Compromised data: Email addresses, Passwords, Usernames In approximately 2011, it's alleged that the Chinese gaming site known as 7k7k suffered a data breach that impacted 9.1 million subscribers.
Compromised data: Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames, Website activity, Years of birth In December 2017, the virtual keyboard application was found to have left a huge amount of data publicly facing in an unsecured Mongo DB instance.
Discovered by researchers at The Kromtech Security Center, the 577GB data set included extensive personal information including over 20 million unique email addresses, social media profiles and address book contacts.
The exposed data included more than 1.3 million unique email addresses, often accompanied by usernames, IP addresses and plain text or hashed passwords retrieved from various sources and intended to be used to compromise the victims' accounts.
Compromised data: Email addresses, IP addresses, Passwords, Usernames In November 2014, the acne website suffered a data breach that exposed over 430k forum members' accounts.
The data was sold and traded before 000webhost was alerted in October.
The breach included names, email addresses and plain text passwords.Compromised data: Email addresses, Passwords, Usernames In November 2015, the gaming website dedicated to classic DOS games Abandonia suffered a data breach resulting in the exposure of 776k unique user records.The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Races, Relationship statuses, Sexual orientations, Spoken languages, Usernames In May 2013, the torrent site Aha suffered a breach which resulted in more than 180k user accounts being published publicly.The breach included a raft of personal information on registered users plus despite assertions of not distributing personally identifiable information, the site also leaked the IP addresses used by the registered identities.The password cryptography was poorly done and many were quickly resolved back to plain text.