LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘Login/Password List’

Potential leak of data: Login/Password List

1 votedvote

Detected 1 occurrence(s) of ‘username[ \t:]+password[ \t:]+email':

Website: www.kerrytaylorauctions.com/

Amount of custom. Logins: Usern. Passw. Email to Spam:  2364
Where to find me: cyberterrorists.net
Hijack by:        stennis1

username 	     password 	                             email

claireman 	a4f4ba461d75173137cecca4b4563ba3 	clairemantell@hotmail.co.uk
edd123 	ddb9edcce121b3a68b1704c584855261 	elena@elenadawson.co.uk
christinegoodbrand 	d6ba1dc75de9166a2c04e957eb41a70e 	christinegoodbrand@ntlworld.com
kateo 	dd9ea10b1ad7201a6

Source: http://pastebin.com/raw.php?i=WAhaVZGM

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: Login/Password List

0 votedvote

Detected 1 occurrence(s) of ‘username[ \t:]+password[ \t:]+email':

 message from the german malsec.
You have got security flaws on your website.

If u don't believe me look at the part of the dump of your table maaking_users from your database opadmin_onlinepianist.

Here comes the dump:


userid admin_definition username password email gender birthday fb_id 
2 yes tal e1853a15674c35db99ba12e7a484a50a talccc@gmail.com Male 1984-10-31 754078496 
5 yes admin f6608076c37171142618f191c5c1bcbd ncohen2007@gmail.com Male 1983-05-14 543499796 
6  op_basic 07f7ef4f8f3d96c558c4cb905073378b talc

Source: pastebin.com/raw.php?i=re0nVng3

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: Login/Password List

0 votedvote

Detected 1 occurrence(s) of ‘username[ \t:]+password[ \t:]+email':

   Y888  "Y88888P"  888   T88b    888     "Y88888P"  888    Y888       d8888888888//
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\twitter.com/nrtnz/////////////////////////////////////
website: 	http://www.dflvwclub.de
#leak of users :D
@NRTNZ ON TWITTER

     username         password                             email            
	admin 	ee50d7fe4de7a4eb4b934501aaf2aa6b 	areinhold@nose-downde 	1
2 	andi/dfl 	91d93590f6295191c5782f2ac3ddab91 	andi@dflvwclubde 	1
3 	olaf/dfl 	b55bc0289d2321dd05a4430ac1dae609 	olaf@dflvwclubde 	1
4 	andreasaps 	2ee886d95346b6d11028333

Source: pastebin.com/raw.php?i=pBSRif6A

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: Login/Password List

0 votedvote

Detected 1 occurrence(s) of ‘username[ \t:]+password[ \t:]+email':

fpublication 	
stafftraining 	
state 	
tblNews 	
tenders 	
test 	id title doctype meta data path
testpage 	
travelgrant 	
travelgrant_user 	id fname lname department designation organization phone cell fax state cnic
user 	id first_name last_name username password email status access

//www.census.gov//


CHARACTER_SETS,
   COLLATIONS,
   COLLATION_CHARACTER_SET_APPLICABILITY,
   COLUMNS,
   COLUMN_PRIVILEGES,
   KEY_COLUMN_USAGE,
   PROFILING,
   ROUTINES,
   SCHEMATA,
   SCHEMA_PRIVILEGES,
   STATISTICS,

Source: pastebin.com/raw.php?i=HznF8Pew

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: MySQL Connect Information

0 votedvote

Detected 2 occurrence(s) of ‘mysql_[p]*connect\([^\$]‘:

osed quotation mark before the character string" 
"Warning: Bad arguments to (join|implode) () in" "on line" -help -forum 
"Warning: Cannot modify header information - headers already sent" 
"Warning: Division by zero in" "on line" -forum 

"Warning: mysql_connect(): Access denied for user: '*@*" "on line" -help -forum 
"Warning: mysql_query()" "invalid query" 
"Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL" 
"Warning: Supplied argument is not a valid File-Handle resource in" 
"Warning:" "f

Detected 2 occurrence(s) of ‘enable secret':

ues * encrypt") 
filetype:sql +"IDENTIFIED BY" -cvs 
filetype:sql password 
filetype:url +inurl:"ftp://" +inurl:";@" 
filetype:xls username password email 
htpasswd 
htpasswd / htgroup 
htpasswd / htpasswd.bak 
intext:"enable password 7" 
intext:"enable secret 5 $" 
intext:"EZGuestbook" 
intext:"Web Wiz Journal" 
intitle:"index of" intext:connect.inc 
intitle:"index of" intext:globals.inc 
intitle:"Index of" passwords modified 
intitle:"Index of" sc_serv.conf sc_serv content 
intitle:"phpinfo()" +"mysql.

Detected 2 occurrence(s) of ‘username[ \t:]+password[ \t:]+email':

HHOSTKEYS 
filetype:sql "insert into" (pass|passwd|password) 
filetype:sql ("values * MD5" | "values * password" | "values * encrypt") 
filetype:sql +"IDENTIFIED BY" -cvs 
filetype:sql password 
filetype:url +inurl:"ftp://" +inurl:";@" 
filetype:xls username password email 
htpasswd 
htpasswd / htgroup 
htpasswd / htpasswd.bak 
intext:"enable password 7" 
intext:"enable secret 5 $" 
intext:"EZGuestbook" 
intext:"Web Wiz Journal" 
intitle:"index of" intext:connect.inc 
intitle:"index of" intext:globals.inc 
intitle

Source: pastebin.com/raw.php?i=dcih9UBC

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.