Here’s an overview of the various breaches that have been consolidated into this Have I Been
Pwned.These are accessible programmatically via the HIBP API
and also via the RSS feed.
In approximately March 2015, the free web hosting provider 000webhost suffered a major data breach that exposed almost 15 million customer records.The data was sold and traded before 000webhost was alerted in October.The breach included names, email addresses and plain text passwords.
Breach date: 1 March 2015
Date added to HIBP: 26 October 2015
Compromised accounts: 14,936,670
Compromised data: Email addresses, IP addresses, Names, Passwords
Permalink
In March 2020, the stock photo site 123RF suffered a data breach which impacted over 8 million subscribers and was subsequently sold online.The breach included email, IP and physical addresses, names, phone numbers and passwords stored as MD5 hashes.The data was provided to HIBP by dehashed.com.
Breach date: 22 March 2020
Date added to HIBP: 15 November 2020
Compromised accounts: 8,661,578
Compromised data: Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames
Permalink
In approximately 2012, it’s alleged that the Chinese email service known as 126 suffered a data breach that impacted 6.4 million subscribers.
Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as “unverified”.The data in the breach contains email addresses and plain text passwords.Read more about Chinese data breaches in Have I Been Pwned.
Breach date: 1 January 2012
Date added to HIBP: 8 October 2016
Compromised accounts: 6,414,191
Compromised data: Email addresses, Passwords
Permalink
In April 2016, customer data obtained from the streaming app known as “17” appeared listed for sale on a Tor hidden service marketplace.The data contained over 4 million unique email addresses along with IP addresses, usernames and passwords stored as unsalted MD5 hashes.
Breach date: 19 April 2016
Date added to HIBP: 8 July 2016
Compromised accounts: 4,009,640
Compromised data: Device information, Email addresses, IP addresses, Passwords, Usernames
Permalink
In late 2011, a series of data breaches in China affected up to 100 million users, including 7.5 million from the gaming site known as 17173.Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as “unverified”.The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided with support from dehashed.com.
Read more about Chinese data breaches in Have I Been Pwned.
Breach date: 28 December 2011
Date added to HIBP: 28 April 2018
Compromised accounts: 7,485,802
Compromised data: Email addresses, Passwords, Usernames
Permalink
In November 2024, the online betting platform 1win suffered a data breach that exposed 96M users.The exposed data included email and IP addresses, phone numbers, dates of birth, country and SHA-256 password hashes.The data was provided to HIBP by a source who requested it be attributed to “Leidhall”.
Breach date: 2 November 2024
Date added to HIBP: 3 February 2025
Compromised accounts: 96,166,543
Compromised data: Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Phone numbers
Permalink
In February 2018, [a massive collection of almost 3,000 alleged data breaches was found online](https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/).Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen.
Each file contained both an email address and plain text password and were consequently loaded as a single “unverified” data breach.
Breach date: 19 February 2018
Date added to HIBP: 26 February 2018
Compromised accounts: 80,115,532
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#2844Breaches)
In December 2017, the Belgian motorcycle forum [2fast4u](https://www.2fast4u.be) discovered a data breach of their system.The breach of the vBulletin message board impacted over 17k individual users and exposed email addresses, usersnames and salted MD5 passwords.
Breach date: 20 December 2017
Date added to HIBP: 7 January 2018
Compromised accounts: 17,706
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#2fast4u)
In mid-2018, the online photography community [500px suffered a data breach](https://support.500px.com/hc/en-us/articles/360017752493-Security-Issue-February-2019-FAQ).The incident exposed almost 15 million unique email addresses alongside names, usernames, genders, dates of birth and either an MD5 or bcrypt password hash.In 2019, [the data appeared listed for sale on a dark web marketplace](https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/) (along with several other large breaches) and subsequently began circulating more broadly.The data was provided to HIBP by a source who requested it to be attributed to “[email protected]”.
Breach date: 5 July 2018
Date added to HIBP: 25 March 2019
Compromised accounts: 14,867,999
Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#500px)
In approximately 2011, it’s alleged that the Chinese gaming site known as [7k7k](http://www.7k7k.com) suffered a data breach that impacted 9.1 million subscribers.Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as “unverified”.The data in the breach contains usernames, email addresses and plain text passwords.[Read more about Chinese data breaches in Have I Been Pwned.](https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/)
Breach date: 1 January 2011
Date added to HIBP: 26 September 2017
Compromised accounts: 9,121,434
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#7k7k)
In July 2018, the health and fitness service [8fit suffered a data breach](https://8fit.zendesk.com/hc/en-us/articles/360017746394-Notice).
The data subsequently appeared for sale on a dark web marketplace in February 2019 and included over 15M unique email addresses alongside names, genders, IP addresses and passwords stored as bcrypt hashes.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 1 July 2018
Date added to HIBP: 21 March 2019
Compromised accounts: 15,025,407
Compromised data: Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords
[Permalink](https://haveibeenpwned.com#8fit)
In June 2017, the online playlists service known as [8Tracks suffered a data breach](https://blog.8tracks.com/2017/06/27/password-security-alert/) which impacted 18 million accounts.In their disclosure, 8Tracks advised that “the vector for the attack was an employee’s GitHub account, which was not secured using two-factor authentication”.Salted SHA-1 password hashes for users who didn’t sign up with either Google or Facebook authentication were also included.
The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses.The complete set of 18M records was later provided by [email protected] and updated in HIBP accordingly.
Breach date: 27 June 2017
Date added to HIBP: 16 February 2018
Compromised accounts: 17,979,961
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#8tracks)
In October 2014, the (now defunct) Belgian gaming news forum 9Lives suffered a data breach [that was later redistributed as part of a larger corpus of data](https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/).
The breach exposed 109k unique email addresses along with usernames and salted MD5 password hashes.The data was provided to HIBP by a source who requested it be attributed to “Leidhall”.
Breach date: 1 October 2014
Date added to HIBP: 2 February 2025
Compromised accounts: 109,515
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#9Lives)
In November 2015, the gaming website dedicated to classic DOS games [Abandonia](http://www.abandonia.com) suffered a data breach resulting in the exposure of 776k unique user records.
The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.
Breach date: 1 November 2015
Date added to HIBP: 5 June 2017
Compromised accounts: 776,125
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Abandonia)
In November 2022, the gaming website dedicated to classic DOS games [Abandonia](https://twitter.com/FalconFeedsio/status/1594670215471792130) suffered a data breach resulting in the exposure of 920k unique user records.This breach was in addition to another one 7 years earlier in 2015.The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.
Breach date: 15 November 2022
Date added to HIBP: 7 December 2022
Compromised accounts: 919,790
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Abandonia2022)
In 2016, the site dedicated to helping people hack email and online gaming accounts known as Abusewith.us suffered multiple data breaches.
The site [allegedly had an administrator in common with the nefarious LeakedSource site](https://krebsonsecurity.com/2017/02/who-ran-leakedsource-com/), both of which have since been shut down.
The exposed data included more than 1.3 million unique email addresses, often accompanied by usernames, IP addresses and plain text or hashed passwords retrieved from various sources and intended to be used to compromise the victims’ accounts.
Breach date: 1 July 2016
Date added to HIBP: 9 October 2017
Compromised accounts: 1,372,550
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#AbuseWithUs)
In November 2014, the acne website [acne.org](http://www.acne.org/) suffered a data breach that exposed over 430k forum members’ accounts.The data was being actively traded on underground forums and included email addresses, birth dates and passwords.
Breach date: 25 November 2014
Date added to HIBP: 6 March 2016
Compromised accounts: 432,943
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#AcneOrg)
In December 2022, [attackers socially engineered an Activision HR employee into disclosing information which led to the breach of almost 20k employee records](https://www.bleepingcomputer.com/news/security/hacker-leaks-alleged-activision-employee-data-on-cybercrime-forum/).The data contained 16k unique email addresses along with names, phone numbers, job titles and the office location of the employee.Activision advised that no sensitive employee information was included in the breach.
Breach date: 4 December 2022
Date added to HIBP: 3 October 2023
Compromised accounts: 16,006
Compromised data: Email addresses, Geographic locations, Job titles, Names, Phone numbers
[Permalink](https://haveibeenpwned.com#Activision)
In October 2021, [security researcher Bob Diachenko discovered an exposed database he attributed to ActMobile, the operators of Dash VPN and FreeVPN](https://www.comparitech.com/blog/information-security/vpn-database-leak/).The exposed data included 1.6 million unique email addresses along with IP addresses and password hashes, all of which were subsequently leaked on a popular hacking forum.Although usage of the service was verified by HIBP subscribers, [ActMobile denied the data was sourced from them](https://www.databreaches.net/shoot-the-messenger-monday-edition-actmobile-threatens-researcher-whose-only-sin-was-trying-to-let-them-know-they-are-leaking-data/) and the breach has subsequently been flagged as “unverified”.
Breach date: 8 October 2021
Date added to HIBP: 9 November 2021
Compromised accounts: 1,583,193
Compromised data: Email addresses, IP addresses
[Permalink](https://haveibeenpwned.com#ActMobile)
In mid-2020, [a 437GB corpus of data attributed to an entity named “Acuity” was created and later extensively distributed](https://www.troyhunt.com/acuity-who-attempts-and-failures-to-attribute-437gb-of-breached-data).
However, the source could not be confidently verified as any known companies named Acuity.The data totalled over 14M unique email addresses with each row containing extensive personal information across more than 400 columns of data including names, phone numbers, physical addresses, genders and dates of birth.
Breach date: 18 June 2020
Date added to HIBP: 15 November 2023
Compromised accounts: 14,055,729
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses, Salutations
[Permalink](https://haveibeenpwned.com#Acuity)
In November 2018, [security researcher Bob Diachenko identified an unprotected database hosted by data aggregator “Adapt”](https://blog.hackenproof.com/industry-news/another-decision-makers-database-leaked/).A provider of “Fresh Quality Contacts”, the service exposed over 9.3M unique records of individuals and employer information including their names, employers, job titles, contact information and data relating to the employer including organisation description, size and revenue.No response was received from Adapt when contacted.
Breach date: 5 November 2018
Date added to HIBP: 22 November 2018
Compromised accounts: 9,363,740
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses, Social media profiles
[Permalink](https://haveibeenpwned.com#Adapt)
In March 2021, [news broke of a massive data breach impacting millions of Adecco customers in South America](https://cybernews.com/security/5-million-adecco-com-users-data-leaked/) which was subsequently sold on a popular hacking forum.The breach exposed over 4M unique email addresses as well as genders, dates of birth, marital statuses, phone numbers and passwords stored as bcrypt hashes.
Breach date: 3 January 2021
Date added to HIBP: 31 May 2022
Compromised accounts: 4,284,538
Compromised data: Email addresses, Genders, Geographic locations, Marital statuses, Names, Passwords, Phone numbers
[Permalink](https://haveibeenpwned.com#Adecco)
In December 2021, Indian retailer [Aditya Birla Fashion and Retail Ltd was breached and ransomed](https://restoreprivacy.com/aditya-birla-fashion-and-retail-ltd-abfrl-hack-2022/).The ransom demand was allegedly rejected and data containing 5.4M unique email addresses was subsequently dumped publicly on a popular hacking forum the next month.
The data contained extensive personal customer information including names, phone numbers, physical addresses, DoBs, order histories and passwords stored as MD5 hashes.Employee data was also dumped publicly and included salary grades, marital statuses and religions.The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 1 December 2021
Date added to HIBP: 15 January 2022
Compromised accounts: 5,470,063
Compromised data: Email addresses, Genders, Income levels, Job titles, Marital statuses, Names, Passwords, Phone numbers, Physical addresses, Purchases, Religions, Salutations
[Permalink](https://haveibeenpwned.com#ABFRL)
In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text.The password cryptography was poorly done and many were quickly resolved back to plain text.The unencrypted hints also [disclosed much about the passwords](https://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html) adding further to the risk that hundreds of millions of Adobe customers already faced.
Breach date: 4 October 2013
Date added to HIBP: 4 December 2013
Compromised accounts: 152,445,165
Compromised data: Email addresses, Password hints, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Adobe)
In July 2022, the Adopt Me Trading Values website for assessing the value of pet trades within the “Adopt Me!” Roblox game suffered a data breach [that was later redistributed as part of a larger corpus of data](https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/).The breach exposed 86k unique email addresses along with usernames (and Roblox usernames), IP addresses and bcrypt password hashes.
The data was provided to HIBP by a source who requested it be attributed to “Leidhall”.
Breach date: 1 July 2022
Date added to HIBP: 10 February 2025
Compromised accounts: 86,136
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#AdoptMeTradingValues)
In May 2015, the adult hookup site [Adult FriendFinder was hacked](http://www.bbc.com/news/business-32839196) and nearly 4 million records dumped publicly.The data dump included extremely sensitive personal information about individuals and their relationship statuses and sexual preferences combined with personally identifiable information.
Breach date: 21 May 2015
Date added to HIBP: 22 May 2015
Compromised accounts: 3,867,997
Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Races, Relationship statuses, Sexual orientations, Spoken languages, Usernames
[Permalink](https://haveibeenpwned.com#AdultFriendFinder)
In October 2016, the adult entertainment company [Friend Finder Networks suffered a massive data breach](https://www.zdnet.com/article/adultfriendfinder-network-hack-exposes-secrets-of-412-million-users/).
The incident impacted multiple separate online assets owned by the company, the largest of which was the Adult FriendFinder website alleged to be “the world’s largest sex & swinger community”.Exposed data included usernames, passwords stored as SHA-1 hashes and 170 million unique email addresses.This incident is separate to the 2015 data breach Adult FriendFinder also suffered.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 16 October 2016
Date added to HIBP: 6 February 2020
Compromised accounts: 169,746,810
Compromised data: Email addresses, Passwords, Spoken languages, Usernames
[Permalink](https://haveibeenpwned.com#AdultFriendFinder2016)
In May 2018, the website for sharing adult-orientated works of fiction known as [Adult-FanFiction.Org](http://www.adult-fanfiction.org) had 186k records exposed in a data breach.
The data contained names, email addresses, dates of birth and passwords stored as both MD5 hashes and plain text.AFF did not respond when contacted about the breach and the site was previously reported as compromised on the [Vigilante.pw](https://vigilante.pw/) breached database directory.
Breach date: 30 May 2018
Date added to HIBP: 6 August 2018
Compromised accounts: 186,082
Compromised data: Dates of birth, Email addresses, Names, Passwords
[Permalink](https://haveibeenpwned.com#AdultFanFiction)
In June 2024, [Advance Auto Parts confirmed they had suffered a data breach](https://www.bleepingcomputer.com/news/security/advance-auto-parts-confirms-data-breach-exposed-employee-information/) which was posted for sale to a popular hacking forum.Linked to unauthorised access to Snowflake cloud services, the breach exposed a large number of records related to both customers and employees.In total, 79M unique email addresses were included in the breach, alongside names, phone numbers, addresses and further data attributes related to company employees.
Breach date: 5 June 2024
Date added to HIBP: 24 June 2024
Compromised accounts: 79,243,727
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#AdvanceAutoParts)
In April 2018, the ad management platform known as [AerServ](https://www.aerserv.com/) suffered a data breach.Acquired by InMobi earlier in the year, the AerServ breach impacted over 66k unique email addresses and also included contact information and passwords stored as salted SHA-512 hashes.The data was publicly posted to Twitter later in 2018 after which InMobi was notified and advised they were aware of the incident.
Breach date: 1 April 2018
Date added to HIBP: 6 December 2018
Compromised accounts: 66,308
Compromised data: Email addresses, Employers, Job titles, Names, Passwords, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#AerServ)
In September 2019, Polish torrent site [AgusiQ-Torrents.pl](http://agusiq-torrents.pl/) suffered a data breach.
The incident exposed 90k member records including email and IP addresses, usernames and passwords stored as MD5 hashes.
Breach date: 24 September 2019
Date added to HIBP: 4 December 2019
Compromised accounts: 90,478
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#AgusiQTorrents)
In May 2013, the torrent site [AhaShare.com](http://www.ahashare.com) suffered a breach which resulted in more than 180k user accounts being published publicly.The breach included a raft of personal information on registered users plus despite assertions of not distributing personally identifiable information, the site also leaked the IP addresses used by the registered identities.
Breach date: 30 May 2013
Date added to HIBP: 6 November 2014
Compromised accounts: 180,468
Compromised data: Email addresses, Genders, Geographic locations, IP addresses, Partial dates of birth, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#AhaShare)
In December 2017, the virtual keyboard application [ai.type was found to have left a huge amount of data publicly facing in an unsecured MongoDB instance](https://mackeepersecurity.com/post/virtual-keyboard-developer-leaked-31-million-of-client-records).Discovered by researchers at The Kromtech Security Center, the 577GB data set included extensive personal information including over 20 million unique email addresses, social media profiles and address book contacts.The email addresses alone were provided to HIBP to enable impacted users to assess their exposure.
Breach date: 5 December 2017
Date added to HIBP: 8 December 2017
Compromised accounts: 20,580,060
Compromised data: Address book contacts, Apps installed on devices, Cellular network names, Dates of birth, Device information, Email addresses, Genders, Geographic locations, IMEI numbers, IMSI numbers, IP addresses, Names, Phone numbers, Profile photos, Social media profiles
[Permalink](https://haveibeenpwned.com#AIType)
In mid-2019, the video game cheats website “Aimware” suffered a data breach that exposed hundreds of thousands of subscribers’ personal information.Data included email and IP addresses, usernames, forum posts, private messages, website activity and passwords stored as salted MD5 hashes.The data was provided to HIBP by a source who requested it be attributed to “clerk/anthrax/soontoberichh”.
Breach date: 28 April 2019
Date added to HIBP: 2 May 2022
Compromised accounts: 305,470
Compromised data: Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#Aimware)
In September 2016, data allegedly obtained from the Chinese gaming website known as [Aipai.com](http://aipai.com) and containing 6.5M accounts was leaked online.
Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as “unverified”.The data in the breach contains email addresses and MD5 password hashes.[Read more about Chinese data breaches in Have I Been Pwned.](https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/)
Breach date: 27 September 2016
Date added to HIBP: 7 November 2016
Compromised accounts: 6,496,778
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#Aipai)
In September 2021, the Thai-based English language teaching website [Ajarn discovered they’d been the victim of a data breach dating back to December 2018](https://www.ajarn.com/data-breach).The breach was self-submitted to HIBP and included 266k email addresses, names, genders, phone numbers and other personal information.
Hashed passwords were also impacted in the breach.
Breach date: 13 December 2018
Date added to HIBP: 26 September 2021
Compromised accounts: 266,399
Compromised data: Dates of birth, Education levels, Email addresses, Genders, Geographic locations, Job applications, Marital statuses, Names, Nationalities, Passwords, Phone numbers, Profile photos
[Permalink](https://haveibeenpwned.com#Ajarn)
In July 2016, a hacker known as Phineas Fisher [hacked Turkey’s ruling party (Justice and Development Party or “AKP”) and gained access to 300k emails](https://motherboard.vice.com/en_us/article/yp3n55/phineas-fisher-turkish-government-hack).The full contents of the emails were subsequently [published by WikiLeaks and made searchable](https://wikileaks.org/akp-emails/).HIBP identified over 917k unique email address patterns in the data set, including message IDs and a number of other non-user addresses.
Breach date: 19 July 2016
Date added to HIBP: 1 October 2017
Compromised accounts: 917,461
Compromised data: Email addresses, Email messages
[Permalink](https://haveibeenpwned.com#AKP)
In February 2025, [23 billion rows of stealer logs were obtained from a Telegram channel known as ALIEN TXTBASE](https://www.troyhunt.com/processing-23-billion-rows-of-alien-txtbase-stealer-logs).The data contained 284M unique email addresses alongside the websites they were entered into and the passwords used.
This data is now searchable in HIBP by both email domain and the domain of the target website.
Breach date: 15 February 2025
Date added to HIBP: 25 February 2025
Compromised accounts: 284,132,969
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#AlienStealerLogs)
In 2019, the snow sports tracking app AlpineReplay suffered a data breach that exposed 900k unique email addresses.Later rolled into the Trace service, the breach included names, usernames, genders, dates of birth, weights and passwords stored as either unsalted MD5 or bcrypt hashes.
Breach date: 27 August 2019
Date added to HIBP: 17 October 2024
Compromised accounts: 898,681
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords, Physical attributes, Usernames
[Permalink](https://haveibeenpwned.com#AlpineReplay)
In June 2022, the malicious “carding” (referring to credit card fraud) website Altenen suffered a data breach [that was later redistributed as part of a larger corpus of data](https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/).The data included 1.3M unique email addresses, usernames, bcrypt password hashes and cryptocurrency wallet addresses.
Breach date: 24 June 2022
Date added to HIBP: 5 November 2024
Compromised accounts: 1,267,701
Compromised data: Cryptocurrency wallet addresses, Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Altenen)
In May 2022, the Australian retailer [Amart Furniture advised that their warranty claims database hosted on Amazon Web Services had been the target of a cyber attack](https://www.ozbargain.com.au/node/701231).Over 100k records containing email and physical address, names, phone numbers and passwords stored as bcrypt hashes were exposed and shared online by the attacker.
Breach date: 16 May 2022
Date added to HIBP: 25 May 2022
Compromised accounts: 108,940
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#AmartFurniture)
In November 2015, an Ancestry service known as [RootsWeb suffered a data breach](https://blogs.ancestry.com/ancestry/2017/12/23/rootsweb-security-update/).
The breach was not discovered until late 2017 when a file containing almost 300k email addresses and plain text passwords was identified.
Breach date: 7 November 2015
Date added to HIBP: 24 December 2017
Compromised accounts: 297,806
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#Ancestry)
In October 2011, the Android Forums website [was hacked](http://www.pcworld.com/article/259201/online_android_forum_hacked_user_data_accessed.html) and 745k user accounts were subsequently leaked publicly.The compromised data included email addresses, user birth dates and passwords stored as a salted MD5 hash.
Breach date: 30 October 2011
Date added to HIBP: 20 December 2015
Compromised accounts: 745,355
Compromised data: Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords
[Permalink](https://haveibeenpwned.com#AndroidForums)
In July 2021, the Android applications and games review site [AndroidLista](https://www.androidlista.com/) suffered a data breach.The incident exposed 6.6M user records containing email addresses, names, usernames and passwords stored as salted SHA-1 hashes, all of which were subsequently posted to a popular hacking forum.AndroidLista did not respond when contacted about the breach.
Breach date: 28 July 2021
Date added to HIBP: 17 October 2023
Compromised accounts: 6,640,643
Compromised data: Email addresses, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#AndroidLista)
In October 2020, the online game for kids [Animal Jam suffered a data breach](https://www.animaljam.com/en/2020databreach) which was subsequently shared through online hacking communities the following month.The data contained 46 million user accounts with over 7 million unique email addresses.Impacted data also included usernames, IP addresses and for some records, dates of birth (sometimes in partial form), physical addresses, parent names and passwords stored as PBKDF2 hashes.
Breach date: 12 October 2020
Date added to HIBP: 12 November 2020
Compromised accounts: 7,104,998
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Physical addresses, Usernames
[Permalink](https://haveibeenpwned.com#AnimalJam)
In February 2020, the gaming website [AnimeGame](http://animegame.me/) suffered a data breach.The incident affected 1.4M subscribers and exposed email addresses, usernames and passwords stored as salted MD5 hashes.
The data was subsequently shared on a popular hacking forum and was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 27 February 2020
Date added to HIBP: 9 March 2020
Compromised accounts: 1,431,378
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#AnimeGame)
In July 2024, [AnimeLeague disclosed a data breach of their services](https://www.animeleague.net/forum/viewtopic.php?f=55&t=134675).The data was posted for sale on a popular hacking forum and included 2 databases covering both event registration records and a dump of the phpBB bulletin board.The impacted data included passwords in various hashed formats including SHA-1, salted md5 and bcrypt, as well as usernames, private messages, dates of birth, purchases and 192k unique email addresses.
Breach date: 4 July 2024
Date added to HIBP: 31 July 2024
Compromised accounts: 192,134
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords, Phone numbers, Private messages, Purchases, Usernames
[Permalink](https://haveibeenpwned.com#AnimeLeague)
In approximately 2016, the anime website [Anime-Planet](https://www.anime-planet.com/) suffered a data breach that impacted 369k subscribers.The exposed data included usernames, IP and email addresses, dates of birth and passwords stored as unsalted MD5 hashes and for newer accounts, bcrypt hashes.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 1 January 2016
Date added to HIBP: 28 July 2019
Compromised accounts: 368,507
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#AnimePlanet)
In July 2018, the cloud-based video making service [Animoto suffered a data breach](https://techcrunch.com/2018/08/20/animoto-hack-exposes-personal-information-geolocation-data/).
The breach exposed 22 million unique email addresses alongside names, dates of birth, country of origin and salted password hashes.The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 10 July 2018
Date added to HIBP: 18 July 2019
Compromised accounts: 22,437,749
Compromised data: Dates of birth, Email addresses, Geographic locations, Names, Passwords
[Permalink](https://haveibeenpwned.com#Animoto)
In December 2016, a huge list of email address and password pairs appeared in a “combo list” referred to as “Anti Public”.
The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems.The list was broadly circulated and used for “credential stuffing”, that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password.For detailed background on this incident, read [Password reuse, credential stuffing and another billion records in Have I Been Pwned](https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned).
Breach date: 16 December 2016
Date added to HIBP: 4 May 2017
Compromised accounts: 457,962,538
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#AntiPublic)
In May 2019, [news broke of a massive SMS spam operation known as “ApexSMS” which was discovered after a MongoDB instance of the same name was found exposed without a password](https://techcrunch.com/2019/05/09/sms-spammers-doxxed/?guccounter=1).The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and IP addresses.
Breach date: 15 April 2019
Date added to HIBP: 21 September 2023
Compromised accounts: 23,246,481
Compromised data: Email addresses, Genders, Geographic locations, IP addresses, Names, Phone numbers, Telecommunications carrier
[Permalink](https://haveibeenpwned.com#ApexSMS)
In September 2022, the Taiwanese Android forum APK.TW suffered a data breach [that was later redistributed as part of a larger corpus of data](https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/).The breach exposed 2.5M unique email addresses along with IP addresses, usernames and salted MD5 password hashes.
Breach date: 3 September 2022
Date added to HIBP: 9 March 2024
Compromised accounts: 2,451,197
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#APKTW)
In July 2018, the sales engagement startup [Apollo left a database containing billions of data points publicly exposed without a password](https://www.wired.com/story/apollo-breach-linkedin-salesforce-data/).The data was discovered by security researcher [Vinny Troia](http://www.vinnytroia.com/) who subsequently sent a subset of the data containing 126 million unique email addresses to Have I Been Pwned.The data left exposed by Apollo was used in their “revenue acceleration platform” and included personal information such as names and email addresses as well as professional information including places of employment, the roles people hold and where they’re located.
Apollo stressed that the exposed data did not include sensitive information such as passwords, social security numbers or financial data.[The Apollo website has a contact form](https://www.apollo.io/contact) for those looking to get in touch with the organisation.
Breach date: 23 July 2018
Date added to HIBP: 5 October 2018
Compromised accounts: 125,929,660
Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Salutations, Social media profiles
[Permalink](https://haveibeenpwned.com#Apollo)
In March 2017, the French Flatsharing site known as [Appartoo](https://www.appartoo.com) suffered a data breach.The incident exposed an extensive amount of personal information on almost 50k members including email addresses, genders, ages, private messages sent between users of the service and passwords stored as SHA-256 hashes.Appartoo advised that all subscribers were notified of the incident in early 2017.
Breach date: 25 March 2017
Date added to HIBP: 2 May 2019
Compromised accounts: 49,681
Compromised data: Ages, Auth tokens, Email addresses, Employment statuses, Genders, IP addresses, Marital statuses, Names, Passwords, Physical addresses, Private messages, Social media profiles
[Permalink](https://haveibeenpwned.com#Appartoo)
In June 2020, the AI training data company [Appen suffered a data breach](https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/) exposing the details of almost 5.9 million users which were subsequently sold online.Included in the breach were names, email addresses and passwords stored as bcrypt hashes.Some records also contained phone numbers, employers and IP addresses.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 22 June 2020
Date added to HIBP: 30 July 2020
Compromised accounts: 5,888,405
Compromised data: Email addresses, Employers, IP addresses, Names, Passwords, Phone numbers
[Permalink](https://haveibeenpwned.com#Appen)
In April 2020, the independent Android app store [Aptoide suffered a data breach](https://blog.aptoide.com/aptoide-credentials-information/).
The incident resulted in the exposure of 20M customer records which were subsequently shared online via a popular hacking forum.Impacted data included email and IP addresses, names, IP addresses and passwords stored as SHA-1 hashes without a salt.
Breach date: 13 April 2020
Date added to HIBP: 19 April 2020
Compromised accounts: 20,012,235
Compromised data: Browser user agent details, Email addresses, IP addresses, Names, Passwords
[Permalink](https://haveibeenpwned.com#Aptoide)
In January 2019, the game portal website [Armor Games suffered a data breach](https://techraptor.net/content/armor-games-data-breach-january-2019).A total of 10.6 million email addresses were impacted by the breach which also exposed usernames, IP addresses, birthdays of administrator accounts and passwords stored as salted SHA-1 hashes.The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 1 January 2019
Date added to HIBP: 20 July 2019
Compromised accounts: 10,604,307
Compromised data: Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#ArmorGames)
In May 2016, the online gaming site [Army Force Online](http://armyforceonline.com) suffered a data breach that exposed 1.5M accounts.
The breached data was found being regularly traded online and included usernames, email and IP addresses and MD5 passwords.
Breach date: 18 May 2016
Date added to HIBP: 10 November 2016
Compromised accounts: 1,531,235
Compromised data: Avatars, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#ArmyForceOnline)
In April 2018, the online arts database [Artsy suffered a data breach which consequently appeared for sale on a dark web marketplace](https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/).Over 1M accounts were impacted and included IP and email addresses, names and passwords stored as salted SHA-512 hashes.The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 1 April 2018
Date added to HIBP: 25 May 2020
Compromised accounts: 1,079,970
Compromised data: Email addresses, IP addresses, Names, Passwords
[Permalink](https://haveibeenpwned.com#Artsy)
In June 2019, the France-based art valuation website [Artvalue.com](http://artvalue.com/) left their 158k member subscriber base publicly exposed in a text file on their website.The exposed data included names, usernames, email addresses and passwords stored as MD5 hashes.
The site operator did not respond when contacted about the incident, although the exposed file was subsequently removed.
Breach date: 19 June 2019
Date added to HIBP: 19 July 2019
Compromised accounts: 157,692
Compromised data: Email addresses, Names, Passwords, Salutations, Usernames
[Permalink](https://haveibeenpwned.com#Artvalue)
In July 2015, the infidelity website Ashley Madison [suffered a serious data breach](http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/).The attackers threatened Ashley Madison with the full disclosure of the breach unless the service was shut down.One month later, the database was dumped including more than 30M unique email addresses.This breach has been classed as “sensitive” and is not publicly searchable, although individuals may discover if they’ve been impacted by [registering for notifications](https://haveibeenpwned.com/NotifyMe).[Read about this approach in detail](https://www.troyhunt.com/2015/07/heres-how-im-going-to-handle-ashley.html).
Breach date: 19 July 2015
Date added to HIBP: 18 August 2015
Compromised accounts: 30,811,934
Compromised data: Dates of birth, Email addresses, Ethnicities, Genders, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Security questions and answers, Sexual orientations, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#AshleyMadison)
In December 2013, the vBulletin forum for the social engineering site known as “AstroPID” was breached and [leaked publicly](https://www.sinister.ly/Thread-40-Compromised-databases).The site provided tips on fraudulently obtaining goods and services, often by providing a legitimate “PID” or Product Information Description.
The breach resulted in nearly 6k user accounts and over 220k private messages between forum members being exposed.
Breach date: 19 December 2013
Date added to HIBP: 6 July 2014
Compromised accounts: 5,788
Compromised data: Email addresses, Instant messenger identities, IP addresses, Names, Passwords, Private messages, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#AstroPID)
In March 2024, [tens of millions of records allegedly breached from AT&T were posted to a popular hacking forum](https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach).Dating back to August 2021, the data was originally posted for sale before later being freely released.At the time, AT&T maintained that there had not been a breach of their systems and that the data originated from elsewhere.12 days later, [AT&T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor](https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html).[AT&T also proceeded to reset customer account passcodes](https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/), an indicator that there was sufficient belief passcodes had been compromised.The incident exposed names, email and physical addresses, dates of birth, phone numbers and US social security numbers.
Breach date: 20 August 2021
Date added to HIBP: 19 March 2024
Compromised accounts: 49,102,176
Compromised data: Dates of birth, Email addresses, Government issued IDs, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#AllegedATT)
In December 2015, the service for creating and running free Minecraft servers known as [Aternos suffered a data breach that impacted 1.4 million subscribers](https://twitter.com/AternosStatus/status/696121828360716288).The data included usernames, email and IP addresses and hashed passwords.
Breach date: 6 December 2015
Date added to HIBP: 1 October 2016
Compromised accounts: 1,436,486
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#Aternos)
In August 2018, the cryptocurrency investment platform [Atlas Quantum suffered a data breach](https://www.facebook.com/notes/atlas-quantum/comunicado-importante/2196456297259749/).
The breach leaked the personal data of 261k investors on the platform including their names, phone numbers, email addresses and account balances.
Breach date: 25 August 2018
Date added to HIBP: 27 August 2018
Compromised accounts: 261,463
Compromised data: Account balances, Email addresses, Names, Phone numbers
[Permalink](https://haveibeenpwned.com#AtlasQuantum)
In April 2021, “Japan’s largest e-mail friend search site” [Atmeltomo suffered a data breach that was later sold on a popular hacking forum](https://socradar.io/the-week-in-dark-web-29-august-2022-access-sales-and-data-leaks/).The breach exposed 1.3M records with 580k unique email addresses along with usernames, IP addresses and unsalted MD5 password hashes.
Breach date: 16 April 2021
Date added to HIBP: 22 August 2023
Compromised accounts: 580,177
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Atmeltomo)
In August 2019, [Audi USA suffered a data breach after a vendor left data unsecured and exposed on the internet](https://techcrunch.com/2021/06/11/volkswagen-says-a-vendors-security-lapse-exposed-3-3-million-drivers-details/).The data contained 2.7M unique email addresses along with names, phone numbers, physical addresses and vehicle information including VIN.
In [a disclosure statement from Audi](https://techcrunch.com/2021/06/11/volkswagen-says-a-vendors-security-lapse-exposed-3-3-million-drivers-details/), they also advised some customers had driver’s licenses, dates of birth, social security numbers and other personal information exposed.
Breach date: 14 August 2019
Date added to HIBP: 23 July 2021
Compromised accounts: 2,743,539
Compromised data: Dates of birth, Driver’s licenses, Email addresses, Names, Phone numbers, Physical addresses, Social security numbers, Vehicle details
[Permalink](https://haveibeenpwned.com#Audi)
In February 2018, [data belonging to the Polish motoring website autocentrum.pl was found online](https://niebezpiecznik.pl/post/wyciek-hasel-144-000-uzytkownikow-autocentrum-pl/).The data contained 144k email addresses and plain text passwords.
Breach date: 4 February 2018
Date added to HIBP: 9 February 2018
Compromised accounts: 143,717
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#Autocentrum)
In January 2023, [1.4M records from the Autotrader online vehicle marketplace appeared on a popular hacking forum](https://thecyberexpress.com/data1-4-million-autotrader-user-exposed/).Autotrader stated that the “data in question relates to aged listing data that was generally publicly available on our site at the time and open to automated collection methods”.The data contained 20k unique email addresses alongside physical addresses and phone numbers of dealers and vehicle details including VIN numbers.
The data was provided to HIBP by a source who requested it be attributed to “IntelBroker”.
Breach date: 6 January 2023
Date added to HIBP: 23 January 2023
Compromised accounts: 20,032
Compromised data: Email addresses, Phone numbers, Physical addresses, Vehicle details, Vehicle identification numbers (VINs)
[Permalink](https://haveibeenpwned.com#Autotrader)
In May 2014, [the Avast anti-virus forum was hacked](https://www.grahamcluley.com/2014/05/avast-forum-hacked/) and 423k member records were exposed.The Simple Machines Based forum included usernames, emails and password hashes.
Breach date: 26 May 2014
Date added to HIBP: 12 March 2016
Compromised accounts: 422,959
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Avast)
In November 2022, the Moroccan e-commerce service [Avito suffered a data breach that exposed the personal information of 2.7M customers](https://ledesk.ma/2022/12/20/avito-sexplique-sur-le-data-breach-ayant-touche-27-millions-dutilisateurs-de-sa-plateforme/).The data included name, email, phone, IP address and geographic location.
Breach date: 18 November 2022
Date added to HIBP: 14 November 2023
Compromised accounts: 2,721,835
Compromised data: Email addresses, Geographic locations, IP addresses, Names, Phone numbers
[Permalink](https://haveibeenpwned.com#Avito)
In approximately December 2019, an alleged data breach of the lawyer directory service Avvo was published to an online hacking forum and used in an extortion scam (it’s possible the exposure dates back earlier than that).The data contained 4.1M unique email addresses alongside SHA-1 hashes, most likely representing user passwords.
[Multiple attempts at contacting Avvo over the course of a week were unsuccessful and the authenticity of the data was eventually verified with common Avvo and HIBP subscribers.](https://troyhunt.com/breach-disclosure-blow-by-blow-heres-why-its-so-hard)
Breach date: 17 December 2019
Date added to HIBP: 15 April 2022
Compromised accounts: 4,101,101
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#Avvo)
In mid-2017, a spam list of over 105 million individuals in corporate America was discovered online.Referred to as “B2B USA Businesses”, the list categorised email addresses by employer, providing information on individuals’ job titles plus their work phone numbers and physical addresses.[Read more about spam lists in HIBP.](https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information)
Breach date: 18 July 2017
Date added to HIBP: 18 July 2017
Compromised accounts: 105,059,554
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#B2BUSABusinesses)
In approximately 2008, the site to help parents name their children known as [Baby Names](https://www.babynames.com/) suffered a data breach.
The incident exposed 846k email addresses and passwords stored as salted MD5 hashes.When contacted in October 2018, Baby Names advised that “the breach happened at least ten years ago” and that members were notified at the time.
Breach date: 24 October 2008
Date added to HIBP: 24 October 2018
Compromised accounts: 846,742
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#BabyNames)
In June 2016, [a data breach allegedly originating from the social website Badoo was found to be circulating amongst traders](http://motherboard.vice.com/read/another-day-another-hack-user-accounts-of-dating-site-badoo).Likely obtained several years earlier, the data contained 112 million unique email addresses with personal data including names, birthdates and passwords stored as MD5 hashes.
Whilst there are many indicators suggesting Badoo did indeed suffer a data breach, [the legitimacy of the data could not be emphatically proven](https://www.troyhunt.com/introducing-unverified-breaches-to-have-i-been-pwned) so this breach has been categorised as “unverified”.
Breach date: 1 June 2013
Date added to HIBP: 6 July 2016
Compromised accounts: 112,005,531
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Badoo)
In approximately December 2018, the online ad platform [BannerBit](https://bannerbit.com/) suffered a data breach.Containing 213k unique email addresses and plain text passwords, the data was provided to HIBP by a third party.
Multiple attempts were made to contact BannerBit, but no response was received.
Breach date: 29 December 2018
Date added to HIBP: 8 January 2019
Compromised accounts: 213,415
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#BannerBit)
In August 2022, [millions of records from Mexican bank “Banorte” were publicly dumped on a popular hacking forum](https://krebsonsecurity.com/2022/08/when-efforts-to-contain-a-data-breach-backfire/) including 2.1M unique email addresses, physical addresses, names, phone numbers, RFC (tax) numbers, genders and bank balances.Banorte have stated that the data is “outdated”, although have not yet indicated how far back it dates to.Anecdotal feedback from HIBP subscribers suggests the data may date back 8 years to 2014.
Breach date: 18 August 2014
Date added to HIBP: 18 August 2022
Compromised accounts: 2,107,000
Compromised data: Account balances, Email addresses, Genders, Government issued IDs, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#Banorte)
In June 2011 as part of a final breached data dump, the hacker collective “LulzSec” [obtained and released over half a million usernames and passwords from the game Battlefield Heroes](http://www.rockpapershotgun.com/2011/06/26/lulzsec-over-release-battlefield-heroes-data).The passwords were stored as MD5 hashes with no salt and many were easily converted back to their plain text versions.
Breach date: 26 June 2011
Date added to HIBP: 23 January 2014
Compromised accounts: 530,270
Compromised data: Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BattlefieldHeroes)
In January 2016, the esports website [Battlefy suffered a data breach that exposed 83k customer records](https://dotesports.com/general/news/battlefy-hack-data-breach-user-credentials-2800).
The impacted data included email addresses, usernames and passwords stored as bcrypt hashes.
Breach date: 11 January 2016
Date added to HIBP: 29 July 2022
Compromised accounts: 83,610
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Battlefy)
In November 2015, the dating website [Beautiful People was hacked](http://www.forbes.com/sites/thomasbrewster/2016/04/25/beautiful-people-hack-sexual-preference-location-addresses/#26a2cdf7559f) and over 1.1M accounts were leaked.The data was being traded in underground circles and included a huge amount of personal information related to dating.
Breach date: 11 November 2015
Date added to HIBP: 25 April 2016
Compromised accounts: 1,100,089
Compromised data: Beauty ratings, Car ownership statuses, Dates of birth, Drinking habits, Education levels, Email addresses, Genders, Geographic locations, Home ownership statuses, Income levels, IP addresses, Job titles, Names, Passwords, Personal descriptions, Personal interests, Physical attributes, Sexual orientations, Smoking habits, Website activity
[Permalink](https://haveibeenpwned.com#BeautifulPeople)
In February 2014, [Bell Canada suffered a data breach via the hacker collective known as NullCrew](http://news.softpedia.com/news/Hackers-Claim-to-Have-Breached-Bell-Canada-s-Systems-422952.shtml?utm_medium=twitter&utm_source=FredToadster).The breach included data from multiple locations within Bell and exposed email addresses, usernames, user preferences and a number of unencrypted passwords and credit card data from 40,000 records containing just over 20,000 unique email addresses and usernames.
Breach date: 1 February 2014
Date added to HIBP: 1 February 2014
Compromised accounts: 20,902
Compromised data: Credit cards, Genders, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Bell)
In May 2017, [the Bell telecommunications company in Canada suffered a data breach](http://www.cbc.ca/beta/news/technology/bell-data-breach-customer-names-phone-numbers-emails-leak-1.4116608) resulting in the exposure of millions of customer records.The data was consequently leaked online with a message from the attacker stating that they were “releasing a significant portion of Bell.ca’s data due to the fact that they have failed to cooperate with us” and included a threat to leak more.The impacted data included over 2 million unique email addresses and 153k survey results dating back to 2011 and 2012.
There were also 162 Bell employee records with more comprehensive personal data including names, phone numbers and plain text “passcodes”.Bell suffered another breach in 2014 which exposed 40k records.
Breach date: 15 May 2017
Date added to HIBP: 16 May 2017
Compromised accounts: 2,231,256
Compromised data: Email addresses, Geographic locations, IP addresses, Job titles, Names, Passwords, Phone numbers, Spoken languages, Survey results, Usernames
[Permalink](https://haveibeenpwned.com#Bell2017)
In November 2019, the Serbian technology news website [Benchmark suffered a breach of its forum](https://forum.benchmark.rs/threads/benchmark-forum-kompromitovan.489760/) that exposed 93k customer records.The breach exposed IP and email addresses, usernames and passwords stored as salted MD5 hashes.[A forum administrator subsequently advised that the breach was due to the forum previously running on an outdated vBulletin instance](https://forum.benchmark.rs/threads/benchmark-forum-kompromitovan.489760/#post-6758095).The data was provided to HIBP by a source who requested it be attributed to “ZAN @ BF”.
Breach date: 1 November 2019
Date added to HIBP: 1 January 2023
Compromised accounts: 93,343
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Benchmark)
In March 2018, the animal bestiality website known as [Bestialitysextaboo was hacked](https://motherboard.vice.com/en_us/article/evqvpz/bestiality-website-hacked-troy-hunt-have-i-been-pwned).A collection of various sites running on the same service were also compromised and details of the hack (including links to the data) were posted on a popular forum.In all, more than 3.2k unique email addresses were included alongside usernames, IP addresses, dates of birth, genders and bcrypt hashes of passwords.
Breach date: 19 March 2018
Date added to HIBP: 29 March 2018
Compromised accounts: 3,204
Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Private messages, Usernames
[Permalink](https://haveibeenpwned.com#Bestialitysextaboo)
In early 2020, the Indonesian consumer electronics website [Bhinneka suffered a data breach that exposed almost 1.3M customer records](https://www.thejakartapost.com/news/2020/05/13/e-commerce-platform-bhinneka-com-reported-to-be-latest-target-of-data-theft.html).
The data included email and physical addresses, names, genders, dates of birth, phone numbers and salted password hashes.
Breach date: 27 January 2020
Date added to HIBP: 6 October 2022
Compromised accounts: 1,274,340
Compromised data: Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#Bhinneka)
In October 2020, the Indian grocery platform [bigbasket suffered a data breach that exposed over 20 million customer records](https://indianexpress.com/article/business/business-others/bigbasket-data-breach-user-details-leaked-dark-web-cyber-crime-7009578/).The data was originally sold before being leaked publicly in April the following year and included email, IP and physical addresses, names, phones numbers, dates of birth passwords stored as Django(SHA-1) hashes.
Breach date: 14 October 2020
Date added to HIBP: 26 April 2021
Compromised accounts: 24,500,011
Compromised data: Dates of birth, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#bigbasket)
In April 2014, the job site [bigmoneyjobs.com](http://www.bigmoneyjobs.com) was [hacked by an attacker known as “ProbablyOnion”](https://twitter.com/ProbablyOnion2/status/451477310319779841).
The attack resulted in the [exposure of over 36,000 user accounts](http://news.softpedia.com/news/BigMoneyJobs-Hacked-Details-of-36-000-Users-Leaked-Online-436250.shtml?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=information_security) including email addresses, usernames and passwords which were stored in plain text.The attack was allegedly mounted by exploiting a SQL injection vulnerability.
Breach date: 3 April 2014
Date added to HIBP: 8 April 2014
Compromised accounts: 36,789
Compromised data: Career levels, Education levels, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Salutations, User website URLs, Website activity
[Permalink](https://haveibeenpwned.com#BigMoneyJobs)
In September 2014, the online game [Bin Weevils suffered a data breach](http://blog.binweevils.com/2014/09/important-security-update/).Whilst originally stating that only usernames and passwords had been exposed, [a subsequent story on DataBreaches.net indicated that a more extensive set of personal attributes were impacted](https://www.databreaches.net/data-from-2014-hack-of-childrens-online-game-bin-weevils-leaked-online-hacker-claims-20m-records/) (comments there also suggest the data may have come from a later breach).Data matching that pattern was later provided to Have I Been Pwned by [@akshayindia6](https://twitter.com/akshayindia6) and included almost 1.3m unique email addresses, genders, ages and plain text passwords.
Breach date: 1 September 2014
Date added to HIBP: 18 August 2017
Compromised accounts: 1,287,073
Compromised data: Ages, Email addresses, Genders, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BinWeevils)
In December 2016, the forum for the biohacking website [Biohack.me suffered a data breach](https://forum.biohack.me/index.php?p=/discussion/2101/critical-website-server-compromised-read-this-action-needed) that exposed 3.4k accounts.The data included usernames, email addresses and hashed passwords along with the private messages of forum members.
The data was self-submitted to HIBP by the Biohack.me operators.
Breach date: 2 December 2016
Date added to HIBP: 23 August 2017
Compromised accounts: 3,402
Compromised data: Email addresses, Passwords, Private messages, Usernames
[Permalink](https://haveibeenpwned.com#BiohackMe)
In September 2014, a large dump of nearly 5M usernames and passwords was [posted to a Russian Bitcoin forum](https://forum.btcsec.com/index.php?/topic/9426-gmail-meniai-parol/).
Whilst commonly reported as 5M “Gmail passwords”, the dump also contained 123k yandex.ru addresses.Whilst the origin of the breach remains unclear, the breached credentials were [confirmed by multiple source as correct](http://web.archive.org/web/20140910190920/http://www.reddit.com/r/netsec/comments/2fz13q/5_millions_of_gmail_passwords_leaked_rus_most/), albeit a number of years old.
Breach date: 9 January 2014
Date added to HIBP: 10 September 2014
Compromised accounts: 4,789,599
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#BTSec)
In May 2015, the Bitcoin forum [Bitcoin Talk was hacked](https://www.cryptocoinsnews.com/bitcoin-exchange-btc-e-bitcointalk-forum-breaches-details-revealed/) and over 500k unique email addresses were exposed.The attack led to the exposure of a raft of personal data including usernames, email and IP addresses, genders, birth dates, security questions and MD5 hashes of their answers plus hashes of the passwords themselves.
Breach date: 22 May 2015
Date added to HIBP: 27 March 2017
Compromised accounts: 501,407
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Passwords, Security questions and answers, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#BitcoinTalk)
In May 2014, the link management company [Bitly announced they’d suffered a data breach](https://bitly.com/blog/urgent-security-update-regarding-your-bitly-account/).The breach contained over 9.3 million unique email addresses, usernames and hashed passwords, most using SHA1 with a small number using bcrypt.
Breach date: 8 May 2014
Date added to HIBP: 6 October 2017
Compromised accounts: 9,313,136
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Bitly)
In January 2016, the forum for the popular torrent software [BitTorrent was hacked](https://motherboard.vice.com/read/another-day-another-hack-user-accounts-for-bittorrents-forum-hacking).
The IP.Board based forum stored passwords as weak SHA1 salted hashes and the breached data also included usernames, email and IP addresses.
Breach date: 1 January 2016
Date added to HIBP: 8 June 2016
Compromised accounts: 34,235
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BitTorrent)
In December 2024, [the video sharing Community BitView suffered a data breach that exposed 63k customer records](https://www.bitview.net/blog#157).Attributed to a backup taken by a previous administrator earlier in the year, the breach exposed email and IP addresses, bcrypt password hashes, usernames, bios, private messages, video comments and for some records, gender, date of birth and country of location.
Breach date: 14 December 2024
Date added to HIBP: 19 December 2024
Compromised accounts: 63,127
Compromised data: Bios, Comments, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Private messages, Usernames
[Permalink](https://haveibeenpwned.com#BitView)
In June 2014, the search engine optimisation forum [Black Hat World](http://www.blackhatworld.com) had three quarters of a million accounts breached from their system.The breach included various personally identifiable attributes which were publicly released in a MySQL database script.
Breach date: 23 June 2014
Date added to HIBP: 3 November 2015
Compromised accounts: 777,387
Compromised data: Dates of birth, Email addresses, Instant messenger identities, IP addresses, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#BlackHatWorld)
In May 2022, the Chinese BlackBerry enthusiasts website [BlackBerry Fans](http://blackberryfans.org/) suffered a data breach that exposed 174k member records.The impacted data included usernames, email and IP addresses and passwords stored as salted MD5 hashes.
Breach date: 6 May 2022
Date added to HIBP: 16 May 2022
Compromised accounts: 174,168
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BlackBerryFans)
In July 2019, the hacking website [BlackSpigotMC suffered a data breach](https://blackspigot.com/).The XenForo forum based site was allegedly compromised by a rival hacking website and resulted in 8.5GB of data being leaked including the database and website itself.The exposed data included 140k unique email addresses, usernames, IP addresses, genders, geographic locations and passwords stored as bcrypt hashes.
Breach date: 14 July 2019
Date added to HIBP: 17 July 2019
Compromised accounts: 140,029
Compromised data: Device information, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BlackSpigotMC)
In December 2018, the Town of Salem website produced by [BlankMediaGames suffered a data breach](https://blog.dehashed.com/town-of-salem-blankmediagames-hacked/).
Reported to HIBP by [DeHashed](https://dehashed.com/), the data contained 7.6M unique user email addresses alongside usernames, IP addresses, purchase histories and passwords stored as phpass hashes.DeHashed made multiple attempts to contact BlankMediaGames over various channels and many days but had yet to receive a response at the time of publishing.
Breach date: 28 December 2018
Date added to HIBP: 2 January 2019
Compromised accounts: 7,633,234
Compromised data: Browser user agent details, Email addresses, IP addresses, Passwords, Purchases, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#BlankMediaGames)
In 2015, the now defunct independent forum for the Bleach Anime series suffered a data breach that exposed 144k user records.The impacted data included usernames, email addresses and salted MD5 password hashes.
Breach date: 1 January 2015
Date added to HIBP: 29 November 2023
Compromised accounts: 143,711
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BleachAnime)
In April 2024, [15M records from the online florist Blooms Today were listed for sale on a popular hacking forum](https://dailydarkweb.net/blooms-today-alleged-data-breach-threat-actor-offers-15-million-records-for-sale-at-5000/).
The most recent data in the breach corpus was from November 2023 and appeared alongside 3.2M unique email addresses, names, phone numbers physical addresses and partial credit card data (card type, 4 digits of the number and expiry date).
The breach did not expose sufficient card data to make purchases.Blooms Today did not respond when contacted about the incident.
Breach date: 11 November 2023
Date added to HIBP: 3 September 2024
Compromised accounts: 3,184,010
Compromised data: Email addresses, Names, Partial credit card data, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#BloomsToday)
In March 2024, the Indian audio and wearables brand [boAt suffered a data breach that exposed 7.5M customer records](https://www.forbesindia.com/article/news/hit-with-massive-data-breach-boat-loses-data-of-75-million-customers/92483/1).
The data included physical and email address, names and phone numbers, all of which were subsequently published to a popular clear web hacking forum.
Breach date: 25 March 2024
Date added to HIBP: 8 April 2024
Compromised accounts: 7,528,985
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#boAt)
In approximately March 2017, the file sharing website [Bolt](http://bolt.cd/) suffered a data breach resulting in the exposure of 995k unique user records.The data was sourced from their vBulletin forum and contained email and IP addresses, usernames and salted MD5 password hashes.The site was previously reported as compromised on the [Vigilante.pw](https://vigilante.pw/) breached database directory.
Breach date: 1 March 2017
Date added to HIBP: 24 November 2017
Compromised accounts: 995,274
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Bolt)
In December 2018, the Slovak website for watching movies online for free [Bombuj.eu](https://www.bombuj.eu) suffered a data breach.The incident exposed over 575k unique email addresses and passwords stored as unsalted MD5 hashes.
No response was received from Bombuj.eu when contacted about the incident.
Breach date: 7 December 2018
Date added to HIBP: 10 December 2018
Compromised accounts: 575,437
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#BombujEu)
In August 2020, the clothing store [Bonobos suffered a data breach](https://www.bleepingcomputer.com/news/security/bonobos-clothing-store-suffers-a-data-breach-hacker-leaks-70gb-database/) that exposed almost 70GB of data containing 2.8 million unique email addresses.The breach also exposed names, physical and IP addresses, phone numbers, order histories and passwords stored as salted SHA-512 hashes, including historical passwords.The breach also exposed partial credit card data including card type, the name on the card, expiry date and the last 4 digits of the card.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 14 August 2020
Date added to HIBP: 31 January 2021
Compromised accounts: 2,811,929
Compromised data: Email addresses, Historical passwords, IP addresses, Names, Partial credit card data, Passwords, Phone numbers, Physical addresses, Purchases
[Permalink](https://haveibeenpwned.com#Bonobos)
In January 2021, the Indian book trading website [Bookchor suffered a data breach that exposed half a million customer records](https://www.opindia.com/2021/04/bookchor-data-breach-information-of-over-5-lakh-users-leaked-what-we-know-so-far/).
The exposed data included email and IP addresses, names, genders, dates of birth, phone numbers and passwords stored as unsalted MD5 hashes.The data was subsequently traded on a popular hacking forum.
Breach date: 28 January 2021
Date added to HIBP: 3 July 2022
Compromised accounts: 498,297
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Social media profiles
[Permalink](https://haveibeenpwned.com#Bookchor)
In August 2022, the book social networking site [BookCrossing disclosed a data breach that dated back to a database backup from November 2012](https://www.bookcrossing.com/forum/9/584194).The incident exposed almost 1.6M records including names, usernames, email and IP addresses, dates of birth and plain text passwords.
Breach date: 5 November 2012
Date added to HIBP: 25 July 2023
Compromised accounts: 1,582,323
Compromised data: Dates of birth, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BookCrossing)
In mid-2018, the social ebook subscription service [Bookmate was among a raft of sites that were breached and their data then sold in early-2019](https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/).The data included almost 4 million unique email addresses alongside names, genders, dates of birth and passwords stored as salted SHA-512 hashes.The data was provided to HIBP by a source who requested it to be attributed to “[email protected]”.
Breach date: 8 July 2018
Date added to HIBP: 22 March 2019
Compromised accounts: 3,830,916
Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Bookmate)
In November 2014, the forum for [Bot of Legends](http://botoflegends.com) suffered a data breach.The IP.Board forum contained 238k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes.
Breach date: 13 November 2014
Date added to HIBP: 27 December 2016
Compromised accounts: 238,373
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#BotOfLegends)
In September 2024, [French electronics retailer Boulanger suffered a data breach that exposed over 27M rows of data](https://therecord.media/france-retailers-hacked-confirm-cyberattack).The data included 2M unique email addresses along with names, physical addresses, phone numbers and latitude and longitude.The data was later publicly published to a popular hacking forum.
The data was provided to HIBP by a source who requested it be attributed to “leidhall”.
Breach date: 6 September 2024
Date added to HIBP: 8 April 2025
Compromised accounts: 2,077,078
Compromised data: Email addresses, Geographic locations, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#Boulanger)
In January 2021, the French travel company [Bourse des Vols suffered a data breach that exposed 1.46M unique email addresses](https://www.riskbasedsecurity.com/2021/02/19/dark-web-roundup-january-2021/) across more than 1.2k .sql files and over 9GB of data.The impacted data exposed personal information and travel histories including names, phone numbers, IP and physical addresses, dates of birth along with flights taken and purchases.
Breach date: 12 January 2021
Date added to HIBP: 3 July 2022
Compromised accounts: 1,460,130
Compromised data: Dates of birth, Email addresses, Flights taken, IP addresses, Names, Phone numbers, Physical addresses, Purchases
[Permalink](https://haveibeenpwned.com#BourseDesVols)
In March 2014, the home theatre PC software maker Boxee had their forums compromised in an attack.
The attackers obtained the entire vBulletin MySQL database and promptly posted it for download on the Boxee forum itself.The data included 160k users, password histories, private messages and a variety of other data exposed across nearly 200 publicly exposed tables.
Breach date: 29 March 2014
Date added to HIBP: 30 March 2014
Compromised accounts: 158,093
Compromised data: Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, User website URLs, Usernames
[Permalink](https://haveibeenpwned.com#Boxee)
In August 2022, the streaming website [Brand New Tube suffered a data breach that exposed the personal information of almost 350k subscribers](https://unitynewsnetwork.co.uk/streaming-site-brand-new-tube-sees-massive-data-breach-with-ip-addresses-and-names-of-users-revealed/).The impacted data included email and IP addresses, usernames, genders, passwords stored as unsalted SHA-1 hashes and private messages.
Breach date: 14 August 2022
Date added to HIBP: 8 September 2022
Compromised accounts: 349,627
Compromised data: Email addresses, Genders, IP addresses, Passwords, Private messages, Usernames
[Permalink](https://haveibeenpwned.com#BrandNewTube)
In April 2013, the adult website known as [Brazzers was hacked](https://motherboard.vice.com/read/nearly-800000-brazzers-porn-site-accounts-exposed-in-forum-hack) and 790k accounts were exposed publicly.Each record included a username, email address and password stored in plain text.The breach was brought to light by the [Vigilante.pw](https://vigilante.pw) data breach reporting site in September 2016.
Breach date: 1 April 2013
Date added to HIBP: 5 September 2016
Compromised accounts: 790,724
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Brazzers)
In November 2022, the well-known hacking forum “BreachForums” was itself, breached.Later the following year, [the operator of the website was arrested and the site seized by law enforcement agencies](https://www.bleepingcomputer.com/news/security/fbi-seizes-breachforums-after-arresting-its-owner-pompompurin-in-march/).
The breach exposed 212k records including usernames, IP and email addresses, private messages between site members and passwords stored as argon2 hashes.The data was provided to HIBP by a source who requested it be attributed to [“breached_db_person”](http://t.me/breached_db_person).
Breach date: 29 November 2022
Date added to HIBP: 26 July 2023
Compromised accounts: 212,156
Compromised data: Email addresses, IP addresses, Passwords, Private messages, Usernames
[Permalink](https://haveibeenpwned.com#BreachForums)
In June 2023, [a clone of the previously shuttered popular hacking forum “BreachForums” suffered a data breach that exposed over 4k records](https://www.hackread.com/breachforums-data-breach-members-data-leak/).The breach was due to an exposed backup of the MyBB database which included email and IP addresses, usernames and Argon2 password hashes.
Breach date: 17 June 2023
Date added to HIBP: 25 June 2023
Compromised accounts: 4,204
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BreachForumsClone)
In November 2021, the crypto exchange platform [BTC-Alpha suffered a ransomware attack data breach](https://www.techtarget.com/searchsecurity/news/252509877/Cryptocurrency-exchange-BTC-Alpha-confirms-ransomware-attack) after which customer data was publicly dumped.The impacted data included 362k email and IP addresses, usernames and passwords stored as PBKDF2 hashes.The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 2 November 2021
Date added to HIBP: 27 January 2022
Compromised accounts: 362,426
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BTCAlpha)
In October 2014, [the Bitcoin exchange BTC-E was hacked](https://www.databreaches.net/bitcoin-exchange-btc-e-and-bitcointalk-forum-breaches/) and 568k accounts were exposed.The data included email and IP addresses, wallet balances and hashed passwords.
Breach date: 1 October 2014
Date added to HIBP: 12 March 2017
Compromised accounts: 568,340
Compromised data: Account balances, Email addresses, IP addresses, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#BTCE)
In December 2019, [a large collection of data from Nigerian gambling company Surebet247 was sent to HIBP](https://www.troyhunt.com/the-difficulty-of-disclosure-surebet247-and-the-streisand-effect/).
Alongside the Surebet247, database backups from gambling sites BetAlfa, BetWay, BongoBongo and TopBet was also included.Further investigation [implicated betting platform provider BtoBet as being the common source of the data](https://www.iafrikan.com/2020/01/09/btobet-sports-betting-technology-software-neuron-platform-surebet247-gambling-data-security-breach/).Impacted data included user records and extensive information on gambling histories.
Breach date: 26 December 2019
Date added to HIBP: 11 January 2020
Compromised accounts: 444,241
Compromised data: Dates of birth, Email addresses, Financial transactions, Geographic locations, IP addresses, Names, Usernames
[Permalink](https://haveibeenpwned.com#BtoBet)
In July 2024, [a data breach of the now defunct cannabis social platform BudTrader was posted for sale on a hacking forum](https://darkwebinformer.com/a-threat-actor-is-allegedly-selling-data-to-budtrader-com/).
Dating back to the previous month, the breach of the website exposed 2.7M email addresses, usernames and WordPress password hashes.
Breach date: 27 June 2024
Date added to HIBP: 1 October 2024
Compromised accounts: 2,721,185
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#BudTrader)
In March 2019, the Indonesian e-commerce website [Bukalapak discovered a data breach of the organisation’s backups dating back to October 2017](https://www.bukalapak.com/blog/feature-updates/petunjuk-teknis-105502).The incident exposed approximately 13 million unique email addresses alongside IP addresses, names and passwords stored as bcrypt and salted SHA-512 hashes.The data was provided to HIBP by a source who requested it to be attributed to “Maxime Thalet”.
Breach date: 23 October 2017
Date added to HIBP: 18 April 2019
Compromised accounts: 13,369,666
Compromised data: Email addresses, IP addresses, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Bukalapak)
In July 2019, [a massive data breach of the Bulgarian National Revenue Agency began circulating with data on 5 million people](https://thenextweb.com/security/2019/07/16/bulgaria-tax-agency-data-leak-hack/).Allegedly obtained in June, the data was broadly shared online and included taxation information alongside names, phone numbers, physical addresses and 471 thousand unique email addresses.The breach is said to have affected “nearly all adults in Bulgaria”.
Breach date: 15 July 2019
Date added to HIBP: 18 July 2019
Compromised accounts: 471,167
Compromised data: Email addresses, Names, Phone numbers, Physical addresses, Taxation records
[Permalink](https://haveibeenpwned.com#BulgarianNationalRevenueAgency)
In April 2014, the Australian “Business Acumen Magazine” website was [hacked by an attacker known as 1337MiR](http://1337mir.com/cracked/2014/04/businessacumen-biz-hacked-26000-user-password-leaked/).The breach resulted in over 26,000 accounts being exposed including usernames, email addresses and password stored with a weak cryptographic hashing algorithm (MD5 with no salt).
Breach date: 25 April 2014
Date added to HIBP: 11 May 2014
Compromised accounts: 26,596
Compromised data: Email addresses, Names, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#BusinessAcumen)
In 2014, the social network for mothers [CafeMom](http://www.cafemom.com) suffered a data breach.
The data surfaced alongside a number of other historical breaches including Kickstarter, Bitly and Disqus and contained 2.6 million email addresses and plain text passwords.
Breach date: 10 April 2014
Date added to HIBP: 9 November 2017
Compromised accounts: 2,628,148
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#CafeMom)
In February 2019, the custom merchandise retailer [CafePress](https://www.cafepress.com/) suffered a data breach.The exposed data included 23 million unique email addresses with some records also containing names, physical addresses, phone numbers and passwords stored as SHA-1 hashes.The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 20 February 2019
Date added to HIBP: 5 August 2019
Compromised accounts: 23,205,290
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#CafePress)
In February 2014, the vBulletin forum for the Marijuana site cannabis.com was breached and [leaked publicly](https://www.google.com/search?q=%22cannabisforum.tar%22).Whilst there has been no public attribution of the breach, the leaked data included over 227k accounts and nearly 10k private messages between users of the forum.
Breach date: 5 February 2014
Date added to HIBP: 1 June 2014
Compromised accounts: 227,746
Compromised data: Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#CannabisForum)
In May 2019, the graphic design tool website [Canva suffered a data breach](https://support.canva.com/contact/customer-support/may-24-security-incident-faqs/) that impacted 137 million subscribers.
The exposed data included email addresses, usernames, names, cities of residence and passwords stored as bcrypt hashes for users not using social logins.
The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 24 May 2019
Date added to HIBP: 9 August 2019
Compromised accounts: 137,272,116
Compromised data: Email addresses, Geographic locations, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Canva)
In December 2020, the economic research company [Capital Economics suffered a data breach that exposed 263k customer records](https://securityaffairs.co/wordpress/113581/deep-web/capital-economics-data-leak.html).The exposed data included email and physical addresses, names, phone numbers, job titles and the employer of impacted customers.
Breach date: 12 December 2020
Date added to HIBP: 4 July 2022
Compromised accounts: 263,829
Compromised data: Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#CapialEconomics)
In December 2021, the Carding Mafia forum suffered a data breach that exposed over 300k members’ email addresses.Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes.This breach came only 9 months after another breach of the forum in March 2021.
Breach date: 28 December 2021
Date added to HIBP: 16 January 2022
Compromised accounts: 303,877
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#CardingMafiaDec2021)
In March 2021, the Carding Mafia forum suffered a data breach that exposed almost 300k members’ email addresses.
Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes.
Breach date: 18 March 2021
Date added to HIBP: 23 March 2021
Compromised accounts: 297,744
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#CardingMafia)
In June 2017, news broke that [CashCrate had suffered a data breach exposing 6.8 million records](https://motherboard.vice.com/en_us/article/bj8pvq/hackers-steal-6-million-user-accounts-for-cash-for-surveys-site).The breach of the cash-for-surveys site dated back to November 2016 and exposed names, physical addresses, email addresses and passwords stored in plain text for older accounts along with weak MD5 hashes for newer ones.
Breach date: 17 November 2016
Date added to HIBP: 20 April 2018
Compromised accounts: 6,844,490
Compromised data: Email addresses, Names, Passwords, Physical addresses
[Permalink](https://haveibeenpwned.com#CashCrate)
In approximately March 2020, the Brazilian recruitment website [Catho was compromised and subsequently appeared alongside 20 other breached websites](https://www.binarydefense.com/threat_watch/shinyhunters-serving-up-21-new-compromised-databases/) listed for sale on a dark web marketplace.The breach included almost 11 million records with 1.2 million unique email addresses.Names, usernames and plain text passwords were also exposed.
The data was provided to HIBP by [breachbase.pw](https://breachbase.pw/).
Breach date: 1 March 2020
Date added to HIBP: 18 August 2020
Compromised accounts: 1,173,012
Compromised data: Email addresses, Names, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#Catho)
In March 2016, [Polish game developer CD Projekt RED suffered a data breach](http://forums.cdprojektred.com/forum/en/the-witcher-series/news-aa/7248610-important-potential-unauthorized-access-to-the-forums%E2%80%99-data).
The hack of their forum led to the exposure of almost 1.9 million accounts along with usernames, email addresses and salted SHA1 passwords.
Breach date: 1 March 2016
Date added to HIBP: 31 January 2017
Compromised accounts: 1,871,373
Compromised data: Email addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#CDProjektRed)
In early 2022, a collective known as [IT Army whose stated goal is to “completely de-anonymise most Russian users by leaking hundreds of gigabytes of databases”](https://www.bleepingcomputer.com/news/security/ukraine-recruits-it-army-to-hack-russian-entities-lists-31-targets/) published over 30GB of data allegedly sourced from Russian courier service CDEK.The data contained over 19M unique email addresses along with names and phone numbers.The authenticity of the breach could not be independently established and has been flagged as “unverfieid”.
Breach date: 9 March 2022
Date added to HIBP: 17 March 2022
Compromised accounts: 19,218,203
Compromised data: Email addresses, Names, Phone numbers
[Permalink](https://haveibeenpwned.com#CDEK)
In September 2024, [data from the ticketing service Central Tickets was publicly posted to a hacking forum](https://www.linkedin.com/posts/threatmon_databreach-cybersecurity-centraltickets-activity-7243167088565960705-vUDM/).
The data suggests the breach occurred several months earlier and exposed 723k unique email addresses alongside names, phone numbers, IP addresses, purchases and passwords stored as unsalted SHA-1 hashes.
Breach date: 1 July 2024
Date added to HIBP: 30 September 2024
Compromised accounts: 722,860
Compromised data: Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Purchases
[Permalink](https://haveibeenpwned.com#CentralTickets)
In March 2020, the photo print service [Chatbooks suffered a data breach](https://www.bleepingcomputer.com/news/security/chatbooks-discloses-data-breach-after-data-sold-on-dark-web/) which was subsequently put up for sale on a dark web marketplace.The breach contained 15 million user records with 2.5 million unique email addresses alongside names, phone numbers, social media profiles and salted SHA-512 password hashes.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 26 March 2020
Date added to HIBP: 29 July 2020
Compromised accounts: 2,520,441
Compromised data: Email addresses, Names, Passwords, Phone numbers, Social media profiles
[Permalink](https://haveibeenpwned.com#Chatbooks)
In approximately mid-2015, the forum for [CheapAssGamer.com](https://www.cheapassgamer.com) suffered a data breach.The database from the IP.Board based forum contained 445k accounts including usernames, email and IP addresses and salted MD5 password hashes.
Breach date: 1 July 2015
Date added to HIBP: 8 November 2016
Compromised accounts: 444,767
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#CheapAssGamer)
In April 2018, the textbook rental service [Chegg suffered a data breach](https://techcrunch.com/2018/09/26/chegg-resets-40-million-user-passwords-after-data-breach/) that impacted 40 million subscribers.
The exposed data included email addresses, usernames, names and passwords stored as unsalted MD5 hashes.A small number of records also contained physical address or phone number.The data was provided to HIBP by a source who requested it be attributed to “[email protected]”.
Breach date: 28 April 2018
Date added to HIBP: 16 August 2019
Compromised accounts: 39,721,127
Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames
[Permalink](https://haveibeenpwned.com#Chegg)
In November 2023, [over 800k user records were scraped from the Chess website and posted to a popular hacking forum](https://www.hackread.com/hacker-leaks-scraped-chess-com-user-records/).
The data included email address, name, username and the geographic location of the user.
Breach date: 8 November 2023
Date added to HIBP: 10 November 2023
Compromised accounts: 827,620
Compromised data: Email addresses, Geographic locations, Names, Usernames
[Permalink](https://haveibeenpwned.com#Chess)
In October 2020, the Asian food delivery app [Chowbus suffered a data breach which led to over 800,000 records being emailed to customers](https://www.reddit.com/r/UIUC/comments/j5fcjp/chowbus_is_hacked_leaks_800000_entries_of/).
The email contained a link to a CSV file with customer data including physical addresses, names, phone numbers and over 444,000 unique email addresses.
Breach date: 5 October 2020
Date added to HIBP: 6 October 2020
Compromised accounts: 444,224
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#Chowbus)
In August 2024, [the website of Master Chris Leong “a leading Tit Tar practitioner in Malaysia” suffered a data breach](https://x.com/DarkWebInformer/status/1822330521147376007).The incident exposed 27k unique email addresses along with names, physical addresses, dates of birth, genders, nationalities and in many cases, links to Facebook profiles.The company did not respond when contacted about the breach.
Breach date: 10 August 2024
Date added to HIBP: 13 August 2024
Compromised accounts: 27,096
Compromised data: Dates of birth, Email addresses, Genders, Names, Nationalities, Phone numbers, Physical addresses, Purchases, Social media profiles
[Permalink](https://haveibeenpwned.com#ChrisLeong)
In November 2020, [a collection of more than 23,000 allegedly breached websites known as Cit0day were made available for download on several hacking forums](https://www.troyhunt.com/inside-the-cit0day-breach-collection).The data consisted of 226M unique email address alongside password pairs, often represented as both password hashes and the cracked, plain text versions.
Independent verification of the data established it contains many legitimate, previously undisclosed breaches.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 4 November 2020
Date added to HIBP: 19 November 2020
Compromised accounts: 226,883,414
Compromised data: Email addresses, Passwords
[Permalink](https://haveibeenpwned.com#Cit0day)
In February 2021, the Lithuanian car-sharing service [CityBee announced they’d suffered a data breach that exposed 110k customers’ personal information](https://www.reuters.com/article/us-baltic-dataprotection-idUSKBN2AG2BW).The breach exposed names, email addresses, government issued IDs and passwords stored as unsalted SHA-1 hashes.
Breach date: 5 February 2021
Date added to HIBP: 17 February 2021
Compromised accounts: 110,156
Compromised data: Email addresses, Government issued IDs, Names, Passwords
[Permalink](https://haveibeenpwned.com#CityBee)
In early 2023, the “mutual masturbation” website [CityJerks suffered a data breach that exposed 177k unique email addresses](https://techcrunch.com/2023/04/27/hackers-steal-emails-private-messages-from-hookup-websites/).The breach also included data from the TruckerSucker “dating app for REAL TRUCKERS and REAL MEN” with the combined corpus of data also exposing usernames, IP addresses, dates of birth, sexual orientations, geo locations, private messages between members and passwords stored as salted MD5 hashes.The data was listed on a public hacking site and provided to HIBP by a source who requested it be attributed to “discord.gg/gN9C9em”.
Breach date: 27 February 2023
Date added to HIBP: 27 April 2023
Compromised accounts: 177,554
Compromised data: Bios, Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Private messages, Profile photos, Sexual orientations, Usernames
[Permalink](https://haveibeenpwned.com#CityJerks)
In mid-2011, data was allegedly obtained from the Chinese engineering website known as [Civil Online](http://www.co188.com/) and contained 7.8M accounts.Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as “unverified”.
The data in the breach contains email and IP addresses, user names and MD5 password hashes.[Read more about Chinese data breaches in Have I Been Pwned.](https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/)
Breach date: 10 July 2011
Date added to HIBP: 7 November 2016
Compromised accounts: 7,830,195
Compromised data: Email addresses, IP addresses, Passwords, Usernames, Website activity
[Permalink](https://haveibeenpwned.com#CivilOnline)
In July 2016, [the forum for the game “Clash of Kings” suffered a data breach](https://www.zdnet.com/article/hacker-steals-forums-of-clash-of-kings-mobile-game/) that impacted 1.6 million subscribers.The impacted data included usernames, IP and email addresses and passwords stored as MD5 hashes.The data was provided to HIBP by [dehashed.com](https://dehashed.com/).
Breach date: 14 July 2016
Date added to HIBP: 27 July 2019
Compromised accounts: 1,604,957
Compromised data: Email addresses, IP addresses, Passwords, Usernames
[Permalink](https://haveibeenpwned.com#ClashOfKings)
In April 2021, the market research surveys company [ClearVoice Surveys](https://www.clearvoicesurveys.com/) had a publicly facing database backup from 2015 taken and redistributed on a popular hacking forum.The data included 15M unique email addresses across more than 17M rows of data that also included names, physical and IP addresses, genders, dates of birth and plain text passwords.ClearVoice Surveys advised they were aware of the breach and confirmed its authenticity.
Breach date: 23 August 2015
Date added to HIBP: 23 April 2021
Compromised accounts: 15,074,786
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses
[Permalink](https://haveibeenpwned.com#ClearVoiceSurveys)
In September 2022, the online photo sharing platform [ClickASnap suffered a data breach](https://blog.clickasnap.com/2022/10/14/clickasnap-website-breach-24-09-22/).The incident exposed almost 3.3M personal records including email addresses, usernames and passwords stored.