This repository has been archived by the owner on Apr 14, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 4
/
yas3bl.json
176 lines (176 loc) · 9.76 KB
/
yas3bl.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
[
{
"count": "24,000+",
"data": "A 17MB Excel file containing Data Legend, GDDY Machine Raw Data, Summary, Compute, Storage, Instance Mapping, Spot, Price List sheets",
"organization": "GoDaddy",
"url": "https://www.upguard.com/breaches/public-domain-how-configuration-information-for-the-worlds-largest-domain-name-registrar-was-exposed-online"
},
{
"count": "2,594",
"data": "Full name, suffix, prefix, phone numbers (cell and landlines), address with house, street, city, state, zip, precinct, political affiliation provided by state, or inferred based on voting trends/history, age and birth year, gender, jurisdiction breakdown based on district, zip code, precinct, county, state, demographics based on ethnicity, language, education",
"organization": "RoboCent",
"url": "https://www.linkedin.com/pulse/hundreds-thousands-us-voter-data-appeared-online-again-bob-diachenko/?published=t"
},
{
"count": "1.3 million",
"data": "Names, addresses, zip codes, phone numbers, email addresses, ip addresses, plaintext passwords",
"organization": "MBM Company Inc.",
"url": "https://mackeepersecurity.com/post/walmart-jewelry-partner-exposed-millions-customer-details"
},
{
"count": "3.2 million",
"data": "Files include access credentials for 211 system operators, email addresses for contacts and registered resources of LA County 211, and detailed call notes, including full names, phone numbers, addresses, and even 33,000 instances of full Social Security numbers.",
"organization": "211 LA County",
"url": "https://www.upguard.com/breaches/la-county-211-hotline"
},
{
"count": "",
"data": "Names, addresses, dates of birth, phone numbers, income ranges, social security numbers (SSNs), driver licenses, armed forces and voter identification cards, bank checks, insurance policy documents, health and medical information (e.g. prescriptions and dosages), and some financial data. Insurance companies found in the data included Cigna, TransAmerica, SafeCo, Schneider Insurance, Manhattan Life, Everest - to name a few.",
"organization": "AgentRun",
"url": "https://www.zdnet.com/article/insurance-startup-leaks-sensitive-customer-health-data/"
},
{
"count": "50,000",
"data": "Names, phone numbers and email addresses for users and their trusted contacts, passwords, gender, information about their cars including VIN, Connect IDs.",
"organization": "Honda",
"url": "https://mackeepersecurity.com/post/honda-leaked-personal-information-from-its-honda-connect-app/"
},
{
"count": "119,000",
"data": "Scanned documents of US and international citizens, such as passports, driver licenses, security IDs, home addresses, phone numbers, zip codes",
"organization": "Fedex",
"url": "https://mackeepersecurity.com/post/fedex-customer-records-exposed"
},
{
"count": "12,000",
"data": "A database backup, called `octoly_production.sql`, exposed real names, addresses, phone numbers, email addresses, birth dates of thousands of influential online personalities (Instagram, Twitter, and YouTube personalities), like Dior, Lancome, and Blizzard Entertainment",
"organization": "Octoly",
"url": "https://www.upguard.com/breaches/cloud-leak-octoly"
},
{
"count": "123 million",
"data": "Data sets belonging to Experian and US Census Bureau, containing personal details of 198 million American voters and 123 million American household PII data such as home addresses, contact information, morgage ownership, financial histories, and purchasing behaviors.",
"organization": "Alteryx",
"url": "https://www.upguard.com/breaches/cloud-leak-alteryx"
},
{
"count": "111 GB",
"data": "Internal personal and financial data of tens of thousands of customers.",
"organization": "National Credit Federation",
"url": "https://www.upguard.com/breaches/credit-crunch-national-credit-federation"
},
{
"count": "47 files",
"data": "Highly sensitive INSCOM data. Some data was 'NOFORN' classified, indicating high sensitivity that cannot be shared with foreign allies",
"organization": "NSA",
"url": "https://www.upguard.com/breaches/cloud-leak-inscom"
},
{
"count": "1.8 billion",
"data": "Three (3) S3 buckets containing 1.8 billion posts of scraped internet content over the last 8 years.",
"organization": "Department of Defense",
"url": "https://www.upguard.com/breaches/cloud-leak-centcom"
},
{
"count": "1 million",
"data": "Names, addresses, credit scores and partial Social Security numbers",
"organization": "Alliance Direct Lending Corporation",
"url": "https://threatpost.com/auto-lender-exposes-loan-data-for-up-to-1-million-applicants/125216/"
},
{
"count": "200 million",
"data": "1.1 Terabytes worth of data on registered voters",
"organization": "DeepRoot Analytics",
"url": "https://www.upguard.com/breaches/the-rnc-files"
},
{
"count": "2.2 - 4 million",
"data": "Names, addresses, account information, email addresses, and last four digits of credit card numbers of millions of subscribers to Dow Jones publications",
"organization": "Dow Jones",
"url": "https://www.upguard.com/breaches/cloud-leak-dow-jones"
},
{
"count": "1.8 million",
"data": "Chicago voter names, addresses, date-of-births, partial SSNs, Driver Licenses, and state ID numbers",
"organization": "ES&S",
"url": "https://www.upguard.com/breaches/cloud-leak-chicago-voters"
},
{
"count": "38,000",
"data": "Credit Card numbers, expiration dates, CVV codes",
"organization": "Groupize",
"url": "https://mackeepersecurity.com/post/online-hotel-booking-service-allegedly-exposed-sensitive-data"
},
{
"count": "Undisclosed",
"data": "Top Secret data from DoD, Pentagon, and National Geospatial Intelligence Agency (NGA), SSH keys, credentials granting access to data center Operating System",
"organization": "Booz Allen Hamilton",
"url": "https://www.upguard.com/breaches/spy-games"
},
{
"count": "93.4 million",
"data": "Mexican voter registration data",
"organization": "Mexico's Electoral Authority (INE)",
"url": "http://splinternews.com/a-massive-data-breach-exposed-personal-info-for-93-4-mi-1793856429"
},
{
"count": "540,642",
"data": "Tracking unit information including usernames, passwords, emails, Vehicle Identification Numbers, license plate numbers, IMEI numbers of GPS devices, specific location where the tracking units were hidden, information on customers and 427 dealerships, 116 GB of hourly backups, 8.5 GB of daily backups from 2017, and 339 log documents",
"organization": "SVR Tracking",
"url": "https://mackeepersecurity.com/post/auto-tracking-company-leaks-hundreds-of-thousands-of-records-online"
},
{
"count": "9,402",
"data": "Resumes of Top Secret US military veterans names, addresses, phones, emails, Driver License numbers, passport numbers, partial SSNs",
"organization": "TigerSwan",
"url": "https://www.upguard.com/breaches/cloud-leak-tigerswan"
},
{
"count": "4 million",
"data": "600 GB worth of data including usernames, emails addresses, MAC addresses, device serial numbers, and financial transaction information",
"organization": "Time Warner/BroadSoft",
"url": "https://mackeepersecurity.com/post/global-communication-software-left-massive-amount-of-data-online"
},
{
"count": "100 MB",
"data": "Data from internal Verizon Wireless system (DVS), 129 Outlook messages, logs, server names & info, admin usernames & passwords",
"organization": "Verizon",
"url": "https://mackeepersecurity.com/post/verizon-wireless-employee-exposed-confidential-data-online"
},
{
"count": "14 million",
"data": "Verizon customer names, addresses, account details, and Personal Identification Numbers (PIN)",
"organization": "Verizon",
"url": "https://www.upguard.com/breaches/verizon-cloud-leak"
},
{
"count": "72 files",
"data": "Encrypted compressed archives containing backup of company's IT infrastructure and private GPG keys used to encrypt the compressed archives",
"organization": "Viacom",
"url": "https://www.theregister.co.uk/2017/09/19/viacom_exposure_in_aws3_bucket_blunder/"
},
{
"count": "3,065,805",
"data": "Fans names, physical addresses, email addresses, earnings, ethnicity, children\u2019s age ranges, birthdates and additional personally identifiable information",
"organization": "WWE",
"url": "https://threatpost.com/leaky-wwe-database-exposes-personal-data-of-3m-wrestling-fans/126710/"
},
{
"count": "137+ GB",
"data": "4 S3 buckets exposing secret API data, authentication credentials, 40,000 plaintext passwords, credentials for GCP and Azure accounts, SSL certificates, private decryption keys, production VPN keys for internal/private networks, database dumps, user IP addresses, JSESSION IDs.",
"organization": "Accenture",
"url": "https://www.upguard.com/breaches/cloud-leak-accenture"
},
{
"count": "316,363",
"data": "47.5 GB PDF medical records containing weekly blood test results, patient names, addresses, and phone numbers. Development server backups. Doctor's names, case management notes, and additional client information.",
"organization": "Patient Home Monitoring",
"url": "https://mackeepersecurity.com/post/patient-home-monitoring-service-leaks-private-medical-data-online"
},
{
"count": "50,000",
"data": "Personal data of Australian employees of several government agencies, banks, and a utility company, including full names, passwords, IDs, phone numbers, email addresses, credit card numbers, salaries and expenses.",
"organization": "Australian Broadcasting Company",
"url": "https://mackeepersecurity.com/post/australian-broadcasting-corporation-exposed-sensitive-data-online"
}
]