Latest Breach Information

Below is a list of the last 25 known data breaches and any information we may have about them.


WhiteDate

Added Date: 1/6/2026
Breach Date: 12/29/2025
Updated Date: 1/6/2026
Breach Count: 6,076
Content: Ages, Astrological signs, Bios, Education levels, Email addresses, Family structure, Genders, Geographic locations, Income levels, IQ levels, Nicknames, Physical attributes, Profile photos, Races, Relationship statuses, Sexual orientations
Domain: whitedate.net

Description:

In December 2025, the dating website "for a Europid vision" WhiteDate suffered a data breach that exposed 6k unique email addresses. The breach exposed extensive further personal information including data related to physical appearance, income, education and IQ.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

WIRED

Added Date: 12/27/2025
Breach Date: 9/8/2025
Updated Date: 12/27/2025
Breach Count: 2,364,431
Content: Dates of birth, Display names, Email addresses, Genders, Geographic locations, Names, Phone numbers, Physical addresses
Domain: wired.com

Description:

In December 2025, 2.3M records of WIRED magazine users allegedly obtained from parent company Condé Nast were published online. The most recent data dated back to the previous September and exposed email addresses and display names, as well as, for a small number of users, their name, phone number, date of birth, gender, and geographic location or full physical address. The WIRED data allegedly represents a subset of Condé Nast brands the hacker also claims to have obtained.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Utair

Added Date: 12/25/2025
Breach Date: 3/21/2019
Updated Date: 12/26/2025
Breach Count: 401,400
Content: Dates of birth, Email addresses, Genders, Loyalty program details, Names, Passport numbers, Phone numbers, Physical addresses
Domain: utair.ru

Description:

In August 2020, news broke of a data breach of Russian airline Utair that dated back to the previous year. The breach contained over 400k unique email addresses along with extensive personal information including names, physical addresses, dates of birth, passport numbers and loyalty program details.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Медицинская лаборатория Гемотест (Gemotest)

Added Date: 12/23/2025
Breach Date: 4/22/2022
Updated Date: 12/23/2025
Breach Count: 6,341,495
Content: Dates of birth, Email addresses, Genders, Government issued IDs, Health insurance information, Names, Passport numbers, Physical addresses
Domain: gemotest.ru

Description:

In April 2022, Russian pharmaceutical company Gemotest suffered a data breach that exposed 31 million patients. The data contained 6.3 million unique email addresses along with names, physical addresses, dates of birth, passport and insurance numbers. Gemotest was later fined for the breach.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

AUTOSUR

Added Date: 12/17/2025
Breach Date: 3/16/2025
Updated Date: 12/17/2025
Breach Count: 487,226
Content: Email addresses, Names, Phone numbers, Physical addresses, Vehicle details, Vehicle identification numbers (VINs), Vehicle registration plates
Domain: autosur.fr

Description:

In March 2025, the French vehicle inspection company AUTOSUR suffered a data breach exposing over 10M customer records, though only 487k unique email addresses were present. The compromised data included names, phone numbers, physical addresses, and vehicle details such as make and model, VIN, and registration plate. AUTOSUR later issued a disclosure notice with further details.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

The Botting Network

Added Date: 12/17/2025
Breach Date: 8/12/2012
Updated Date: 12/17/2025
Breach Count: 96,320
Content: Dates of birth, Email addresses, Passwords, Usernames
Domain: thebotnet.com

Description:

In August 2012, the forum for making money with botting "The Botting Network" suffered a data breach that exposed 96k user records. The now defunct vBulletin forum leaked 96k email addresses, usernames, dates of birth and salted MD5 password hashes.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Web Hosting Talk

Added Date: 12/17/2025
Breach Date: 7/1/2016
Updated Date: 12/17/2025
Breach Count: 515,149
Content: Email addresses, IP addresses, Passwords, Usernames
Domain: webhostingtalk.com

Description:

In July 2016, the Web Hosting Talk forum suffered a data breach that was subsequently listed for sale. The breach of the vBulletin based forum exposed 515k user records including usernames, email addresses, IP addresses and salted MD5 password hashes.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

KinoKong

Added Date: 12/6/2025
Breach Date: 3/25/2021
Updated Date: 12/6/2025
Breach Count: 817,808
Content: Email addresses, IP addresses, Names, Passwords, Usernames
Domain: kinokong.org

Description:

In March 2021, the Russian online streaming service KinoKong suffered a data breach that was later redistributed as part of a larger corpus of data. The breach exposed over 800k unique email addresses along with names, usernames, IP addresses and MD5 password hashes.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Zilvia.net

Added Date: 12/1/2025
Breach Date: 11/6/2025
Updated Date: 12/1/2025
Breach Count: 287,863
Content: Email addresses, IP addresses, Passwords, Usernames
Domain: zilvia.net

Description:

In November 2025, data breached from the Zilvia.net Nissan 240SX Silvia and Z Fairlady car forum was leaked. The breach exposed 288k unique email addresses along with usernames, IP addresses and salted MD5 password hashes sourced from the vBulletin based platform. Attempts to contact Zilvia.net about the incident were unsuccessful.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

China Software Developer Network

Added Date: 11/26/2025
Breach Date: 12/21/2011
Updated Date: 11/26/2025
Breach Count: 6,414,990
Content: Email addresses, Passwords, Usernames
Domain: csdn.net

Description:

In 2011, the China Software Developer Network (CSDN) suffered a data breach that exposed over 6M user records. The data included email addresses alongside usernames and plain text passwords.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

CodeStepByStep

Added Date: 11/22/2025
Breach Date: 11/15/2025
Updated Date: 12/2/2025
Breach Count: 103,077
Content: Email addresses, Names, Usernames
Domain: codestepbystep.com

Description:

In November 2025, the online coding practice tool CodeStepByStep suffered a data breach that exposed 17k records which were subsequently published online. The following month, a further corpus of data was released bringing the total to 103k. The impacted data included names, usernames and email addresses.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

ADDA

Added Date: 11/22/2025
Breach Date: 3/24/2025
Updated Date: 11/23/2025
Breach Count: 1,829,314
Content: Email addresses, Names, Passwords, Phone numbers
Domain: adda.io

Description:

In March 2025, data allegedly breached from the ADDA housing societies service was posted to a public hacking forum. The data contained over 1.8M unique email addresses along with names, phone numbers and MD5 password hashes.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

International Kiteboarding Organization

Added Date: 11/20/2025
Breach Date: 11/11/2025
Updated Date: 11/20/2025
Breach Count: 340,349
Content: Email addresses, Geographic locations, Names, Usernames
Domain: ikointl.com

Description:

In November 2025, the International Kiteboarding Organization suffered a data breach that exposed 340k user records. The data was subsequently listed for sale on a hacking forum and included email addresses, names, usernames and in many cases, the user's city and country.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Beckett Collectibles

Added Date: 11/19/2025
Breach Date: 11/9/2025
Updated Date: 12/2/2025
Breach Count: 1,041,238
Content: Email addresses, Names, Phone numbers, Physical addresses, Usernames
Domain: beckett.com

Description:

In November 2025, Beckett Collectibles experienced a data breach accompanied by website content defacement. The stolen data was later advertised for sale on a prominent hacking forum, with portions subsequently released publicly. The publicly circulating data initially included more than 500k email addresses reportedly belonging to North American customers, before a larger corpus of over 1M addresses was published the following month. The impacted data included names, usernames, phone numbers and physical addresses.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Eurofiber

Added Date: 11/19/2025
Breach Date: 11/13/2025
Updated Date: 11/19/2025
Breach Count: 10,003
Content: Email addresses, Names, Phone numbers
Domain: eurofiber.com

Description:

In November 2025, Eurofiber France disclosed a data breach of its ticket management platform. Data containing 10k unique email addresses and a smaller number of names and phone numbers was subsequently leaked. A threat actor claiming responsibility for the breach alleges to have additional, more sensitive data including screenshots, VPN configuration files, credentials, source code, certificates, archives, and SQL backup files.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Vultr

Added Date: 11/19/2025
Breach Date: 7/8/2022
Updated Date: 11/19/2025
Breach Count: 187,872
Content: Email addresses, Geographic locations, IP addresses, Names
Domain: vultr.com

Description:

In March 2023, the "AI-first global cloud platform" Vultr disclosed a security incident at a third-party vendor. Dating back to the previous year, the incident was attributed to the ActiveCampaign email marketing service provider and resulted in the exposure of 188k unique email addresses. A small number of records also included name, IP address and country of origin. No Vultr systems or additional customer data were impacted. Vultr subsequently self-submitted the impacted data to HIBP.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Operation Endgame 3.0

Added Date: 11/13/2025
Breach Date: 11/13/2025
Updated Date: 11/13/2025
Breach Count: 2,046,030
Content: Email addresses, Passwords
Domain: n/a

Description:

Between 10 and 13 November 2025, the latest phase of Operation Endgame was coordinated from Europol's headquarters in The Hague. The actions targeted one of the biggest infostealer Rhadamanthys, the Remote Access Trojan VenomRAT, and the botnet Elysium, all of which played a key role in international cybercrime. Authorities took down these three large cybercrime enablers and provided 2 million impacted email addresses and 7.4 million passwords to HIBP.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

TISZA Világ

Added Date: 11/8/2025
Breach Date: 10/6/2025
Updated Date: 11/8/2025
Breach Count: 198,520
Content: Email addresses, Names, Phone numbers, Physical addresses, Usernames
Domain: tiszavilag.hu

Description:

In late October 2025, data breached from the Hungarian political party TISZA was published online before being extensively redistributed. Stemming from a compromise of the TISZA Világ service earlier in the month, the breach exposed 200k records of personal data including email addresses along with names, phone numbers and physical addresses.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

Synthient Credential Stuffing Threat Data

Added Date: 11/5/2025
Breach Date: 4/11/2025
Updated Date: 11/8/2025
Breach Count: 1,957,476,021
Content: Email addresses, Passwords
Domain: n/a

Description:

During 2025, the threat-intelligence firm Synthient aggregated 2 billion unique email addresses disclosed in credential-stuffing lists found across multiple malicious internet sources. Comprised of email addresses and passwords from previous data breaches, these lists are used by attackers to compromise other, unrelated accounts of victims who have reused their passwords. The data also included 1.3 billion unique passwords, which are now searchable in Pwned Passwords. Working to turn breached data into awareness, Synthient partnered with HIBP to help victims of cybercrime understand their exposure.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

MyVidster (2025)

Added Date: 10/26/2025
Breach Date: 10/24/2025
Updated Date: 10/26/2025
Breach Count: 3,864,364
Content: Email addresses, Profile photos, Usernames
Domain: myvidster.com

Description:

In October 2025, the data of almost 4M MyVidster users was posted to a public hacking forum. Separate to the 2015 breach, this incident exposed usernames, email addresses and in a small number of cases, profile photos.

Verified: , Fabricated: , Sensitive: , Active: , Retired: , Is Spam List:

























Account Search

This site simply searches online databases of compromised account information in an attempt to help you keep your accounts safe and secure. We do not actually have or store any information -- including the usernames and email addresses you enter above.

Share This!


Make a Donation To Keep Us Running