{"id":31108,"date":"2020-11-02T14:49:59","date_gmt":"2020-11-02T12:49:59","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=31108"},"modified":"2025-08-28T02:04:18","modified_gmt":"2025-08-27T23:04:18","slug":"online-databases-containing-34-million-user-records-from-17-companies-found","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/online-databases-containing-34-million-user-records-from-17-companies-found\/","title":{"rendered":"Online databases containing 34 million user records from 17 companies found"},"content":{"rendered":"<p><span style=\\\"font-weight: 400;\\\">User data from 17 companies stolen in breaches has been put up for sale online.<\/span><!--more--><\/p>\n<p><span style=\\\"font-weight: 400;\\\">According to <\/span><a href=\\\"https:\/\/www.bleepingcomputer.com\/news\/security\/hacker-is-selling-34-million-user-records-stolen-from-17-companies\/\\\" target=\\\"_blank\\\" rel=\\\"noopener noreferrer\\\"><span style=\\\"font-weight: 400;\\\">Bleeping Computer<\/span><\/a><span style=\\\"font-weight: 400;\\\">, a listing for databases totaling 34 million records appeared on one of the hacking forums. The databases include email addresses, phone numbers, passwords, names and other information.<\/span><\/p>\n<p><span style=\\\"font-weight: 400;\\\">The databases for all 17 companies contain user data obtained in 2020. The largest database, with 8.1 million records, relates to the company Geekie.<\/span><\/p>\n<p>Companies including Wongnai, RedMart, Katapult and others were also affected.<\/p>\n<p><span style=\\\"font-weight: 400;\\\">The seller of the databases said he did not participate in the breach. The attacker refused to reveal the sources of the stolen data.<\/span><\/p>\n<p><span style=\\\"font-weight: 400;\\\">Read about how the personal data market on the darknet is structured in ForkLog&#8217;s exclusive.<\/span><\/p>\n<blockquote class=\\\"wp-embedded-content\\\" data-secret=\\\"MmCke1EXNu\\\">\n<p>How the black data market works: who sells, who buys, and can you protect yourself<\/p>\n<\/blockquote>\n<p><iframe loading=\\\"lazy\\\" class=\\\"wp-embedded-content\\\" sandbox=\\\"allow-scripts\\\" security=\\\"restricted\\\" style=\\\"position: absolute; visibility: hidden;\\\" title=\\\"&ldquo;How the black data market works: who sells, who buys, and can you protect yourself&rdquo; \u2014 ForkLog\\\" src=\\\"https:\/\/forklog.com\/exclusive\/kak-ustroen-chernyj-rynok-dannyh-kto-prodaet-kto-pokupaet-i-mozhno-li-zashhitit-sebya\/embed#?secret=ozeiGW5hPj#?secret=MmCke1EXNu\\\" data-secret=\\\"MmCke1EXNu\\\" width=\\\"500\\\" height=\\\"282\\\" frameborder=\\\"0\\\" marginwidth=\\\"0\\\" marginheight=\\\"0\\\" scrolling=\\\"no\\\"><\/iframe><\/p>\n<p>Subscribe to ForkLog updates on Telegram: <a href=\\\"https:\/\/t.me\/forklogfeed\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">ForkLog Feed<\/a> \u2014 the full news feed, <a href=\\\"https:\/\/telegram.me\/forklog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>User data from 17 companies stolen in breaches has been put up for sale online.<\/p>\n","protected":false},"author":1,"featured_media":31109,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1829],"class_list":["post-31108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-database"],"aioseo_notices":[],"amp_enabled":true,"views":"17","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=31108"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31108\/revisions"}],"predecessor-version":[{"id":31110,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31108\/revisions\/31110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/31109"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=31108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=31108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=31108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}