Share this analysis

ActMobile Networks, wirecard and others fall victim of data leaks.

14 November 2021
BREACHAWARE HQ
VPN

A total of 23 breach events were found and analysed resulting in 5,668,173 exposed accounts containing a total of 21 different data types of personal datum . The breaches found publicly and freely available included ActMobile Networks, wirecard, Atraf, Send Pulse and Xbox Scene. Sign in to view the full library of breach events which includes, where available, reference articles relating to each breach.

Categories of Personal Data Discovered

Contact Data, Locational Data, Technical Data, Financial Data, Usage Data, Social Relationships Data, Documentary Data, Socia-Demographic Data, Special Category, Behavioural Data.

Data Breach Analysis

The breached entities span a diverse digital landscape: from VPN and mobile data services, to payment platforms, email automation providers, LGBTQ+ social networks, and legacy gaming communities. The diversity of this batch not only highlights the fragmented nature of online privacy risks, but also demonstrates how various user populations, each with unique threat profiles, can be disproportionately affected depending on the sector of exposure.

Privacy-Oriented Services Under Pressure: ActMobile Networks

One of the most notable inclusions in this batch is ActMobile Networks, a provider of virtual private network (VPN) and mobile data services. VPNs are designed to protect user privacy by encrypting internet traffic and masking IP addresses, and are often used by individuals in high-risk regions, whistleblowers, journalists, activists, or users attempting to circumvent censorship.

When a provider like ActMobile experiences a data breach, the implications go beyond credential theft. If attackers gain access to IP history, device identifiers, or session metadata, the breach has the potential to de-anonymise users who specifically sought these services for security and privacy. For populations depending on VPNs to evade surveillance, maintain anonymity, or bypass national restrictions, the reputational and personal safety consequences can be severe, even if financial credentials were not compromised.

While it’s unclear what specific data was exposed in this case, the presence of such a platform in the breach list underscores the critical vulnerability of privacy infrastructure and the need for robust backend security in even the most privacy-conscious services.

Payment Systems and Financial Technology: Wirecard

Another high-risk inclusion is Wirecard, a once-prominent German payments processor known globally for its role in facilitating digital financial transactions, until its collapse in 2020 following revelations of widespread accounting fraud. While the company is no longer operational, residual databases and third-party data dumps continue to surface online.

A breach involving legacy Wirecard data is especially concerning for two reasons. First, because historic payment and identity data associated with Wirecard transactions may remain relevant for account recovery processes, phishing, or identity theft. Second, because the fallout from the company’s collapse has left oversight fragmented, with leaked data possibly moving between different custodians, jurisdictions, and dark web repositories.

For individuals whose data was once entrusted to Wirecard, often unknowingly, via merchant transactions, the breach serves as a reminder that financial data lingers well beyond the lifespan of a business.

At-Risk Communities: Atraf

Among the platforms breached was Atraf, an LGBTQ+ dating and social network popular primarily in Israel. Breaches of platforms like Atraf are especially sensitive due to the increased privacy, safety, and reputational risks for users, particularly those living in regions with social, legal, or cultural hostility toward LGBTQ+ individuals.

Even if data leaked from such platforms is limited to usernames or contact details, it can out individuals, facilitate harassment, or be used in blackmail and social engineering attacks. Furthermore, LGBTQ+ platforms often serve as community lifelines for users in conservative or high-surveillance environments, making their security a matter of personal safety rather than mere digital hygiene.

The inclusion of Atraf in this dataset calls attention to the ethical responsibilities of platforms catering to vulnerable groups, especially regarding data retention policies, encryption, and breach response planning.

Infrastructure and Marketing Tools: SendPulse

Another affected service was SendPulse, a widely-used email and push notification marketing platform. Used by small businesses, bloggers, ecommerce vendors, and NGOs, platforms like SendPulse typically hold mailing list data, sender metadata, campaign analytics, and authentication credentials.

A breach affecting an email marketing service presents attackers with direct channels for phishing, spam, and social engineering. If attackers can spoof trusted sender domains or exploit internal lists, they can launch campaigns that appear legitimate and bypass spam filters.

This event is also emblematic of a broader trend in data breaches, targeting infrastructure-as-a-service (IaaS) or software-as-a-service (SaaS) tools, which serve as multiplier platforms. One breach can affect thousands of downstream organisations and individuals who were never aware their information passed through the service in the first place.

Niche Gaming Platforms: Xbox Scene

Finally, the breach involving Xbox Scene, a now-defunct forum for Xbox console modding, game backups, and homebrew development, illustrates the enduring risks of legacy user data. Communities like these often collect data over long periods, from hobbyist users who may have used shared usernames or reused passwords across personal accounts.

Though the site itself may no longer be operational, data exposed from these kinds of forums can be correlated with modern platforms through credential stuffing, doxxing, or identity linking. It’s also worth noting that modding and console hacking communities are frequently cross-referenced with other underground or gray-market platforms, giving attackers greater incentive to mine even seemingly outdated data sets.

Cross-Sectoral Impact and User Profiles

This batch of 23 breaches presents a clear picture of just how cross-cutting the consequences of a data breach can be. Affected individuals span:
- Privacy-conscious users relying on VPNs and mobile obfuscation services.
- Financial technology customers, including those linked to now-defunct processors.
- Sexual minority communities, especially in regions where personal exposure may carry legal or social risks.
- Small business operators and marketers, using email tools for outreach and sales.
- Gaming and tech hobbyists, particularly those active in console modification and custom firmware forums.

Each group faces different threat vectors, from phishing and impersonation to outing and blackmail. But what they share is a digital dependence on third-party platforms that may not have the security maturity, governance controls, or breach response infrastructure necessary to keep data safe over time.

Conclusion

With 5.6 million exposed accounts and a striking 21 categories of personal data involved, this latest set of breach events reveals both the scale and granularity of modern digital risk. Whether the breached platform facilitates financial transactions, community expression, email marketing, or gaming discussions, the downstream impact can be profound, especially when historic data is rediscovered and re-exploited in new contexts.

Users must continue to adopt compartmentalised digital identities, utilise multi-factor authentication, and remain skeptical of unsolicited communications, even if they appear linked to legitimate past services. And for platform operators, particularly those managing sensitive, community-specific, or high-value transactional data, the need for proactive security cannot be overstated.

  • Key Stats
  • BREACH EVENTS
    0
  • EXPOSED ACCOUNTS
    4,699
  • EXPOSED DATUM TYPES
    0