Dating App Disaster, Forum Chaos, and SwatWiki’s Dumb Demise.
18 August 2025BREACHAWARE HQ
A total of 14 breach events
were found and analysed resulting in 30,062,800 exposed accounts
containing a total of 32 different data types of personal datum
. The breaches found publicly and freely available included Stealer Log 0539, Have I Been Drained Crypto Drainer, ULP Alien TxT File - Episode 21, Indian Business Owners and Le Surfaces. Sign in to view the full
library of breach events which includes, where available, reference articles relating to
each breach.
Categories of Personal Data Discovered
Contact, Digital Behaviour, Sociodemographic, Technology, Finance, Geolocation, Commerce, Career, Academic, Unstructured.
Data Breach Impact
This round of breaches is especially concerning because of the sheer scale, over 30 million accounts, and the diversity of 32 data types exposed. The inclusion of Stealer Log 0539 and the Have I Been Drained Crypto Drainer highlights how malware and crypto-targeted tools are feeding directly into large scale data compromise, pulling not just login details but also financial assets and transaction histories. The exposure of “Indian Business Owners” data suggests that professional and commercial identities are now being swept into breach ecosystems, amplifying risks of fraud, impersonation, and targeted scams against entrepreneurs and SMEs. What’s striking here is that this isn’t just consumer data at risk; it’s a mix of personal, financial, and professional intelligence that, once combined, creates powerful opportunities for exploitation.For the organisations tied to these leaks, the implications run deep. The recurring presence of ULP Alien TxT Files continues to show that unsecured, unmonitored repositories remain a weak spot, and in sectors like crypto, the reputational fallout from mishandling user trust can be devastating. Companies associated with these breaches may face questions not only about technical safeguards but also about data governance practices, why such large, detailed datasets were held in ways that could be compromised so easily. For businesses exposed in this wave, the path forward isn’t just about damage control; it’s about proving they can protect high-value data in a world where attackers are blending malware, drainers, and open repositories into a relentless breach pipeline.
Cyber Spotlight
Ah, the romantic world of dating apps, where your soulmate might be just a swipe away, but so is a catastrophic data breach.After TeaForWomen had its dirty laundry leaked all over the internet (KYC photos, chat logs about cheating, abortion, STDs, the works), someone thought, “Hey, let’s launch a competitor app immediately!” Thus, TeaOnHer was born.
Unfortunately, it wasn’t born ready. Within days, users discovered the admin password just sitting on the launch page. Not hidden, not encrypted, just right there. To make matters worse, the password was “Password1.” Truly, a masterpiece of 2002-level security.
And yes, TeaOnHer is already leaking KYC photos. To add insult to injury, the app has a “Data Security & Protection” page full of corporate waffle about industry-standard encryption and rigorous security audits. TL;DR: it’s like claiming your Titanic replica is “iceberg-resistant.”
Meanwhile, law enforcement might be less thrilled to hear that one of the top Russian-speaking hacking forums has staged a full recovery. After the moderator’s arrest in Ukraine and the domains being seized, rumours flew that everyone, admins, mods, ISP staff, and possibly the janitor, was arrested.
Turns out: nope. The forum is back online with both a fresh clearnet and onion domain. The admin even left a short but smug note “Infrastructure transfer complete!” Translation: “Thanks for the attention, but we’re fine.”
While one forum was reborn, others have vanished into the digital abyss. One major site’s clearnet and onion domains dropped off the map with zero explanation. Another fast-rising rival forum went dark too, the onion disconnected, and the login page now just tells users “I’m sorry, but you are banned.”
Cue chaos. Every script kiddie with a Telegram account is now panicking like the stock market in 2008. The underground is a mess, and the popcorn is free.
And finally, in the “even too dumb for the dark web” category: SwatWiki.com, a vile site themed around swatting (false police reports that send armed officers to someone’s house), has gone offline.
The shutdown message blames “significant internal issues within the team, including extortion by a member.” But here’s the kicker: the supposed admin popped up online to say he has no idea what’s going on, and that he never decided to shut it down.
So either someone hijacked the site, or the admin’s staff staged the world’s pettiest coup. Either way, it’s a fittingly chaotic end to a project that should never have existed in the first place.
Vulnerability Chat
Researchers at Imperva and Tel Aviv University have uncovered a new DDoS attack vector they’ve named MadeYouReset. Similar to the infamous Rapid Reset method, it can be weaponised to fuel massive distributed denial-of-service attacks. Thankfully, vendors including Apache Tomcat, F5, Fastly, and Varnish have already released patches to close the gap.Plex, meanwhile, has sent out urgent alerts to some of its users, warning them to update their media servers. The company hasn’t revealed specifics about the flaw, but emphasised the need to patch quickly before attackers can reverse engineer the fix and craft an exploit.
Cisco has also joined the week’s disclosure wave, announcing a critical vulnerability in its Secure Firewall Management Center (FMC) Software. The flaw could allow unauthenticated attackers to remotely execute arbitrary shell commands with high-level privileges. Cisco says there are no workarounds, but free updates have been released, and the company is urging all customers to patch immediately.
5 Common Vulnerability and Exposures (CVEs) were added to the CyberSecurity & Infrastructure Security Agency's (CISA) 'Known Exploited Vulnerabilities Catalog' last week including:
- RARLAB; WinRAR
- Microsoft; Office
- Microsoft; Internet Explorer
- N-able; N-Central
See the full catalog here: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
NIST's National Vulnerability Database (NVD), the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP), has published 1,089 vulnerabilities during the last week, making the 2025 total 29,409. For more information visit https://nvd.nist.gov/vuln/search/
View the latest critical vulnerabilities, exploited vulnerabilities and EU CSIRT coordinated vulnerabilities from the European Union Agency for Cybersecurity (ENISA) "Vulnerability Database" here: https://euvd.enisa.europa.eu/homepage
Information Privacy Headlines
Big Brother Watch is sounding the alarm over what it calls an “Orwellian” use of passport and immigration databases in the UK. According to the group, the government has quietly allowed facial recognition systems to tap into these databases without telling the public or parliament. In a joint statement, director Silkie Carlo and Privacy International’s senior technologist Nuno Guerreiro de Sousa condemned the secrecy and confirmed that letters have been sent to both the Home Office and the Metropolitan Police demanding an outright ban on the practice.Meanwhile, in the Netherlands, the privacy watchdog Autoriteit Persoonsgegevens has launched an investigation into a serious breach at test processing lab Clinical Diagnostics, which has compromised the data of nearly half a million people. The lab says those affected will be formally notified by August 19, and family doctors will also be informed. But reporting from RTL Nieuws revealed a troubling detail: among the hacked records were women living in shelters, with not just their names and ID numbers exposed, but even the address of the shelter itself.
And on the global stage, Infosys has published a sweeping report on how business leaders are grappling with AI. Surveying more than 1,500 executives across six countries, the study found that 95% had already experienced at least one serious problem tied to their use of AI. Privacy violations and systemic failures topped the list, each reported by a third of respondents. Close behind were inaccurate or harmful predictions at 32%, ethical violations also at 32%, and a lack of explainability at 30%.
Smarter Protection Starts with Awareness
Data Breach Exposure Scan, Check Any Domain for Free https://breachaware.com/scan