DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Another day and Another Bulk Breach Dump Totaling over 3.4 Billion Credentials.

Posted on February 27, 2018 by Lee J

Reshared, Recycled, Swapped and Sold breach data is being a common thing and well once again someone has complied a bunch of public and not so public combo lists from well known previous breaches that when combined have a total of 3,443,684,697 Emails with 2,914,838,915 of them being unique leaving only about 333K duplicate entries.

The leak has originated from raidforums and was posted at First in the services section for general stuff by tutweb on the 20th of feb 2018 where they was asking at $70USD.

19th Feb 2018
First thread posted with links to a 8.77GB leak which contains ver 3000 databases, recently troy hunt had processed this data and done a nice article about it here.

20th Feb 2018
Posted for sale thread asking $70USD for the 154GB leak with links to a selly.gg shop that also contains various other for sale combo lists.

22nd Feb 2018
Posted another thread with links to the full 154GB leak which was hosted on fex.net.

Capture

Before even starting to download it, it was very clear that the data was a mix of old data but what was not clear was if there was any new or unseen data in this leak. After spending many hours ( no joke over 30hours because fex.net just has awesome speeds. ) downloading this data i set about figuring out how many total of emails/combo lists are in it, where the data has come from and what it is exactly.

The description of the post from the 20th had probably the most clear explanation of what and where this data came from.

Shops — 44 files -869.9 MB
Social networks – 2 files 85.1 MB
User:pass 11 files 452.8 MB
Country – 295 files – 1.82GB
Other – 2,7GB/ email for spam Dorks …..
Base – 35 files 3.26gb Privat Publick email;pass
Dump hash – 2490 files 3.86GB
Base with email access – 45 files – 1.21GB
Dumps Dehash/ all database email:pass – 3019 files – 8.77GB (games shop btc sites)
Game – 29 files 2.5GB
antipubluck personal – 305 files – 115.1GB – first Very big email pass database.
Russian – 36 files 1.64gb (mail.ru yandex.ru rambler.ru)
Money – very good database for brute money service. ebay amazon and other – 22 files 2.58 GB
BTC – database for brute BTC service – 18 files – 1.18GB
USA – usa database – 31 files 7.47GB

For the most part, the format of the leaked contents is all .txt files with lists of email:pass with the exception of files in the logs folder which contains 949 compressed files over 5 folders which are sorted into dates from early 2018 of a credentials stealer named Project Evrial which is being sold recently in clearnet market places for $40USD.

Each file in this directory contains a desktop.jpg, passwords.log and cookies folder with the passwords.log file being a log of the users login attempts that have been captured.

The other folder that is not included into the total count provided above is the Miscellaneous Folder which contains another huge load of leaks it self with 2.81GB and 338 files which includes compressed files as well. I left this out of the calculation until further notice as the contents here are a bit scattered in content. The contents in the Miscellaneous folder includes a trove of lists of links to different types of websites, raw dumps from older breaches in 2015/2016 with full sets of information including usernames, phone numbers and dobs for some of them; it also contains various tutorials and search dorks.

Troy Hunt from Have I Been Pwned has recently parsed and documented the 8.77GB leak posted on the 19th as well as adding another 80M entries from over 2800 new breaches to the HIBP database.

At time of publishing tutweb had not replied to my contact requests and all files are still accessible online.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach Incidents

Post navigation

← University of Wisconsin-Superior Alumni Association notifies alumni after unintentional exposure of SSN
Another day and Another Bulk Breach Dump Totaling over 3.4 Billion Credentials. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.