Share this analysis

VK, MGM Resorts and others fall victim of data leaks.

12 December 2021
BREACHAWARE HQ
Social

A total of 21 breach events were found and analysed resulting in 95,231,337 exposed accounts containing a total of 17 different data types of personal datum . The breaches found publicly and freely available included VK, MGM Resorts, Album Wash, Games of Desire and Bear Tax. Sign in to view the full library of breach events which includes, where available, reference articles relating to each breach.

Categories of Personal Data Discovered

Contact Data, Technical Data, Socia-Demographic Data, Locational Data, Financial Data, Communications Data.

Data Breach Analysis

What is particularly notable about this breach cohort is its cross-industry diversity, with impacted platforms ranging from global social networks and hospitality giants to adult entertainment sites, digital services, and financial management tools.

Platforms Affected: A Cross-Section of Global Digital Life

Each of the breached platforms reflects a different facet of online engagement, from messaging and media to leisure and financial planning:

VK (VKontakte) is one of the largest social networking platforms in the world, especially dominant across Russian-speaking regions. With its Facebook-like functionalities and massive user base, it offers a treasure trove of profiles, contact lists, and interpersonal communication data.

MGM Resorts, a globally recognised hospitality brand, connects directly to real-world services: hotel reservations, loyalty programs, casino memberships, and event bookings. Exposure from this environment implies potential leaks of travel activity, account credentials, and loyalty data, often tied to personal identification or payment records.

Album Wash likely refers to a photo-sharing or editing platform, possibly designed for mobile users interested in aesthetic personal galleries or social sharing, indicating exposure of media-linked user data.

Games of Desire represents the adult gaming or fantasy space, a sector frequently breached due to weak protections and high-value personal identifiers (as users may seek anonymity, making such exposures particularly sensitive).

Bear Tax is a tax tracking and calculation tool for cryptocurrency investors. In a regulatory environment increasingly focused on compliance, any data breach from platforms like this may expose user activity that’s both financially significant and personally sensitive.

Who Was Likely Affected?

The diversity of platforms in this breach group means the affected user base is vast and varied. Likely groups include:
- Everyday social media users, especially across Eastern Europe and Asia, due to VK’s inclusion. VK's reach means users as young as teens and as senior as retirees may be impacted.
- Business travellers, vacationers, and casino patrons via MGM Resorts, who may have enrolled in loyalty or membership programs, submitted identification for bookings, or connected their accounts to payment services.
- Creative mobile app users, including younger or mid-career individuals using Album Wash or similar apps for social content generation.
- Adult content consumers, many of whom actively avoid tying such activity to their real identities, increasing the reputational risk when such platforms are breached.
- Cryptocurrency investors, who may be using platforms like Bear Tax to log and track their crypto portfolios for tax purposes, often under pseudonymous or partial IDs.

This variety points to an intersection of lifestyle, leisure, and financial activity, all increasingly governed by digital accounts and cloud-based tools that may lack consistent security oversight.

Implications of Cross-Sector Breaches

What makes this set of breaches particularly instructive is the layered vulnerability across industries that aren’t usually discussed in the same breath. While many breach narratives focus on social media, fintech, or enterprise software, this group reveals how:
- Real-world services (MGM Resorts), digital social identity (VK), and lifestyle micro-services (Album Wash) all function within a single, entangled user data ecosystem.
- The same user may have accounts across multiple breached platforms e.g., someone could post vacation photos on VK, stay at an MGM hotel, and later organise their crypto taxes on Bear Tax, thereby increasing their exposure exponentially if they reuse credentials or email addresses.
- Some platforms (like Games of Desire) operate in privacy-sensitive domains where breaches may have disproportionate reputational or personal consequences, even if fewer data points are leaked.

As a result, the fallout from such breaches may extend well beyond spam or phishing. These datasets may allow attackers to triangulate user habits, travel schedules, financial holdings, and digital preferences, which can be weaponised in more advanced social engineering schemes or identity theft.

Common Weaknesses in Digital Infrastructure

Though the breach sources range widely in function and geography, they often share some common issues that make them vulnerable:
- Inconsistent application of encryption standards or failure to secure cloud storage buckets.
- Minimal use of multi-factor authentication (MFA) or modern identity verification protocols.
- Fragmented governance over user data, particularly in platforms operating across multiple jurisdictions without unified privacy compliance.
- Third-party data sharing or integrations that may serve analytics or advertising purposes but expand the attack surface.

These vulnerabilities are not necessarily signs of negligence, in some cases, platforms were likely built for scale before security maturity. However, in the post-GDPR and CCPA era, excuses for under-protecting user data are quickly vanishing.

Key Lessons for Users and Platforms

For users, this set of breach events reinforces essential cybersecurity habits:
- Use unique, strong passwords across platforms, even lesser-known ones.
- Enable multi-factor authentication wherever offered.
- Be mindful of what data is shared, even on niche or short-term-use services.
- Regularly check whether email addresses or usernames have been exposed in known breaches using public monitoring tools.

For platforms and developers, the need for better data stewardship is urgent. No matter the domain, be it adult gaming, photo editing, or crypto accounting, users expect a baseline level of protection, especially where identifiable or financial information is concerned. Security needs to be built in, not bolted on.

Conclusion

The exposure of over 95 million accounts across 21 breach events illustrates how data risk is no longer confined to "big tech" or financial institutions. From global hotel chains to crypto tax tools and mobile entertainment platforms, nearly every corner of online life is now vulnerable to compromise. What unites these seemingly disparate breaches is a common reliance on user data, and a shared responsibility to protect it.

These platforms, while varied in focus and audience, reflect how deeply integrated our digital identities have become. Whether organising leisure, finances, or expression, users entrust services with their digital footprints. The breadth of this breach set serves as a cautionary reminder: the scale of exposure isn't just measured in numbers, but in how many aspects of modern life are touched by insecure data practices.

  • Key Stats
  • BREACH EVENTS
    0
  • EXPOSED ACCOUNTS
    0
  • EXPOSED DATUM TYPES
    0