Latest Breach Information
Below is a list of the last 25 known data breaches and any information we may have about them.
Zilvia.net
| Added Date: |
12/1/2025 |
| Breach Date: |
11/6/2025 |
| Updated Date: |
12/1/2025 |
| Breach Count: |
287,863 |
| Content: |
Email addresses, IP addresses, Passwords, Usernames |
| Domain: |
zilvia.net |
Description:
In November 2025, data breached from the Zilvia.net Nissan 240SX Silvia and Z Fairlady car forum was leaked. The breach exposed 288k unique email addresses along with usernames, IP addresses and salted MD5 password hashes sourced from the vBulletin based platform. Attempts to contact Zilvia.net about the incident were unsuccessful.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
China Software Developer Network
| Added Date: |
11/26/2025 |
| Breach Date: |
12/21/2011 |
| Updated Date: |
11/26/2025 |
| Breach Count: |
6,414,990 |
| Content: |
Email addresses, Passwords, Usernames |
| Domain: |
csdn.net |
Description:
In 2011, the China Software Developer Network (CSDN) suffered a data breach that exposed over 6M user records. The data included email addresses alongside usernames and plain text passwords.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
CodeStepByStep
| Added Date: |
11/22/2025 |
| Breach Date: |
11/15/2025 |
| Updated Date: |
12/2/2025 |
| Breach Count: |
103,077 |
| Content: |
Email addresses, Names, Usernames |
| Domain: |
codestepbystep.com |
Description:
In November 2025, the online coding practice tool CodeStepByStep suffered a data breach that exposed 17k records which were subsequently published online. The following month, a further corpus of data was released bringing the total to 103k. The impacted data included names, usernames and email addresses.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
ADDA
| Added Date: |
11/22/2025 |
| Breach Date: |
3/24/2025 |
| Updated Date: |
11/23/2025 |
| Breach Count: |
1,829,314 |
| Content: |
Email addresses, Names, Passwords, Phone numbers |
| Domain: |
adda.io |
Description:
In March 2025, data allegedly breached from the ADDA housing societies service was posted to a public hacking forum. The data contained over 1.8M unique email addresses along with names, phone numbers and MD5 password hashes.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
International Kiteboarding Organization
| Added Date: |
11/20/2025 |
| Breach Date: |
11/11/2025 |
| Updated Date: |
11/20/2025 |
| Breach Count: |
340,349 |
| Content: |
Email addresses, Geographic locations, Names, Usernames |
| Domain: |
ikointl.com |
Description:
In November 2025, the International Kiteboarding Organization suffered a data breach that exposed 340k user records. The data was subsequently listed for sale on a hacking forum and included email addresses, names, usernames and in many cases, the user's city and country.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Beckett Collectibles
| Added Date: |
11/19/2025 |
| Breach Date: |
11/9/2025 |
| Updated Date: |
12/2/2025 |
| Breach Count: |
1,041,238 |
| Content: |
Email addresses, Names, Phone numbers, Physical addresses, Usernames |
| Domain: |
beckett.com |
Description:
In November 2025, Beckett Collectibles experienced a data breach accompanied by website content defacement. The stolen data was later advertised for sale on a prominent hacking forum, with portions subsequently released publicly. The publicly circulating data initially included more than 500k email addresses reportedly belonging to North American customers, before a larger corpus of over 1M addresses was published the following month. The impacted data included names, usernames, phone numbers and physical addresses.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Eurofiber
| Added Date: |
11/19/2025 |
| Breach Date: |
11/13/2025 |
| Updated Date: |
11/19/2025 |
| Breach Count: |
10,003 |
| Content: |
Email addresses, Names, Phone numbers |
| Domain: |
eurofiber.com |
Description:
In November 2025, Eurofiber France disclosed a data breach of its ticket management platform. Data containing 10k unique email addresses and a smaller number of names and phone numbers was subsequently leaked. A threat actor claiming responsibility for the breach alleges to have additional, more sensitive data including screenshots, VPN configuration files, credentials, source code, certificates, archives, and SQL backup files.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Vultr
| Added Date: |
11/19/2025 |
| Breach Date: |
7/8/2022 |
| Updated Date: |
11/19/2025 |
| Breach Count: |
187,872 |
| Content: |
Email addresses, Geographic locations, IP addresses, Names |
| Domain: |
vultr.com |
Description:
In March 2023, the "AI-first global cloud platform" Vultr disclosed a security incident at a third-party vendor. Dating back to the previous year, the incident was attributed to the ActiveCampaign email marketing service provider and resulted in the exposure of 188k unique email addresses. A small number of records also included name, IP address and country of origin. No Vultr systems or additional customer data were impacted. Vultr subsequently self-submitted the impacted data to HIBP.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Operation Endgame 3.0
| Added Date: |
11/13/2025 |
| Breach Date: |
11/13/2025 |
| Updated Date: |
11/13/2025 |
| Breach Count: |
2,046,030 |
| Content: |
Email addresses, Passwords |
| Domain: |
n/a |
Description:
Between 10 and 13 November 2025, the latest phase of Operation Endgame was coordinated from Europol's headquarters in The Hague. The actions targeted one of the biggest infostealer Rhadamanthys, the Remote Access Trojan VenomRAT, and the botnet Elysium, all of which played a key role in international cybercrime. Authorities took down these three large cybercrime enablers and provided 2 million impacted email addresses and 7.4 million passwords to HIBP.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
TISZA Világ
| Added Date: |
11/8/2025 |
| Breach Date: |
10/6/2025 |
| Updated Date: |
11/8/2025 |
| Breach Count: |
198,520 |
| Content: |
Email addresses, Names, Phone numbers, Physical addresses, Usernames |
| Domain: |
tiszavilag.hu |
Description:
In late October 2025, data breached from the Hungarian political party TISZA was published online before being extensively redistributed. Stemming from a compromise of the TISZA Világ service earlier in the month, the breach exposed 200k records of personal data including email addresses along with names, phone numbers and physical addresses.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Synthient Credential Stuffing Threat Data
| Added Date: |
11/5/2025 |
| Breach Date: |
4/11/2025 |
| Updated Date: |
11/8/2025 |
| Breach Count: |
1,957,476,021 |
| Content: |
Email addresses, Passwords |
| Domain: |
n/a |
Description:
During 2025, the threat-intelligence firm Synthient aggregated 2 billion unique email addresses disclosed in credential-stuffing lists found across multiple malicious internet sources. Comprised of email addresses and passwords from previous data breaches, these lists are used by attackers to compromise other, unrelated accounts of victims who have reused their passwords. The data also included 1.3 billion unique passwords, which are now searchable in Pwned Passwords. Working to turn breached data into awareness, Synthient partnered with HIBP to help victims of cybercrime understand their exposure.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
MyVidster (2025)
| Added Date: |
10/26/2025 |
| Breach Date: |
10/24/2025 |
| Updated Date: |
10/26/2025 |
| Breach Count: |
3,864,364 |
| Content: |
Email addresses, Profile photos, Usernames |
| Domain: |
myvidster.com |
Description:
In October 2025, the data of almost 4M MyVidster users was posted to a public hacking forum. Separate to the 2015 breach, this incident exposed usernames, email addresses and in a small number of cases, profile photos.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Synthient Stealer Log Threat Data
| Added Date: |
10/21/2025 |
| Breach Date: |
4/11/2025 |
| Updated Date: |
10/21/2025 |
| Breach Count: |
182,962,095 |
| Content: |
Email addresses, Passwords |
| Domain: |
n/a |
Description:
During 2025, Synthient aggregated billions of records of "threat data" from various internet sources. The data contained 183M unique email addresses alongside the websites they were entered into and the passwords used. After normalising and deduplicating the data, 183 million unique email addresses remained, each linked to the website where the credentials were captured, and the password used. This dataset is now searchable in HIBP by email address, password, domain, and the site on which the credentials were entered.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Prosper
| Added Date: |
10/15/2025 |
| Breach Date: |
9/1/2025 |
| Updated Date: |
10/15/2025 |
| Breach Count: |
17,605,276 |
| Content: |
Browser user agent details, Credit status information, Dates of birth, Email addresses, Employment statuses, Government issued IDs, Income levels, IP addresses, Names, Physical addresses |
| Domain: |
prosper.com |
Description:
In September 2025, Prosper announced that it had detected unauthorised access to their systems, which resulted in the exposure of customer and applicant information. The data breach impacted 17.6M unique email addresses, along with other customer information, including US Social Security numbers. Prosper advised that they did not find any evidence of unauthorised access to customer accounts and funds, and that their customer-facing operations were uninterrupted. Further information about the incident is contained in Prosper's FAQs.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Hello Cake
| Added Date: |
10/14/2025 |
| Breach Date: |
7/25/2025 |
| Updated Date: |
10/14/2025 |
| Breach Count: |
22,907 |
| Content: |
Dates of birth, Email addresses, Names, Phone numbers, Physical addresses, Purchases |
| Domain: |
hellocake.com |
Description:
In July 2025, the sexual healthcare product maker Hello Cake suffered a data breach. The data was subsequently posted on a public hacking forum and included 23k unique email addresses along with names, phone numbers, physical addresses, dates of birth and purchases.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Vietnam Airlines
| Added Date: |
10/11/2025 |
| Breach Date: |
6/20/2025 |
| Updated Date: |
10/11/2025 |
| Breach Count: |
7,316,915 |
| Content: |
Dates of birth, Email addresses, Loyalty program details, Names, Phone numbers |
| Domain: |
vietnamairlines.com |
Description:
In October 2025, data stolen from the Salesforce instances of multiple companies by a hacking group calling itself "Scattered LAPSUS$ Hunters" was publicly released. Among the affected organisations was Vietnam Airlines, which had 7.3M unique customer email addresses exposed following a breach of its Salesforce environment in June of that year. The compromised data also included names, phone numbers, dates of birth, and loyalty program membership numbers.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Adpost
| Added Date: |
10/6/2025 |
| Breach Date: |
2/14/2025 |
| Updated Date: |
10/6/2025 |
| Breach Count: |
3,339,512 |
| Content: |
Email addresses, Names, Usernames |
| Domain: |
adpost.com |
Description:
In February 2025, data allegedly obtained from an earlier Adpost breach surfaced. The dataset contained 3.3M records including email addresses, usernames, and display names. Multiple attempts to contact Adpost regarding the incident received no response.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Artists&Clients
| Added Date: |
10/3/2025 |
| Breach Date: |
8/31/2025 |
| Updated Date: |
10/3/2025 |
| Breach Count: |
95,351 |
| Content: |
Email addresses, IP addresses, Passwords, Usernames |
| Domain: |
artistsnclients.com |
Description:
In August 2025, the "marketplace that connects artists to prospective clients" Artists&Clients, suffered a data breach and subsequent ransom demand of US$50k. The data was subsequently leaked publicly and included 95k unique email addresses alongside usernames, IP addresses and bcrypt password hashes.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
HomeRefill
| Added Date: |
10/3/2025 |
| Breach Date: |
4/2/2020 |
| Updated Date: |
10/3/2025 |
| Breach Count: |
187,457 |
| Content: |
Dates of birth, Email addresses, Names, Passwords, Phone numbers |
| Domain: |
homerefill.com.br |
Description:
In April 2020, now defunct Brazilian e-commerce platform HomeRefill suffered a data breach that was later redistributed as part of a larger corpus of data. The data included 187k unique email addresses along with names, phone numbers, dates of birth and salted password hashes.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List:
Latest Pilot Jobs
| Added Date: |
10/2/2025 |
| Breach Date: |
8/14/2022 |
| Updated Date: |
10/2/2025 |
| Breach Count: |
118,864 |
| Content: |
Email addresses, Names, Passwords, Usernames |
| Domain: |
latestpilotjobs.com |
Description:
In August 2022, the Latest Pilot Jobs website suffered a data breach that later appeared on a popular hacking forum before being redistributed as part of a larger corpus of data. The data included 119k unique email addresses along with names, usernames and unsalted MD5 password hashes.
Verified: 
,
Fabricated: 
,
Sensitive: 
,
Active: 
,
Retired: 
,
Is Spam List: