Friday, May 2, 2025
HomeCyber Security NewsHackers Selling a Total of 34 Million User Records Stolen From 17...

Hackers Selling a Total of 34 Million User Records Stolen From 17 Companies

Published on

SIEM as a Service

Follow Us on Google News

A threat actor is selling account databases containing a total of 34 million user records that they claim were stolen from seventeen companies during data breaches.

This was first advertised on October 28th by a data breach broker, who created a new topic on a hacker forum to sell the stolen user databases for seventeen companies.

Selling Exclusive private databases. These databases are fresh and have never been sold before. Limited sales”

- Advertisement - Google News

This has gone viral now, questioning what information would be included in this sale?

Who is responsible for the data breaches?

The Seller has been clear to their point that they were not responsible for hacking into the seventeen companies and is only acting as a broker for the databases.

Also, according to the Seller, the account databases are the results of data breaches that took place in 2020, but none of the affected companies have disclosed security breaches prior to this week.

Companies and Data which had Supposedly breached in 2020

It is important to know that all of the seventeen databases being sold were obtained in 2020, and data like phone numbers, credit card information, email, passwords and SHA256/512,md5crypt and bcrypt passwords, etc are likely to be disclosed.

According to the seller, the following information is exposed per breach:

  • Redmart.lazada.sg: emails, SHA1 hashed passwords, mailing and billing addresses, full name, phone numbers, partial credit cards numbers and exp dates
  • Everything5pounds.com: emails, hashed passwords, name, gender, phone number
  • Geekie.com.br: emails, bcrypt-sha256/sha512 hashed passwords, usernames, names, DoB, gender, mobile phone number, Brazilian CPF numbers
  • Cermati.com: – emails, password bcrypt, name, address, phone, revenue, bank, tax number, id number, gender, job, company, mothers maiden name
  • Clip.mx: email, phone
  • Katapult.com: email, password pbkdf2-sha256/unknown, name
  • Eatigo.com: email, password md5, name, phone, gender, facebook id & token
  • Wongnai.com: email, password md5, ip, facebook & twitter id, names, birthdate, phone, zip
  • Toddycafe.com: email, password unknown, name, phone, address
  • Game24h.vn: email, password md5, username, birthdate, name
  • Wedmegood.com: email, password sha512, phone, facebook id
  • W3layouts.com: – email, password bcrypt, ip, country, city, state, phone, name
  • Apps-builder.com: email, password md5crypt, ip, name, country
  • Invideo.io: email, password bcrypt, name, phone
  • Coupontools.com: email, password bcrypt, name, phone, gender, birthdate
  • Athletico.com.br: email, password md5, name, cpf, birthdate
  • Fantasycruncher.com: email, password bcrypt/sha1, username, ip

Safer Precaution

If you are a user of one of these sites, it is suggested to change your password and it is also advisable to change the password of all other sites if you are likely to be using the same password everywhere.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

VOIP Service Provider Exposes 350M Customer Records

Food Delivery Platform Hacked – More than 400K Customer Impacted

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cyberattack Targets Iconic UK Retailer Harrods

Luxury department store Harrods has become the latest UK retailer to face a cyberattack,...

Nebulous Mantis hackers have Deployed the RomCom RAT globally, Targeting organizations.

Nebulous Mantis, also known as Cuba, STORM-0978, Tropical Scorpius, and UNC2596, is a Russian-speaking...

Why CISOs Are Adopting DevSecOps for Secure Software Development

CISOs adopting DevSecOps strategically enhance security measures while ensuring fast-paced software development, responding to...

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cyberattack Targets Iconic UK Retailer Harrods

Luxury department store Harrods has become the latest UK retailer to face a cyberattack,...

Nebulous Mantis hackers have Deployed the RomCom RAT globally, Targeting organizations.

Nebulous Mantis, also known as Cuba, STORM-0978, Tropical Scorpius, and UNC2596, is a Russian-speaking...

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series...