News that Twitter has been hacked takes the internet by storm.
01 August 2022BREACHAWARE HQ
A total of 12 breach events
were found and analysed resulting in 2,010,497 exposed accounts
containing a total of 19 different data types of personal datum
. The breaches found publicly and freely available included iUnlocker, Team Xecuter, Best Blackhat Forum, SBC Communications (URL Redirected) and OKRU. Sign in to view the full
library of breach events which includes, where available, reference articles relating to
each breach.
Categories of Personal Data Discovered
Contact Data, Technical Data, Social Relationships Data, Socia-Demographic Data, Locational Data, Financial Data, Transactional Data, Usage Data, Documentary Data.
Data Breach Analysis
Team Xecuter, historically associated with console modding and piracy, has long operated in legal grey zones, making any leak tied to its userbase particularly sensitive. The exposure could potentially implicate individuals in activities that they would prefer to keep anonymous, presenting reputational and even legal risks. OKRU, with its millions of users, primarily in Russian-speaking regions, is more mainstream, but no less vulnerable, especially considering regional regulatory scrutiny.SBC Communications, whose involvement came via redirected URLs, demonstrates how even dormant or legacy web infrastructure can become an unintended conduit for data exposure. Meanwhile, forums like Best Blackhat Forum and tools such as iUnlocker often serve communities operating at the edge of cybersecurity norms, further complicating the privacy implications for their users.
The exposure of this volume of accounts reinforces the broader challenge of platform accountability, particularly for websites with informal governance, outdated security models, or international hosting arrangements that bypass stringent compliance regimes. For users, the consequences can range from identity misuse and targeted scams to reputational fallout, especially when associations with specific platforms suggest illicit or controversial activity.
For affected organisations, even in cases where breaches are discovered in older or inactive infrastructures, the damage to brand trust and public perception can be lasting. Employers, too, may find themselves indirectly involved when employees' credentials or affiliations surface in such datasets, prompting internal reviews or HR inquiries.
This cluster of incidents serves as a reminder that no platform is too niche or too obscure to be exploited, and that data, once leaked, can reverberate far beyond its original context.
Spotlight
The news that Twitter has been hacked takes the internet by storm, while crypto pokes its head above water. Several members of the team have been seeing a lot more 'leads' type leaks at the moment. Maybe it's the time of the year or all the threat actors are trying to squeeze just a little bit more out of their stolen data.'Leads' leaks, in my opinion, are files posted on forums with the title "UK leads", for example, which contain a range of information like names, physical addresses, email addresses, and national insurance numbers (social security numbers), etc. This data won’t come from just one place; it will be a collection of UK users mixed up together in one file.
We’ve seen a big mobile operator in the UK have a section of their user base dumped online. We’re still in the process of verifying the data. A large number of datasets were in the breach. Geolocation, race, and mobile carriers were just a few of the datasets in the breach. I see mobile carriers as a good dataset for threat actors to use SIM swapping.
It's been a while since we commented on the flood of Russian data breaches. I know it's probably not everyone's favourite subject right now, but the data is real and the people whom it affects are real. A breach we picked up very recently is a very large shopping mall in Moscow, Russia. The classic datasets were in the database as well as full credit card numbers with names and physical addresses.