$$$$$$$$\ $$\ $$\ $$ _____| $$ | $$ | $$ | $$$$$$$\ $$ | $$\ $$$$$$\ $$$$$$\ $$$$$$\ $$$$$$$ | $$$$$$\ $$$$$\ $$ _____|$$ | $$ |\____$$\ $$ __$$\ \____$$\ $$ __$$ |$$ __$$\ $$ __| \$$$$$$\ $$$$$$ / $$$$$$$ |$$ / $$ | $$$$$$$ |$$ / $$ |$$$$$$$$ | $$ | \____$$\ $$ _$$< $$ __$$ |$$ | $$ |$$ __$$ |$$ | $$ |$$ ____| $$$$$$$$\ $$$$$$$ |$$ | \$$\\$$$$$$$ |$$$$$$$ |\$$$$$$$ |\$$$$$$$ |\$$$$$$$\ \________|\_______/ \__| \__|\_______|$$ ____/ \_______| \_______| \_______| $$ | $$ | \__| Eskapade Dox || Trojan ~ Description: Trojan also known as William Frost is a imbecile originating from HackForums. He has scammed people, caused harassment and generally is a complete retard. On behalf of the eskapade legion, I have decided to dox William/Neil as it is justified. Enjoy the read! Feel free to do whatever you would like with this scumbag. - Benjamin ~ _____ _ |_ _| (_) | |_ __ ___ _ __ _ _ __ | | '__/ _ \| |/ _` | '_ \ | | | | (_) | | (_| | | | | \_/_| \___/| |\__,_|_| |_| _/ | |__/ ~ Background Information: Current Age: 18 Years Old Name: William Frost, Aliases are: Joe Falco, Neil Walter Phone Numbers: +1.2403424362 (240-301)***-4362 Fax Number: +1.8774612631 Emails: trojanhf@protonmail.com williamfrost005@gmail.com neilwalter7@gmail.com williamfrost005@outlook.com neilwalter@outlook.com luk•••••••••••••••••@gmail.com ~ Private Information: IP Addresses: 108.28.53.166 (Real IP) ~ Dynamic 107.173.191.179 (VPN) ~ ISP Info: Decimal: 1813788070 Hostname: pool-108-28-53-166.washdc.fios.verizon.net ASN: 701 ISP: Verizon Fios Organization: Verizon Fios ~ Country: United States State: Olney, MD (Maryland) Address: 9726 Clover Hill Ter, Old Stage Road ~ Passwords/Email/Username Dumps: VALUES ('9942', 'williamfrost005', '$2y$12$9Tc4SrR43atPrqfA67WaluygX7Ho3mLjk/Z6s8t4pvpSsIRFkSh1C', 'mowfVPV6', 'uUVn9ASaJSUNVz0UBLTtdgtgH7h8n23S4DFfxejOgUERxuliCs', 'williamfrost005@gmail.com', '4', '2', '', '', '', '2', '', '0', '', '1532367151', '1543117610', '1533012544', '1543117594', '', '0', '', '', '', '', '', 'all', '', '1', '0', '0', '0', '1', '0', '2', '0', '1', '0', 'linear', '1', '1', '1', '1', '1', '1', '0', '0', '0', '', '', '', '0', '0', '', '', '36', '0', '0', '0', '', '1$%%$2$%%$3$%%$4', '', '0', '0', '0', 0x175E1CA8, 0x6C338C96, '', '1517', '1', '4', '3', '0', '0', '0', '0', '0', '0', '0', '0', '1', '2', '0', '', '0', '2139.00', '1', '0', '6', '2', '', '1', '1', '2', '0', '0', '58', '0', '[]', '1', null, null, null, '1', '', '', '0', '0', '0', '', '', '', '', '', '0', '', '', '', '0', '0', '0', '1', '0', '0', '0', '4', '0', '0', '0', '', '0', '', '0', '0', '0', '', '', '', '', '', '', '', '', '', '', '0', 'a:3:{i:103171;a:6:{s:3:"uid";i:103171;s:12:"displaygroup";s:1:"2";s:9:"usergroup";s:1:"2";s:8:"username";s:13:"mastercracker";s:6:"avatar";s:0:"";s:4:"time";i:1563058448;}i:256213;a:6:{s:3:"uid";i:256213;s:12:"displaygroup";s:1:"2";s:9:"usergroup";s:1:"2";s:8:"username";s:13:"Monkeybutt101";s:6:"avatar";s:0:"";s:4:"time";i:1562700696;}i:148630;a:6:{s:3:"uid";i:148630;s:6:"avatar";s:0:"";s:12:"displaygroup";s:1:"2";s:9:"usergroup";s:1:"2";s:8:"username";s:9:"mikeymods";s:4:"time";i:1556373315;}}', 'mybb_bcrypt', '0', ''); VALUES ('174274', 'squealed', '$2y$12$NpL6SBL3E5ALwItc5U91KuCfMyEzMaR0eZyumhb2i8RcCfBeMtNrK', 'jt6pwozW', '5kgNIefZ24GFvudvEtlX1p9hd5ocIASsF2Fo4RW6wensxr029N', 'neilwalter7@gmail.com', '2', '0', '', '', '', '2', '', '0', '', '1557707617', '1559438267', '1558836086', '1557708803', '', '0', '', '', '', '', '', 'all', '', '1', '0', '0', '0', '1', '0', '1', '0', '1', '0', 'linear', '1', '1', '1', '1', '1', '1', '0', '0', '0', '', '', '', '0', '0', '', '', '36', '0', '0', '0', '', '1$%%$2$%%$3$%%$4', '', '0', '0', '0', 0x60E762D7, 0x60E762D7, '', '4159', '1', '2', '0', '0', '0', '0', '0', '0', '0', '0', '0', '1', '1', '0', '', '0', '58.00', '1', '0', '0', '0', '', '1', '1', '2', '0', '0', '2', '0', '[]', '1', null, null, null, '1', '', '', '0', '0', '0', '', '', '', '', '', '0', '', '', '', '0', '0', '0', '1', '0', '0', '0', '0', '0', '0', '0', '', '0', '', '0', '0', '0', '', '', '', '', '', '', '', '', '', '', '0', 'a:1:{i:103171;a:6:{s:3:"uid";i:103171;s:12:"displaygroup";s:1:"2";s:9:"usergroup";s:1:"2";s:8:"username";s:13:"mastercracker";s:6:"avatar";s:0:"";s:4:"time";i:1561583746;}}', 'mybb_bcrypt', '0', ''); (62209, 'squealed', 'aa95dde4052f3637aa3b76646cd0fb62', 'GiSChtGH', '', 'neilwalter7@gmail.com', 0, 0, 0, '', '', '', 7, '', 0, '', 1530161775, 1535751343, 1535751343, 0, '', '', '', '', '', '', 'all', '', 1, 0, 0, 0, 1, 0, 1, 0, 1, 0, 'linear', 1, 1, 1, 1, 1, 1, 0, 0, 0, '', '', '', 0, 0, '', '', 46, 0, 0, '', '', '1$%%$2$%%$3$%%$4', '', 0, 0, 0, UNHEX('175E1CA8'), UNHEX('6C2D77E8'), '', 34500, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 2, 0, '', 0, 0, 0, 0, 0, '[]', 0, 0, 0, '', '', 0, 0, 1, 0.00, 0, NULL, 0, 0, '', NULL, 0, NULL, NULL, '', NULL, 1, '', '', '', 1, 1, 2, 0, 0, 0, 0, '', 0, '', 0, 1574391812, NULL, 0), williamfrost005', 'c87518f20f882bea6f78b933e7bbc3b3', 'Xc9CW9bi', '', 'williamfrost005@gmail.com', 0, 0, 1, '', '', '', 7, '', 0, '', 1536550141, 1576553587, 1575764825, 1536550622, '', '0', '', '', '', '2-4-1960', 'all', '', 1, 0, 0, 0, 1, 0, 1, 0, 1, 0, 'linear', 1, 1, 1, 1, 1, 1, 0, 0, 0, '', '', '', 0, 0, '', '', 46, 0, 0, '0', '', '1$%%$2$%%$3$%%$4', '', 0, 0, 0, UNHEX('A2D2C602'), UNHEX('60E762D7'), '', 12164, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 3, 0, '', 0, 0, 0, 0, 0, '[]', 0, 0, 0, '', '', 0, 0, 1, 1.08, 0, NULL, 0, 0, '', NULL, 0, NULL, NULL, '', NULL, 1, '', '', '', 1, 1, 2, 0, 0, 0, 0, '', 1, '', 0, 1574391812, NULL, 0), (62209, 'squealed', 'aa95dde4052f3637aa3b76646cd0fb62', 'GiSChtGH', '', 'neilwalter7@gmail.com', 0, 0, 0, '', '', '', 7, '', 0, '', 1530161775, 1535751343, 1535751343, 0, '', '', '', '', '', '', 'all', '', 1, 0, 0, 0, 1, 0, 1, 0, 1, 0, 'linear', 1, 1, 1, 1, 1, 1, 0, 0, 0, '', '', '', 0, 0, '', '', 46, 0, 0, '', '', '1$%%$2$%%$3$%%$4', '', 0, 0, 0, UNHEX('175E1CA8'), UNHEX('6C2D77E8'), '', 34500, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 2, 0, '', 0, 0, 0, 0, 0, '[]', 0, 0, 0, '', '', 0, 0, 1, 0.00, 0, NULL, 0, 0, '', NULL, 0, NULL, NULL, '', NULL, 1, '', '', '', 1, 1, 2, 0, 0, 0, 0, '', 0, '', 0, 1574391812, NULL, 0), ~ Hashed Passwords | Email:Password:Salt : neilwalter7@gmail.com:aa95dde4052f3637aa3b76646cd0fb62:GiSChtGH neilwalter7@gmail.com:$2y$12$NpL6SBL3E5ALwItc5U91KuCfMyEzMaR0eZyumhb2i8RcCfBeMtNrK:jt6pwozW ~ Passwords Hashes: c87518f20f882bea6f78b933e7bbc3b3 Salt: Xc9CW9bi $P$BMdJz5uKiC6UiPtkZS2Y.7XgSTNulB1 No Salt ~ Social Profiles: https://cracked.to/trojano https://cracked.to/squealed https://hackforums.net/member.php?action=profile&uid=237516 Discord: 284174448695836673 (UID) Trojan#4112 https://dreamweavervcc.com/community/profile/neilwalter7/ Domain Registers: Domain Name Creation Date Registrar freemineconcape.com 2016-08-05 1and1.com neilwalter.net 2016-08-31 1and1.com eBay: https://www.ebay.com/usr/squealed ~ SSN Number: 216-54-0991 ~ Leaked DB Info: {"Breaches":[{"Name":"000webhost","Title":"000webhost","Domain":"000webhost.com","BreachDate":"2015-03-01","AddedDate":"2015-10-26T23:35:45Z","ModifiedDate":"2017-12-10T21:44:27Z","PwnCount":14936670,"Description":"In approximately March 2015, the free web hosting provider 000webhost suffered a major data breach that exposed almost 15 million customer records. The data was sold and traded before 000webhost was alerted in October. The breach included names, email addresses and plain text passwords.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/000webhost.png","DataClasses":["Email addresses","IP addresses","Names","Passwords"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"2844Breaches","Title":"2,844 Separate Data Breaches","Domain":"","BreachDate":"2018-02-19","AddedDate":"2018-02-26T10:06:02Z","ModifiedDate":"2018-02-26T10:06:02Z","PwnCount":80115532,"Description":"In February 2018, a massive collection of almost 3,000 alleged data breaches was found online. Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen. Each file contained both an email address and plain text password and were consequently loaded as a single "unverified" data breach.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png","DataClasses":["Email addresses","Passwords"],"IsVerified":false,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"Canva","Title":"Canva","Domain":"canva.com","BreachDate":"2019-05-24","AddedDate":"2019-08-09T14:24:01Z","ModifiedDate":"2019-08-09T14:24:01Z","PwnCount":137272116,"Description":"In May 2019, the graphic design tool website Canva suffered a data breach that impacted 137 million subscribers. The exposed data included email addresses, usernames, names, cities of residence and passwords stored as bcrypt hashes for users not using social logins. The data was provided to HIBP by a source who requested it be attributed to \"JimScott.Sec@protonmail.com\".","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/Canva.png","DataClasses":["Email addresses","Geographic locations","Names","Passwords","Usernames"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"Collection1","Title":"Collection #1","Domain":"","BreachDate":"2019-01-07","AddedDate":"2019-01-16T21:46:07Z","ModifiedDate":"2019-01-16T21:50:21Z","PwnCount":772904991,"Description":"In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record \"Collection #1\" Data Breach.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png","DataClasses":["Email addresses","Passwords"],"IsVerified":false,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"CrackedTO","Title":"Cracked.to","Domain":"cracked.to","BreachDate":"2019-07-21","AddedDate":"2019-08-12T11:18:56Z","ModifiedDate":"2019-08-12T11:18:56Z","PwnCount":749161,"Description":"In July 2019, the hacking website Cracked.to suffered a data breach. There were 749k unique email addresses spread across 321k forum users and other tables in the database. A rival hacking website claimed responsibility for breaching the MyBB based forum which disclosed email and IP addresses, usernames, private messages and passwords stored as bcrypt hashes.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/CrackedTO.png","DataClasses":["Email addresses","IP addresses","Passwords","Private messages","Usernames"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"DemonForums","Title":"Demon Forums","Domain":"demonforums.net","BreachDate":"2019-02-20","AddedDate":"2019-04-04T07:14:34Z","ModifiedDate":"2019-04-04T07:14:34Z","PwnCount":52623,"Description":"In February 2019, the hacking forum Demon Forums suffered a data breach. The compromise of the vBulletin forum exposed 52k unique email addresses alongside usernames and passwords stored as salted MD5 hashes.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/DemonForums.png","DataClasses":["Email addresses","Passwords","Usernames"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"ExploitIn","Title":"Exploit.In","Domain":"","BreachDate":"2016-10-13","AddedDate":"2017-05-06T07:03:18Z","ModifiedDate":"2017-05-06T07:03:18Z","PwnCount":593427119,"Description":"In late 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png","DataClasses":["Email addresses","Passwords"],"IsVerified":false,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"MailRu","Title":"mail.ru Dump","Domain":"mail.ru","BreachDate":"2014-09-10","AddedDate":"2014-09-12T04:50:22Z","ModifiedDate":"2018-01-09T03:38:56Z","PwnCount":16630988,"Description":"In September 2014, several large dumps of user accounts appeared on the Russian Bitcoin Security Forum including one with nearly 5M email addresses and passwords, predominantly on the mail.ru domain. Whilst unlikely to be the result of a direct attack against mail.ru, the credentials were confirmed by many as legitimate for other services they had subscribed to. Further data allegedly valid for mail.ru and containing email addresses and plain text passwords was added in January 2018 bringing to total to more than 16M records. The incident was also then flagged as "unverified", a concept that was introduced after the initial data load in 2014.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/MailRu.png","DataClasses":["Email addresses","Passwords"],"IsVerified":false,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"Mathway","Title":"Mathway","Domain":"mathway.com","BreachDate":"2020-01-13","AddedDate":"2020-06-05T23:59:45Z","ModifiedDate":"2020-06-05T23:59:45Z","PwnCount":25692862,"Description":"In January 2020, the math solving website Mathway suffered a data breach that exposed over 25M records. The data was subsequently sold on a dark web marketplace and included names, Google and Facebook IDs, email addresses and salted password hashes.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/Mathway.png","DataClasses":["Device information","Email addresses","Names","Passwords","Social media profiles"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"ModernBusinessSolutions","Title":"Modern Business Solutions","Domain":"modbsolutions.com","BreachDate":"2016-10-08","AddedDate":"2016-10-12T09:09:11Z","ModifiedDate":"2016-10-12T09:09:11Z","PwnCount":58843488,"Description":"In October 2016, a large Mongo DB file containing tens of millions of accounts was shared publicly on Twitter (the file has since been removed). The database contained over 58M unique email addresses along with IP addresses, names, home addresses, genders, job titles, dates of birth and phone numbers. The data was subsequently attributed to "Modern Business Solutions", a company that provides data storage and database hosting solutions. They've yet to acknowledge the incident or explain how they came to be in possession of the data.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/ModernBusinessSolutions.png","DataClasses":["Dates of birth","Email addresses","Genders","IP addresses","Job titles","Names","Phone numbers","Physical addresses"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"MPGH","Title":"MPGH","Domain":"mpgh.net","BreachDate":"2015-10-22","AddedDate":"2015-10-26T03:20:20Z","ModifiedDate":"2015-10-26T03:20:20Z","PwnCount":3122898,"Description":"In October 2015, the multiplayer game hacking website MPGH was hacked and 3.1 million user accounts disclosed. The vBulletin forum breach contained usernames, email addresses, IP addresses and salted hashes of passwords.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/MPGH.png","DataClasses":["Email addresses","IP addresses","Passwords","Usernames"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"Nulled","Title":"Nulled.cr","Domain":"nulled.cr","BreachDate":"2016-05-06","AddedDate":"2016-05-09T11:28:01Z","ModifiedDate":"2020-05-24T07:00:23Z","PwnCount":599080,"Description":"In May 2016, the cracking community forum known as Nulled.cr was hacked and 599k user accounts were leaked publicly. The compromised data included email and IP addresses, weak salted MD5 password hashes and hundreds of thousands of private messages between members.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/Nulled.png","DataClasses":["Dates of birth","Email addresses","IP addresses","Passwords","Private messages","Usernames","Website activity"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"OGUsers","Title":"OGUsers (2019 breach)","Domain":"ogusers.com","BreachDate":"2018-12-26","AddedDate":"2019-05-19T22:45:45Z","ModifiedDate":"2020-04-04T08:21:10Z","PwnCount":161143,"Description":"In May 2019, the account hijacking and SIM swapping forum OGusers suffered a data breach. The breach exposed a database backup from December 2018 which was published on a rival hacking forum. There were 161k unique email addresses spread across 113k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/OGUsers.png","DataClasses":["Email addresses","IP addresses","Passwords","Private messages","Usernames"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"OGUsers2020","Title":"OGUsers (2020 breach)","Domain":"ogusers.com","BreachDate":"2020-04-02","AddedDate":"2020-04-04T08:27:13Z","ModifiedDate":"2020-04-04T08:27:13Z","PwnCount":263189,"Description":"In April 2020, the account hijacking and SIM swapping forum OGUsers suffered their second data breach in less than a year. As with the previous breach, the exposed data included email and IP addresses, usernames, private messages and passwords stored as salted MD5 hashes. A total of 263k email addresses across user accounts and other tables were posted to a rival hacking forum.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/OGUsers.png","DataClasses":["Email addresses","IP addresses","Passwords","Private messages","Usernames"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"SocialEngineered","Title":"Social Engineered","Domain":"socialengineered.net","BreachDate":"2019-06-13","AddedDate":"2019-06-23T20:46:39Z","ModifiedDate":"2019-06-25T18:06:57Z","PwnCount":89392,"Description":"In June 2019, the "Art of Human Hacking" site Social Engineered suffered a data breach. The breach of the MyBB forum was published on a rival hacking forum and included 89k unique email addresses spread across 55k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes.","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/SocialEngineered.png","DataClasses":["Email addresses","IP addresses","Passwords","Private messages","Usernames"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false},{"Name":"Whitepages","Title":"Whitepages","Domain":"whitepages.com","BreachDate":"2016-06-27","AddedDate":"2019-03-27T01:50:45Z","ModifiedDate":"2019-03-27T01:50:45Z","PwnCount":11657763,"Description":"In mid-2016, the telephone and address directory service Whitepages was among a raft of sites that were breached and their data then sold in early-2019. The data included over 11 million unique email addresses alongside names and passwords stored as either a SHA-1 or bcrypt hash. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".","LogoPath":"https://haveibeenpwned.com/Content/Images/PwnedLogos/Whitepages.png","DataClasses":["Email addresses","Names","Passwords"],"IsVerified":true,"IsFabricated":false,"IsSensitive":false,"IsRetired":false,"IsSpamList":false}],"Pastes":[{"Id":"https://underground-revolution.eu/hacked/Viphf December 2014.sql","Source":"AdHocUrl","Title":"underground-revolution.eu","Date":null,"EmailCount":35173},{"Id":"https://underground-revolution.eu/hacked/demonforums.sql","Source":"AdHocUrl","Title":"Upgrade - (Website name here)","Date":null,"EmailCount":31008},{"Id":"https://underground-revolution.eu/hacked/teamviewer.ninja db.sql","Source":"AdHocUrl","Title":"underground-revolution.eu","Date":null,"EmailCount":345},{"Id":"z0peqZ8F","Source":"Pastebin","Title":"卐 Vape.gg Database 卐","Date":"2017-09-23T03:44:53Z","EmailCount":7657},{"Id":"mAJF7GMS","Source":"Pastebin","Title":"DB","Date":"2018-01-07T22:00:32Z","EmailCount":2447},{"Id":"ccpav6dA","Source":"Pastebin","Title":"Vape1","Date":"2018-09-09T21:43:09Z","EmailCount":2848}]} Cracked.to: In July 2019, the hacking website Cracked.to suffered a data breach. There were 749k unique email addresses spread across 321k forum users and other tables in the database. A rival hacking website claimed responsibility for breaching the MyBB based forum which disclosed email and IP addresses, usernames, private messages and passwords stored as bcrypt hashes. Compromised data: Email addresses, IP addresses, Passwords, Private messages, Usernames ~ OGUsers (2019 breach): In May 2019, the account hijacking and SIM swapping forum OGusers suffered a data breach. The breach exposed a database backup from December 2018 which was published on a rival hacking forum. There were 161k unique email addresses spread across 113k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes. Compromised data: Email addresses, IP addresses, Passwords, Private messages, Usernames ~ OGUsers (2020 breach): In April 2020, the account hijacking and SIM swapping forum OGUsers suffered their second data breach in less than a year. As with the previous breach, the exposed data included email and IP addresses, usernames, private messages and passwords stored as salted MD5 hashes. A total of 263k email addresses across user accounts and other tables were posted to a rival hacking forum. Compromised data: Email addresses, IP addresses, Passwords, Private messages, Usernames ~ Social Engineered: In June 2019, the "Art of Human Hacking" site Social Engineered suffered a data breach. The breach of the MyBB forum was published on a rival hacking forum and included 89k unique email addresses spread across 55k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes. Compromised data: Email addresses, IP addresses, Passwords, Private messages, Usernames ~ Proof of Harassment/Image dist: https://imgur.com/a/7LRidDO ~ ◭