DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

#OpDarknetV2 Publish Personal Details of People involved with lolita city

Posted on May 20, 2012 by Lee J

lolita city, a nasty website on the tor network has become a main target for #OpDarknetV2 which is setout to expose Pedophiles on the Internet and their websites. So far the operation has leaked information from another nasty site based on the tor network and now they have published a whole heap of basic details for claimed users who upload videos and images to the lolita city website. In the release they state that these are the people who are stupid enough to be using their real names and information for contact within the site and due to this it was easy for them to be exposed.

Its funny when you realise how stupid these pedos are to use the same names they do for their other online activities.

The press release which ends with them stating they will sit back and watch the fbi arrest these people is quite short and was originally uploaded to pastebin with all the personal details being dumped on pastehtml. If its anything like the other operations nothing will come out of this, which is very sad that it would seem the police do not want to accept the information that has been provided, therefore leaving possible pedos and sex offenders lerking on the interwebs. The type of personal information that was leaked is usernames, names, country’s they may live in, other online names and accounts such as youtubes and other adult websites and even information on relatives. pr:

Greetings World, for the last couple of days we have been looking over the user list of lolita city and grabbing any personal information on the users as we could, and now we bring you personal information about pedos who upload pictures to lolita city (a fucked up pedo site) Its funny when you realise how stupid these pedos are to use the same names they do for their other online activities. Now lets sit back and watch happily them all get v& by the FBI. info is here: https://pastehtml.com/view/bykt95v1j.html


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach Incidents

Post navigation

← A breach avoided
Adult Advertising Site sex06.nl Hacked, 969 User Details Leaked by Anonymous →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.