DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Analysis into Philips data leak by #Anonymous

Posted on August 30, 2012 by Lee J

Earlier today we did a short post on a very fresh hack that has leaked over 200k emails from Electronics Giant Philips. Since then we have been going over the data and attempting to figure out exactly where this data belonged and came from. here is what we got so , file name: emails_db.txt size: 4,358KB contains: emails only count, 197,000+ file name: becuase.sql size: 167kb contains: first and last names, emails and other personal details. source: subscriber information from https://www.meaningfulinnovation.philips.comcount, 255 file****name: mysql.sql size: 99kb contains: administration details for the databases that were hacked., usernames, ips, encrypted passwords. count, 113 file name: db_buzzer_sonicare.sql size: 167kb **contains: **emails and ids, no vital data. source: appears to be a subscription list for philips sonicare products. count, 1774 of which 518 are non duplicated. file name: philips_flavor.sql size: 94kb **contains: **emails , usernames, first and last names, passwords and site settings. source: appears to be a old product registration details from 2008. count, 360 file name: philips_recmedia.sql size: 700kb **contains: **emails , usernames, first and last names, and site settings. source: also appears to be an old database for Philips digital media device product registrations. count, 2156 file name: philips_buyonegetone.sql size: 139kb **contains: **emails , usernames, first and last names, full personal address details, product choice details and further site information. source: promotion database for "buy one get one free" deals that philips has with alot of its products. count, 298 file name: wakeuplight_be.sql size: 168kb contains usernames, emails,full addresses, telephone numbers, passwords which are encyrpted source: users appear to be those who have registered for the wakeup light by philips. count: 439 also we are currently processing the data for ozdc.net. If you fear your account has been breached you may use the sites search to check. https://ozdc.net/archives.php?aid=3147 – it will be  on hold until processing is finished, you may wish to wait till then to check for your email to be sure.


Related:

  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
  • Massive Great Firewall Leak Exposes 500GB of Censorship Data
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
Category: Breach Incidents

Post navigation

← Philips hacked, Loads of data leaked by #Anonymous
Ukrainian #Blizzard community hacked 19,000+ Accounts Leaked By #Anonymous →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.