exposure-removal-time-label-90 = 61–90 days\ndashboard-exposures-filter-exposure-removal-time-label-180 = 91-180 days\ndashboard-exposures-filter-exposure-removal-time-label-other = 181+ days\ndashboard-exposures-filter-exposure-removal-time-label-unknown = Unknown\n# “Not applicable” – abbreviated because there’s not much room for this string.\ndashboard-exposures-filter-exposure-removal-time-label-na = N/A\n\n# About Exposure Types Modal\n\nmodal-exposure-type-title = About exposure types\n# Variables:\n# $data_broker_sites_total_num is the total number of data broker sites available to scan. It will always be more than 1.\nmodal-exposure-type-description = {\n $data_broker_sites_total_num -\u003e\n *[other] We search for you in all known data breaches and { $data_broker_sites_total_num } data broker sites that sell your personal info. Here are the two types of exposures we find:\n}\nmodal-exposure-type-data-breach = \u003cb\u003eData breach\u003c/b\u003e means your information has been compromised in a breach and could be in the wrong hands.\n Resolving these typically requires accessing your accounts, so you’ll need to take manual steps to resolve each breach even if you’ve subscribed to { -brand-monitor-plus }.\nmodal-exposure-type-data-broker-part-one = \u003cb\u003eInfo for sale\u003c/b\u003e means a data broker site is publicly publishing and selling your personal info.\n You’ll need to manually request removal from each site.\nmodal-exposure-type-data-broker-part-two = But if you’re a { -brand-monitor-plus } subscriber, we auto-remove the profiles for you.\n\n# About Exposure Statuses Modal\n\n# Variables:\n# $data_broker_sites_total_num is the total number of data broker sites available to scan. It will always be plural.\nmodal-exposure-status-description-premium = {\n $data_broker_sites_total_num -\u003e\n *[other] We search for exposures in all known data breaches and { $data_broker_sites_total_num } data broker sites that sell your personal info. Your exposures will have one of the following statuses:\n}\nmodal-exposure-indicator-requested-removal = We’ve sent an official removal request to the data broker. We’ll keep you updated if we need to re-send the request.\nmodal-exposure-indicator-in-progress = We’re actively working to confirm data broker removal compliance.\nmodal-exposure-indicator-removed = We’ve successfully removed your data from the data broker site!\n\n# Variables:\n# $exposures_unresolved_num is the unresolved number of exposures the user has.\n# $data_breach_unresolved_num is the unresolved number of data breaches the user has.\n# $data_broker_unresolved_num is the unresolved number of data brokers selling the user’s data.\ndashboard-exposures-area-description-premium = We found your information exposed { $exposures_unresolved_num } times over { $data_breach_unresolved_num } data breaches and { $data_broker_unresolved_num } data broker sites that are selling your personal info.\n\n# Variables:\n# $exposures_unresolved_num is the unresolved number of exposures the user has.\n# $data_breach_unresolved_num is the unresolved number of data breaches the user has.\ndashboard-exposures-breaches-scan-progress-description = {\n $exposures_unresolved_num -\u003e\n [one] {\n $data_breach_unresolved_num -\u003e\n [one] We found your information exposed { $exposures_unresolved_num } time in { $data_breach_unresolved_num } data breach. We’re still scanning sites that may be selling your personal info.\n *[other] We found your information exposed { $exposures_unresolved_num } time in { $data_breach_unresolved_num } data breaches. We’re still scanning sites that may be selling your personal info.\n }\n *[other] {\n $data_breach_unresolved_num -\u003e\n [one] We found your information exposed { $exposures_unresolved_num } times in { $data_breach_unresolved_num } data breach. We’re still scanning sites that may be selling your personal info.\n *[other] We found your information exposed { $exposures_unresolved_num } times in { $data_breach_unresolved_num } data breaches. We’re still scanning sites that may be selling your personal info.\n }\n}\ndashboard-exposures-no-breaches-scan-progress-description = We didn’t find any data breaches, but we’re still scanning sites that may be selling your personal info.\ndashboard-exposures-scan-progress-label = Scan in progress\n\ndashboard-fixed-area-headline-premium = View all exposures that are fixed or in progress\n\n# Variables:\n# $data_broker_total_num is the total number of data brokers selling the user’s data.\ndashboard-exposures-all-fixed-free-scan = {\n $data_broker_total_num -\u003e\n [one] Next \u003ca\u003estart your free scan\u003c/a\u003e of { $data_broker_total_num } site that may be selling your personal info.\n *[other] Next \u003ca\u003estart your free scan\u003c/a\u003e of { $data_broker_total_num } sites that may be selling your personal info.\n }\n\n# About Removal Time Indicators Modal\n\nmodal-exposure-removal-time-title = A note about removal times\nmodal-exposure-removal-time-text = { -product-short-name } provides estimated time frames for how long data brokers usually take to remove your profile after we request it. We may periodically update these estimates for accuracy.\nmodal-exposure-removal-time-button-label = Got it\n\n## False door test\n\n# Strings used in a banner (false door test) to observe engagement with Monitor premium and gauge user interest.\n\nfalse-door-test-content-part-one = No one should be able to buy your personal information.\nfalse-door-test-content-part-two = Automatically remove data from sites trying to sell it.\nfalse-door-test-content-part-two-dashboard = Auto-delete data from sites trying to sell it.\nfalse-door-test-cta = Count me in\nfalse-door-test-popup-close = Close\nfalse-door-test-phase-2-content-part-one = Did you know there are sites selling your private info?\nfalse-door-test-phase-2-content-part-two = Automatically remove data from sketchy sites.\nfalse-door-test-phase-2-content-part-two-dashboard = Automatically remove data from broker sites.\nfalse-door-test-phase-3-content-part-one = Did you know there are sites selling your private info?\nfalse-door-test-phase-3-content-part-two = Automatically remove data from sketchy sites with { -product-short-name }.\nfalse-door-test-phase-3-content-part-two-dashboard = Automatically remove data from broker sites with { -product-short-name }.\n\n# Premium upsell dialog\n\npremium-upsell-dialog-title = Turn on automatic data removal with { -brand-monitor-plus }\n\n## Top banner on the dashboard\n\n# Variables:\n# $unresolved_exposures is the total number of unresolved exposures the user has.\ndashboard-top-banner-scan-in-progress-unresolved-description =\n { $unresolved_exposures -\u003e\n [one] We found { $unresolved_exposures } exposure so far, but we’re still scanning sites that sell your personal info. This should be done within a few minutes.\n *[other] We found { $unresolved_exposures } exposures so far, but we’re still scanning sites that sell your personal info. This should be done within a few minutes.\n }\ndashboard-top-banner-scan-in-progress-no-results-info = In the meantime, you can check more email addresses for data breaches.\ndashboard-top-banner-scan-in-progress-no-results-cta = Check more email addresses\n\ndashboard-top-banner-scan-in-progress-fix-now-hint = You can come back later, or start fixing your data breaches now.\ndashboard-top-banner-scan-in-progress-results-found-cta = See what’s ready now\n\n# Variables:\n# $data_breach_unresolved_num is the unresolved number of data breaches the user has.\n# $data_broker_unresolved_num is the unresolved number of data brokers selling the user’s data.\ndashboard-top-banner-protect-your-data-description = We found your data in { $data_breach_unresolved_num } data breaches and { $data_broker_unresolved_num } sites selling your personal info. We’ll guide you step-by-step on how to fix it.\n\ndashboard-top-banner-monitor-protects-your-even-more-title = { -product-short-name } now protects you even more\n# Variables:\n# $data_broker_sites_total_num is the total number of data broker sites available to scan.\ndashboard-top-banner-monitor-protects-your-even-more-description =\n { $data_broker_sites_total_num -\u003e\n [one] We can now find exposures of your personal info on { $data_broker_sites_total_num } data broker site that publish and sell your personal info for a profit.\n *[other] We can now find exposures of your personal info on { $data_broker_sites_total_num } data broker sites that publish and sell your personal info for a profit.\n }\ndashboard-top-banner-monitor-protects-your-even-more-cta = Get first scan free\ndashboard-top-banner-monitor-protects-your-even-more-learn-more = Learn more\n\n# Variables:\n# $data_broker_sites_total_num is the total number of data broker sites available to scan. This will always be plural.\ndashboard-top-banner-no-exposures-found-description = Great news! We searched all known data breaches and { $data_broker_sites_total_num } data broker sites that sell personal info and found no exposures.\ndashboard-top-banner-no-exposures-found-upsell-info = Subscribe to { -brand-monitor-plus } and we’ll scan for new exposures every month.\ndashboard-top-banner-no-exposures-found-cta = Get continuous protection\n\n# Variables:\n# $starting_exposure_total_num is the number of exposures the user has resolved.\ndashboard-top-banner-your-data-is-protected-description =\n { $starting_exposure_total_num -\u003e\n [one] Great work, the exposure of your data is fixed or in progress! We’ll keep monitoring and will alert you of any new exposures.\n *[other] Great work, all { $starting_exposure_total_num } exposures of your data are fixed or in progress! We’ll keep monitoring and will alert you of any new exposures.\n }\ndashboard-top-banner-your-data-is-protected-cta = See what’s fixed\n\n# Variables:\n# $starting_exposure_total_num is the number of exposures the user has resolved.\ndashboard-top-banner-your-data-is-protected-all-fixed-description =\n { $starting_exposure_total_num -\u003e\n [one] Great work, { $starting_exposure_total_num } exposure of your data is fixed! Subscribe to { -brand-monitor-plus } and we’ll scan for new exposures every month. Plus, we’ll automatically remove your info from any sites that are selling it.\n *[other] Great work, all { $starting_exposure_total_num } exposures of your data are fixed! Subscribe to { -brand-monitor-plus } and we’ll scan for new exposures every month. Plus, we’ll automatically remove your info from any sites that are selling it.\n }\n\n# Variables:\n# $exposures_resolved_num is the number of exposures the user has resolved.\ndashboard-top-banner-your-data-scan-in-progress-all-fixed-description =\n { $exposures_resolved_num -\u003e\n [one] Great work fixing { $exposures_resolved_num } exposure so far! We’re still scanning sites that sell your personal info. This should be done within a few minutes.\n *[other] Great work fixing { $exposures_resolved_num } exposures so far! We’re still scanning sites that sell your personal info. This should be done within a few minutes.\n }\n\nexposure-card-description-info-for-sale-action-needed-manual-fix-page = This site is selling \u003cdata_broker_profile\u003ethese details about you\u003c/data_broker_profile\u003e. Contact the site for removal, or \u003cupsell_link\u003esubscribe to { -brand-monitor-plus }\u003c/upsell_link\u003e and we’ll do it for you.\nexposure-card-description-info-for-sale-requested-removal-dashboard = We’ve started the process of removing \u003cdata_broker_profile\u003ethis profile\u003c/data_broker_profile\u003e. Removal times vary, and this can take multiple attempts.\nexposure-card-description-info-for-sale-action-needed-dashboard = This site is publicly publishing and selling \u003cdata_broker_profile\u003ethese details about you\u003c/data_broker_profile\u003e. Remove this profile to protect your privacy.\nexposure-card-description-info-for-sale-in-progress-dashboard = As a { -brand-monitor-plus } member, we’ve removed \u003cdata_broker_profile\u003ethis profile\u003c/data_broker_profile\u003e and are confirming the data broker’s removal compliance.\nexposure-card-description-info-for-sale-fixed = As a { -brand-monitor-plus } member, we’ve \u003cdata_broker_profile\u003eremoved this profile\u003c/data_broker_profile\u003e for you and will continually monitor to make sure they don’t add you back.\nexposure-card-description-info-for-sale-fixed-manually-fixed = You marked this profile as fixed. Be sure you’ve followed all instructions on \u003cdata_broker_profile\u003ethe site\u003c/data_broker_profile\u003e to ensure they remove your personal info.\n\n## CSAT survey banner for subscribers\n\nsurvey-csat-question = How satisfied are you with your { -brand-mozilla-monitor } experience?\nsurvey-csat-answer-very-dissatisfied = Very dissatisfied\nsurvey-csat-answer-dissatisfied = Dissatisfied\nsurvey-csat-answer-neutral = Neutral\nsurvey-csat-answer-satisfied = Satisfied\nsurvey-csat-answer-very-satisfied = Very satisfied\nsurvey-csat-follow-up-link-label = Your feedback is helpful to us! How can we improve { -product-short-name } for you?\nsurvey-csat-survey-dismiss-label = Dismiss\n\n## Petition banner US data privacy law\n\npetition-banner-data-privacy-title = Join the Movement for a U.S. Data Privacy Law\npetition-banner-data-privacy-text = Advocate for stronger data protection laws with the { -brand-mozilla-foundation } — \u003cb\u003eyour voice can shape a safer digital future!\u003c/b\u003e\npetition-banner-data-privacy-button-sign = Sign petition\npetition-banner-data-privacy-button-dismiss = No, thank you\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"33:T1f78,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Strings in this file are not yet final, and thus should not be localised yet.\n\nemail-footer-reason-subscriber = You’re receiving this automated email as a subscriber of { -brand-mozilla-monitor }. If you received it in error, no action is required. For more information, please visit \u003csupport-link\u003e{ -brand-mozilla } Support\u003c/support-link\u003e.\nemail-footer-reason-subscriber-one-time = You’ve received this one-time automated email because you are subscribed to { -brand-monitor-plus }. You won’t receive any further emails like this. For more information, please visit \u003csupport-link\u003e{ -brand-mozilla } Support\u003c/support-link\u003e.\n\n## Monthly overview email\n\nemail-monthly-plus-auto-subject = Your monthly { -brand-monitor } report\nemail-monthly-plus-auto-preview = See how we’ve protected your personal information.\nemail-monthly-plus-auto-intro-content = As a { -brand-monitor-plus } subscriber, you have our highest level of protection. We remove your personal info from data broker sites — no matter how many times they re-add you. We also help you resolve data breaches that require manual action. Here’s what we fixed:\nemail-monthly-plus-auto-cta-label = View all activity\n# Accompanies a number that indicates how many data broker exposures the user fixed themselves\nemail-monthly-plus-auto-fixed-section-manual-heading = Manually fixed\n# Accompanies a number that indicates how many data broker exposures we're still fixing\nemail-monthly-plus-auto-fixed-section-in-progress-heading = Removals in progress\n# Accompanies a number that indicates how many data broker exposures we've already fixed\nemail-monthly-plus-auto-fixed-section-done-heading = Auto-removed\n\nemail-monthly-free-subject = Your monthly { -brand-monitor } report\nemail-monthly-free-preview = See what was fixed this month and what needs your attention.\nemail-monthly-free-intro-content = We constantly monitor for new exposures of your personal info. Sign in to see what exposures need you to take action, and what’s already been fixed.\nemail-monthly-free-cta-label = View your dashboard\nemail-monthly-free-fixed-heading = What we fixed\nemail-monthly-free-fixed-lead = We guide you to resolve data breaches that require manual action. For { -brand-monitor-plus } subscribers, we auto-remove your personal info from data broker sites that are selling it.\n# Accompanies a number that indicates how many data broker exposures the user fixed themselves\nemail-monthly-free-fixed-section-manual-heading = Manually fixed\n# Accompanies a number that indicates how many data broker exposures we're still fixing (always 0 for free users)\nemail-monthly-free-fixed-section-in-progress-heading = Removals in progress\n# Accompanies a number that indicates how many data broker exposures we've already fixed (always 0 for free users)\nemail-monthly-free-fixed-section-done-heading = Auto-removed\nemail-monthly-free-banner-plus-heading = Upgrade for extra protection\nemail-monthly-free-banner-plus-content = Get auto-removal of your profiles for sale plus continuous monitoring for new exposures.\nemail-monthly-free-banner-plus-cta-label = Get { -brand-monitor-plus }\n\n## First data broker removal fixed email\n\nemail-first-broker-removal-fixed-subject = Your first auto-removal is complete!\n# Variables:\n# $data_broker_name (string) - The name of the data broker result that has been removed\nemail-first-broker-removal-fixed-preview = Your private information has been removed from { $data_broker_name }\nemail-first-broker-removal-fixed-heading = Your first auto-removal is complete\nemail-first-broker-removal-fixed-subheading = Your personal information is now more private.\n# Variables:\n# $data_broker_name (string) - The name of the data broker result that has been removed\n# $data_broker_removal_date (string) - The date on which the data broker result has been removed\nemail-first-broker-removal-fixed-content-one = We’re excited to share that we successfully removed your info from \u003cdata-broker-link\u003e{ $data_broker_name }\u003c/data-broker-link\u003e on { $data_broker_removal_date }.\nexposure-card-description-info-for-sale-fixed = As a { -brand-monitor-plus } member, we’ve \u003cdata_broker_profile\u003eremoved this profile\u003c/data_broker_profile\u003e for you and will continually monitor to make sure they don’t add you back.\nemail-first-broker-removal-fixed-content-two = We’ll keep working on any remaining data broker exposures to help protect your privacy. You can sign in to your dashboard any time to see your progress.\nemail-first-broker-removal-fixed-cta-label = View dashboard\n\n## Redesigned breach alert email\n\nemail-breach-alert-plus-scan-banner-heading = { -brand-monitor } now protects you even more\nemail-breach-alert-plus-scan-banner-content = We can find your personal info on data broker sites that sell it for a profit.\nemail-breach-alert-plus-scan-banner-cta-label = Get first scan free\nemail-breach-alert-plus-upgrade-banner-heading = Upgrade for extra protection\nemail-breach-alert-plus-upgrade-banner-content = { -brand-monitor-plus } can find and remove your phone number, home address, and other personal info from online databases.\nemail-breach-alert-plus-upgrade-banner-cta-label = Get { -brand-monitor-plus }\nemail-breach-alert-plus-scan-results-heading = Current exposures\n# Variables:\n# $data_point_count (number) - The number of data exposures that were exposed\nemail-breach-alert-plus-scan-results-data-points-label =\n {$data_point_count -\u003e\n [one] Data exposure\n *[other] Data exposures\n }\nemail-breach-alert-plus-scan-results-cta-label = Take action to resolve these exposures\nemail-breach-alert-plus-scan-results-trailer = We’ll guide you step-by-step through the process\n\n# Monthly Report Free User\n\nemail-monthly-report-hero-free-heading = Your monthly { -brand-mozilla-monitor } report\nemail-monthly-report-hero-free-body = A summary of what needs your attention, and what’s been resolved over the past month.\n\n## This string is displayed under a large numeral that indicates the total\n## number of data breaches that have exposed the user’s information.\n## Don’t add $data_point_count to your localization, because it would\n## result in the number showing twice.\n##\n## Variables:\n## $data_point_count (number) - The number of data breaches that were exposed\n\nemail-monthly-report-no-scan-results-data-points-label =\n { $data_point_count -\u003e\n [one] Data breach\n *[other] Data breaches\n }\nemail-monthly-report-free-summary-auto-removed =\n { $data_point_count -\u003e\n [one] Auto-removed exposure\n *[other] Auto-removed exposures\n }\nemail-monthly-report-free-summary-resolved-breaches =\n { $data_point_count -\u003e\n [one] Manually resolved data breach\n *[other] Manually resolved data breaches\n }\nemail-monthly-report-free-summary-manually-resolved-exposures =\n { $data_point_count -\u003e\n [one] Manually resolved exposure\n *[other] Manually resolved exposures\n }\n\n##\n\nemail-monthly-report-free-results-heading = Current exposures\nemail-monthly-report-free-summary-heading = What’s happened in the last month\nemail-monthly-report-free-upgrade-cta = Unlock with { -brand-monitor-plus }\nemail-monthly-report-free-banner-heading = { -brand-monitor } now protects you even more\nemail-monthly-report-free-banner-body = We can find your personal info on data broker sites that sell it for a profit.\nemail-monthly-report-free-banner-cta-free-scan = Get first scan free\nemail-monthly-report-free-banner-cta-upgrade = Get { -brand-monitor-plus }\nemail-monthly-report-hero-free-no-breaches-heading = Great news!\nemail-monthly-report-hero-free-no-breaches-body = You currently have no data breaches that need action.\nemail-monthly-report-hero-free-no-breaches-cta = View your Dashboard\nemail-unsubscribe-link = \u003clink_to_unsub\u003eUnsubscribe from this email\u003c/link_to_unsub\u003e anytime.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"34:T2de4,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Strings in this file are not yet final, and thus should not be localised yet.\n\nfix-flow-nav-data-broker-profiles = Data broker profiles\nfix-flow-data-broker-profiles-start-free-scan-headline = Find out which sites are selling your personal info\n# Variables:\n# $data_broker_count is the number of data brokers scanned monthly\nfix-flow-data-broker-profiles-start-free-scan-content-p1 =\n { $data_broker_count -\u003e\n [one] Before you review your data breaches, would you like us to search for you on { $data_broker_count } data broker site that may be selling your personal information?\n *[other] Before you review your data breaches, would you like us to search for you on { $data_broker_count } data broker sites that may be selling your personal information?\n }\nfix-flow-data-broker-profiles-start-free-scan-content-p2 = Your first scan is free and only takes a few minutes.\nfix-flow-data-broker-profiles-start-free-scan-link-learn-more = Learn more\nfix-flow-data-broker-profiles-start-free-scan-button-start-scan = Start free scan\nfix-flow-data-broker-profiles-start-free-scan-button-skip = Skip for now\n# Variables:\n# $data_broker_sites_results_num is the number of data broker sites that have your data\nfix-flow-data-broker-profiles-view-data-broker-profiles-headline =\n { $data_broker_sites_results_num -\u003e\n [one] { $data_broker_sites_results_num } site is selling your personal information\n *[other] { $data_broker_sites_results_num } sites are selling your personal information\n }\nfix-flow-data-broker-profiles-view-data-broker-profiles-content = Data brokers make up a $240 billion industry of gathering your personal info and selling it to anyone searching for you. Remove these now to protect your privacy.\nfix-flow-data-broker-profiles-view-data-broker-profiles-button-remove-for-me = Remove them for me\nfix-flow-data-broker-profiles-view-data-broker-profiles-button-remove-manually = I’ll remove them manually\nfix-flow-data-broker-profiles-view-data-broker-profiles-view-info-on-sites = View your info on these sites\nfix-flow-data-broker-profiles-view-data-broker-profiles-more-dialog-trigger-label = More info\nfix-flow-data-broker-profiles-view-data-broker-profiles-more-dialog-title = About these profiles\nfix-flow-data-broker-profiles-view-data-broker-profiles-more-dialog-paragraph1 = Data brokers make up a $240 billion industry of gathering your personal info and selling it to anyone searching for you. They scrape your data from publicly available sources to create profiles that include your name(s), current and previous addresses, family member names, criminal history, and much more.\n# Variables:\n# $data_broker_sites_total_num is the total number of data broker sites available to scan.\nfix-flow-data-broker-profiles-view-data-broker-profiles-more-dialog-paragraph2 =\n { $data_broker_sites_total_num -\u003e\n [one] We found these profiles by searching { $data_broker_sites_total_num } data broker site for the name, location, and date of birth you provided. These profiles are currently live and available to anyone searching for you. { -brand-mozilla } is not associated with these data broker sites.\n *[other] We found these profiles by searching { $data_broker_sites_total_num } data broker sites for the name, location, and date of birth you provided. These profiles are currently live and available to anyone searching for you. { -brand-mozilla } is not associated with these data broker sites.\n }\nfix-flow-data-broker-profiles-view-data-broker-profiles-more-dialog-confirm = OK\nfix-flow-data-broker-profiles-view-data-broker-profiles-view-profile = View your profile\nfix-flow-data-broker-profiles-view-data-broker-profiles-button-view-more = View more\nfix-flow-data-broker-profiles-view-data-broker-profiles-button-view-less = View less\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-headline = Here’s how to remove these profiles\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-1-title = Visit each site and find removal instructions\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-1-content = They may be called data suppression, delete my data, do not show my data, or opt-out instructions.\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-2-title = Follow the steps outlined on the site\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-2-content = Some sites may allow you to fill out an opt-out form online, while others may require you to mail a letter.\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-3-title = Mark as fixed on this page\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-3-content = This will help you keep track of which exposures still need your attention, and make your overall exposures go down.\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-4-title = Watch for re-exposures\nfix-flow-data-broker-profiles-manual-remove-how-to-remove-step-4-content = This process does not remove your information from public records, so even after your information is removed, sites often add you back. If you’d like us to handle this for you and automatically remove any new exposures, \u003csubscribe_link\u003esubscribe to { -brand-monitor-plus }\u003c/subscribe_link\u003e.\nfix-flow-data-broker-profiles-manual-remove-review-profiles-headline = Review \u0026 remove your profiles\nfix-flow-data-broker-profiles-manual-remove-button-mark-fixed = Mark as fixed\nfix-flow-data-broker-profiles-manual-remove-button-remove-for-me = Remove them for me\nfix-flow-data-broker-profiles-manual-remove-button-skip = Skip for now\nfix-flow-data-broker-profiles-automatic-remove-headline = We’ll auto-remove these and guide you through exposures that need manual fixes\n# Variables:\n# $data_broker_count is the number of data brokers scanned monthly\nfix-flow-data-broker-profiles-automatic-remove-subheadline = {\n $data_broker_count -\u003e\n [one] Removing these stops the sale of your personal info on { $data_broker_count } site. Subscribe to { -brand-monitor-plus } and you’ll get:\n *[other] Removing these stops the sale of your personal info on { $data_broker_count } sites. Subscribe to { -brand-monitor-plus } and you’ll get:\n}\n# Variables:\n# $percent is the percentage you can save subscribing to an annual/yearly plan\nfix-flow-data-broker-profiles-automatic-remove-save-percent = Save { $percent }% with yearly plan 🎉\nfix-flow-data-broker-profiles-automatic-remove-features-select-plan-headline = { -brand-monitor-plus }\nfix-flow-data-broker-profiles-automatic-remove-features-select-plan-toggle-yearly = Yearly\nfix-flow-data-broker-profiles-automatic-remove-features-select-plan-toggle-monthly = Monthly\nfix-flow-data-broker-profiles-automatic-remove-features-select-plan-monthly-frequency = Billed monthly\nfix-flow-data-broker-profiles-automatic-remove-features-select-plan-monthly-button = Select monthly plan\nfix-flow-data-broker-profiles-automatic-remove-features-select-plan-yearly-frequency = Billed yearly\nfix-flow-data-broker-profiles-automatic-remove-features-select-plan-yearly-button = Select yearly plan\nfix-flow-data-broker-profiles-automatic-remove-features-headline = Features:\nfix-flow-data-broker-profiles-automatic-remove-features-remove-personal-info = Automatic data removal from sites that are selling your personal info\nfix-flow-data-broker-profiles-automatic-remove-features-guided-experience = Guided experience through high risk data breaches that require manual steps\nfix-flow-data-broker-profiles-automatic-remove-features-continuous-monitoring = Continuous monitoring for new exposures\nfix-flow-data-broker-profiles-automatic-remove-features-breach-alerts = Alerts when your data has been breached\n# Variables:\n# $data_broker_count is the number of data brokers scanned monthly\nfix-flow-data-broker-profiles-automatic-remove-features-monthly-scan =\n { $data_broker_count -\u003e\n [one] Monthly scan of { $data_broker_count } data broker site that may be selling your personal info\n *[other] Monthly scan of { $data_broker_count } data broker sites that may be selling your personal info\n }\n# Variables:\n# $price is the price of a monthly plan. \"/mo\" is short for \"monthly\"\nfix-flow-data-broker-profiles-automatic-remove-features-price = ${ $price }/mo\n\n# Variables\n# $estimated_time is the amount of time it would take for a user to manually resolve a leaked password breach. It will always be a number greater than 1.\n# \"Est.\" is shortform for \"Estimated\".\n# \"mins\" is shortform for \"minutes\".\ndata-broker-profiles-estimated-time = { $estimated_time -\u003e\n *[other] Est. time to complete: { $estimated_time } mins\n}\n\n# Variables\n# $exposure_reduction is the percentage of exposures that are data brokers.\ndata-broker-profiles-exposure-reduction = Exposure reduction: { $exposure_reduction }%\n\n# Welcome to Premium Data Broker Profiles\n\n# Exposure reduction chart\n# The number inside \u003cnr\u003e will be displayed in a large font,\n# the label inside \u003clabel_line_1\u003e will be shown in a smaller font. First line of the label\n# the label inside \u003clabel_line_2\u003e will be shown in smaller font. Second line of the label\n# Variables:\n# $nr (number) - % of exposures reduced for the user\nexposure-reduction-chart-heading = \u003cnr\u003e{ $nr }\u003c/nr\u003e\u003cpercent\u003e%\u003c/percent\u003e\nexposure-reduction-chart-explanation = \u003clabel_line_1\u003eexposures may\u003c/label_line_1\u003e\u003clabel_line_2\u003ebe reduced\u003c/label_line_2\u003e\n\nwelcome-to-premium-data-broker-profiles-title-part-one = Welcome to { -brand-monitor-plus }.\nwelcome-to-premium-data-broker-profiles-title-part-two = We’ll remove those profiles ASAP.\n# Variables:\n# $profile_total_num is the number of exposures came back from user data broker scans.\n# $exposure_reduction_percentage is the percent by which exposures are reduced\nwelcome-to-premium-data-broker-profiles-description-part-one =\n { $profile_total_num -\u003e\n [one] We’ve already started our auto-removal process of 1 profile — which may \u003cb\u003ereduce your exposures up to { $exposure_reduction_percentage }%\u003c/b\u003e.\n *[other] We’ve already started our auto-removal process of { $profile_total_num } profiles — which may \u003cb\u003ereduce your exposures up to { $exposure_reduction_percentage }%\u003c/b\u003e.\n }\n# There used to be a \"part two\", but we removed that\nwelcome-to-premium-data-broker-profiles-description-part-three = Next we’ll guide you through high risk data breaches that require manual steps.\n# Variables:\n# $data_broker_count is the number of data brokers scanned monthly\nwelcome-to-premium-data-broker-profiles-zero-state-description-part-one =\n { $data_broker_count -\u003e\n [one] Great news! We scanned { $data_broker_count } data broker site and didn’t find any sites selling your personal information. We’ll run a scan every month to make sure it stays that way.\n *[other] Great news! We scanned { $data_broker_count } data broker sites and didn’t find any sites selling your personal information. We’ll run a scan every month to make sure it stays that way.\n }\nwelcome-to-premium-data-broker-profiles-zero-state-description-part-two = Data brokers are constantly adding new details to their sites. If we find yours, we’ll immediately start our auto-removal process to help keep you safe.\nwelcome-to-premium-data-broker-profiles-zero-state-description-part-three = Next we’ll guide you through high risk data breaches that require manual steps.\nwelcome-to-premium-data-broker-profiles-cta-label = Let’s keep going\n\nsecurity-recommendation-phone-step-three = Use a \u003clink_to_info\u003e{ -brand-relay } phone mask\u003c/link_to_info\u003e to protect your phone in the future\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"35:T169d,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n## Banner\n\nhow-it-works-banner-title = How it works\nhow-it-works-banner-text = We help fix exposures of your information from two different sources: \u003cdata_brokers_link\u003edata brokers\u003c/data_brokers_link\u003e and \u003cdata_breaches_link\u003edata breaches\u003c/data_breaches_link\u003e.\n\n## Section 1 - We remove your info from data brokers\n## Intro\n\nhow-it-works-page-data-brokers-intro-title = We remove your info from \u003cdata_brokers\u003edata brokers\u003c/data_brokers\u003e\nhow-it-works-page-data-brokers-intro-text-1 = These sites scrape your data from across the web to create profiles that include your name(s), current and previous addresses, family member names, criminal history, and much more. And they sell this information to anyone searching for you.\nhow-it-works-page-data-brokers-intro-text-2 = Getting your information off these sites helps protect your privacy and keep stalkers or harassers from finding info like your phone number or home address.\nhow-it-works-page-data-brokers-intro-cta-button = Get data removal\n\n## Step 1\n\nhow-it-works-page-data-brokers-step-1-title = Step 1\nhow-it-works-page-data-brokers-step-1-subtitle = We scan for your private information using only your:\nhow-it-works-page-data-brokers-step-1-name = \u003cname\u003eName:\u003c/name\u003e Your legal name will help us find profiles of you, but aliases or previous names may also appear in search results.\nhow-it-works-page-data-brokers-step-1-location = \u003clocation\u003eLocation:\u003c/location\u003e Your current city and state will help us narrow down the results, but past addresses may also show up.\nhow-it-works-page-data-brokers-step-1-dob = \u003cdob\u003eDate of birth:\u003c/dob\u003e This will reduce chances of finding profiles of people with the same name as you.\nhow-it-works-page-data-brokers-step-1-closing-text = In seconds, we’ll show you how many sites have made profiles of you, and exactly what information they are selling.\n\n## Step 2\n\nhow-it-works-page-data-brokers-step-2-title = Step 2\nhow-it-works-page-data-brokers-step-2-subtitle = We automatically remove your information\nhow-it-works-page-data-brokers-step-2-text-1 = Each data broker needs to be contacted to begin the data removal process, which takes time and effort.\nhow-it-works-page-data-brokers-step-2-text-2 = For paid subscribers, as soon as we identify which sites have your information, we automatically initiate a request for removal. Free members will be alerted which data brokers to contact themselves.\n\n## Step 3\n\nhow-it-works-page-data-brokers-step-3-title = Step 3\nhow-it-works-page-data-brokers-step-3-subtitle = We watch for re-exposures, and remove again\nhow-it-works-page-data-brokers-step-3-text-1 = Sites that sell your data continually scrape new information about you on sources across the web — and they will often re-add you to their sites, even if you’ve removed it.\nhow-it-works-page-data-brokers-step-3-text-2 = For paid subscribers, we re-check every month to make sure they don’t add you back. It’s an ongoing process and you can rest assured that no matter how many times your name reappears on their site, we will always work to remove it.\n\n# CTA button\nhow-it-works-page-data-brokers-cta-button = Get data removal\n\n## Section 2 - We provide steps to help resolve data breaches\n## Intro\n\nhow-it-works-page-data-breaches-intro-title = We provide steps to help resolve \u003cdata_breaches\u003edata breaches\u003c/data_breaches\u003e\nhow-it-works-page-data-breaches-intro-text-1 = Data breaches are security violations where your personal information is either accidentally exposed or illegally stolen by hackers — including passwords, contact info, financials, and much more. Any account or anywhere your information is stored online could be a target.\nhow-it-works-page-data-breaches-intro-text-2 = Resolving data breaches helps prevent hackers from accessing your accounts, causing financial harm or stealing your identity.\nhow-it-works-page-data-breaches-intro-cta-button = Get free scan\n\n## Step 1\n\nhow-it-works-page-data-breaches-step-1-title = Step 1\nhow-it-works-page-data-breaches-step-1-subtitle = We scan for breaches\nhow-it-works-page-data-breaches-step-1-text = Using just your email address, we search for you across all known data breaches. All subscribers can monitor 5 email addresses for free.\n\n## Step 2\n\nhow-it-works-page-data-breaches-step-2-title = Step 2\nhow-it-works-page-data-breaches-step-2-subtitle = We help you resolve breaches\nhow-it-works-page-data-breaches-step-2-text-1 = Because resolving data breaches usually involves manual steps like changing your passwords or placing a fraud alert on your credit score, we can’t resolve them for you. But we’ll walk you through the steps to resolve your leaked information.\nhow-it-works-page-data-breaches-step-2-text-2 = And if your info does fall into the wrong hands, we’ll give you security recommendations on what you can do to protect yourself now and in the future.\n\n## Step 3\n\nhow-it-works-page-data-breaches-step-3-title = Step 3\nhow-it-works-page-data-breaches-step-3-subtitle = We monitor for new breaches\nhow-it-works-page-data-breaches-step-3-text = Whenever we detect a new breach, we’ll check to see if you were a part of it and alert you if you are.\n\n## CTA button\n\nhow-it-works-page-data-breaches-cta-button = Get free scan\n\n## FooterSection\n\nhow-it-works-page-footersection-title = Take back control of your data\nhow-it-works-page-footersection-input-placeholder = example@example.com\nhow-it-works-page-footersection-cta-button = Get free scan\n\n## Inbound links\n## Site Navigation\n\nmain-nav-link-how-it-works-label = How It Works\nfooter-external-link-how-it-works-label = How It Works\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"36:T2755,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n## Top navbar\n\nlanding-premium-hero-navbar-link-how-it-works = How it works\nlanding-premium-hero-navbar-link-pricing = Pricing\nlanding-premium-hero-navbar-link-faqs = FAQs\nlanding-premium-hero-navbar-link-recent-breaches = Recent data breaches\n\n##\n\nlanding-premium-hero-lead = We scan to see if your phone number, passwords or home address have been leaked, and help you make it private again.\n\nlanding-premium-hero-emailform-input-label = Enter your email address to check for data breach exposures and sites selling your info.\n\n# This will be displayed in a smaller font, underneath the number 46, displayed\n# in a large font. This is part of a demo image, which is why the number is fixed.\n# Note: the hyphen is a so-called \"non-breaking hyphen\", which prevents\n# \"auto‑removed\" from being split across two lines. You might want to\n# copy-paste it when you also need a hyphen in your translation, unless it\n# results in a relatively long word.\nlanding-premium-hero-image-removal-badge-label = exposures auto‑removed\n\n# This is a label underneath a big number \"50\" - it's an image that demos Monitor.\nlanding-premium-hero-image-chart-label = fixed\n\nlanding-premium-plans-heading = Choose your level of protection\nlanding-premium-plans-lead = We believe in your right to privacy, so data breach monitoring is always free. For more robust protection, { -brand-monitor } also offers continuous automatic removal of your personal information.\nlanding-premium-plans-table-annotation-plus = Recommended\nlanding-premium-plans-table-heading-feature = Features\n# Users can click a button with this label to see a popover with a bit more detail.\nlanding-premium-plans-table-feature-callout-trigger = More info\nlanding-premium-plans-table-heading-free-title = { -brand-monitor }\nlanding-premium-plans-table-heading-free-subtitle = Free breach alerts\nlanding-premium-plans-table-heading-plus-title = { -brand-monitor } \u003cb\u003ePlus\u003c/b\u003e\nlanding-premium-plans-table-heading-plus-subtitle = Automatic data removal\n# Variables:\n# $dataBrokerTotalCount (number) - number of scanned data broker sites, e.g. 190\nlanding-premium-plans-table-feature-scan-label =\n { $dataBrokerTotalCount -\u003e\n [one] Scan { $dataBrokerTotalCount } data broker site that may be selling your personal info\n *[other] Scan { $dataBrokerTotalCount } data broker sites that may be selling your personal info\n }\nlanding-premium-plans-table-feature-scan-free = One-time\nlanding-premium-plans-table-feature-scan-plus = Monthly\nlanding-premium-plans-table-feature-removal-label = Remove personal info from sites that are selling it\nlanding-premium-plans-table-feature-removal-free = Manual removal\nlanding-premium-plans-table-feature-removal-plus = Automatic removal\nlanding-premium-plans-table-feature-removal-free-callout = We’ll let you know which data brokers are selling your info so you can contact them to request removal.\n# Variables:\n# $dataBrokerTotalCount (number) - number of scanned data broker sites, e.g. 190\nlanding-premium-plans-table-feature-removal-plus-callout =\n { $dataBrokerTotalCount -\u003e\n [one] We’ll automatically request removal of your private info across { $dataBrokerTotalCount } data broker site.\n *[other] We’ll automatically request removal of your private info across more than { $dataBrokerTotalCount } data broker sites.\n }\nlanding-premium-plans-table-feature-alerts-label = Get alerts when your data has been breached\nlanding-premium-plans-table-feature-alerts-free = Included\nlanding-premium-plans-table-feature-alerts-plus = Included\nlanding-premium-plans-table-feature-guidance-label = Fix high-risk data breaches\nlanding-premium-plans-table-feature-guidance-free = Guided\nlanding-premium-plans-table-feature-guidance-plus = Guided\nlanding-premium-plans-table-feature-monitoring-label = Continuous monitoring\nlanding-premium-plans-table-feature-monitoring-free = Included\nlanding-premium-plans-table-feature-monitoring-plus = Included\nlanding-premium-plans-table-billing-label = Price\nlanding-premium-plans-table-billing-free = Always free\n# Label for the options \"Yearly\" and \"Monthly\"\nlanding-premium-plans-table-billing-plus-period-label = Billing\nlanding-premium-plans-table-billing-plus-period-yearly = Yearly\nlanding-premium-plans-table-billing-plus-period-monthly = Monthly\n# There is not much room in the UI for this string, so abbreviating \"month\",\n# if possible, is probably a good idea:\n# Variables:\n# $monthlyPrice (string) - annual plan's price per month, including currency, e.g. \"$13.37\"\nlanding-premium-plans-table-price-plus-yearly = { $monthlyPrice }/mo.\n# Variables:\n# $discountPercentage (number) - how much percent the yearly plan is cheaper than the monthly plan, without the percentage sign, e.g. `42`\nlanding-premium-plans-table-price-plus-yearly-discount = Save { $discountPercentage }%\n# Variables:\n# $yearlyPrice (string) - annual plan's price in total, including currency, e.g. \"$13.37\"\nlanding-premium-plans-table-price-plus-yearly-sum = { $yearlyPrice } total\n# There is not much room in the UI for this string, so abbreviating \"month\",\n# if possible, is probably a good idea:\n# Variables:\n# $monthlyPrice (string) - monthly plan's price, including currency, e.g. \"$13.37\"\nlanding-premium-plans-table-price-plus-monthly = { $monthlyPrice }/mo.\nlanding-premium-plans-table-cta-free-label = Start free monitoring\nlanding-premium-plans-table-cta-plus-label = Get data removal\nlanding-premium-plans-table-reassurance-free-label = Upgrade anytime\nlanding-premium-plans-table-reassurance-plus-label = Cancel anytime\n\n\nlanding-premium-plans-cards-feature-included = Included:\nlanding-premium-plans-cards-feature-not-included = Not included:\n# Variables:\n# $dataBrokerTotalCount (number) - number of scanned data broker sites, e.g. 190\nlanding-premium-plans-cards-feature-scan-free =\n { $dataBrokerTotalCount -\u003e\n [one] \u003cb\u003eOne-time\u003c/b\u003e scan of { $dataBrokerTotalCount } data broker site that may be selling your personal info\n *[other] \u003cb\u003eOne-time\u003c/b\u003e scan of { $dataBrokerTotalCount } data broker sites that may be selling your personal info\n }\n# Variables:\n# $dataBrokerTotalCount (number) - number of scanned data broker sites, e.g. 190\nlanding-premium-plans-cards-feature-scan-plus =\n { $dataBrokerTotalCount -\u003e\n [one] \u003cb\u003eMonthly\u003c/b\u003e scan of { $dataBrokerTotalCount } data broker site that may be selling your personal info\n *[other] \u003cb\u003eMonthly\u003c/b\u003e scan of { $dataBrokerTotalCount } data broker sites that may be selling your personal info\n }\nlanding-premium-plans-cards-feature-removal-free = \u003cb\u003eManual removal\u003c/b\u003e of personal info from sites that are selling it\nlanding-premium-plans-cards-feature-removal-plus = \u003cb\u003eAutomatic data removal\u003c/b\u003e from sites that are selling your personal info\nlanding-premium-plans-cards-feature-alerts = Get alerts when your data has been breached\nlanding-premium-plans-cards-feature-guidance = \u003cb\u003eGuided help\u003c/b\u003e to fix high-risk data breaches\nlanding-premium-plans-cards-feature-monitoring = Continuous monitoring\n\n# Value proposition\n\nlanding-premium-value-prop-fix-exposures-description = We provide steps to follow when you’ve been affected by a data breach and can even remove your data from more than 190 sites trying to sell it — and we \u003cprivacy_link\u003erespect your privacy\u003c/privacy_link\u003e in the process.\nlanding-premium-value-prop-info-at-risk-description = Details like your \u003cexposure_type_list\u003ehome address, family members’ names, financial info\u003c/exposure_type_list\u003e and more can be exposed when a website is hacked — or sold on data broker sites to anyone looking for you. Knowing what info is out there is the first step in protecting yourself.\nlanding-premium-value-prop-progress-card-illustration-alt = Progress card delineating exposures that are fixed, in progress or manually fixed\n\n# Quote\n\nlanding-premium-quote = There’s a $240 billion industry of \u003cdata_brokers\u003edata brokers\u003c/data_brokers\u003e selling your private information for profit. It’s time to take back your privacy.\n\n# US FAQ\n\nlanding-premium-what-websites-sell-info-qn = What kinds of websites sell my personal information?\nlanding-premium-what-websites-sell-info-ans = Certain websites are in the business of collecting and selling people’s personal information without their consent, which is unfortunately legal in the US. These sites are called data brokers and they make up a $240 billion dollar industry. They use sophisticated methods to collect personal, financial, location, and even health information, often without your consent or even your knowledge. They’ll sell what they’ve collected to third parties, profiting from your information and leaving you open to violations of your privacy and security.\nlanding-premium-continuous-data-removal-qn = How does continuous data removal work?\n# Variables:\n# $data_broker_sites_total_num is the total number of data broker sites available to scan. It will always be plural.\nlanding-premium-continuous-data-removal-ans = { $data_broker_sites_total_num -\u003e\n *[other] Every month, we use the information you provided about yourself (name, location and birthdate) to search across { $data_broker_sites_total_num } data broker sites that sell people’s private information. If we find your data on any of these sites, we initiate the request for removal. This feature is available for { -brand-monitor-plus } users only. \u003clearn_more_link\u003eLearn more here.\u003c/learn_more_link\u003e\n}\n\n# Scan Limit\n\nlanding-premium-max-scan = We’ve reached the maximum scans for the month. Enter your email to get on our waitlist.\nlanding-premium-max-scan-at-capacity = At capacity\nlanding-premium-max-scan-waitlist = Join waitlist\nlanding-premium-waitlist-section-pt-1 = We’ve reached the maximum scans for the month.\nlanding-premium-waitlist-section-pt-2 = Enter your email to get on our waitlist.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"37:T55c,# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Variables:\n# $discount_percentage_num is the amount discounted in percentage per month\n# $discount_duration is the number of month(s) that users will pay the discounted price\nlimitations-apply-title =\n { $discount_duration -\u003e\n [one] { $discount_percentage_num } off { $discount_duration } month promotion\n *[other] { $discount_percentage_num } off { $discount_duration } months promotion\n}\nlimitations-pill = Rules \u0026 Restrictions\nlimitations-apply-description-one = Discount available for a limited time only.\nlimitations-apply-description-two = Redeemable 1 time only.\n# Variables:\n# $discount_percentage_num is the amount discounted in percentage per month\n# $discount_duration is the number of month(s) that users will pay the discounted price\nlimitations-apply-description-three =\n { $discount_duration -\u003e\n [one] { -brand-mozilla-monitor } monthly subscribers will receive { $discount_percentage_num } off their next { $discount_duration } consecutive month billing.\n *[other] { -brand-mozilla-monitor } monthly subscribers will receive { $discount_percentage_num } off their next { $discount_duration } consecutive months billing.\n}\n38:T1a54,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Strings in this file are not yet final, and thus should not be localised yet.\n\nonboarding-steps-get-started-label = Get started\nonboarding-steps-enter-info-label = Enter info\nonboarding-steps-enter-info-back = Go back\nonboarding-steps-find-exposures-label = Find exposures\nonboarding-get-started-heading = Welcome to { -product-short-name }. Let’s find your exposed information.\nonboarding-get-started-content-data = To find and fix your exposed data, we’ll need to ask for your personal info. Rest assured we will safeguard your information like it’s our own.\nonboarding-get-started-content-price = We believe in your right to privacy, so basic { -product-short-name } is always free. Subscribe to { -brand-monitor-plus } for continuous protection and automatic removal of your personal info.\nonboarding-get-started-content-explainer = See how we protect your data\nonboarding-get-started-cta-label = Start my free scan\nonboarding-get-started-how-it-works-dialog-heading-line1 = We’re here to protect your personal information\nonboarding-get-started-how-it-works-dialog-heading-line2 = Here’s how it works:\nonboarding-get-started-how-it-works-dialog-step1-heading = Scan for exposures\n# Variables:\n# $dataBrokerTotalCount (number) - number of scanned data broker sites, e.g. 190\nonboarding-get-started-how-it-works-dialog-step1-content = {\n $dataBrokerTotalCount -\u003e\n *[other] With just a few key pieces of information, we’ll search for you in all known data breaches and { $dataBrokerTotalCount } major data broker sites. All users get the first scan free.\n}\nonboarding-get-started-how-it-works-dialog-step2-heading = Remove your personal info\nonboarding-get-started-how-it-works-dialog-step2-content = We’ll show you what personal info each data broker site is selling. You’ll need to contact each data broker to request removal. Removal typically takes 7-10 business days, but some can take longer. Subscribe to { -brand-monitor-plus } and we’ll handle this for you.\nonboarding-get-started-how-it-works-dialog-step3-heading = Resolve data breaches\nonboarding-get-started-how-it-works-dialog-step3-content = They’ll require access to your accounts, so you’ll need to resolve them manually even if you subscribe to { -brand-monitor-plus }.\nonboarding-get-started-how-it-works-dialog-confirm-label = OK\n\nonboarding-enter-details-title = Enter the details you want to protect\nonboarding-enter-details-text = We’ll use this to find exposures of your personal information, and then guide you step-by-step on how to fix it.\nonboarding-enter-details-why-button-label = Why do we need this info?\nonboarding-enter-details-dialog = There’s a $240 billion industry of data brokers that expose and sell your personal information for a profit. They scrape your data from publicly available sources to create profiles that include your name(s), current and previous addresses, family member names, criminal history, and much much more.\nonboarding-enter-details-diaglog-subheader = To find your profiles on these sites, we use three key pieces of information:\nonboarding-enter-details-dialog-name-label = Name\nonboarding-enter-details-dialog-name-text = Your full legal name will help us find profiles of you, but your aliases or previous names may also appear in search results.\nonboarding-enter-details-dialog-location-label = Location\nonboarding-enter-details-dialog-location-text = Your current city and state will help us narrow down the results, but your past addresses may also appear in search results.\nonboarding-enter-details-dialog-date-label = Date of birth\nonboarding-enter-details-dialog-date-text = This will reduce chances of finding profiles of people with the same name as you.\nonboarding-enter-details-dialog-data-protection-text = We fully encrypt data you share with us, and we are committed to protecting it. Read our \u003cprivacy-policy-link\u003ePrivacy Policy\u003c/privacy-policy-link\u003e, and \u003cprivacy-protection-link\u003elearn more about how we protect your privacy\u003c/privacy-protection-link\u003e.\nonboarding-enter-details-comfirm-dialog-title = Is this correct?\nonboarding-enter-details-comfirm-dialog-text = To ensure accurate results, please confirm this is your correct information. You won’t be able to update this later for your one-time free scan.\nonboarding-enter-details-comfirm-dialog-button-edit = Edit\nonboarding-enter-details-comfirm-dialog-button-confirm = Confirm\nonboarding-enter-details-label-first-name = First name\nonboarding-enter-details-placeholder-first-name = Enter first name\nonboarding-enter-details-label-middle-name = Middle name\nonboarding-enter-details-placeholder-middle-name = Enter middle name\nonboarding-enter-details-label-last-name = Last name\nonboarding-enter-details-placeholder-last-name = Enter last name\n# A name suffix follows a person’s full name and provides additional information\n# about their position, accreditation, etc.\n# Examples: “PhD”, “CCNA”, “OBE”, “Jr.”, “Sr.”, etc.\nonboarding-enter-details-label-name-suffix = Suffix\nonboarding-enter-details-placeholder-name-suffix = Enter suffix\nonboarding-enter-details-label-location = City and state\nonboarding-enter-details-placeholder-location = Enter city and state\nonboarding-enter-details-placeholder-location-results = No location found\nonboarding-enter-details-label-date-of-birth = Date of birth\nonboarding-enter-details-input-error-message-generic = Required to complete the scan\nonboarding-enter-details-input-error-message-location = Type location and select from list\nonboarding-enter-details-input-error-alt = Error\nonboarding-enter-details-input-info-text-location = Use the location you’ve spent the most time in recently.\n\nonboarding-find-exposures-progress-label = Scanning for exposures…\n# Variables:\n# $breachesTotalCount (number) - number of scanned breaches, e.g. 672\n# $breachesScannedCount (number) - number of the currently scanned breaches, e.g. between 0 and $breachesTotalCount\nonboarding-find-exposures-progress-breaches-counter = {\n $breachesTotalCount -\u003e\n *[other] { $breachesScannedCount } of { $breachesTotalCount } known data breaches\n}\n# Variables:\n# $dataBrokerTotalCount (number) - number of scanned data broker sites, e.g. 190\n# $dataBrokerScannedCount (number) - number of the currently scanned data broker sites, e.g. between 0 and $dataBrokerTotalCount\nonboarding-find-exposures-progress-broker-counter = {\n $dataBrokerTotalCount -\u003e\n *[other] { $dataBrokerScannedCount } of { $dataBrokerTotalCount } data broker sites\n}\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"39:T127a,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n## Cancel Plus subscription\n\nsettings-cancel-plus-title = Cancel { -brand-monitor-plus } subscription\nsettings-cancel-plus-details = Your subscription will revert to a free account after the current billing cycle ends. Your data broker scan results will be permanently deleted, and you may be re-added to those sites.\nsettings-cancel-plus-link-label = Cancel from your { -brand-mozilla-account }\n\n## Cancel Plus subscription - flow with a cancellation survey\n\nsettings-cancel-plus-survey-button-label = Cancel your subscription\nsettings-cancel-plus-step-confirm-heading = Hey, before you go…\nsettings-cancel-plus-step-confirm-content = Data brokers continually re-add your personal info back into their databases. Leaving now means you’ll no longer be protected.\nsettings-cancel-plus-step-confirm-cta-label = Continue to cancellation\nsettings-cancel-plus-step-confirm-cancel-label = Never mind, take me back\nsettings-cancel-plus-step-survey-heading = We’re sorry to see you go. Will you tell us why you’re leaving?\nsettings-cancel-plus-step-survey-lead = Your experience is important to us. We read every response and take it into consideration.\nsettings-cancel-plus-step-survey-cta-label = Continue to cancellation\nsettings-unsubscribe-dialog-confirmation-redirect-title = Directing you to your { -brand-mozilla-account } to cancel\nsettings-unsubscribe-dialog-confirmation-redirect-description-pt1 = We’ll automatically redirect you to your { -brand-mozilla-account } where you can cancel your { -brand-monitor } subscription.\nsettings-unsubscribe-dialog-confirmation-redirect-description-pt2 = Please note, all of your { -brand-monitor-plus } services will be \u003cb\u003epermanently deleted\u003c/b\u003e after your current billing cycle ends.\nsettings-unsubscribe-dialog-cancellation-survey-form-placeholder = What could have gone better?\n# Variables:\n# $discount_percentage_num is the amount discounted in percentage per month\n# $discount_duration is the number of month(s) that users will pay the discounted price\nsettings-unsubscribe-dialog-promotion-cta = {\n $discount_duration -\u003e\n [one] Stay and get { $discount_percentage_num } off next month\n *[other] Stay and get { $discount_percentage_num } off { $discount_duration } months\n}\n# Variables:\n# $discount_percentage_num is the amount discounted in percentage per month\n# $discount_duration is the number of month(s) that users will pay the discounted price\nsettings-unsubscribe-dialog-promotion-description = {\n $discount_duration -\u003e\n [one] { -brand-monitor-plus } will continue protecting your personal data, and a { $discount_percentage_num } discount has been applied to your next month.\n *[other] { -brand-monitor-plus } will continue protecting your personal data, and a { $discount_percentage_num } discount has been applied to your next { $discount_duration } months.\n}\nsettings-unsubscribe-dialog-promotion-cta-subtitle = Discount applied to your next month. Redeemable one time only.\nsettings-unsubscribe-dialog-promotion-unsuccessful = There was a problem applying your discount. \u003ctry_again_link\u003ePlease try again.\u003c/try_again_link\u003e\nsettings-unsubscribe-dialog-promotion-complete = You’re all set!\nsettings-unsubscribe-dialog-promotion-back-to-dashboard-cta = Go to my Dashboard\nsettings-unsubscribe-dialog-promotion-limitations-apply = Limited time, restrictions apply\n\n## Delete Monitor account\n\nsettings-delete-monitor-plus-account-title = Delete { -brand-monitor } account\nsettings-delete-monitor-plus-account-description-2 = This will delete your { -brand-monitor } account and immediately end your paid { -brand-monitor-plus } subscription.\nsettings-delete-monitor-plus-account-cta-label = Delete account\nsettings-delete-monitor-plus-account-dialog-title-2 = Your { -brand-monitor } account will be deleted\nsettings-delete-monitor-plus-account-dialog-lead-p1-2 = All of your { -brand-monitor } account information will be deleted and we’ll no longer monitor for new data breaches or data broker exposures. This will not delete your { -brand-mozilla-account }.\nsettings-delete-monitor-plus-account-dialog-lead-p2-2 = You’ll regain access to { -brand-monitor-plus } features if you sign back in during any remaining time of your paid subscription.\nsettings-delete-monitor-plus-account-dialog-cta-label = Delete account\nsettings-delete-monitor-plus-account-dialog-cancel-button-label = Never mind, take me back\n\n## Monthly Monitor Report\n\nsettings-alert-preferences-allow-monthly-monitor-plus-report-title = Monthly { -brand-monitor-plus } report\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"3a:T5b4,# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n### Dialog window that allows a user to add a new email address to be monitored\n\nadd-email-add-another-heading = Add another email address\n\n# $total is the number of emails a user is allowed to add\nadd-email-your-account-includes =\n { $total -\u003e\n [one] Your account includes monitoring of { $total } email address. Add a new email address to see if it’s been involved in a breach.\n *[other] Your account includes monitoring of up to { $total } email addresses. Add a new email address to see if it’s been involved in a breach.\n }\n\nadd-email-address-input-label = Email Address\nadd-email-send-verification-button = Send verification link\n\n# $email is the newly added email address. $settings-href is the URL for the Settings page. HTML tags should not be translated, e.g. `\u003ca\u003e`\n# This string will be deprecated when the new Plus plan is live.\nadd-email-verify-the-link = Verify the link sent to { $email } to add it to { -brand-fx-monitor }. Manage all email addresses in \u003ca { $settings-href }\u003eSettings\u003c/a\u003e.\n# Variables:\n# $email (string) - An email address submitted by the user for monitoring, e.g. `example@example.com`\nadd-email-verify-the-link-2 = Verify the link sent to \u003cb\u003e{ $email }\u003c/b\u003e to add it to { -brand-mozilla-monitor }.\n3b:T28b6,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Strings for the main app\n\n\n## The following messages are brand and should be kept entirely in English\n## unless otherwise indicated.\n\n-product-name = Mozilla Monitor\n-product-short-name = Monitor\n-brand-name = Firefox\n-brand-HIBP = Have I Been Pwned\n-brand-fxa = Firefox Account\n-brand-pocket = Pocket\n-brand-lockwise = Firefox Lockwise\n-brand-firefox = Firefox\n-brand-monitor = Monitor\n-brand-fx-monitor = Mozilla Monitor\n-brand-mozilla = Mozilla\n-brand-premium = Premium\n-brand-monitor-premium = Monitor Premium\n-brand-mozilla-foundation = Mozilla Foundation\n-brand-github = GitHub\n-brand-mozilla-vpn = Mozilla VPN\n-brand-relay = Firefox Relay\n-brand-mozilla-monitor = Mozilla Monitor\n-brand-monitor-plus = Monitor Plus\n\n##\n\nerror-not-subscribed = This email address is not subscribed to { -product-name }.\nerror-hibp-throttled = Too many connections to { -brand-HIBP }.\nerror-hibp-connect = Error connecting to { -brand-HIBP }.\nuser-add-invalid-email = Invalid Email\nuser-add-too-many-emails = You are monitoring the maximum number of email addresses.\nuser-add-duplicate-email = This email has already been added to { -product-name }.\nuser-add-verification-email-just-sent = Another verification email can’t be sent this quickly. Please try again later.\nuser-add-unknown-error = Something went wrong adding another email address. Please try again later.\nuser-delete-unknown-error = Something went wrong removing an email address. Please try again later.\nuser-verify-token-error = Verification token is required.\n# compromised-data = the kind of user data exposed to hackers in data breach.\ncompromised-data = Compromised data:\n# Breach data provided by Have I Been Pwned.\n# Variables:\n# $hibp-link (String) - Link to Have I Been Pwned\nhibp-attribution = Breach data provided by { $hibp-link }\nshow-all = Show all\nsign-out = Sign Out\n# Manage Firefox Account, link to page where account holders can change their account settings.\nmanage-fxa = Manage { -brand-fxa }\n# Link title\npreferences = Preferences\n# Link title\nhome = Home\n# Link title\nsecurity-tips = Security Tips\n# Link title\nmore-about-this-breach = More about this breach\nmonitor-several-emails = Monitor several emails\nwebsite-breach = Website Breach\nsensitive-breach = Sensitive Website Breach\ndata-aggregator-breach = Data Aggregator Breach\nwhat-data = What data was compromised:\nsensitive-sites = How does { -product-name } treat sensitive sites?\nsensitive-sites-copy =\n { -product-name } only reveals accounts associated with these \n types of breaches after an email address has been verified. This means you’re the \n only person who can see if your information was in this breach (unless someone \n else has access to your email account.)\ndelayed-reporting-headline = Why did it take so long to report this breach?\ndelayed-reporting-copy =\n It can sometimes take months or years for credentials exposed \n in a data breach to appear on the dark web. Breaches get added to our database as \n soon as they have been discovered and verified.\nfxm-warns-you =\n { -product-name } warns you if your email address has been exposed \n in an online data breach. See if your information has been exposed, learn how \n to better protect your online accounts, and get alerted if your email address \n appears in a new breach.\nwhat-is-data-agg = What is a data aggregator?\nwhat-is-data-agg-blurb =\n Data aggregators, or data brokers, collect information from public \n records and buy it from other companies. They compile this data to sell it to companies \n for marketing purposes. Victims of these breaches are less likely to experience financial \n fraud, but hackers could use this data to impersonate or profile them.\navoid-personal-info = Avoid using personal info in passwords\nsend-verification = Send Verification Link\n# This string is a header on the user preferences page and\n# appears above a check-box list of user options which allow\n# the user to choose whether or not they want to receive breach\n# alerts for all of their monitored email addresses to a single\n# email address.\nbreach-summary = Breach Summary\n\n##\n\nbreach-alert-subject = { -product-name } found your email in a new data breach.\n# This string is displayed under a large numeral that indicates the total number\n# of data breaches that exposed a user’s password. Don’t add $passwords to\n# your localization, because it would result in the number showing twice.\npasswords-exposed =\n { $passwords -\u003e\n [one] Password exposed across all breaches\n *[other] Passwords exposed across all breaches\n }\n# This string is displayed under a large numeral that indicates the total number\n# of data breaches that have exposed the user’s information. Don’t add $breaches to\n# your localization, because it would result in the number showing twice.\nknown-data-breaches-exposed =\n { $breaches -\u003e\n [one] Known data breach has exposed your info\n *[other] Known data breaches have exposed your info\n }\nwhat-is-a-website-breach = What is a website breach?\nwebsite-breach-blurb = A website data breach happens when cyber criminals steal, copy, or expose personal information from online accounts. It’s usually a result of hackers finding a weak spot in the website’s security. Breaches can also happen when account information gets leaked by accident.\n# This is a section headline on the breach detail page that appears above\n# a short summary about the breach.\nbreach-overview-title = Overview\n# This is a standardized breach overview blurb that appears on all breach detail pages.\n# $breachTitle is the name of the breached company or website.\n# $breachDate and $addedDate are calendar dates.\nbreach-overview-new = On { $breachDate }, { $breachTitle } was breached. Once the breach was discovered and verified, it was added to our database on { $addedDate }.\n# Title that appears in the mobile menu bar and opens the mobile menu when clicked.\nmenu = Menu\n# This is part of a confirmation message that appears after a user has submitted\n# the form to add an additional email to Firefox Monitor.\n# Variables:\n# $userEmail (String) - User email address\nverify-the-link = Verify the link sent to { $userEmail } to add it to { -product-name }.\n\n## These are part of a confirmation page that appears after a user has verified\n## an additional email to Firefox Monitor.\n\n# This string is a label for the calendar date a breach is added to the database\n# and is followed by that date.\nbreach-added-label = Breach added:\n# Section headline\nrec-section-headline = What to do for this breach\nrec-section-subhead = We recommend you take these steps to keep your personal info safe and protect your digital identity.\n# Section headline\nrec-section-headline-no-pw = What to do to protect your personal info\nrec-section-subhead-no-pw = Though passwords weren’t exposed in this breach, there are still steps you can take to better protect your personal info.\n\n##\n\n# A status indicator that appears in the top right corner of new breach cards\nnew-breach = New\n\n##\n\n# “account” can be localized, “Mozilla” must be treated as a brand,\n# and kept in English.\n-brand-mozilla-account = Mozilla account\nopen-in-new-tab-alt = Open link in a new tab\n\n## Search Engine Optimization\n\nmeta-desc-2 = Find out if you’ve been part of a data breach with { -brand-fx-monitor }. We’ll help you understand what to do next and continuously monitor for any new breaches.\n\n## Header\n\n# Deprecated\nbrand-fx-monitor = { -brand-fx-monitor }\nsign-in = Sign In\nbrand-mozilla-monitor = { -brand-fx-monitor }\n\n## Site navigation\n\nmobile-menu-label = Main menu\nmain-nav-button-collapse-label = Collapse menu\nmain-nav-button-collapse-tooltip = Collapse menu\nmain-nav-button-expand-label = Expand menu\nmain-nav-button-expand-tooltip = Expand menu\nmain-nav-label = Navigation\nmain-nav-link-home-label = Home\nmain-nav-link-dashboard-label = Dashboard\nmain-nav-link-settings-label = Settings\nmain-nav-link-faq-label = FAQs\nmain-nav-link-faq-tooltip = Frequently asked questions\n\n## User menu\n\nuser-menu-trigger-label = Open user menu\nuser-menu-trigger-tooltip = Profile\nuser-menu-manage-fxa-label = Manage your { -brand-mozilla-account }\nuser-menu-settings-label = Settings\nuser-menu-settings-tooltip = Configure { -brand-mozilla-monitor }\nuser-menu-help-label = Help and support\nuser-menu-help-tooltip = Get help using { -brand-mozilla-monitor }\nuser-menu-signout-label = Sign out\nuser-menu-signout-tooltip = Sign out of { -brand-mozilla-monitor }\n\n## Footer\n\nmozilla = { -brand-mozilla }\nterms-of-service = Terms of Service\nprivacy-notice = Privacy Notice\ngithub = { -brand-github }\nfooter-nav-recent-breaches = Recent Data Breaches\nfooter-external-link-faq-label = FAQs\nfooter-external-link-faq-tooltip = Frequently asked questions\n\n## Error page\n\n# Variables:\n# $errorCode (number) - \"404\"\nerror-page-error-404-title = { $errorCode } Page not found\nerror-page-error-404-copy = We’re sorry, the page you’re looking for no longer exists.\nerror-page-error-404-cta-button = Go back\n# Variables:\n# $errorCode (number) - the status code of the error, e.g. 403\nerror-page-error-other-title = { $errorCode } Something went wrong\n\n## Breach overview page\n\nall-breaches-headline-2 = All breaches detected by { -brand-fx-monitor }\nall-breaches-lead = We monitor all known data breaches to find out if your personal information was compromised. Here’s a complete list of all of the breaches that have been reported since 2007.\nsearch-breaches = Search Breaches\n# the kind of user data exposed to hackers in data breach.\nexposed-data = Exposed data:\n\n## Public breach detail page\n\nfind-out-if-2 = Find out if you were involved in this breach\nfind-out-if-description = We’ll help you quickly see if your email address was exposed in this breach, and understand what to do next.\nbreach-detail-cta-signup = Check for breaches\n\n## Firefox Monitor -\u003e Mozilla Monitor rebrand banner\n\nbanner-monitor-rebrand-text = \u003cb\u003e{ -brand-mozilla-monitor }\u003c/b\u003e: New name, look and even more ways to \u003cb\u003ereclaim your privacy\u003c/b\u003e.\nbanner-monitor-rebrand-dismiss-button-label = OK\nbanner-monitor-rebrand-dismiss-button-tooltip = Dismiss\nloading-accessibility = Loading\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"3c:T1ecf,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nbreach-all-meta-title = { -brand-fx-monitor } - All Data Breaches\nbreach-all-meta-social-title = All Breaches Detected by { -brand-fx-monitor }\nbreach-all-meta-social-description = Browse the complete list of known breaches detected by { -brand-fx-monitor }, then find out if your information was exposed.\n\n# Variables:\n# $company (String) - Name of the company that was breached, e.g. \"PHP Freaks\"\nbreach-detail-meta-social-title = Were you affected by the { $company } Data Breach?\nbreach-detail-meta-social-description = Use { -brand-fx-monitor } to find out if your personal information was exposed in this breach, and understand what to do next.\n\n## Breaches header\n\n## Breaches resolved filter\n\n## Breaches table\n\n## Links that we might refer to when prompting the user to make changes after a breach\n\nbreach-checklist-link-firefox-relay = { -brand-relay }\nbreach-checklist-link-password-manager = { -brand-firefox } Password Manager\nbreach-checklist-link-mozilla-vpn = { -brand-mozilla-vpn }\n\n## Prompts the user for changes when there is a breach detected of password\n\nbreach-checklist-pw-header-text = Update your passwords and enable two-factor authentication (2FA).\n\n# The `breached-company-link` tags will be replaced with link tags or stripped if no link is available.\n# Variables:\n# $passwordManagerLink (string) - a link to the password manager documentation, with { -breach-checklist-link-password-manager } as the label\nbreach-checklist-pw-body-text = In most cases, we’d recommend that you change your password on the company’s website. But \u003cb\u003etheir website may be down or contain malicious content\u003c/b\u003e, so use caution if you \u003cbreached-company-link\u003evisit the site\u003c/breached-company-link\u003e. For added protection, make sure you’re using unique passwords for all accounts, so that any leaked passwords can’t be used to access other accounts. { $passwordManagerLink } can help you securely keep track of all of your passwords.\n\n## Prompts the user for changes when there is a breach detected of email\n\n# Variables:\n# $firefoxRelayLink (string) - a link to Firefox Relay, with { -breach-checklist-link-firefox-relay } as the label\nbreach-checklist-email-header-2 = Protect your email with an email masking service like { $firefoxRelayLink }.\nbreach-checklist-email-body = This can hide your true email address while forwarding emails to your real inbox.\n\n## Prompts the user for changes when there is a breach detected of social security number\n\n# Credit reports list your bill payment history, loans, current debt, and other financial information.\n# They show where you work and live and whether you've been sued, arrested, or filed for bankruptcy.\nbreach-checklist-ssn-header = Monitor your credit report for accounts, loans, or credit cards you don’t recognize.\n# A security freeze prevents prospective creditors from accessing your credit file.\n# Creditors typically won't offer you credit if they can't access your credit reporting file,\n# so a security freeze, also called a credit freeze, prevents you or others from opening accounts in your name.\n# This will only be shown to users in the US.\n# Variables:\n# $equifaxLink (string) - a link to the Equifax website\n# $experianLink (string) - a link to the Experian website\n# $transUnionLink (string) - a link to the TransUnion website\nbreach-checklist-ssn-body-2 = You can also consider freezing your credit on { $equifaxLink }, { $experianLink } and { $transUnionLink } to stop scammers from opening new accounts in your name. It’s free and won’t affect your credit score.\n\n## Prompts the user for changes when there is a breach detected of credit card\n\nbreach-checklist-cc-header = Report this breach to your credit card issuer and request a new card with a new number.\nbreach-checklist-cc-body = You should also review your credit card statements for unrecognized charges.\n\n## Prompts the user for changes when there is a breach detected of bank account\n\nbreach-checklist-bank-header = Notify your bank immediately that your account number has been compromised.\nbreach-checklist-bank-body = Doing so faster could give you more legal protections to help you recover any losses. You’ll also want to check your accounts for any unrecognized charges.\n\n## Prompts the user for changes when there is a breach detected of pin\n\nbreach-checklist-pin-header = Notify your card issuer and change your PIN immediately.\nbreach-checklist-pin-body = Make sure your new PIN, or any other PIN, doesn’t include easily guessed numbers such as your birth date or address.\n\n## Prompts the user for changes when there is a breach detected of IP address\n\n# Variables:\n# $mozillaVpnLink (string) - a link to the Mozilla VPN website, with { -breach-checklist-link-mozilla-vpn } as the label\nbreach-checklist-ip-header-2 = Use the internet privately with a VPN, such as { $mozillaVpnLink }.\nbreach-checklist-ip-body = Your IP address (Internet Protocol address) pinpoints your location and internet service provider. A VPN can hide your real IP address so you can use the internet privately.\n\n## Prompts the user for changes when there is a breach detected of physical address\n\nbreach-checklist-address-header = Change any passwords or PINs that include any part of your address.\nbreach-checklist-address-body = Addresses are easy to find in public records and can make those passwords and PINs easy to guess.\n\n## Prompts the user for changes when there is a breach detected of date of birth\n\nbreach-checklist-dob-header = Change any passwords or PINs that include your date of birth.\nbreach-checklist-dob-body = Birth dates are easy to find in public records, and people who find it could easily guess your PIN.\n\n## Prompts the user for changes when there is a breach detected of phone number\n\n# Variables:\n# $firefoxRelayLink (string) - a link to Firefox Relay, with { -breach-checklist-link-firefox-relay } as the label\nbreach-checklist-phone-header-2 = Protect your phone number with a masking service like { $firefoxRelayLink }, which hides your true phone number.\n\n## Prompts the user for changes when there is a breach detected of security questions\n\nbreach-checklist-sq-header-text = Update your security questions.\n\n# The `breached-company-link` tags will be replaced with link tags or stripped if no link is available.\nbreach-checklist-sq-body-text = In most cases, we’d recommend that you update your security questions on the company’s website. But \u003cb\u003etheir website may be down or contain malicious content\u003c/b\u003e, so use caution if you \u003cbreached-company-link\u003evisit the site\u003c/breached-company-link\u003e. For added protection, update these security questions on any important accounts where you’ve used them, and create unique passwords for all accounts.\n\n## Prompts the user for changes when there is a breach detected of historical password\n\nbreach-checklist-hp-header = Create unique, strong passwords for any account where you’ve re-used passwords.\n# Variables:\n# $passwordManagerLink (string) - a link to the password manager documentation, with { -breach-checklist-link-password-manager } as the label\nbreach-checklist-hp-body-2 = A password manager like { $passwordManagerLink } (which is free and built-in to the { -brand-firefox } browser) can help you keep track of all your passwords and access them securely from all your devices.\n\n## Prompts the user for changes when there is a breach detected of other types\n\n# Variables:\n# $breachDate (String) - Date of the breach\n# $companyName (String) - Name of the company where the breach occurred\nbreach-checklist-general-header = Reach out to { $companyName } to inform them about this breach and ask for specific steps you can take.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"3d:T214c,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Chart summarizing total exposures\n\n# The number inside \u003cnr\u003e will be displayed in a large font,\n# the label inside \u003clabel\u003e will be shown underneath, in a smaller font.\n# Variables:\n# $nr (number) - Number of unresolved exposures for the user\nexposure-chart-heading =\n { $nr -\u003e\n [one] \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eexposure\u003c/label\u003e\n *[other] \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eexposures\u003c/label\u003e\n }\n# Variables:\n# $nr (number) - Number of fixed exposures found for the user\nexposure-chart-heading-fixed = \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eFixed\u003c/label\u003e\nexposure-chart-legend-heading-type = Exposure\nexposure-chart-legend-heading-nr = Number\n# Variables:\n# $nr (number) - Number of a particular type of exposure found for the user\nexposure-chart-legend-value-nr = { $nr }×\nexposure-chart-caption = This chart shows how many times your info is actively exposed.\n# Variables:\n# $total_fixed_exposures_num (number) - Number of fixed exposures\n# $total_exposures_num (number) - Number of total exposures\nexposure-chart-caption-fixed = This chart shows the total exposures that are fixed ({ $total_fixed_exposures_num } out of { $total_exposures_num })\nexposure-chart-returning-user-upgrade-prompt = Home address, family members and more are not yet included.\nexposure-chart-returning-user-upgrade-prompt-cta = Start a free scan\nexposure-chart-scan-in-progress-prompt = \u003cb\u003eScan in progress:\u003c/b\u003e address, family members, and more are not yet included.\nmodal-active-number-of-exposures-title = About your number of active exposures\n# Variables:\n# $limit (number) - Number of email addresses included in the plan\nmodal-active-number-of-exposures-part-one-all =\n { $limit -\u003e\n [one] This chart includes the total number of times we found each type of data exposed across all data breaches for the { $limit } email address that you are currently monitoring.\n *[other] This chart includes the total number of times we found each type of data exposed across all data breaches for up to { $limit } email addresses that you are currently monitoring.\n }\nmodal-active-number-of-exposures-part-two = For example, if you have 10 exposures of your phone number, that might mean one phone number is exposed across 10 different sites, or it could mean 2 different phone numbers were exposed across 5 different sites.\nmodal-active-number-of-exposures-part-three-all = Once they are resolved, they will be added to your total number of fixed exposures on the Fixed page.\nmodal-fixed-number-of-exposures-title = About your number of fixed exposures\nmodal-fixed-number-of-exposures-all = This chart includes the total number of data breaches that have been fixed for all email addresses you’re currently monitoring. Once exposures are marked as fixed, they’ll be added to the total here.\nmodal-cta-ok = OK\nmodal-cta-got-it = Got it\nopen-modal-alt = Open modal\nclose-modal-alt = Close modal\nopen-tooltip-alt = Open tooltip\nprogress-card-heres-what-we-fixed-headline-all = Here’s what you fixed\nprogress-card-manually-fixed-headline = Manually fixed\ndashboard-tab-label-action-needed = Action needed\ndashboard-tab-label-fixed = Fixed\ndashboard-exposures-all-fixed-label = All fixed here!\ndashboard-exposures-area-headline = View all sites where your info is exposed\n# Note: this line precedes dashboard-exposures-area-description-all-line2.\n# Variables:\n# $exposures_unresolved_num (number) - the unresolved number of exposures the user has.\ndashboard-exposures-area-description-all-line1 =\n { $exposures_unresolved_num -\u003e\n [one] We found { $exposures_unresolved_num } exposure of your data.\n *[other] We found { $exposures_unresolved_num } exposures of your data.\n }\n# Note: this line follows dashboard-exposures-area-description-all-line1.\n# Variables:\n# $data_breach_unresolved_num (number) - the unresolved number of data breaches the user has.\ndashboard-exposures-area-description-all-line2 =\n { $data_breach_unresolved_num -\u003e\n [one] It appeared in { $data_breach_unresolved_num } data breach.\n *[other] It appeared across { $data_breach_unresolved_num } data breaches.\n }\ndashboard-fixed-area-headline-all = View all exposures that are fixed\n# This is the label on a button that opens a popover menu, which shows a menu to adjust filters for the listed exposures.\ndashboard-exposures-filter = Filter\ndashboard-exposures-filter-company = Company\ndashboard-exposures-filter-date-found = Date found\ndashboard-exposures-filter-date-found-last-seven-days = Last 7 days\ndashboard-exposures-filter-date-found-last-thirty-days = Last 30 days\ndashboard-exposures-filter-date-found-last-year = Last year\ndashboard-exposures-filter-status = Status\npopover-open-filter-settings-alt = Select filters\ndashboard-exposures-filter-show-all = Show all\ndashboard-exposures-filter-show-results = Show results\ndashboard-exposures-filter-reset = Reset\n\n## Top banner on the dashboard\n\ndashboard-top-banner-section-label = Dashboard summary\ndashboard-top-banner-scan-in-progress-title = Your scan is still in progress\ndashboard-top-banner-your-data-is-protected-title = Your data is protected\ndashboard-top-banner-your-data-is-protected-cta = See what’s fixed\ndashboard-top-banner-lets-keep-protecting-title = Let’s keep protecting your data\n# Variables:\n# $exposures_unresolved_num is the remaining number of exposures the user has to resolve.\ndashboard-top-banner-lets-keep-protecting-description =\n { $exposures_unresolved_num -\u003e\n [one] You still have { $exposures_unresolved_num } exposure left to fix. Keep going and protect yourself. We’ll guide you step-by-step.\n *[other] You still have { $exposures_unresolved_num } exposures left to fix. Keep going and protect yourself. We’ll guide you step-by-step.\n }\ndashboard-top-banner-lets-keep-protecting-cta = Let’s keep going\ndashboard-top-banner-protect-your-data-title = Let’s protect your data\ndashboard-top-banner-protect-your-data-cta = Let’s fix it\n# Note: this line is followed by `dashboard-top-banner-non-us-protect-your-data-description-line1`.\n# Variables:\n# $exposures_unresolved_num (number) - the total number of exposures the user has.\ndashboard-top-banner-non-us-protect-your-data-description-line1 =\n { $exposures_unresolved_num -\u003e\n [one] We found { $exposures_unresolved_num } exposure of your data.\n *[other] We found { $exposures_unresolved_num } exposures of your data.\n }\n# Note: this line is preceded by `dashboard-top-banner-non-us-protect-your-data-description-line1`.\n# Variables:\n# $data_breach_unresolved_num (number) - the total number of data breaches the user has.\ndashboard-top-banner-non-us-protect-your-data-description-line2 =\n { $data_breach_unresolved_num -\u003e\n [one] It appeared in { $data_breach_unresolved_num } data breach. We’ll guide you step-by-step on how to fix it.\n *[other] It appeared across { $data_breach_unresolved_num } data breaches. We’ll guide you step-by-step on how to fix it.\n }\ndashboard-top-banner-no-exposures-found-title = No exposures found\ndashboard-top-banner-non-us-no-exposures-found-description = Great news! We searched all known data breaches and found no exposures. We’ll keep monitoring your email address and will alert you if a new breach occurs.\ndashboard-no-exposures-label = No exposures found\n# Variables:\n# $exposures_resolved_num is the number of exposures the user has resolved.\ndashboard-top-banner-non-us-your-data-is-protected-description =\n { $exposures_resolved_num -\u003e\n [one] Great work, the exposure of your data is fixed! We’ll keep monitoring and will alert you of any new exposures.\n *[other] Great work, all { $exposures_resolved_num } exposures of your data are fixed! We’ll keep monitoring and will alert you of any new exposures.\n }\ndashboard-top-banner-monitor-more-cta = Monitor more emails\n\n# About Exposure Indicators Modal\n\nmodal-exposure-status-description-all =\n We search for exposures in all known data breaches.\n Your exposures will have one of the following statuses:\nmodal-exposure-indicator-title = Exposure statuses\nmodal-exposure-indicator-action-needed = Advanced or manual action is needed by you to complete an action.\nmodal-exposure-indicator-fixed = The exposure has been resolved and there’s no action for you to take.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"3e:T17be,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Breach Data Classes\n\naccount-balances = Account balances\naddress-book-contacts = Address book contacts\nage-groups = Age groups\nages = Ages\n# Refers to medical appointments.\nappointments = Appointments\napps-installed-on-devices = Apps installed on devices\nastrological-signs = Astrological signs\naudio-recordings = Audio recordings\nauth-tokens = Auth tokens\navatars = Avatars\nbank-account-numbers = Bank account numbers\nbeauty-ratings = Beauty ratings\nbiometric-data = Biometric data\n# This string is the shortened version of \"Biographies\", and\n# refers to biographical data about a user.\nbios = Bios\nbrowser-user-agent-details = Browser user agent details\nbrowsing-histories = Browsing histories\nbuying-preferences = Buying preferences\ncar-ownership-statuses = Car ownership statuses\ncareer-levels = Career levels\ncellular-network-names = Cellular network names\ncharitable-donations = Charitable donations\nchat-logs = Chat logs\ncitizenship-statuses = Citizenship statuses\nclothing-sizes = Clothing sizes\ncredit-card-cvv = Credit card CVV\ncredit-cards = Credit cards\ncredit-status-information = Credit status information\ncryptocurrency-wallet-hashes = Cryptocurrency wallet hashes\ncustomer-feedback = Customer feedback\ncustomer-interactions = Customer interactions\ndates-of-birth = Dates of birth\ndeceased-date = Deceased date\ndeceased-statuses = Deceased statuses\n# Instructions that you can set up in online shopping services to get your orders\n# delivered (e.g. deliver to a specific neighbor, entrance location, etc.).\ndelivery-instructions = Delivery instructions\ndevice-information = Device information\ndevice-serial-numbers = Device serial numbers\ndevice-usage-tracking-data = Device usage tracking data\ndrinking-habits = Drinking habits\ndriver-s-licenses = Driver’s licences\ndrug-habits = Drug habits\neating-habits = Eating habits\neducation-levels = Education levels\nemail-addresses = Email addresses\nemail-messages = Email messages\nemployers = Employers\nemployment-statuses = Employment statuses\nencrypted-keys = Encrypted keys\nethnicities = Ethnicities\nfamily-members-names = Family members’ names\nfamily-plans = Family plans\nfamily-structure = Family structure\nfinancial-investments = Financial investments\nfinancial-transactions = Financial transactions\nfitness-levels = Fitness levels\nflights-taken = Flights taken\ngenders = Genders\ngeographic-locations = Geographic locations\ngovernment-issued-ids = Government issued IDs\nhealth-insurance-information = Health insurance information\nhistorical-passwords = Historical passwords\nhiv-statuses = HIV statuses\nhome-loan-information = Home loan information\nhome-ownership-statuses = Home ownership statuses\nhomepage-urls = Homepage URLs\nimei-numbers = IMEI numbers\nimsi-numbers = IMSI numbers\nincome-levels = Income levels\ninstant-messenger-identities = Instant messenger identities\nip-addresses = IP addresses\njob-applications = Job applications\njob-titles = Job titles\n# This string refers to vehicle license plates.\nlicence-plates = Licence Plates\nliving-costs = Living costs\n# This string refers to financial loans.\nloan-information = Loan information\nlogin-histories = Login histories\nloyalty-program-details = Loyalty program details\nmac-addresses = MAC addresses\nmarital-statuses = Marital statuses\n# Mnemonic phrases are a group of words used to access the content of cryptocurrency wallets.\nmnemonic-phrases = Mnemonic phrases\nmothers-maiden-names = Mothers maiden names\nnames = Names\nnationalities = Nationalities\nnet-worths = Net worths\nnicknames = Nicknames\n# no data classes found\nnone-data-class = None\noccupations = Occupations\n# various data classes grouped together\nother-data-class = Other\nparenting-plans = Parenting plans\npartial-credit-card-data = Partial credit card data\npartial-dates-of-birth = Partial dates of birth\npartial-phone-numbers = Partial phone numbers\npassport-numbers = Passport numbers\npassword-hints = Password hints\npassword-strengths = Password strengths\npasswords = Passwords\npayment-histories = Payment histories\npayment-methods = Payment methods\npersonal-descriptions = Personal descriptions\npersonal-health-data = Personal health data\npersonal-interests = Personal interests\nphone-numbers = Phone numbers\nphotos = Photos\nphysical-addresses = Physical addresses\nphysical-attributes = Physical attributes\npins = PINs\nplaces-of-birth = Places of birth\npolitical-donations = Political donations\npolitical-views = Political views\nprivate-messages = Private messages\nprofessional-skills = Professional skills\nprofile-photos = Profile photos\npurchases = Purchases\npurchasing-habits = Purchasing habits\nraces = Races\nrecovery-email-addresses = Recovery email addresses\nrelationship-statuses = Relationship statuses\nreligions = Religions\nreward-program-balances = Reward program balances\nsalutations = Salutations\nschool-grades-class-levels = School grades (class levels)\nsecurity-questions-and-answers = Security questions and answers\nsexual-fetishes = Sexual fetishes\nsexual-orientations = Sexual orientations\nsmoking-habits = Smoking habits\nsms-messages = SMS messages\nsocial-connections = Social connections\nsocial-media-profiles = Social media profiles\nsocial-security-numbers = Social security numbers\nspoken-languages = Spoken languages\nspouses-names = Spouses names\nsupport-tickets = Support tickets\nsurvey-results = Survey results\ntaxation-records = Taxation records\ntelecommunications-carrier = Telecommunications carriers\ntime-zones = Time zones\ntravel-habits = Travel habits\nuser-statuses = User statuses\nuser-website-urls = User website URLs\nusernames = Usernames\nutility-bills = Utility bills\nvehicle-details = Vehicle details\nvehicle-identification-numbers-vins = Vehicle identification numbers (VINs)\nwebsite-activity = Website activity\nwork-habits = Work habits\nyears-of-birth = Years of birth\nyears-of-professional-experience = Years of professional experience\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"3f:Tfda,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n## Email headers\n\nemail-header-logo-alt = { -brand-mozilla-monitor }\nemail-header-button-sign-in = Sign in\n\n## Email footers\n\nemail-footer-support-heading = Questions about { -brand-mozilla-monitor }?\nemail-footer-support-content = Visit our \u003csupport-link\u003eSupport Centre\u003c/support-link\u003e for help\nemail-footer-trigger-transactional = You’re receiving this email as a subscriber of { -brand-mozilla-monitor }.\nemail-footer-source-hibp = Breach data provided by \u003chibp-link\u003e{ -brand-HIBP }\u003c/hibp-link\u003e\nemail-footer-logo-mozilla-alt = { -brand-mozilla }\nemail-footer-meta-privacy-notice = Privacy\n# Firefox Relay is a product name and should not be translated.\n-product-name-relay = Firefox Relay\n# Mozilla VPN is a product name and should not be translated.\n-product-name-vpn = Mozilla VPN\n# A link to legal information about mozilla products.\nlegal = Legal\n# Button text\nverify-email-cta = Verify Email\n# Headline of verification email\nemail-link-expires = This link expires in 24 hours\n\n##\n\n# Subject line of email\nemail-subject-found-breaches = { -product-name } found your info in these breaches\n# Subject line of email\nemail-subject-no-breaches = { -product-name } found no known breaches\n# Subject line of email\nemail-subject-verify = Verify your email for { -product-name }\nfxm-warns-you-no-breaches =\n { -product-name } warns you about data breaches involving your personal info. \n So far, no breaches were found. We’ll send you an alert if your email address appears in a new breach.\nemail-breach-alert-blurb =\n { -product-name } warns you about data breaches involving your personal info. \n We just received details about another company’s data breach.\n\n## 2022 email template. HTML tags should not be translated, e.g. `\u003ca\u003e`\n\n# Have I Been Pwned attribution\n# Variables:\n# $hibp-link-attr (String) - Link to Have I Been Pwned\nemail-2022-hibp-attribution = Breach data provided by \u003ca { $hibp-link-attr }\u003e{ -brand-HIBP }\u003c/a\u003e\n\n## Verification email\n\nemail-verify-heading = Safeguard your data, starting right now\nemail-verify-subhead = Verify your email to start protecting your data after a breach.\nemail-verify-simply-click = Simply click the link below to finish verifying your account.\n\n## Breach report\n\nemail-breach-summary = Here’s your data breach summary\n# Variables:\n# $email-address (string) - Email address, bolded\nemail-breach-detected = Search results for your { $email-address } account have detected that your email may have been exposed. We recommend you act now to resolve this breach.\n# Deprecated after the redesigned breach alert email is launched\n# Variables:\n# $email-address (string) - Email address\nemail-breach-detected-2 = Search results for your \u003cb\u003e{ $email-address }\u003c/b\u003e account have detected that your email may have been exposed. We recommend you act now to resolve this breach.\nemail-dashboard-cta = Go to Dashboard\n\n## Breach alert\n\n# Deprecated after the redesigned breach alert email is launched\nemail-spotted-new-breach = We’ve spotted a new data breach\n\n## Redesigned breach alert email\n\nemail-breach-alert-all-subject = New data breach detected\nemail-breach-alert-all-preview = We’ll guide you through the steps to resolve it.\nemail-breach-alert-all-hero-heading = You’ve been in a new data breach\nemail-breach-alert-all-hero-subheading = Don’t worry, we can help you resolve this exposure\nemail-breach-alert-all-lead = { -brand-mozilla-monitor } discovered the following data breach that includes your personal information:\nemail-breach-alert-all-source-title = Breach source:\nemail-breach-alert-all-data-points-title = Your exposed data:\nemail-breach-alert-all-next-steps-lead = We’ll guide you step-by-step on how to resolve this data breach.\nemail-breach-alert-all-next-steps-cta-label = Let’s get started\nemail-breach-alert-all-next-steps-button-dashboard = Go to Dashboard\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"40:T7af,# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nchevron-alt = Exposure details\nexposure-card-exposure-type = Exposure type\nexposure-card-date-found = Date of the exposure\n\n# Status Pill\n\nstatus-pill-action-needed = Action needed\nstatus-pill-progress = In progress\nstatus-pill-fixed = Fixed\n\n# Exposure Card\n\nexposure-card-family-members = Family members\nexposure-card-email = Email\nexposure-card-phone-number = Phone number\nexposure-card-address = Address\nexposure-card-credit-card = Credit Card\nexposure-card-password = Password\nexposure-card-ip-address = IP Address\nexposure-card-other = Other\n# Variables:\n# $data_breach_company is the company associated with the data breach.\n# $data_breach_date is the date of the data breach.\nexposure-card-description-data-breach-action-needed = Your information was exposed in the \u003cdata_breach_link\u003e{ $data_breach_company } data breach on { $data_breach_date }.\u003c/data_breach_link\u003e We’ll walk you through the steps to fix it.\nexposure-card-description-data-breach-fixed = You’ve taken the steps needed to fix \u003cdata_breach_link\u003ethis breach\u003c/data_breach_link\u003e. We’ll continually monitor for data breaches and alert you of any new exposures.\nexposure-card-your-exposed-info = Your exposed info:\nexposure-card-exposure-type-data-broker = Info for sale\nexposure-card-exposure-type-data-breach = Data breach\nexposure-card-cta = Fix all exposures\nexposure-card-label-company-logo = Company logo\nexposure-card-label-company = Company\n# Status of the exposure card, could be In Progress, Fixed or Action Needed\nexposure-card-label-status = Status\n# Variables:\n# $category_label is the data breach exposure type that was leaked. Eg. Email, IP Address.\n# $count is the number of times that the data type was leaked.\nexposure-card-label-and-count = { $category_label }: { $count }\n41:T34e1,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nfix-flow-nav-high-risk-data-breaches = High risk data breaches\nfix-flow-nav-leaked-passwords = Leaked passwords\nfix-flow-nav-security-recommendations = Security recommendations\n\nguided-resolution-flow-exit = Return to dashboard\nguided-resolution-flow-next-arrow = Go to next step\nguided-resolution-flow-step-navigation-label = Guided steps\n\n# Celebration screens\n\n\n## Shared CTA labels\n\nfix-flow-celebration-next-label = Let’s keep going\nfix-flow-celebration-next-recommendations-label = See recommendations\nfix-flow-celebration-next-dashboard-label = Go to your Dashboard\n\n## High-risk flow\n\nfix-flow-celebration-high-risk-title = You’ve fixed your high risk exposures!\nfix-flow-celebration-high-risk-description-in-progress = Doing this work can feel like a lot, but it’s important to do so to keep yourself safe. Keep up the good work.\nfix-flow-celebration-high-risk-description-done = Doing this work can feel like a lot, but it’s important to do so to keep yourself safe.\nfix-flow-celebration-high-risk-description-next-passwords = Now let’s fix your exposed passwords.\nfix-flow-celebration-high-risk-description-next-security-questions = Now let’s fix your exposed security questions.\nfix-flow-celebration-high-risk-description-next-security-recommendations = Next, we’ll give you personalized security recommendations based on what data of yours has been exposed.\nfix-flow-celebration-high-risk-description-next-dashboard = You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n## Leaked passwords and security questions flow\n\nfix-flow-celebration-leaked-passwords-title = Your passwords are now protected!\nfix-flow-celebration-security-questions-title = Your security questions are protected!\nfix-flow-celebration-leaked-passwords-description-next-security-questions = Now let’s review and update your exposed security questions.\nfix-flow-celebration-leaked-passwords-description-next-security-recommendations = Next, we’ll give you personalized security recommendations based on what data of yours has been exposed.\nfix-flow-celebration-leaked-passwords-description-next-dashboard = Nicely done! You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n## Security recommendations flow\n\nfix-flow-celebration-security-recommendations-title = You’ve completed all your recommendations!\nfix-flow-celebration-security-recommendations-description-next-dashboard = Nicely done! You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n# High Risk Data Breaches\n\nhigh-risk-breach-heading = Here’s what to do\nhigh-risk-breach-subheading = This requires access to your sensitive info, so you’ll need to manually fix it.\n# Variables\n# $num_breaches is the number of breaches where the high risk data was found.\nhigh-risk-breach-summary =\n { $num_breaches -\u003e\n [one] It appeared in { $num_breaches } data breach:\n *[other] It appeared in { $num_breaches } data breaches:\n }\n# Variables\n# $breach_name is the name of the breach where the high risk data was found.\n# $breach_date is the date when the breach occurred.\n# An example of this string is Twitter on 13/09/18.\nhigh-risk-breach-name-and-date = { $breach_name } \u003cbreach_date\u003eon { $breach_date }\u003c/breach_date\u003e\nhigh-risk-breach-mark-as-fixed = Mark as fixed\nhigh-risk-breach-skip = Skip for now\n# Variables:\n# $estimated_time is the estimated time it would take for a user to complete breach resolution steps. It not be singular, and the + is meant as \"or more\".\n# An example of this string is Your estimated time: 15+ minutes.\nhigh-risk-breach-estimated-time =\n { $estimated_time -\u003e\n *[other] Your estimated time: { $estimated_time }+ minutes\n }\n\n# Credit Card Breaches\n\nhigh-risk-breach-credit-card-title = Your credit card number was exposed\nhigh-risk-breach-credit-card-description = Anyone who gets it can make unauthorized purchases that you may be liable for. Act now to prevent financial harm.\nhigh-risk-breach-credit-card-step-one = If you still have this card, contact the issuer to report it stolen.\nhigh-risk-breach-credit-card-step-two = Request a new card with a new number.\nhigh-risk-breach-credit-card-step-three = Check your accounts for unauthorized charges.\n\n# Bank Account Breaches\n\nhigh-risk-breach-bank-account-title = Your bank account was exposed\nhigh-risk-breach-bank-account-description = Taking action as soon as possible could give you more legal protections to help you recover any losses.\nhigh-risk-breach-bank-account-step-one = Notify your bank immediately that your account number has been compromised.\nhigh-risk-breach-bank-account-step-two = Change your account number.\nhigh-risk-breach-bank-account-step-three = Check your accounts for unauthorized charges.\n\n# Social Security Number Breaches\n\nhigh-risk-breach-social-security-title = Your social security number was exposed\nhigh-risk-breach-social-security-description = Scammers can open up new loans or credit cards with your social security number. Act fast to prevent financial harm.\nhigh-risk-breach-social-security-step-one = Protect yourself by \u003clink_to_info\u003esetting up a fraud alert or freezing your credit.\u003c/link_to_info\u003e\nhigh-risk-breach-social-security-step-two = \u003clink_to_info\u003eCheck your credit report\u003c/link_to_info\u003e for unrecognized accounts.\n\n# Social Security Number Modal\n\nssn-modal-title = About fraud alerts and credit freezes\nssn-modal-description-fraud-part-one = \u003cb\u003eA fraud alert\u003c/b\u003e requires businesses to verify your identity before it issues new credit in your name. It’s free, lasts one year, and won’t negatively affect your credit score.\nssn-modal-description-fraud-part-two = To set one up, contact any one of the three credit bureaus. You don’t have to contact all three.\nssn-modal-description-freeze-credit-part-one = \u003cb\u003eFreezing your credit\u003c/b\u003e prevents anyone from opening a new account in your name. It’s free and won’t negatively affect your credit score, but you’ll need to unfreeze it before opening any new accounts.\nssn-modal-description-freeze-credit-part-two = To freeze your credit, contact each of the three credit bureaus — \u003cequifax_link\u003eEquifax\u003c/equifax_link\u003e, \u003cexperian_link\u003eExperian\u003c/experian_link\u003e, and \u003ctransunion_link\u003eTransUnion\u003c/transunion_link\u003e.\nssn-modal-learn-more = Learn more about fraud alerts and credit freezes\nssn-modal-ok = OK\n\n# PIN Breaches\n\nhigh-risk-breach-pin-title = Your PIN was exposed\nhigh-risk-breach-pin-description = Taking action as soon as possible could give you more legal protections to help you recover any losses.\nhigh-risk-breach-pin-step-one = Notify your bank immediately that your PIN has been compromised.\nhigh-risk-breach-pin-step-two = Change your PIN anywhere you’ve used the same one.\nhigh-risk-breach-pin-step-three = Check your accounts for unauthorized charges.\n\n# No high risk breaches found\n\nhigh-risk-breach-none-title = Great news, we didn’t find any high risk data breaches\n# Variables\n# $email_list is list of emails that the user is monitoring for breaches. E.g. john@yahoo.com, ali@gmail.com, sam@hotmail.com\nhigh-risk-breach-none-description = We detect data breaches based on your email address, and we didn’t find any high risk data breaches for { $email_list }.\nhigh-risk-breach-none-sub-description-part-one = High risk data breaches include:\nhigh-risk-breach-none-sub-description-ssn = Social security number\nhigh-risk-breach-none-sub-description-bank-account = Bank account info\nhigh-risk-breach-none-sub-description-cc-number = Credit card numbers\nhigh-risk-breach-none-sub-description-pin = PINs\nhigh-risk-breach-none-continue = Continue\n\n# Security recommendations\n\nsecurity-recommendation-steps-label = Security recommendations\nsecurity-recommendation-steps-title = Here’s our advice:\nsecurity-recommendation-steps-cta-label = Got it!\n\n# Phone security recommendation\n\nsecurity-recommendation-phone-title = Protect your phone number\n# $num_breaches is the number of breaches where the phone number was found.\nsecurity-recommendation-phone-summary =\n { $num_breaches -\u003e\n [one] Your phone number was exposed in { $num_breaches } data breach:\n *[other] Your phone number was exposed in { $num_breaches } data breaches:\n }\nsecurity-recommendation-phone-description = Unfortunately you can’t take it back. But there are steps you can take to make sure you stay safe.\nsecurity-recommendation-phone-step-one = Block spam numbers to prevent more junk calls\nsecurity-recommendation-phone-step-two = Don’t click on links in texts from unknown senders; if it appears to be from a trusted source, call directly to confirm\n\n# Email security recommendation\n\nsecurity-recommendation-email-title = Protect your email address\n# $num_breaches is the number of breaches where the email address was found.\nsecurity-recommendation-email-summary =\n { $num_breaches -\u003e\n [one] Your email address was exposed in { $num_breaches } data breach:\n *[other] Your email address was exposed in { $num_breaches } data breaches:\n }\nsecurity-recommendation-email-description = Unfortunately you can’t fix this. But there are steps you can take to protect yourself.\nsecurity-recommendation-email-step-one = Don’t click on links in emails from unknown senders; if it appears to be from trusted source, call directly to confirm\nsecurity-recommendation-email-step-two = Be aware of \u003clink_to_info\u003ephishing scams\u003c/link_to_info\u003e\nsecurity-recommendation-email-step-three = Mark suspicious emails as spam and block the sender\nsecurity-recommendation-email-step-four = Use \u003clink_to_info\u003e{ -brand-relay } email masks\u003c/link_to_info\u003e to protect your email in the future\n\n# IP security recommendation\n\nsecurity-recommendation-ip-title = Use a VPN for added privacy\n# $num_breaches is the number of breaches where the IP address was found.\nsecurity-recommendation-ip-summary =\n { $num_breaches -\u003e\n [one] Your IP address was exposed in { $num_breaches } data breach:\n *[other] Your IP address was exposed in { $num_breaches } data breaches:\n }\nsecurity-recommendation-ip-description = Your IP address pinpoints your location and internet service provider. Hackers could use this information to find your location or try to connect to your devices.\nsecurity-recommendation-ip-step-one = Use a VPN (such as \u003clink_to_info\u003e{ -brand-mozilla-vpn }\u003c/link_to_info\u003e) to hide your real IP address and use the internet privately.\n\n# Leaked Passwords\n\n# Variables\n# $breach_name is the name of the breach where the leaked password was found.\nleaked-passwords-title = Your { $breach_name } password was exposed\n# Variables\n# $breach_date is the date when the breach occurred.\nleaked-passwords-summary = It appeared in a data breach on { $breach_date }.\nleaked-passwords-description = Scammers can access your account and will likely try to use it on other accounts to see if you’ve used the same password. Change it anywhere you’ve used it to protect yourself.\nleaked-passwords-steps-title = Here’s what to do\nleaked-passwords-steps-subtitle = This requires access to your account, so you’ll need to manually fix it.\n# Variables\n# $breach_name is the name of the breach where the leaked password was found.\n# $emails_affected are the emails associated with the breach.\nleaked-passwords-step-one = Change your password for \u003cb\u003e{ $emails_affected }\u003c/b\u003e on \u003clink_to_breach_site\u003e{ $breach_name }\u003c/link_to_breach_site\u003e.\nleaked-passwords-step-two = Change it anywhere else you’ve used it.\nleaked-passwords-mark-as-fixed = Mark as fixed\nleaked-passwords-skip = Skip for now\n# Variables\n# $estimated_time is the amount of time it would take for a user to manually resolve a leaked password breach. It will always be a number greater than 1.\n# \"Est.\" is shortform for \"Estimated\".\n# \"mins\" is shortform for \"minutes\".\nleaked-passwords-estimated-time =\n { $estimated_time -\u003e\n *[other] Est. time to complete: { $estimated_time } mins per site\n }\n\n# Leaked Security Questions\n\nleaked-security-questions-title = Your security questions were exposed\n# Variables\n# $breach_name is the name of the breach where the leaked security questions were found.\n# $breach_date is the date when the breach occurred.\n# An example of this string is Twitter on 13/09/18.\nleaked-security-questions-summary = They appeared in a data breach on { $breach_name } on { $breach_date }.\nleaked-security-questions-description = Scammers can use these to access your accounts, and any other site where you’ve used the same security questions. Update them now to protect your accounts.\nleaked-security-questions-steps-title = Here’s what to do\nleaked-security-questions-steps-subtitle = This requires access to your account, so you’ll need to manually fix it.\n# Variables\n# $breach_name is the name of the breach where the security questions were found.\n# $email_affected is the email associated with the breach.\nleaked-security-questions-step-one = Update your security questions for \u003cb\u003e{ $email_affected }\u003c/b\u003e on \u003clink_to_breach_site\u003e{ $breach_name }\u003c/link_to_breach_site\u003e.\nleaked-security-questions-step-two = Update them on any other site where you used the same security questions. Be sure to use different security questions for every account.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"42:T11a7,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\npublic-nav-name = { -brand-mozilla-monitor }\nlanding-all-hero-title = Find where your private info is exposed — and take it back\nlanding-all-hero-lead = We scan data breaches to see if your data has been leaked and give you steps to fix it.\nlanding-all-hero-emailform-input-placeholder = yourname@example.com\nlanding-all-hero-emailform-input-label = Enter your email address to check for data breach exposures.\nlanding-all-hero-emailform-submit-label = Get free scan\nlanding-all-hero-emailform-submit-sign-up-label = Sign up to get free scan\n# This is a label underneath a big number \"14\" - it's an image that demos Monitor.\nlanding-all-hero-image-chart-label = exposures\n\n# Value Proposition\n\nlanding-all-value-prop-fix-exposures = We’ll help you fix your exposures\nlanding-all-value-prop-fix-exposures-description = Our mission is to put control of your personal data back in your hands. We’ll help you resolve data breaches and keep your info private — and we’ll \u003cprivacy_link\u003erespect your privacy\u003c/privacy_link\u003e in the process.\nlanding-all-value-prop-info-at-risk = What info could be at risk?\nlanding-all-value-prop-info-at-risk-description = Data leaks are unfortunately part of our digital lives. Your passwords, contact details, financial information, and other personal info can be exposed, putting you at risk of identity theft.\n\n# Quote\n\nlanding-all-quote = \u003cdata_breaches\u003eData breaches\u003c/data_breaches\u003e happen every 11 minutes, exposing your private information — but don’t worry, we can help.\n\n# Non-US FAQ\n\nlanding-all-faq-title = Frequently asked questions\n# FAQ is an acronym for Frequently Asked Questions\nlanding-all-faq-see-all = See all FAQs\nlanding-all-data-breach-definition-qn = What exactly is a data breach?\nlanding-all-data-breach-definition-ans = A data breach happens when personal or private information gets exposed, stolen or copied without permission. These security incidents can result from cyber attacks on websites, apps or any database where people’s personal information resides. A data breach can also happen accidentally, like if someone’s login credentials get posted publicly.\nlanding-all-data-breach-next-steps-qn = I just found out I’m in a data breach. What do I do next?\nlanding-all-data-breach-next-steps-ans = Visit { -brand-mozilla-monitor } to learn what to do after a data breach and get guided steps to resolve exposures of your personal info. Hackers rely on people reusing passwords, so it’s important to create strong, unique passwords for all your accounts. Keep your passwords in a safe place that only you have access to; this could be the same place where you store important documents or a password manager.\nlanding-all-data-breach-info-qn = What information gets exposed in data breaches?\nlanding-all-data-breach-info-ans = Not all breaches expose all the same info. It just depends on what hackers can access. Many data breaches expose email addresses and passwords. Others expose more sensitive information such as credit card numbers, PIN numbers, and social security numbers.\nlanding-all-close-faq-alt = Close\n\n# Social proof\n\n# Variables\n# $num_users is the number of users in the millions.\nlanding-all-social-proof-title =\n { $num_users -\u003e\n *[other] Trusted by { $num_users } million people worldwide\n }\n# Variables\n# $num_countries is the number of countries available.\nlanding-all-social-proof-description =\n { $num_countries -\u003e\n *[other] Since 2018, we’ve helped people in { $num_countries } countries protect their data when it has been exposed.\n }\nlanding-all-social-proof-press = As seen in\n\n# Here's How We Help\n\nlanding-all-help-protect-you = Here’s how we help protect you\nlanding-all-help-protect-you-description = We believe in your right to privacy, so data breach monitoring protection is always free.\nlanding-all-help-protect-you-feature-one = We’ll search for you in all known data breaches\nlanding-all-help-protect-you-feature-two = We’ll guide you through the steps to resolve each breach\nlanding-all-help-protect-you-feature-three = We’ll continuously monitor and send you alerts for any new breaches\nlanding-all-help-protect-you-cta = Sign up for breach alerts\nlanding-all-get-started = Scan your email to get started\nlanding-all-take-back-data = Take back control of your data\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"43:T174f,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"\n# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Recommendation subhead\nrec-ssn-subhead = Review your credit reports\n# Link title\nrec-ssn-cta = Request credit reports\nrec-ssn =\n You get three free credit reports a year by law. \n Requesting and reviewing them does not affect your credit. \n Look for accounts, loans, or credit cards you don’t recognize.\n\n# Recommendation subhead\nrec-pw-1-subhead = Change your password\n# Link title\nrec-pw-1-cta = Change password for this site\nrec-pw-1-2 =\n Make this password unique and different from any others you use.\n A good strategy to follow is to combine two or more unrelated\n words to create an entire passphrase, and include numbers and symbols.\n\n# Recommendation subhead\nrec-pw-2-subhead = Update other logins using the same password\n# Link title\nrec-pw-2-cta-fx = View logins in { -brand-name }\nrec-pw-2 =\n Reusing passwords turns a single data breach into many. Now that this \n password is out there, hackers could use it to get in to other accounts.\n\n# Recommendation subhead\nrec-pw-3-subhead = Use a password manager to take your passwords everywhere\n# Link title\nrec-pw-3-cta = Get { -brand-lockwise }\nrec-pw-3-fx =\n Use { -brand-lockwise } to securely access the passwords you’ve saved in \n { -brand-name } from anywhere — even outside of the browser.\nrec-pw-3-non-fx =\n Use { -brand-lockwise } to keep track of all your different \n passwords and access them securely from your phone or tablet.\n\n# Recommendation subhead\nrec-pw-4-subhead = Set up two-factor authentication (2FA)\n# Link title\nrec-pw-4-cta = See sites that offer 2FA\nrec-pw-4 =\n Many websites offer 2FA as an extra security measure. This requires \n another piece of information to log in to your account, such as a \n one-time code you receive via text.\n\n# Recommendation subhead\nrec-bank-acc-subhead = Monitor your bank statements\nrec-bank-acc =\n Check your bank statements for suspicious activity or unusual \n charges. Notify your bank if you see anything you don’t recognize\n\n# Recommendation subhead\nrec-cc-subhead = Monitor your credit card statements\nrec-cc =\n Look out for strange charges on your credit card. You may want \n to request a new card with a new number from your credit card issuer.\n\n# Recommendation subhead\nrec-email-mask-subhead = Use an email mask\nrec-email-cta = Try { -brand-relay }\nrec-email = Giving out your real email address makes it easier for hackers or trackers to find your passwords or target you online. A service like { -brand-relay } hides your real email address while forwarding emails to your real inbox.\n\n# Recommendation subhead\nrec-ip-subhead-2 = Use a VPN to mask your IP address\n\n# Recommendation subhead\nrec-moz-vpn-cta = Try { -brand-mozilla-vpn }\nrec-moz-vpn-update-2 =\n Your Internet Protocol address (IP address) pinpoints your location\n and internet service provider. A service like { -brand-mozilla-vpn }\n masks your IP address to hide your location.\n\nrec-hist-pw-subhead = Avoid reusing passwords\n# Link title\nrec-hist-pw-cta-fx = View logins in { -brand-name }\nrec-hist-pw =\n Use unique, strong passwords for every account. If one password gets \n exposed in a data breach, you’ll only need to update that one login.\n\n# Recommendation subhead\nrec-sec-qa-subhead = Create unique answers for security questions\nrec-sec-qa =\n Many websites ask the same questions. If one answer gets exposed, the \n information is out. Create long, random answers and store them somewhere safe.\n\n# Recommendation subhead\nrec-phone-num-subhead = Avoid sharing your phone number\nrec-phone-num =\n Try to avoid giving out your phone number when signing up for new \n accounts or services. If a phone number isn’t required, don’t enter it.\n\n# Recommendation subhead\nrec-dob-subhead = Avoid using personal info in PINs\nrec-dob =\n Because your date of birth is easy to find in public records, \n it’s best to avoid using it in passwords and PINs. People who \n know your birthday could also very easily guess your PIN.\n\n# Recommendation subhead\nrec-pins-subhead = Strengthen the security of your PINs\nrec-pins =\n A strong PIN does not contain personal info, such as your date of birth \n or address. It should be a number only you know and can’t be easily guessed.\n\n# Recommendation subhead\nrec-address-subhead = Avoid using addresses in passwords\nrec-address =\n Using addresses or the street where you grew up weaken your \n passwords. Since it’s easy to find this info publicly, it makes these \n passwords easy to guess.\n\n# Recommendation subhead\nrec-gen-1-subhead = Use unique, strong passwords for every account\n# Link title\nrec-gen-1-cta = How to create strong passwords\nrec-gen-1 =\n Password reuse puts all your accounts at risk. This means that if \n one password gets exposed, hackers have the keys to many accounts.\n\n# Recommendation subhead\nrec-gen-2-subhead = Store passwords in a safe place\n# Link title\nrec-gen-2-cta = Myths about password managers\nrec-gen-2 =\n Put your login details in a secure place only you can access, such as a \n password manager. This also makes it easy to keep track of all your different passwords.\n\n# Recommendation subhead\nrec-gen-3-subhead = Be cautious about giving out personal information\n# Link title\nrec-gen-3-cta = Read more security tips\nrec-gen-3 =\n Don’t hand out personal data if you don’t have to. If you are asked to \n enter or give out your email address, postal code, or phone number, you can say no.\n\n# Recommendation subhead\nrec-gen-4-subhead = Update software and apps regularly\nrec-gen-4 =\n Updating your smartphone apps, browsers, and operating systems makes your \n devices more secure. These updates fix bugs, software vulnerabilities, and security problems.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"44:Tde4,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Settings page\n\nsettings-page-title = { -product-short-name } Settings\n\n## Breach alert preferences\n\nsettings-alert-email-preferences-title = Email preferences\nsettings-alert-email-preferences-subtitle = Tell us which emails you’d like to receive.\nsettings-alert-preferences-allow-breach-alerts-title = Instant breach alerts\nsettings-alert-preferences-allow-breach-alerts-subtitle = These alerts are sent immediately once a data breach is detected\nsettings-alert-preferences-option-one = Send breach alerts to the affected email address\nsettings-alert-preferences-option-two = Send all breach alerts to the primary email address\nsettings-alert-preferences-allow-monthly-monitor-report-title = Monthly { -brand-monitor } report\nsettings-alert-preferences-allow-monthly-monitor-report-subtitle = A monthly update of new exposures, what’s been fixed, and what needs your attention.\n\n## Monitored email addresses\n\n# Variables:\n# $email (string) - Email address\nsettings-email-list-title = Monitored email addresses\n# Variables:\n# $limit (number) - Number of email addresses included in the plan\nsettings-email-limit-info =\n { $limit -\u003e\n [one] Your account includes monitoring of up to { $limit } email.\n *[other] Your account includes monitoring of up to { $limit } emails.\n }\nsettings-email-verification-callout = Email verification required\nsettings-resend-email-verification-link = Resend verification email\nsettings-add-email-button = Add email address\nsettings-remove-email-button-label = Remove\n# Variables:\n# $emailAddress (string) - The email address to remove, e.g. `billnye@example.com`\nsettings-remove-email-button-tooltip = Stop monitoring { $emailAddress }\n# This string is shown beneath each of the user’s email addresses to indicate\n# how many known breaches that email address was found in.\n# Variables:\n# $breachCount (number) - Number of breaches\nsettings-email-number-of-breaches-info =\n { $breachCount -\u003e\n [one] Appears in { $breachCount } known breach.\n *[other] Appears in { $breachCount } known breaches.\n }\n\n## Deactivate account\n\nsettings-deactivate-account-title = Deactivate account\nsettings-deactivate-account-info-2 = You can deactivate { -product-short-name } by deleting your { -brand-mozilla-account }.\nsettings-fxa-link-label-3 = Go to { -brand-mozilla-account } settings\n\n## Delete Monitor account\n\nsettings-delete-monitor-free-account-title = Delete { -brand-monitor } account\nsettings-delete-monitor-free-account-description = This will permanently delete your { -brand-monitor } account and turn off all notifications.\nsettings-delete-monitor-free-account-cta-label = Delete account\nsettings-delete-monitor-free-account-dialog-title = Your { -brand-monitor } account will be permanently deleted\nsettings-delete-monitor-free-account-dialog-lead-v2 = All of your { -brand-monitor } account information will be deleted and we’ll no longer monitor for new data breaches. This will not delete your { -brand-mozilla-account }.\nsettings-delete-monitor-free-account-dialog-cta-label = Delete account\nsettings-delete-monitor-free-account-dialog-cancel-button-label = Never mind, take me back\nsettings-delete-monitor-account-confirmation-toast-label-2 = Your { -brand-monitor } account is now deleted.\nsettings-delete-monitor-account-confirmation-toast-dismiss-label = Dismiss\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"45:T5b4,# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n### Dialog window that allows a user to add a new email address to be monitored\n\nadd-email-add-another-heading = Add another email address\n\n# $total is the number of emails a user is allowed to add\nadd-email-your-account-includes =\n { $total -\u003e\n [one] Your account includes monitoring of { $total } email address. Add a new email address to see if it’s been involved in a breach.\n *[other] Your account includes monitoring of up to { $total } email addresses. Add a new email address to see if it’s been involved in a breach.\n }\n\nadd-email-address-input-label = Email address\nadd-email-send-verification-button = Send verification link\n\n# $email is the newly added email address. $settings-href is the URL for the Settings page. HTML tags should not be translated, e.g. `\u003ca\u003e`\n# This string will be deprecated when the new Plus plan is live.\nadd-email-verify-the-link = Verify the link sent to { $email } to add it to { -brand-fx-monitor }. Manage all email addresses in \u003ca { $settings-href }\u003eSettings\u003c/a\u003e.\n# Variables:\n# $email (string) - An email address submitted by the user for monitoring, e.g. `example@example.com`\nadd-email-verify-the-link-2 = Verify the link sent to \u003cb\u003e{ $email }\u003c/b\u003e to add it to { -brand-mozilla-monitor }.\n46:T28a1,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Strings for the main app\n\n\n## The following messages are brand and should be kept entirely in English\n## unless otherwise indicated.\n\n-product-name = Mozilla Monitor\n-product-short-name = Monitor\n-brand-name = Firefox\n-brand-HIBP = Have I Been Pwned\n-brand-fxa = Firefox Account\n-brand-pocket = Pocket\n-brand-lockwise = Firefox Lockwise\n-brand-firefox = Firefox\n-brand-monitor = Monitor\n-brand-fx-monitor = Mozilla Monitor\n-brand-mozilla = Mozilla\n-brand-premium = Premium\n-brand-monitor-premium = Monitor Premium\n-brand-mozilla-foundation = Mozilla Foundation\n-brand-github = GitHub\n-brand-mozilla-vpn = Mozilla VPN\n-brand-relay = Firefox Relay\n-brand-mozilla-monitor = Mozilla Monitor\n-brand-monitor-plus = Monitor Plus\n\n##\n\nerror-not-subscribed = This email address is not subscribed to { -product-name }.\nerror-hibp-throttled = Too many connections to { -brand-HIBP }.\nerror-hibp-connect = Error connecting to { -brand-HIBP }.\nuser-add-invalid-email = Invalid Email\nuser-add-too-many-emails = You are monitoring the maximum number of email addresses.\nuser-add-duplicate-email = This email has already been added to { -product-name }.\nuser-add-verification-email-just-sent = Another verification email can’t be sent this quickly. Please try again later.\nuser-add-unknown-error = Something went wrong adding another email address. Please try again later.\nuser-delete-unknown-error = Something went wrong removing an email address. Please try again later.\nuser-verify-token-error = Verification token is required.\n# compromised-data = the kind of user data exposed to hackers in data breach.\ncompromised-data = Compromised data:\n# Breach data provided by Have I Been Pwned.\n# Variables:\n# $hibp-link (String) - Link to Have I Been Pwned\nhibp-attribution = Breach data provided by { $hibp-link }\nshow-all = Show all\nsign-out = Sign Out\n# Manage Firefox Account, link to page where account holders can change their account settings.\nmanage-fxa = Manage { -brand-fxa }\n# Link title\npreferences = Preferences\n# Link title\nhome = Home\n# Link title\nsecurity-tips = Security Tips\n# Link title\nmore-about-this-breach = More about this breach\nmonitor-several-emails = Monitor several emails\nwebsite-breach = Web Site Breach\nsensitive-breach = Sensitive Web Site Breach\ndata-aggregator-breach = Data Aggregator Breach\nwhat-data = What data was compromised:\nsensitive-sites = How does { -product-name } treat sensitive sites?\nsensitive-sites-copy =\n { -product-name } only reveals accounts associated with these \n types of breaches after an email address has been verified. This means you’re the \n only person who can see if your information was in this breach (unless someone \n else has access to your email account).\ndelayed-reporting-headline = Why did it take so long to report this breach?\ndelayed-reporting-copy =\n It can sometimes take months or years for credentials exposed \n in a data breach to appear on the dark web. Breaches get added to our database as \n soon as they have been discovered and verified.\nfxm-warns-you =\n { -product-name } warns you if your email address has been exposed \n in an online data breach. See if your information has been exposed, learn how \n to better protect your online accounts, and get alerted if your email address \n appears in a new breach.\nwhat-is-data-agg = What is a data aggregator?\nwhat-is-data-agg-blurb =\n Data aggregators, or data brokers, collect information from public \n records and buy it from other companies. They compile this data to sell it to companies \n for marketing purposes. Victims of these breaches are less likely to experience financial \n fraud, but hackers could use this data to impersonate or profile them.\navoid-personal-info = Avoid using personal info in passwords\nsend-verification = Send Verification Link\n# This string is a header on the user preferences page and\n# appears above a check-box list of user options which allow\n# the user to choose whether or not they want to receive breach\n# alerts for all of their monitored email addresses to a single\n# email address.\nbreach-summary = Breach Summary\n\n##\n\nbreach-alert-subject = { -product-name } found your email in a new data breach.\n# This string is displayed under a large numeral that indicates the total number\n# of data breaches that exposed a user’s password. Don’t add $passwords to\n# your localization, because it would result in the number showing twice.\npasswords-exposed =\n { $passwords -\u003e\n [one] Password exposed across all breaches\n *[other] Passwords exposed across all breaches\n }\n# This string is displayed under a large numeral that indicates the total number\n# of data breaches that have exposed the user’s information. Don’t add $breaches to\n# your localization, because it would result in the number showing twice.\nknown-data-breaches-exposed =\n { $breaches -\u003e\n [one] Known data breach has exposed your info\n *[other] Known data breaches have exposed your info\n }\nwhat-is-a-website-breach = What is a web site breach?\nwebsite-breach-blurb = A web site data breach happens when cyber criminals steal, copy, or expose personal information from online accounts. It’s usually a result of hackers finding a weak spot in the web site’s security. Breaches can also happen when account information gets leaked by accident.\n# This is a section headline on the breach detail page that appears above\n# a short summary about the breach.\nbreach-overview-title = Overview\n# This is a standardized breach overview blurb that appears on all breach detail pages.\n# $breachTitle is the name of the breached company or website.\n# $breachDate and $addedDate are calendar dates.\nbreach-overview-new = On { $breachDate }, { $breachTitle } was breached. Once the breach was discovered and verified, it was added to our database on { $addedDate }.\n# Title that appears in the mobile menu bar and opens the mobile menu when clicked.\nmenu = Menu\n# This is part of a confirmation message that appears after a user has submitted\n# the form to add an additional email to Firefox Monitor.\n# Variables:\n# $userEmail (String) - User email address\nverify-the-link = Verify the link sent to { $userEmail } to add it to { -product-name }.\n\n## These are part of a confirmation page that appears after a user has verified\n## an additional email to Firefox Monitor.\n\n# This string is a label for the calendar date a breach is added to the database\n# and is followed by that date.\nbreach-added-label = Breach added:\n# Section headline\nrec-section-headline = What to do for this breach\nrec-section-subhead = We recommend you take these steps to keep your personal info safe and protect your digital identity.\n# Section headline\nrec-section-headline-no-pw = What to do to protect your personal info\nrec-section-subhead-no-pw = Though passwords weren’t exposed in this breach, there are still steps you can take to better protect your personal info.\n\n##\n\n# A status indicator that appears in the top right corner of new breach cards\nnew-breach = New\n\n##\n\n# “account” can be localized, “Mozilla” must be treated as a brand,\n# and kept in English.\n-brand-mozilla-account = Mozilla account\nopen-in-new-tab-alt = Open link in a new tab\n\n## Search Engine Optimization\n\nmeta-desc-2 = Find out if you’ve been part of a data breach with { -brand-fx-monitor }. We’ll help you understand what to do next and continuously monitor for any new breaches.\n\n## Header\n\n# Deprecated\nbrand-fx-monitor = { -brand-fx-monitor }\nsign-in = Sign In\nbrand-mozilla-monitor = { -brand-fx-monitor }\n\n## Site navigation\n\nmobile-menu-label = Main menu\nmain-nav-button-collapse-label = Collapse menu\nmain-nav-button-collapse-tooltip = Collapse menu\nmain-nav-button-expand-label = Expand menu\nmain-nav-button-expand-tooltip = Expand menu\nmain-nav-label = Navigation\nmain-nav-link-home-label = Home\nmain-nav-link-dashboard-label = Dashboard\nmain-nav-link-settings-label = Settings\nmain-nav-link-faq-label = FAQs\nmain-nav-link-faq-tooltip = Frequently asked questions\n\n## User menu\n\nuser-menu-trigger-label = Open user menu\nuser-menu-trigger-tooltip = Profile\nuser-menu-manage-fxa-label = Manage your { -brand-mozilla-account }\nuser-menu-settings-label = Settings\nuser-menu-settings-tooltip = Configure { -brand-mozilla-monitor }\nuser-menu-help-label = Help and support\nuser-menu-help-tooltip = Get help using { -brand-mozilla-monitor }\nuser-menu-signout-label = Sign out\nuser-menu-signout-tooltip = Sign out of { -brand-mozilla-monitor }\n\n## Footer\n\nmozilla = { -brand-mozilla }\nterms-of-service = Terms of Service\nprivacy-notice = Privacy Notice\ngithub = { -brand-github }\nfooter-nav-recent-breaches = Recent Data Breaches\nfooter-external-link-faq-label = FAQs\nfooter-external-link-faq-tooltip = Frequently asked questions\n\n## Error page\n\n# Variables:\n# $errorCode (number) - \"404\"\nerror-page-error-404-title = { $errorCode } Page not found\nerror-page-error-404-copy = We’re sorry, the page you’re looking for no longer exists.\nerror-page-error-404-cta-button = Go back\n# Variables:\n# $errorCode (number) - the status code of the error, e.g. 403\nerror-page-error-other-title = { $errorCode } Something went wrong\n\n## Breach overview page\n\nall-breaches-headline-3 = Data Breach Database\nall-breaches-lead = We monitor all known data breaches to find out if your personal information was compromised. Here’s a complete list of all of the breaches that have been reported since 2007.\nsearch-breaches = Search Breaches\n# the kind of user data exposed to hackers in data breach.\nexposed-data = Exposed data:\n\n## Public breach detail page\n\nfind-out-if-2 = Find out if you were involved in this breach\nfind-out-if-description = We’ll help you quickly see if your email address was exposed in this breach, and understand what to do next.\nbreach-detail-cta-signup = Check for breaches\n\n## Firefox Monitor -\u003e Mozilla Monitor rebrand banner\n\nbanner-monitor-rebrand-text = \u003cb\u003e{ -brand-mozilla-monitor }\u003c/b\u003e: New name, look and even more ways to \u003cb\u003ereclaim your privacy\u003c/b\u003e.\nbanner-monitor-rebrand-dismiss-button-label = OK\nbanner-monitor-rebrand-dismiss-button-tooltip = Dismiss\nloading-accessibility = Loading\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"47:T1f47,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nbreach-all-meta-page-title = Data Breach Database — { -brand-fx-monitor }\nbreach-all-meta-social-title = All Breaches Detected by { -brand-fx-monitor }\nbreach-all-meta-social-description = Browse the complete list of known breaches detected by { -brand-fx-monitor }, then find out if your information was exposed.\n# Variables:\n# $company (String) - Name of the company that was breached, e.g. \"PHP Freaks\"\nbreach-detail-meta-page-title = { $company } Data Breach – { -brand-fx-monitor }\n# Variables:\n# $company (String) - Name of the company that was breached, e.g. \"PHP Freaks\"\nbreach-detail-meta-social-title = Were you affected by the { $company } Data Breach?\nbreach-detail-meta-social-description = Use { -brand-fx-monitor } to find out if your personal information was exposed in this breach, and understand what to do next.\n\n## Links that we might refer to when prompting the user to make changes after a breach\n\nbreach-checklist-link-firefox-relay = { -brand-relay }\nbreach-checklist-link-password-manager = { -brand-firefox } Password Manager\nbreach-checklist-link-mozilla-vpn = { -brand-mozilla-vpn }\n\n## Prompts the user for changes when there is a breach detected of password\n\nbreach-checklist-pw-header-text = Update your passwords and enable two-factor authentication (2FA).\n# The `breached-company-link` tags will be replaced with link tags or stripped if no link is available.\n# Variables:\n# $passwordManagerLink (string) - a link to the password manager documentation, with { -breach-checklist-link-password-manager } as the label\nbreach-checklist-pw-body-text = In most cases, we’d recommend that you change your password on the company’s web site. But \u003cb\u003etheir web site may be down or contain malicious content\u003c/b\u003e, so use caution if you \u003cbreached-company-link\u003evisit the site\u003c/breached-company-link\u003e. For added protection, make sure you’re using unique passwords for all accounts, so that any leaked passwords can’t be used to access other accounts. { $passwordManagerLink } can help you securely keep track of all of your passwords.\n\n## Prompts the user for changes when there is a breach detected of email\n\n# Variables:\n# $firefoxRelayLink (string) - a link to Firefox Relay, with { -breach-checklist-link-firefox-relay } as the label\nbreach-checklist-email-header-2 = Protect your email with an email masking service like { $firefoxRelayLink }.\nbreach-checklist-email-body = This can hide your true email address while forwarding emails to your real inbox.\n\n## Prompts the user for changes when there is a breach detected of social security number\n\n# Credit reports list your bill payment history, loans, current debt, and other financial information.\n# They show where you work and live and whether you've been sued, arrested, or filed for bankruptcy.\nbreach-checklist-ssn-header = Monitor your credit report for accounts, loans, or credit cards you don’t recognise.\n# A security freeze prevents prospective creditors from accessing your credit file.\n# Creditors typically won't offer you credit if they can't access your credit reporting file,\n# so a security freeze, also called a credit freeze, prevents you or others from opening accounts in your name.\n# This will only be shown to users in the US.\n# Variables:\n# $equifaxLink (string) - a link to the Equifax website\n# $experianLink (string) - a link to the Experian website\n# $transUnionLink (string) - a link to the TransUnion website\nbreach-checklist-ssn-body-2 = You can also consider freezing your credit on { $equifaxLink }, { $experianLink } and { $transUnionLink } to stop scammers from opening new accounts in your name. It’s free and won’t affect your credit score.\n\n## Prompts the user for changes when there is a breach detected of credit card\n\nbreach-checklist-cc-header = Report this breach to your credit card issuer and request a new card with a new number.\nbreach-checklist-cc-body = You should also review your credit card statements for unrecognised charges.\n\n## Prompts the user for changes when there is a breach detected of bank account\n\nbreach-checklist-bank-header = Notify your bank immediately that your account number has been compromised.\nbreach-checklist-bank-body = Doing so faster could give you more legal protections to help you recover any losses. You’ll also want to check your accounts for any unrecognised charges.\n\n## Prompts the user for changes when there is a breach detected of pin\n\nbreach-checklist-pin-header = Notify your card issuer and change your PIN immediately.\nbreach-checklist-pin-body = Make sure your new PIN, or any other PIN, doesn’t include easily guessed numbers such as your birth date or address.\n\n## Prompts the user for changes when there is a breach detected of IP address\n\n# Variables:\n# $mozillaVpnLink (string) - a link to the Mozilla VPN website, with { -breach-checklist-link-mozilla-vpn } as the label\nbreach-checklist-ip-header-2 = Use the internet privately with a VPN, such as { $mozillaVpnLink }.\nbreach-checklist-ip-body = Your IP address (Internet Protocol address) pinpoints your location and internet service provider. A VPN can hide your real IP address so you can use the internet privately.\n\n## Prompts the user for changes when there is a breach detected of physical address\n\nbreach-checklist-address-header = Change any passwords or PINs that include any part of your address.\nbreach-checklist-address-body = Addresses are easy to find in public records and can make those passwords and PINs easy to guess.\n\n## Prompts the user for changes when there is a breach detected of date of birth\n\nbreach-checklist-dob-header = Change any passwords or PINs that include your date of birth.\nbreach-checklist-dob-body = Birth dates are easy to find in public records, and people who find it could easily guess your PIN.\n\n## Prompts the user for changes when there is a breach detected of phone number\n\n# Variables:\n# $firefoxRelayLink (string) - a link to Firefox Relay, with { -breach-checklist-link-firefox-relay } as the label\nbreach-checklist-phone-header-2 = Protect your phone number with a masking service like { $firefoxRelayLink }, which hides your true phone number.\n\n## Prompts the user for changes when there is a breach detected of security questions\n\nbreach-checklist-sq-header-text = Update your security questions.\n# The `breached-company-link` tags will be replaced with link tags or stripped if no link is available.\nbreach-checklist-sq-body-text = In most cases, we’d recommend that you update your security questions on the company’s web site. But \u003cb\u003etheir web site may be down or contain malicious content\u003c/b\u003e, so use caution if you \u003cbreached-company-link\u003evisit the site\u003c/breached-company-link\u003e. For added protection, update these security questions on any important accounts where you’ve used them, and create unique passwords for all accounts.\n\n## Prompts the user for changes when there is a breach detected of historical password\n\nbreach-checklist-hp-header = Create unique, strong passwords for any account where you’ve re-used passwords.\n# Variables:\n# $passwordManagerLink (string) - a link to the password manager documentation, with { -breach-checklist-link-password-manager } as the label\nbreach-checklist-hp-body-2 = A password manager like { $passwordManagerLink } (which is free and built-in to the { -brand-firefox } browser) can help you keep track of all your passwords and access them securely from all your devices.\n\n## Prompts the user for changes when there is a breach detected of other types\n\n# Variables:\n# $breachDate (String) - Date of the breach\n# $companyName (String) - Name of the company where the breach occurred\nbreach-checklist-general-header = Reach out to { $companyName } to inform them about this breach and ask for specific steps you can take.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"48:T214c,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Chart summarizing total exposures\n\n# The number inside \u003cnr\u003e will be displayed in a large font,\n# the label inside \u003clabel\u003e will be shown underneath, in a smaller font.\n# Variables:\n# $nr (number) - Number of unresolved exposures for the user\nexposure-chart-heading =\n { $nr -\u003e\n [one] \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eexposure\u003c/label\u003e\n *[other] \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eexposures\u003c/label\u003e\n }\n# Variables:\n# $nr (number) - Number of fixed exposures found for the user\nexposure-chart-heading-fixed = \u003cnr\u003e{ $nr }\u003c/nr\u003e \u003clabel\u003eFixed\u003c/label\u003e\nexposure-chart-legend-heading-type = Exposure\nexposure-chart-legend-heading-nr = Number\n# Variables:\n# $nr (number) - Number of a particular type of exposure found for the user\nexposure-chart-legend-value-nr = { $nr }×\nexposure-chart-caption = This chart shows how many times your info is actively exposed.\n# Variables:\n# $total_fixed_exposures_num (number) - Number of fixed exposures\n# $total_exposures_num (number) - Number of total exposures\nexposure-chart-caption-fixed = This chart shows the total exposures that are fixed ({ $total_fixed_exposures_num } out of { $total_exposures_num })\nexposure-chart-returning-user-upgrade-prompt = Home address, family members and more are not yet included.\nexposure-chart-returning-user-upgrade-prompt-cta = Start a free scan\nexposure-chart-scan-in-progress-prompt = \u003cb\u003eScan in progress:\u003c/b\u003e address, family members, and more are not yet included.\nmodal-active-number-of-exposures-title = About your number of active exposures\n# Variables:\n# $limit (number) - Number of email addresses included in the plan\nmodal-active-number-of-exposures-part-one-all =\n { $limit -\u003e\n [one] This chart includes the total number of times we found each type of data exposed across all data breaches for the { $limit } email address that you are currently monitoring.\n *[other] This chart includes the total number of times we found each type of data exposed across all data breaches for up to { $limit } email addresses that you are currently monitoring.\n }\nmodal-active-number-of-exposures-part-two = For example, if you have 10 exposures of your phone number, that might mean one phone number is exposed across 10 different sites, or it could mean 2 different phone numbers were exposed across 5 different sites.\nmodal-active-number-of-exposures-part-three-all = Once they are resolved, they will be added to your total number of fixed exposures on the Fixed page.\nmodal-fixed-number-of-exposures-title = About your number of fixed exposures\nmodal-fixed-number-of-exposures-all = This chart includes the total number of data breaches that have been fixed for all email addresses you’re currently monitoring. Once exposures are marked as fixed, they’ll be added to the total here.\nmodal-cta-ok = OK\nmodal-cta-got-it = Got it\nopen-modal-alt = Open modal\nclose-modal-alt = Close modal\nopen-tooltip-alt = Open tooltip\nprogress-card-heres-what-we-fixed-headline-all = Here’s what you fixed\nprogress-card-manually-fixed-headline = Manually fixed\ndashboard-tab-label-action-needed = Action needed\ndashboard-tab-label-fixed = Fixed\ndashboard-exposures-all-fixed-label = All fixed here!\ndashboard-exposures-area-headline = View all sites where your info is exposed\n# Note: this line precedes dashboard-exposures-area-description-all-line2.\n# Variables:\n# $exposures_unresolved_num (number) - the unresolved number of exposures the user has.\ndashboard-exposures-area-description-all-line1 =\n { $exposures_unresolved_num -\u003e\n [one] We found { $exposures_unresolved_num } exposure of your data.\n *[other] We found { $exposures_unresolved_num } exposures of your data.\n }\n# Note: this line follows dashboard-exposures-area-description-all-line1.\n# Variables:\n# $data_breach_unresolved_num (number) - the unresolved number of data breaches the user has.\ndashboard-exposures-area-description-all-line2 =\n { $data_breach_unresolved_num -\u003e\n [one] It appeared in { $data_breach_unresolved_num } data breach.\n *[other] It appeared across { $data_breach_unresolved_num } data breaches.\n }\ndashboard-fixed-area-headline-all = View all exposures that are fixed\n# This is the label on a button that opens a popover menu, which shows a menu to adjust filters for the listed exposures.\ndashboard-exposures-filter = Filter\ndashboard-exposures-filter-company = Company\ndashboard-exposures-filter-date-found = Date found\ndashboard-exposures-filter-date-found-last-seven-days = Last 7 days\ndashboard-exposures-filter-date-found-last-thirty-days = Last 30 days\ndashboard-exposures-filter-date-found-last-year = Last year\ndashboard-exposures-filter-status = Status\npopover-open-filter-settings-alt = Select filters\ndashboard-exposures-filter-show-all = Show all\ndashboard-exposures-filter-show-results = Show results\ndashboard-exposures-filter-reset = Reset\n\n## Top banner on the dashboard\n\ndashboard-top-banner-section-label = Dashboard summary\ndashboard-top-banner-scan-in-progress-title = Your scan is still in progress\ndashboard-top-banner-your-data-is-protected-title = Your data is protected\ndashboard-top-banner-your-data-is-protected-cta = See what’s fixed\ndashboard-top-banner-lets-keep-protecting-title = Let’s keep protecting your data\n# Variables:\n# $exposures_unresolved_num is the remaining number of exposures the user has to resolve.\ndashboard-top-banner-lets-keep-protecting-description =\n { $exposures_unresolved_num -\u003e\n [one] You still have { $exposures_unresolved_num } exposure left to fix. Keep going and protect yourself. We’ll guide you step-by-step.\n *[other] You still have { $exposures_unresolved_num } exposures left to fix. Keep going and protect yourself. We’ll guide you step-by-step.\n }\ndashboard-top-banner-lets-keep-protecting-cta = Let’s keep going\ndashboard-top-banner-protect-your-data-title = Let’s protect your data\ndashboard-top-banner-protect-your-data-cta = Let’s fix it\n# Note: this line is followed by `dashboard-top-banner-non-us-protect-your-data-description-line1`.\n# Variables:\n# $exposures_unresolved_num (number) - the total number of exposures the user has.\ndashboard-top-banner-non-us-protect-your-data-description-line1 =\n { $exposures_unresolved_num -\u003e\n [one] We found { $exposures_unresolved_num } exposure of your data.\n *[other] We found { $exposures_unresolved_num } exposures of your data.\n }\n# Note: this line is preceded by `dashboard-top-banner-non-us-protect-your-data-description-line1`.\n# Variables:\n# $data_breach_unresolved_num (number) - the total number of data breaches the user has.\ndashboard-top-banner-non-us-protect-your-data-description-line2 =\n { $data_breach_unresolved_num -\u003e\n [one] It appeared in { $data_breach_unresolved_num } data breach. We’ll guide you step-by-step on how to fix it.\n *[other] It appeared across { $data_breach_unresolved_num } data breaches. We’ll guide you step-by-step on how to fix it.\n }\ndashboard-top-banner-no-exposures-found-title = No exposures found\ndashboard-top-banner-non-us-no-exposures-found-description = Great news! We searched all known data breaches and found no exposures. We’ll keep monitoring your email address and will alert you if a new breach occurs.\ndashboard-no-exposures-label = No exposures found\n# Variables:\n# $exposures_resolved_num is the number of exposures the user has resolved.\ndashboard-top-banner-non-us-your-data-is-protected-description =\n { $exposures_resolved_num -\u003e\n [one] Great work, the exposure of your data is fixed! We’ll keep monitoring and will alert you of any new exposures.\n *[other] Great work, all { $exposures_resolved_num } exposures of your data are fixed! We’ll keep monitoring and will alert you of any new exposures.\n }\ndashboard-top-banner-monitor-more-cta = Monitor more emails\n\n# About Exposure Indicators Modal\n\nmodal-exposure-status-description-all =\n We search for exposures in all known data breaches.\n Your exposures will have one of the following statuses:\nmodal-exposure-indicator-title = Exposure statuses\nmodal-exposure-indicator-action-needed = Advanced or manual action is needed by you to complete an action.\nmodal-exposure-indicator-fixed = The exposure has been resolved and there’s no action for you to take.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"49:T17c0,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Breach Data Classes\n\naccount-balances = Account balances\naddress-book-contacts = Address book contacts\nage-groups = Age groups\nages = Ages\n# Refers to medical appointments.\nappointments = Appointments\napps-installed-on-devices = Apps installed on devices\nastrological-signs = Astrological signs\naudio-recordings = Audio recordings\nauth-tokens = Auth tokens\navatars = Avatars\nbank-account-numbers = Bank account numbers\nbeauty-ratings = Beauty ratings\nbiometric-data = Biometric data\n# This string is the shortened version of \"Biographies\", and\n# refers to biographical data about a user.\nbios = Bios\nbrowser-user-agent-details = Browser user agent details\nbrowsing-histories = Browsing histories\nbuying-preferences = Buying preferences\ncar-ownership-statuses = Car ownership statuses\ncareer-levels = Career levels\ncellular-network-names = Mobile network names\ncharitable-donations = Charitable donations\nchat-logs = Chat logs\ncitizenship-statuses = Citizenship statuses\nclothing-sizes = Clothing sizes\ncredit-card-cvv = Credit card CVV\ncredit-cards = Credit cards\ncredit-status-information = Credit status information\ncryptocurrency-wallet-hashes = Cryptocurrency wallet hashes\ncustomer-feedback = Customer feedback\ncustomer-interactions = Customer interactions\ndates-of-birth = Dates of birth\ndeceased-date = Deceased date\ndeceased-statuses = Deceased statuses\n# Instructions that you can set up in online shopping services to get your orders\n# delivered (e.g. deliver to a specific neighbor, entrance location, etc.).\ndelivery-instructions = Delivery instructions\ndevice-information = Device information\ndevice-serial-numbers = Device serial numbers\ndevice-usage-tracking-data = Device usage tracking data\ndrinking-habits = Drinking habits\ndriver-s-licenses = Driver’s licences\ndrug-habits = Drug habits\neating-habits = Eating habits\neducation-levels = Education levels\nemail-addresses = Email addresses\nemail-messages = Email messages\nemployers = Employers\nemployment-statuses = Employment statuses\nencrypted-keys = Encrypted keys\nethnicities = Ethnicities\nfamily-members-names = Family members’ names\nfamily-plans = Family plans\nfamily-structure = Family structure\nfinancial-investments = Financial investments\nfinancial-transactions = Financial transactions\nfitness-levels = Fitness levels\nflights-taken = Flights taken\ngenders = Genders\ngeographic-locations = Geographic locations\ngovernment-issued-ids = Government issued IDs\nhealth-insurance-information = Health insurance information\nhistorical-passwords = Historical passwords\nhiv-statuses = HIV statuses\nhome-loan-information = Home loan information\nhome-ownership-statuses = Home ownership statuses\nhomepage-urls = Homepage URLs\nimei-numbers = IMEI numbers\nimsi-numbers = IMSI numbers\nincome-levels = Income levels\ninstant-messenger-identities = Instant messenger identities\nip-addresses = IP addresses\njob-applications = Job applications\njob-titles = Job titles\n# This string refers to vehicle license plates.\nlicence-plates = Licence Plates\nliving-costs = Living costs\n# This string refers to financial loans.\nloan-information = Loan information\nlogin-histories = Login histories\nloyalty-program-details = Loyalty programme details\nmac-addresses = MAC addresses\nmarital-statuses = Marital statuses\n# Mnemonic phrases are a group of words used to access the content of cryptocurrency wallets.\nmnemonic-phrases = Mnemonic phrases\nmothers-maiden-names = Mothers maiden names\nnames = Names\nnationalities = Nationalities\nnet-worths = Net worths\nnicknames = Nicknames\n# no data classes found\nnone-data-class = None\noccupations = Occupations\n# various data classes grouped together\nother-data-class = Other\nparenting-plans = Parenting plans\npartial-credit-card-data = Partial credit card data\npartial-dates-of-birth = Partial dates of birth\npartial-phone-numbers = Partial phone numbers\npassport-numbers = Passport numbers\npassword-hints = Password hints\npassword-strengths = Password strengths\npasswords = Passwords\npayment-histories = Payment histories\npayment-methods = Payment methods\npersonal-descriptions = Personal descriptions\npersonal-health-data = Personal health data\npersonal-interests = Personal interests\nphone-numbers = Phone numbers\nphotos = Photos\nphysical-addresses = Physical addresses\nphysical-attributes = Physical attributes\npins = PINs\nplaces-of-birth = Places of birth\npolitical-donations = Political donations\npolitical-views = Political views\nprivate-messages = Private messages\nprofessional-skills = Professional skills\nprofile-photos = Profile photos\npurchases = Purchases\npurchasing-habits = Purchasing habits\nraces = Races\nrecovery-email-addresses = Recovery email addresses\nrelationship-statuses = Relationship statuses\nreligions = Religions\nreward-program-balances = Reward program balances\nsalutations = Salutations\nschool-grades-class-levels = School grades (class levels)\nsecurity-questions-and-answers = Security questions and answers\nsexual-fetishes = Sexual fetishes\nsexual-orientations = Sexual orientations\nsmoking-habits = Smoking habits\nsms-messages = SMS messages\nsocial-connections = Social connections\nsocial-media-profiles = Social media profiles\nsocial-security-numbers = Social security numbers\nspoken-languages = Spoken languages\nspouses-names = Spouses names\nsupport-tickets = Support tickets\nsurvey-results = Survey results\ntaxation-records = Taxation records\ntelecommunications-carrier = Telecommunications carriers\ntime-zones = Time zones\ntravel-habits = Travel habits\nuser-statuses = User statuses\nuser-website-urls = User web site URLs\nusernames = Usernames\nutility-bills = Utility bills\nvehicle-details = Vehicle details\nvehicle-identification-numbers-vins = Vehicle identification numbers (VINs)\nwebsite-activity = Web site activity\nwork-habits = Work habits\nyears-of-birth = Years of birth\nyears-of-professional-experience = Years of professional experience\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"4a:Tfda,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n## Email headers\n\nemail-header-logo-alt = { -brand-mozilla-monitor }\nemail-header-button-sign-in = Sign in\n\n## Email footers\n\nemail-footer-support-heading = Questions about { -brand-mozilla-monitor }?\nemail-footer-support-content = Visit our \u003csupport-link\u003eSupport Center\u003c/support-link\u003e for help\nemail-footer-trigger-transactional = You’re receiving this email as a subscriber of { -brand-mozilla-monitor }.\nemail-footer-source-hibp = Breach data provided by \u003chibp-link\u003e{ -brand-HIBP }\u003c/hibp-link\u003e\nemail-footer-logo-mozilla-alt = { -brand-mozilla }\nemail-footer-meta-privacy-notice = Privacy\n# Firefox Relay is a product name and should not be translated.\n-product-name-relay = Firefox Relay\n# Mozilla VPN is a product name and should not be translated.\n-product-name-vpn = Mozilla VPN\n# A link to legal information about mozilla products.\nlegal = Legal\n# Button text\nverify-email-cta = Verify Email\n# Headline of verification email\nemail-link-expires = This link expires in 24 hours\n\n##\n\n# Subject line of email\nemail-subject-found-breaches = { -product-name } found your info in these breaches\n# Subject line of email\nemail-subject-no-breaches = { -product-name } found no known breaches\n# Subject line of email\nemail-subject-verify = Verify your email for { -product-name }\nfxm-warns-you-no-breaches =\n { -product-name } warns you about data breaches involving your personal info. \n So far, no breaches were found. We’ll send you an alert if your email address appears in a new breach.\nemail-breach-alert-blurb =\n { -product-name } warns you about data breaches involving your personal info. \n We just received details about another company’s data breach.\n\n## 2022 email template. HTML tags should not be translated, e.g. `\u003ca\u003e`\n\n# Have I Been Pwned attribution\n# Variables:\n# $hibp-link-attr (String) - Link to Have I Been Pwned\nemail-2022-hibp-attribution = Breach data provided by \u003ca { $hibp-link-attr }\u003e{ -brand-HIBP }\u003c/a\u003e\n\n## Verification email\n\nemail-verify-heading = Safeguard your data, starting right now\nemail-verify-subhead = Verify your email to start protecting your data after a breach.\nemail-verify-simply-click = Simply click the link below to finish verifying your account.\n\n## Breach report\n\nemail-breach-summary = Here’s your data breach summary\n# Variables:\n# $email-address (string) - Email address, bolded\nemail-breach-detected = Search results for your { $email-address } account have detected that your email may have been exposed. We recommend you act now to resolve this breach.\n# Deprecated after the redesigned breach alert email is launched\n# Variables:\n# $email-address (string) - Email address\nemail-breach-detected-2 = Search results for your \u003cb\u003e{ $email-address }\u003c/b\u003e account have detected that your email may have been exposed. We recommend you act now to resolve this breach.\nemail-dashboard-cta = Go to Dashboard\n\n## Breach alert\n\n# Deprecated after the redesigned breach alert email is launched\nemail-spotted-new-breach = We’ve spotted a new data breach\n\n## Redesigned breach alert email\n\nemail-breach-alert-all-subject = New data breach detected\nemail-breach-alert-all-preview = We’ll guide you through the steps to resolve it.\nemail-breach-alert-all-hero-heading = You’ve been in a new data breach\nemail-breach-alert-all-hero-subheading = Don’t worry, we can help you resolve this exposure\nemail-breach-alert-all-lead = { -brand-mozilla-monitor } discovered the following data breach that includes your personal information:\nemail-breach-alert-all-source-title = Breach source:\nemail-breach-alert-all-data-points-title = Your exposed data:\nemail-breach-alert-all-next-steps-lead = We’ll guide you step-by-step on how to resolve this data breach.\nemail-breach-alert-all-next-steps-cta-label = Let’s get started\nemail-breach-alert-all-next-steps-button-dashboard = Go to Dashboard\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"4b:T7b0,# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nchevron-alt = Exposure details\n\nexposure-card-exposure-type = Exposure type\nexposure-card-date-found = Date of the exposure\n\n# Status Pill\n\nstatus-pill-action-needed = Action needed\nstatus-pill-progress = In progress\nstatus-pill-fixed = Fixed\n\n# Exposure Card\n\nexposure-card-family-members = Family members\nexposure-card-email = Email\nexposure-card-phone-number = Phone number\nexposure-card-address = Address\nexposure-card-credit-card = Credit Card\nexposure-card-password = Password\nexposure-card-ip-address = IP Address\nexposure-card-other = Other\n# Variables:\n# $data_breach_company is the company associated with the data breach.\n# $data_breach_date is the date of the data breach.\nexposure-card-description-data-breach-action-needed = Your information was exposed in the \u003cdata_breach_link\u003e{ $data_breach_company } data breach on { $data_breach_date }.\u003c/data_breach_link\u003e We’ll walk you through the steps to fix it.\nexposure-card-description-data-breach-fixed = You’ve taken the steps needed to fix \u003cdata_breach_link\u003ethis breach\u003c/data_breach_link\u003e. We’ll continually monitor for data breaches and alert you of any new exposures.\nexposure-card-your-exposed-info = Your exposed info:\nexposure-card-exposure-type-data-broker = Info for sale\nexposure-card-exposure-type-data-breach = Data breach\nexposure-card-cta = Fix all exposures\nexposure-card-label-company-logo = Company logo\nexposure-card-label-company = Company\n# Status of the exposure card, could be In Progress, Fixed or Action Needed\nexposure-card-label-status = Status\n# Variables:\n# $category_label is the data breach exposure type that was leaked. Eg. Email, IP Address.\n# $count is the number of times that the data type was leaked.\nexposure-card-label-and-count = { $category_label }: { $count }\n4c:T34e1,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\nfix-flow-nav-high-risk-data-breaches = High risk data breaches\nfix-flow-nav-leaked-passwords = Leaked passwords\nfix-flow-nav-security-recommendations = Security recommendations\n\nguided-resolution-flow-exit = Return to dashboard\nguided-resolution-flow-next-arrow = Go to next step\nguided-resolution-flow-step-navigation-label = Guided steps\n\n# Celebration screens\n\n\n## Shared CTA labels\n\nfix-flow-celebration-next-label = Let’s keep going\nfix-flow-celebration-next-recommendations-label = See recommendations\nfix-flow-celebration-next-dashboard-label = Go to your Dashboard\n\n## High-risk flow\n\nfix-flow-celebration-high-risk-title = You’ve fixed your high risk exposures!\nfix-flow-celebration-high-risk-description-in-progress = Doing this work can feel like a lot, but it’s important to do so to keep yourself safe. Keep up the good work.\nfix-flow-celebration-high-risk-description-done = Doing this work can feel like a lot, but it’s important to do so to keep yourself safe.\nfix-flow-celebration-high-risk-description-next-passwords = Now let’s fix your exposed passwords.\nfix-flow-celebration-high-risk-description-next-security-questions = Now let’s fix your exposed security questions.\nfix-flow-celebration-high-risk-description-next-security-recommendations = Next, we’ll give you personalised security recommendations based on what data of yours has been exposed.\nfix-flow-celebration-high-risk-description-next-dashboard = You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n## Leaked passwords and security questions flow\n\nfix-flow-celebration-leaked-passwords-title = Your passwords are now protected!\nfix-flow-celebration-security-questions-title = Your security questions are protected!\nfix-flow-celebration-leaked-passwords-description-next-security-questions = Now let’s review and update your exposed security questions.\nfix-flow-celebration-leaked-passwords-description-next-security-recommendations = Next, we’ll give you personalised security recommendations based on what data of yours has been exposed.\nfix-flow-celebration-leaked-passwords-description-next-dashboard = Nicely done! You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n## Security recommendations flow\n\nfix-flow-celebration-security-recommendations-title = You’ve completed all your recommendations!\nfix-flow-celebration-security-recommendations-description-next-dashboard = Nicely done! You’ve reached the end of your steps. You can view any action items and track your progress on your dashboard.\n\n# High Risk Data Breaches\n\nhigh-risk-breach-heading = Here’s what to do\nhigh-risk-breach-subheading = This requires access to your sensitive info, so you’ll need to manually fix it.\n# Variables\n# $num_breaches is the number of breaches where the high risk data was found.\nhigh-risk-breach-summary =\n { $num_breaches -\u003e\n [one] It appeared in { $num_breaches } data breach:\n *[other] It appeared in { $num_breaches } data breaches:\n }\n# Variables\n# $breach_name is the name of the breach where the high risk data was found.\n# $breach_date is the date when the breach occurred.\n# An example of this string is Twitter on 13/09/18.\nhigh-risk-breach-name-and-date = { $breach_name } \u003cbreach_date\u003eon { $breach_date }\u003c/breach_date\u003e\nhigh-risk-breach-mark-as-fixed = Mark as fixed\nhigh-risk-breach-skip = Skip for now\n# Variables:\n# $estimated_time is the estimated time it would take for a user to complete breach resolution steps. It not be singular, and the + is meant as \"or more\".\n# An example of this string is Your estimated time: 15+ minutes.\nhigh-risk-breach-estimated-time =\n { $estimated_time -\u003e\n *[other] Your estimated time: { $estimated_time }+ minutes\n }\n\n# Credit Card Breaches\n\nhigh-risk-breach-credit-card-title = Your credit card number was exposed\nhigh-risk-breach-credit-card-description = Anyone who gets it can make unauthorised purchases that you may be liable for. Act now to prevent financial harm.\nhigh-risk-breach-credit-card-step-one = If you still have this card, contact the issuer to report it stolen.\nhigh-risk-breach-credit-card-step-two = Request a new card with a new number.\nhigh-risk-breach-credit-card-step-three = Check your accounts for unauthorised charges.\n\n# Bank Account Breaches\n\nhigh-risk-breach-bank-account-title = Your bank account was exposed\nhigh-risk-breach-bank-account-description = Taking action as soon as possible could give you more legal protections to help you recover any losses.\nhigh-risk-breach-bank-account-step-one = Notify your bank immediately that your account number has been compromised.\nhigh-risk-breach-bank-account-step-two = Change your account number.\nhigh-risk-breach-bank-account-step-three = Check your accounts for unauthorised charges.\n\n# Social Security Number Breaches\n\nhigh-risk-breach-social-security-title = Your social security number was exposed\nhigh-risk-breach-social-security-description = Scammers can open up new loans or credit cards with your social security number. Act fast to prevent financial harm.\nhigh-risk-breach-social-security-step-one = Protect yourself by \u003clink_to_info\u003esetting up a fraud alert or freezing your credit.\u003c/link_to_info\u003e\nhigh-risk-breach-social-security-step-two = \u003clink_to_info\u003eCheck your credit report\u003c/link_to_info\u003e for unrecognised accounts.\n\n# Social Security Number Modal\n\nssn-modal-title = About fraud alerts and credit freezes\nssn-modal-description-fraud-part-one = \u003cb\u003eA fraud alert\u003c/b\u003e requires businesses to verify your identity before it issues new credit in your name. It’s free, lasts one year, and won’t negatively affect your credit score.\nssn-modal-description-fraud-part-two = To set one up, contact any one of the three credit bureaus. You don’t have to contact all three.\nssn-modal-description-freeze-credit-part-one = \u003cb\u003eFreezing your credit\u003c/b\u003e prevents anyone from opening a new account in your name. It’s free and won’t negatively affect your credit score, but you’ll need to unfreeze it before opening any new accounts.\nssn-modal-description-freeze-credit-part-two = To freeze your credit, contact each of the three credit bureaus — \u003cequifax_link\u003eEquifax\u003c/equifax_link\u003e, \u003cexperian_link\u003eExperian\u003c/experian_link\u003e, and \u003ctransunion_link\u003eTransUnion\u003c/transunion_link\u003e.\nssn-modal-learn-more = Learn more about fraud alerts and credit freezes\nssn-modal-ok = OK\n\n# PIN Breaches\n\nhigh-risk-breach-pin-title = Your PIN was exposed\nhigh-risk-breach-pin-description = Taking action as soon as possible could give you more legal protections to help you recover any losses.\nhigh-risk-breach-pin-step-one = Notify your bank immediately that your PIN has been compromised.\nhigh-risk-breach-pin-step-two = Change your PIN anywhere you’ve used the same one.\nhigh-risk-breach-pin-step-three = Check your accounts for unauthorised charges.\n\n# No high risk breaches found\n\nhigh-risk-breach-none-title = Great news, we didn’t find any high risk data breaches\n# Variables\n# $email_list is list of emails that the user is monitoring for breaches. E.g. john@yahoo.com, ali@gmail.com, sam@hotmail.com\nhigh-risk-breach-none-description = We detect data breaches based on your email address, and we didn’t find any high risk data breaches for { $email_list }.\nhigh-risk-breach-none-sub-description-part-one = High risk data breaches include:\nhigh-risk-breach-none-sub-description-ssn = Social security number\nhigh-risk-breach-none-sub-description-bank-account = Bank account info\nhigh-risk-breach-none-sub-description-cc-number = Credit card numbers\nhigh-risk-breach-none-sub-description-pin = PINs\nhigh-risk-breach-none-continue = Continue\n\n# Security recommendations\n\nsecurity-recommendation-steps-label = Security recommendations\nsecurity-recommendation-steps-title = Here’s our advice:\nsecurity-recommendation-steps-cta-label = Got it!\n\n# Phone security recommendation\n\nsecurity-recommendation-phone-title = Protect your phone number\n# $num_breaches is the number of breaches where the phone number was found.\nsecurity-recommendation-phone-summary =\n { $num_breaches -\u003e\n [one] Your phone number was exposed in { $num_breaches } data breach:\n *[other] Your phone number was exposed in { $num_breaches } data breaches:\n }\nsecurity-recommendation-phone-description = Unfortunately you can’t take it back. But there are steps you can take to make sure you stay safe.\nsecurity-recommendation-phone-step-one = Block spam numbers to prevent more junk calls\nsecurity-recommendation-phone-step-two = Don’t click on links in texts from unknown senders; if it appears to be from a trusted source, call directly to confirm\n\n# Email security recommendation\n\nsecurity-recommendation-email-title = Protect your email address\n# $num_breaches is the number of breaches where the email address was found.\nsecurity-recommendation-email-summary =\n { $num_breaches -\u003e\n [one] Your email address was exposed in { $num_breaches } data breach:\n *[other] Your email address was exposed in { $num_breaches } data breaches:\n }\nsecurity-recommendation-email-description = Unfortunately you can’t fix this. But there are steps you can take to protect yourself.\nsecurity-recommendation-email-step-one = Don’t click on links in emails from unknown senders; if it appears to be from trusted source, call directly to confirm\nsecurity-recommendation-email-step-two = Be aware of \u003clink_to_info\u003ephishing scams\u003c/link_to_info\u003e\nsecurity-recommendation-email-step-three = Mark suspicious emails as spam and block the sender\nsecurity-recommendation-email-step-four = Use \u003clink_to_info\u003e{ -brand-relay } email masks\u003c/link_to_info\u003e to protect your email in the future\n\n# IP security recommendation\n\nsecurity-recommendation-ip-title = Use a VPN for added privacy\n# $num_breaches is the number of breaches where the IP address was found.\nsecurity-recommendation-ip-summary =\n { $num_breaches -\u003e\n [one] Your IP address was exposed in { $num_breaches } data breach:\n *[other] Your IP address was exposed in { $num_breaches } data breaches:\n }\nsecurity-recommendation-ip-description = Your IP address pinpoints your location and internet service provider. Hackers could use this information to find your location or try to connect to your devices.\nsecurity-recommendation-ip-step-one = Use a VPN (such as \u003clink_to_info\u003e{ -brand-mozilla-vpn }\u003c/link_to_info\u003e) to hide your real IP address and use the internet privately.\n\n# Leaked Passwords\n\n# Variables\n# $breach_name is the name of the breach where the leaked password was found.\nleaked-passwords-title = Your { $breach_name } password was exposed\n# Variables\n# $breach_date is the date when the breach occurred.\nleaked-passwords-summary = It appeared in a data breach on { $breach_date }.\nleaked-passwords-description = Scammers can access your account and will likely try to use it on other accounts to see if you’ve used the same password. Change it anywhere you’ve used it to protect yourself.\nleaked-passwords-steps-title = Here’s what to do\nleaked-passwords-steps-subtitle = This requires access to your account, so you’ll need to manually fix it.\n# Variables\n# $breach_name is the name of the breach where the leaked password was found.\n# $emails_affected are the emails associated with the breach.\nleaked-passwords-step-one = Change your password for \u003cb\u003e{ $emails_affected }\u003c/b\u003e on \u003clink_to_breach_site\u003e{ $breach_name }\u003c/link_to_breach_site\u003e.\nleaked-passwords-step-two = Change it anywhere else you’ve used it.\nleaked-passwords-mark-as-fixed = Mark as fixed\nleaked-passwords-skip = Skip for now\n# Variables\n# $estimated_time is the amount of time it would take for a user to manually resolve a leaked password breach. It will always be a number greater than 1.\n# \"Est.\" is shortform for \"Estimated\".\n# \"mins\" is shortform for \"minutes\".\nleaked-passwords-estimated-time =\n { $estimated_time -\u003e\n *[other] Est. time to complete: { $estimated_time } mins per site\n }\n\n# Leaked Security Questions\n\nleaked-security-questions-title = Your security questions were exposed\n# Variables\n# $breach_name is the name of the breach where the leaked security questions were found.\n# $breach_date is the date when the breach occurred.\n# An example of this string is Twitter on 13/09/18.\nleaked-security-questions-summary = They appeared in a data breach on { $breach_name } on { $breach_date }.\nleaked-security-questions-description = Scammers can use these to access your accounts, and any other site where you’ve used the same security questions. Update them now to protect your accounts.\nleaked-security-questions-steps-title = Here’s what to do\nleaked-security-questions-steps-subtitle = This requires access to your account, so you’ll need to manually fix it.\n# Variables\n# $breach_name is the name of the breach where the security questions were found.\n# $email_affected is the email associated with the breach.\nleaked-security-questions-step-one = Update your security questions for \u003cb\u003e{ $email_affected }\u003c/b\u003e on \u003clink_to_breach_site\u003e{ $breach_name }\u003c/link_to_breach_site\u003e.\nleaked-security-questions-step-two = Update them on any other site where you used the same security questions. Be sure to use different security questions for every account.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"4d:T11a8,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\npublic-nav-name = { -brand-mozilla-monitor }\nlanding-all-hero-title = Find where your private info is exposed — and take it back\nlanding-all-hero-lead = We scan data breaches to see if your data has been leaked and give you steps to fix it.\nlanding-all-hero-emailform-input-placeholder = yourname@example.com\nlanding-all-hero-emailform-input-label = Enter your email address to check for data breach exposures.\nlanding-all-hero-emailform-submit-label = Get free scan\nlanding-all-hero-emailform-submit-sign-up-label = Sign up to get free scan\n# This is a label underneath a big number \"14\" - it's an image that demos Monitor.\nlanding-all-hero-image-chart-label = exposures\n\n# Value Proposition\n\nlanding-all-value-prop-fix-exposures = We’ll help you fix your exposures\nlanding-all-value-prop-fix-exposures-description = Our mission is to put control of your personal data back in your hands. We’ll help you resolve data breaches and keep your info private — and we’ll \u003cprivacy_link\u003erespect your privacy\u003c/privacy_link\u003e in the process.\nlanding-all-value-prop-info-at-risk = What info could be at risk?\nlanding-all-value-prop-info-at-risk-description = Data leaks are unfortunately part of our digital lives. Your passwords, contact details, financial information, and other personal info can be exposed, putting you at risk of identity theft.\n\n# Quote\n\nlanding-all-quote = \u003cdata_breaches\u003eData breaches\u003c/data_breaches\u003e happen every 11 minutes, exposing your private information — but don’t worry, we can help.\n\n# Non-US FAQ\n\nlanding-all-faq-title = Frequently asked questions\n# FAQ is an acronym for Frequently Asked Questions\nlanding-all-faq-see-all = See all FAQs\nlanding-all-data-breach-definition-qn = What exactly is a data breach?\nlanding-all-data-breach-definition-ans = A data breach happens when personal or private information gets exposed, stolen or copied without permission. These security incidents can result from cyber attacks on web sites, apps or any database where people’s personal information resides. A data breach can also happen accidentally, like if someone’s login credentials get posted publicly.\nlanding-all-data-breach-next-steps-qn = I just found out I’m in a data breach. What do I do next?\nlanding-all-data-breach-next-steps-ans = Visit { -brand-mozilla-monitor } to learn what to do after a data breach and get guided steps to resolve exposures of your personal info. Hackers rely on people reusing passwords, so it’s important to create strong, unique passwords for all your accounts. Keep your passwords in a safe place that only you have access to; this could be the same place where you store important documents or a password manager.\nlanding-all-data-breach-info-qn = What information gets exposed in data breaches?\nlanding-all-data-breach-info-ans = Not all breaches expose all the same info. It just depends on what hackers can access. Many data breaches expose email addresses and passwords. Others expose more sensitive information such as credit card numbers, PIN numbers, and social security numbers.\nlanding-all-close-faq-alt = Close\n\n# Social proof\n\n# Variables\n# $num_users is the number of users in the millions.\nlanding-all-social-proof-title =\n { $num_users -\u003e\n *[other] Trusted by { $num_users } million people worldwide\n }\n# Variables\n# $num_countries is the number of countries available.\nlanding-all-social-proof-description =\n { $num_countries -\u003e\n *[other] Since 2018, we’ve helped people in { $num_countries } countries protect their data when it has been exposed.\n }\nlanding-all-social-proof-press = As seen in\n\n# Here's How We Help\n\nlanding-all-help-protect-you = Here’s how we help protect you\nlanding-all-help-protect-you-description = We believe in your right to privacy, so data breach monitoring protection is always free.\nlanding-all-help-protect-you-feature-one = We’ll search for you in all known data breaches\nlanding-all-help-protect-you-feature-two = We’ll guide you through the steps to resolve each breach\nlanding-all-help-protect-you-feature-three = We’ll continuously monitor and send you alerts for any new breaches\nlanding-all-help-protect-you-cta = Sign up for breach alerts\nlanding-all-get-started = Scan your email to get started\nlanding-all-take-back-data = Take back control of your data\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"4e:T175b,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"\n# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n# Recommendation subhead\nrec-ssn-subhead = Review your credit reports\n# Link title\nrec-ssn-cta = Request credit reports\nrec-ssn =\n You get three free credit reports a year by law. \n Requesting and reviewing them does not affect your credit. \n Look for accounts, loans, or credit cards you don’t recognise.\n\n# Recommendation subhead\nrec-pw-1-subhead = Change your password\n# Link title\nrec-pw-1-cta = Change password for this site\nrec-pw-1-2 =\n Make this password unique and different from any others you use.\n A good strategy to follow is to combine two or more unrelated\n words to create an entire passphrase, and include numbers and symbols.\n\n# Recommendation subhead\nrec-pw-2-subhead = Update other logins using the same password\n# Link title\nrec-pw-2-cta-fx = View logins in { -brand-name }\nrec-pw-2 =\n Reusing passwords turns a single data breach into many. Now that this \n password is out there, hackers could use it to get in to other accounts.\n\n# Recommendation subhead\nrec-pw-3-subhead = Use a password manager to take your passwords everywhere\n# Link title\nrec-pw-3-cta = Get { -brand-lockwise }\nrec-pw-3-fx =\n Use { -brand-lockwise } to securely access the passwords you’ve saved in \n { -brand-name } from anywhere — even outside of the browser.\nrec-pw-3-non-fx =\n Use { -brand-lockwise } to keep track of all your different \n passwords and access them securely from your phone or tablet.\n\n# Recommendation subhead\nrec-pw-4-subhead = Set up two-factor authentication (2FA)\n# Link title\nrec-pw-4-cta = See sites that offer 2FA\nrec-pw-4 =\n Many web sites offer 2FA as an extra security measure. This requires \n another piece of information to log in to your account, such as a \n one-time code you receive via text.\n\n# Recommendation subhead\nrec-bank-acc-subhead = Monitor your bank statements\nrec-bank-acc =\n Check your bank statements for suspicious activity or unusual \n charges. Notify your bank if you see anything you don’t recognise\n\n# Recommendation subhead\nrec-cc-subhead = Monitor your credit card statements\nrec-cc =\n Look out for strange charges on your credit card. You may want \n to request a new card with a new number from your credit card issuer.\n\n# Recommendation subhead\nrec-email-mask-subhead = Use an email mask\nrec-email-cta = Try { -brand-relay }\nrec-email =\n Giving out your real email address makes it easier for hackers or trackers to\n find your passwords or target you online. A service like { -brand-relay }\n hides your real email address while forwarding emails to your real inbox.\n\n# Recommendation subhead\nrec-ip-subhead-2 = Use a VPN to mask your IP address\n\n# Recommendation subhead\nrec-moz-vpn-cta = Try { -brand-mozilla-vpn }\nrec-moz-vpn-update-2 =\n Your Internet Protocol address (IP address) pinpoints your location\n and internet service provider. A service like { -brand-mozilla-vpn }\n masks your IP address to hide your location.\n\nrec-hist-pw-subhead = Avoid reusing passwords\n# Link title\nrec-hist-pw-cta-fx = View logins in { -brand-name }\nrec-hist-pw =\n Use unique, strong passwords for every account. If one password gets \n exposed in a data breach, you’ll only need to update that one login.\n\n# Recommendation subhead\nrec-sec-qa-subhead = Create unique answers for security questions\nrec-sec-qa =\n Many web sites ask the same questions. If one answer gets exposed, the \n information is out. Create long, random answers and store them somewhere safe.\n\n# Recommendation subhead\nrec-phone-num-subhead = Avoid sharing your phone number\nrec-phone-num =\n Try to avoid giving out your phone number when signing up for new \n accounts or services. If a phone number isn’t required, don’t enter it.\n\n# Recommendation subhead\nrec-dob-subhead = Avoid using personal info in PINs\nrec-dob =\n Because your date of birth is easy to find in public records, \n it’s best to avoid using it in passwords and PINs. People who \n know your birthday could also very easily guess your PIN.\n\n# Recommendation subhead\nrec-pins-subhead = Strengthen the security of your PINs\nrec-pins =\n A strong PIN does not contain personal info, such as your date of birth \n or address. It should be a number only you know and can’t be easily guessed.\n\n# Recommendation subhead\nrec-address-subhead = Avoid using addresses in passwords\nrec-address =\n Using addresses or the street where you grew up weaken your \n passwords. Since it’s easy to find this info publicly, it makes these \n passwords easy to guess.\n\n# Recommendation subhead\nrec-gen-1-subhead = Use unique, strong passwords for every account\n# Link title\nrec-gen-1-cta = How to create strong passwords\nrec-gen-1 =\n Password reuse puts all your accounts at risk. This means that if \n one password gets exposed, hackers have the keys to many accounts.\n\n# Recommendation subhead\nrec-gen-2-subhead = Store passwords in a safe place\n# Link title\nrec-gen-2-cta = Myths about password managers\nrec-gen-2 =\n Put your login details in a secure place only you can access, such as a \n password manager. This also makes it easy to keep track of all your different passwords.\n\n# Recommendation subhead\nrec-gen-3-subhead = Be cautious about giving out personal information\n# Link title\nrec-gen-3-cta = Read more security tips\nrec-gen-3 =\n Don’t hand out personal data if you don’t have to. If you are asked to \n enter or give out your email address, Post code, or phone number, you can say no.\n\n# Recommendation subhead\nrec-gen-4-subhead = Update software and apps regularly\nrec-gen-4 =\n Updating your smartphone apps, browsers, and operating systems makes your \n devices more secure. These updates fix bugs, software vulnerabilities, and security problems.\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"4f:Tde4,"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"# This Source Code Form is subject to the terms of the Mozilla Public\n# License, v. 2.0. If a copy of the MPL was not distributed with this\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n\n# Settings page\n\nsettings-page-title = { -product-short-name } Settings\n\n## Breach alert preferences\n\nsettings-alert-email-preferences-title = Email preferences\nsettings-alert-email-preferences-subtitle = Tell us which emails you’d like to receive.\nsettings-alert-preferences-allow-breach-alerts-title = Instant breach alerts\nsettings-alert-preferences-allow-breach-alerts-subtitle = These alerts are sent immediately once a data breach is detected\nsettings-alert-preferences-option-one = Send breach alerts to the affected email address\nsettings-alert-preferences-option-two = Send all breach alerts to the primary email address\nsettings-alert-preferences-allow-monthly-monitor-report-title = Monthly { -brand-monitor } report\nsettings-alert-preferences-allow-monthly-monitor-report-subtitle = A monthly update of new exposures, what’s been fixed, and what needs your attention.\n\n## Monitored email addresses\n\n# Variables:\n# $email (string) - Email address\nsettings-email-list-title = Monitored email addresses\n# Variables:\n# $limit (number) - Number of email addresses included in the plan\nsettings-email-limit-info =\n { $limit -\u003e\n [one] Your account includes monitoring of up to { $limit } email.\n *[other] Your account includes monitoring of up to { $limit } emails.\n }\nsettings-email-verification-callout = Email verification required\nsettings-resend-email-verification-link = Resend verification email\nsettings-add-email-button = Add email address\nsettings-remove-email-button-label = Remove\n# Variables:\n# $emailAddress (string) - The email address to remove, e.g. `billnye@example.com`\nsettings-remove-email-button-tooltip = Stop monitoring { $emailAddress }\n# This string is shown beneath each of the user’s email addresses to indicate\n# how many known breaches that email address was found in.\n# Variables:\n# $breachCount (number) - Number of breaches\nsettings-email-number-of-breaches-info =\n { $breachCount -\u003e\n [one] Appears in { $breachCount } known breach.\n *[other] Appears in { $breachCount } known breaches.\n }\n\n## Deactivate account\n\nsettings-deactivate-account-title = Deactivate account\nsettings-deactivate-account-info-2 = You can deactivate { -product-short-name } by deleting your { -brand-mozilla-account }.\nsettings-fxa-link-label-3 = Go to { -brand-mozilla-account } settings\n\n## Delete Monitor account\n\nsettings-delete-monitor-free-account-title = Delete { -brand-monitor } account\nsettings-delete-monitor-free-account-description = This will permanently delete your { -brand-monitor } account and turn off all notifications.\nsettings-delete-monitor-free-account-cta-label = Delete account\nsettings-delete-monitor-free-account-dialog-title = Your { -brand-monitor } account will be permanently deleted\nsettings-delete-monitor-free-account-dialog-lead-v2 = All of your { -brand-monitor } account information will be deleted and we’ll no longer monitor for new data breaches. This will not delete your { -brand-mozilla-account }.\nsettings-delete-monitor-free-account-dialog-cta-label = Delete account\nsettings-delete-monitor-free-account-dialog-cancel-button-label = Never mind, take me back\nsettings-delete-monitor-account-confirmation-toast-label-2 = Your { -brand-monitor } account is now deleted.\nsettings-delete-monitor-account-confirmation-toast-dismiss-label = Dismiss\n"])</script> <script nonce="becb8074-9e67-474f-b861-2b4a2f1edf7d">self.__next_f.push([1,"16:[\"$\",\"$L26\",null,{\"bundleSources\":[{\"locale\":\"en\",\"bundleSources\":[\"$27\",\"$28\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\ntoolbar-app-picker-trigger-title = { -brand-mozilla } apps and services\\ntoolbar-app-picker-product-vpn = { -brand-mozilla-vpn }\\ntoolbar-app-picker-product-relay = { -brand-relay }\\ntoolbar-app-picker-product-pocket = { -brand-pocket }\\ntoolbar-app-picker-product-fx-desktop = { -brand-firefox } for Desktop\\ntoolbar-app-picker-product-fx-mobile = { -brand-firefox } for Mobile\\ntoolbar-app-picker-by-mozilla = Made by { -brand-mozilla }\\n\\n# Bento headline\\nfx-makes-tech = { -brand-name } is tech that fights for your online privacy.\\n\",\"$29\",\"$2a\",\"$2b\",\"$2c\",\"$2d\",\"$2e\",\"$2f\",\"$30\",\"$31\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\n# Confirm Unsubscription State\\n\\nunsubscribe-from-monthly-report-header = Unsubscribe from this email?\\nunsubscribe-from-monthly-report-body = You’ll no longer receive the monthly { -brand-monitor } report, which tells you how many new exposures you’ve had each month and how many are fixed.\\nunsubscribe-cta = Unsubscribe\\n\\n# Success Unsubscription State\\n\\nunsubscribe-success-from-monthly-report-header = You’re now unsubscribed\\nunsubscribe-success-from-monthly-report-body = You can resubscribe or update your email preferences anytime from your { -brand-monitor } settings.\\nunsubscribe-success-cta = Sign in to { -brand-monitor }\\n\\n# Error warning\\n\\nunsubscription-failed = Unsubscribe failed. \u003ctry_again_link\u003eTry again.\u003c/try_again_link\u003e\\n\",\"$32\",\"$33\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\nstatus-pill-requested-removal = Requested removal\\nstatus-pill-removed = Removed\\n# Variables:\\n# $attempt_count is the number of times that a removal has been attempted.\\n# $last_attempt_date is the date of the last removal attempt.\\nstatus-pill-requested-removal-info = Attempt { $attempt_count }: { $last_attempt_date }\\n\",\"$34\",\"$35\",\"$36\",\"$37\",\"$38\",\"$39\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\nsubscriber-waitlist-dialog-title = { -brand-monitor } is currently at capacity\\nsubscriber-waitlist-dialog-info-text = The good news is we’re helping hundreds of thousands of people get their personal information off of sites that are selling it. The bad news, we’re currently at capacity and can’t run new scans at this time.\\nsubscriber-waitlist-dialog-instruction-text = Join the waitlist and you’ll be the first to know when there’s space. We look forward to helping protect your personal information!\\nsubscriber-waitlist-dialog-cta-button-label = Join the waitlist\\nsubscriber-waitlist-dialog-skip-button-label = Skip for now\\n\"]},{\"locale\":\"en-CA\",\"bundleSources\":[\"$3a\",\"$3b\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\ntoolbar-app-picker-trigger-title = { -brand-mozilla } apps and services\\ntoolbar-app-picker-product-vpn = { -brand-mozilla-vpn }\\ntoolbar-app-picker-product-relay = { -brand-relay }\\ntoolbar-app-picker-product-pocket = { -brand-pocket }\\ntoolbar-app-picker-product-fx-desktop = { -brand-firefox } for Desktop\\ntoolbar-app-picker-product-fx-mobile = { -brand-firefox } for Mobile\\ntoolbar-app-picker-by-mozilla = Made by { -brand-mozilla }\\n\\n# Bento headline\\nfx-makes-tech = { -brand-name } is tech that fights for your online privacy.\\n\",\"$3c\",\"$3d\",\"$3e\",\"$3f\",\"$40\",\"$41\",\"$42\",\"$43\",\"$44\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\n\\n# Confirm Unsubscription State\\n\\nunsubscribe-from-monthly-report-header = Unsubscribe from this email?\\nunsubscribe-from-monthly-report-body = You’ll no longer receive the monthly { -brand-monitor } report, which tells you how many new exposures you’ve had each month and how many are fixed.\\nunsubscribe-cta = Unsubscribe\\n\\n# Success Unsubscription State\\n\\nunsubscribe-success-from-monthly-report-header = You’re now unsubscribed\\nunsubscribe-success-from-monthly-report-body = You can resubscribe or update your email preferences anytime from your { -brand-monitor } settings.\\nunsubscribe-success-cta = Sign in to { -brand-monitor }\\n\\n# Error warning\\n\\nunsubscription-failed = Unsubscribe failed. \u003ctry_again_link\u003eTry again.\u003c/try_again_link\u003e\\n\"]},{\"locale\":\"en-GB\",\"bundleSources\":[\"$45\",\"$46\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\ntoolbar-app-picker-trigger-title = { -brand-mozilla } apps and services\\ntoolbar-app-picker-product-vpn = { -brand-mozilla-vpn }\\ntoolbar-app-picker-product-relay = { -brand-relay }\\ntoolbar-app-picker-product-pocket = { -brand-pocket }\\ntoolbar-app-picker-product-fx-desktop = { -brand-firefox } for Desktop\\ntoolbar-app-picker-product-fx-mobile = { -brand-firefox } for Mobile\\ntoolbar-app-picker-by-mozilla = Made by { -brand-mozilla }\\n\\n# Bento headline\\nfx-makes-tech = { -brand-name } is tech that fights for your online privacy.\\n\",\"$47\",\"$48\",\"$49\",\"$4a\",\"$4b\",\"$4c\",\"$4d\",\"$4e\",\"$4f\",\"# This Source Code Form is subject to the terms of the Mozilla Public\\n# License, v. 2.0. If a copy of the MPL was not distributed with this\\n# file, You can obtain one at http://mozilla.org/MPL/2.0/.\\n\\n\\n# Confirm Unsubscription State\\n\\nunsubscribe-from-monthly-report-header = Unsubscribe from this email?\\nunsubscribe-from-monthly-report-body = You’ll no longer receive the monthly { -brand-monitor } report, which tells you how many new exposures you’ve had each month and how many are fixed.\\nunsubscribe-cta = Unsubscribe\\n\\n# Success Unsubscription State\\n\\nunsubscribe-success-from-monthly-report-header = You’re now unsubscribed\\nunsubscribe-success-from-monthly-report-body = You can resubscribe or update your email preferences anytime from your { -brand-monitor } settings.\\nunsubscribe-success-cta = Sign in to { -brand-monitor }\\n\\n# Error warning\\n\\nunsubscription-failed = Unsubscribe failed. \u003ctry_again_link\u003eTry again.\u003c/try_again_link\u003e\\n\"]}],\"children\":[\"$\",\"$L50\",null,{\"locale\":\"en\",\"children\":[\"$\",\"$L51\",null,{\"countryCode\":\"sg\",\"children\":[false,[\"$\",\"$Lf\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"(proper_react)\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L10\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}],[\"$\",\"$L52\",null,{}]]}]}]}]\n"])</script> <script>function gtElInit() {var lib = new google.translate.TranslateService();lib.translatePage('pl', 'fr', function () {});}</script> <script src="https://translate.google.com/translate_a/element.js?cb=gtElInit&hl=en-GB&client=wt" type="text/javascript"></script> </body> </html>