breachwatch-march-2017_08_24

Acquisition Date: 2017-08-21T00:00:00Z

Site: Online Center

Description: At an unconfirmed date, OnlineCenter.pl's user database was allegedly breached. The stolen data contains 225,000 records including email addresses and passwords. The compromised data is being shared privately on the darknet.

Passwords: 225061

Acquisition Date: 2017-08-15T00:00:00Z

Site: TF Portal

Description: At an unconfirmed date, TFPortal's user database was allegedly breached. The stolen data contains 6,500 records including email addresses, usernames, and MD5 hashed passwords. In August 2016, the data was shared publicly on a few hacker sites and forums.

Passwords: 6567

Acquisition Date: 2017-08-21T00:00:00Z

Site: InkVN

Description: At an unconfirmed date, InkVN's user database was allegedly breached. The stolen data contains 65,000 records including email addresses. The compromised data is being shared privately on the darknet.

Passwords: 27903

Acquisition Date: 2017-08-21T00:00:00Z

Site: Alphazone

Description: In October 2013, Alphazone's user database was allegedly breached. The stolen data contains 280 records including email addresses, usernames, passwords, and full names. The compromised data is being shared privately on the darknet.

Passwords: 284

Acquisition Date: 2017-08-16T00:00:00Z

Site: Click Evolution

Description: At an unconfirmed date, ClickEvolution's user database was allegedly breached. The stolen data contains 108,000 records including email addresses and plaintext passwords. The compromised data is being shared privately on the darknet.

Passwords: 108737

Acquisition Date: 2017-08-22T00:00:00Z

Site: M2Bob

Description: In January 2015, M2Bob's user database was allegedly breached. The stolen data contains 165,000 records including usernames and plaintext passwords. In April 2016, the data was shared publicly on a few hacker sites and forums.

Passwords: 165030

Acquisition Date: 2017-08-22T00:00:00Z

Site: Sensitive Source

Description: This source has been marked as sensitive due to one of the following reasons:Revealing the source may compromise an on-going investigationThe affected site is of a controversial nature but does not validate email addresses and could therefore be used to tarnish an employee's reputation

Passwords: 86558

Acquisition Date: 2017-08-20T00:00:00Z

Site: Taringa

Description: At an unconfirmed date prior to September 2017, social network Taringa's user database was allegedly breached. The stolen records contained email addresses and hashed passwords, and were distributed privately among closed and trusted groups.

Passwords: 27736220

Acquisition Date: 2017-08-15T00:00:00Z

Site: TPS Gaming

Description: In October 2014, TPSGaming.com's user database was allegedly breached. The stolen data contains 2,000 records including email addresses, usernames, passwords, and salts. In May 2016, the data was shared publicly on a few hacker sites and forums.

Passwords: 2070

Acquisition Date: 2017-08-21T00:00:00Z

Site: MagazineDee

Description: In January 2017, MagazineDee.com's user database was allegedly breached. The stolen data contains 109,000 records including email addresses and passwords. In June 2017, the data was shared publicly on a few hacker sites and forums.

Passwords: 109856

Acquisition Date: 2017-08-20T00:00:00Z

Site: PinkSofa

Description: In January 2016, PinkSofa's user database was allegedly breached. The stolen data contains 304,000 records including usernames and passwords. In July 2017, the data was shared publicly on a few hacker sites and forums.

Passwords: 304371

Acquisition Date: 2017-08-16T00:00:00Z

Site: DevToolShed

Description: In November 2015, DevToolShed's user database was allegedly breached. The stolen data contains 9,500 records including email addresses, usernames, and passwords. In June 2017, the data was shared publicly on a few hacker sites and forums.

Passwords: 9560