• bks@panix.com, lmao! 7 Data Breaches.

    From Trump Country USA@21:1/5 to All on Tue Aug 19 14:46:37 2025
    XPost: talk.politics.misc, alt.fan.rush-limbaugh, sac.politics
    XPost: talk.politics.guns

    NemoWeb
    In September 2016, almost 21GB of data from the French website used for "standardised and decentralized means of exchange for publishing newsgroup articles" NemoWeb was leaked from what appears to have been an unprotected Mongo DB. The data consisted of a large volume of emails sent to the
    service and included almost 3.5M unique addresses, albeit many of them auto-generated. Multiple attempts were made to contact the operators of
    NemoWeb but no response was received.

    Compromised data:
    Email addresses

    Exploit.In
    In late 2016, a huge list of email address and password pairs appeared in
    a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to
    identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned.

    Compromised data:
    Email addresses
    Password

    Anti Public Combo List
    In December 2016, a huge list of email address and password pairs appeared
    in a "combo list" referred to as "Anti Public". The list contained 458
    million unique email addresses, many with multiple different passwords
    hacked from various online systems. The list was broadly circulated and
    used for "credential stuffing", that is attackers employ it in an attempt
    to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned.

    Compromised data:
    Email addresses
    Passwords


    River City Media Spam List
    In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of
    which was used as part of an enormous spam operation. Once de-duplicated,
    there were 393 million unique email addresses within the exposed data.

    Compromised data:
    Email addresses
    IP addresses
    Names
    Physical addresses


    Onliner Spambot
    In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was
    found is in the blog post titled Inside the Massive 711 Million Record
    Onliner Spambot Dump.

    Compromised data:
    Email addresses
    Passwords

    Verifications.io
    In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the
    breach was due to the data being stored in a MongoDB instance left
    publicly facing without a password and resulted in 763 million unique
    email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process,
    although an archived copy remains viewable.

    Compromised data:
    Dates of birth
    Email addresses
    Employers
    Genders
    Geographic locations
    IP addresses
    Job titles
    Names
    Phone numbers
    Physical addresses


    Data Enrichment Exposure From PDL Customer
    In October 2019, security researchers Vinny Troia and Bob Diachenko
    identified an unprotected Elasticsearch server holding 1.2 billion records
    of personal data. The exposed data included an index indicating it was
    sourced from data enrichment company People Data Labs (PDL) and contained
    622 million unique email addresses. The server was not owned by PDL and
    it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles
    and job history data.

    Compromised data:
    Email addresses
    Employers
    Geographic locations
    Job titles
    Names
    Phone numbers
    Social media profiles

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)