Hosting site accidentally cc'd email to all their active customers.
12 September 2022BREACHAWARE HQ
A total of 7 breach events
were found and analysed resulting in 55,971,246 exposed accounts
containing a total of 10 different data types of personal datum
. The breaches found publicly and freely available included US Blowout 2019, IDC Games, Qiwi, Vedantu and 3S. Sign in to view the full
library of breach events which includes, where available, reference articles relating to
each breach.
Categories of Personal Data Discovered
Contact Data, Technical Data, Financial Data, Socia-Demographic Data, Contractual Data.
Data Breach Analysis
US Blowout 2019: A catch-all label often referring to a massive compilation of previously breached records. While not a breach of a specific platform, this dataset has continued to resurface in different forums and repositories, fueling identity theft, spam campaigns, and other malicious activity through aggregated exposure.IDC Games: A multiplayer gaming platform with a significant international user base. Leaked account data from such platforms can be particularly harmful, as gamers often reuse credentials across systems and may also store in-app purchase information, making them ripe for credential stuffing or fraudulent access.
Qiwi: A Russian-based digital payments and financial services provider. Exposure linked to Qiwi is concerning due to the potential presence of financial or transaction data, which can lead to account fraud, phishing scams, and reputational damage both for individuals and the service.
Vedantu: A popular Indian edtech company offering live tutoring. Breached records from this platform can affect students, parents, and educators, raising risks of identity misuse, unauthorised access to academic data, and loss of trust in educational platforms.
3S: Though lesser-known, the inclusion of smaller or regional services like 3S shows that no digital footprint is too small to be exploited. Breached data from these platforms may still contain valuable personal identifiers, creating security gaps if reused elsewhere.
Collectively, these breaches reiterate the need for proactive cybersecurity practices. The wide range of impacted services, gaming, fintech, education, reflects how deeply embedded our personal data has become across sectors, and how vulnerable it remains without proper protection.
For users, this serves as a powerful reminder to regularly change passwords, enable multi-factor authentication, and monitor for signs of unusual account activity. For companies, it reinforces the necessity of robust incident response protocols, transparent disclosure, and continuous security audits.
With nearly 56 million records exposed, the potential downstream impact is significant, spanning fraud, privacy violations, and operational risks for businesses and consumers alike.
Spotlight
One of Russia's largest e-wallet companies suffered a data breach. The company reaches into Ukraine and as well as Kazakhstan with 47 million registered users and supports 20 different payment methods. Earlier in the year, their site was hit by a ransomware attack.It has been reported by a well known threat actor in the community that a hosting site which prides themselves on their anonymity and reliability has sent an email to all of their active customers accidentally. Sending a carbon copy rather than a blind copy resulting in the full names and email address of there entire user-base. The threat actor posted that s/he had received an email, but s/he was not letting slip their real name.
On the subject of client lists, a cyber security company that is well known in the industry has had their entire client list dumped online. Names, mobile phone numbers, and email addresses, as well as companies.
A new VPN has launched, advertising themselves on a variety of unsavoury forums and channels. They seem to be reachable from their own onion site. We're always very sceptical about VPNs unless they have very good reputation. The problem with being in this industry is that the paranoia is ramped so high that the phrase "this is why we can’t have nice things" is echoed by members of the team when any new technology or software is securitised.