Advertisement
Guest User

Untitled

a guest
Feb 15th, 2016
1,503
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.71 KB | None | 0 0
  1. [{"Title":"Battlefield Heroes","Name":"BattlefieldHeroes","Domain":"battlefieldheroes.com","BreachDate":"2011-06-26","AddedDate":"2014-01-23T13:10:29Z","PwnCount":530270,"Description":"In June 2011 as part of a final breached data dump, the hacker collective &quot;LulzSec&quot; <a href=\"http://www.rockpapershotgun.com/2011/06/26/lulzsec-over-release-battlefield-heroes-data\" target=\"_blank\">obtained and released over half a million usernames and passwords from the game Battlefield Heroes</a>. The passwords were stored as MD5 hashes with no salt and many were easily converted back to their plain text versions.","DataClasses":["Passwords","Usernames"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"Cannabis.com","Name":"CannabisForum","Domain":"cannabis.com","BreachDate":"2014-02-05","AddedDate":"2014-06-01T07:55:24Z","PwnCount":227746,"Description":"In February 2014, the vBulletin forum for the Marijuana site cannabis.com was breached and <a href=\"https://www.google.com/search?q=%22cannabisforum.tar%22\" target=\"_blank\">leaked publicly</a>. Whilst there has been no public attribution of the breach, the leaked data included over 227k accounts and nearly 10k private messages between users of the forum.","DataClasses":["Dates of birth","Email addresses","Geographic location","Historical passwords","Instant messenger identities","IP addresses","Passwords","Private messages","Usernames","Website activity"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"Forbes","Name":"Forbes","Domain":"forbes.com","BreachDate":"2014-02-15","AddedDate":"2014-02-15T11:24:42Z","PwnCount":1057819,"Description":"In February 2014, the Forbes website <a href=\"http://news.cnet.com/8301-1009_3-57618945-83/syrian-electronic-army-hacks-forbes-steals-user-data\" target=\"_blank\">succumbed to an attack that leaked over 1 million user accounts</a>. The attack was attributed to the Syrian Electronic Army, allegedly as retribution for a perceived \"Hate of Syria\". The attack not only leaked user credentials, but also resulted in the posting of fake news stories to forbes.com.","DataClasses":["Email addresses","Passwords","User website URLs","Usernames"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"Gawker","Name":"Gawker","Domain":"gawker.com","BreachDate":"2010-12-11","AddedDate":"2013-12-04T00:00:00Z","PwnCount":1247574,"Description":"In December 2010, Gawker was attacked by the hacker collective &quot;Gnosis&quot; in retaliation for what was reported to be a feud between Gawker and 4Chan. Information about Gawkers 1.3M users was published along with the data from Gawker's other web presences including Gizmodo and Lifehacker. Due to the prevalence of password reuse, many victims of the breach <a href=\"http://www.troyhunt.com/2011/01/why-your-apps-security-design-could.html\" target=\"_blank\">then had their Twitter accounts compromised to send Acai berry spam</a>.","DataClasses":["Email addresses","Passwords","Usernames"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"hackforums.net","Name":"HackForums","Domain":"hackforums.net","BreachDate":"2011-06-25","AddedDate":"2014-05-11T10:30:43Z","PwnCount":191540,"Description":"In June 2011, the hacktivist group known as \"LulzSec\" leaked <a href=\"http://www.forbes.com/sites/andygreenberg/2011/06/25/lulzsec-says-goodbye-dumping-nato-att-gamer-data/\" target=\"_blank\">one final large data breach they titled \"50 days of lulz\"</a>. The compromised data came from sources such as AT&T, Battlefield Heroes and the <a href=\"http://hackforums.net\" target=\"_blank\">hackforums.net website</a>. The leaked Hack Forums data included credentials and personal information of nearly 200,000 registered forum users.","DataClasses":["Dates of birth","Email addresses","Instant messenger identities","IP addresses","Passwords","Social connections","Spoken languages","Time zones","User website URLs","Usernames","Website activity"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"hemmelig.com","Name":"Hemmelig","Domain":"hemmelig.com","BreachDate":"2011-12-21","AddedDate":"2014-03-25T07:23:52Z","PwnCount":28641,"Description":"In December 2011, Norway's largest online sex shop hemmelig.com was <a href=\"http://www.dazzlepod.com/hemmelig/?page=93\" target=\"_blank\">hacked by a collective calling themselves &quot;Team Appunity&quot;</a>. The attack exposed over 28,000 usernames and email addresses along with nicknames, gender, year of birth and unsalted MD5 password hashes.","DataClasses":["Email addresses","Genders","Nicknames","Passwords","Usernames","Years of birth"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"Insanelyi","Name":"Insanelyi","Domain":"insanelyi.com","BreachDate":"2014-07-22","AddedDate":"2014-07-22T22:56:15Z","PwnCount":104097,"Description":"In July 2014, the iOS forum <a href=\"http://insanelyi.com\" target=\"_blank\">Insanelyi</a> was <a href=\"http://securityaffairs.co/wordpress/26835/hacking/hacked-bigboss-cydia.html?utm_content=bufferc7e16\" target=\"_blank\">hacked by an attacker known as Kim Jong-Cracks</a>. A popular source of information for users of jailbroken iOS devices running Cydia, the Insanelyi breach disclosed over 104k users' emails addresses, user names and weakly hashed passwords (salted MD5).","DataClasses":["Email addresses","Passwords","Usernames","Website activity"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"Lounge Board","Name":"LoungeBoard","Domain":"loungeboard.net","BreachDate":"2013-08-01","AddedDate":"2014-07-06T10:22:01Z","PwnCount":45018,"Description":"At some point in 2013, 45k accounts were <a href=\"http://leak.sx/thread-186921\" target=\"_blank\">breached from the Lounge Board \"General Discussion Forum\" and then dumped publicly</a>. Lounge Board was a MyBB forum launched in 2012 and discontinued in mid 2013 (the last activity in the logs was from August 2013).","DataClasses":["Email addresses","IP addresses","Names","Passwords","Private messages","Usernames","Website activity"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"},{"Title":"Verified","Name":"Verified","Domain":"verified.cm","BreachDate":"2014-01-10","AddedDate":"2014-07-06T04:16:37Z","PwnCount":16919,"Description":"In January 2014, <a href=\"http://securityaffairs.co/wordpress/21120/cyber-crime/verified-communities-hacked.html\" target=\"_blank\">one of the largest communities of Eastern Europe cybercriminals known as \"Verified\" was hacked</a>. The breach exposed nearly 17k users of the vBulletin forum including their personal messages and other potentially personally identifiable information.","DataClasses":["Email addresses","Historical passwords","IP addresses","Passwords","Private messages","Usernames","Website activity"],"IsVerified":true,"IsSensitive":false,"LogoType":"svg"}]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement