Fortunately was all outdated or made up information. Interestingly I just revived my old PSN account and immediately started getting spam on the linked email addy which has been dormant awhile... coincidence?
EDIT: I'm leaning towards coincidence as it started happening almost immediately but kind of odd that account has been pretty much inactive for months, used it to revive the PSN account and ever since been getting a trickle of spam emails.
2,844 Separate Data Breaches (
unverified): In February 2018,
a massive collection of almost 3,000 alleged data breaches was found online. Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen. Each file contained both an email address and plain text password and were consequently loaded as a single "unverified" data breach.
Compromised data: Email addresses, Passwords
Adobe: In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email,
encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also
disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced.
Compromised data: Email addresses, Password hints, Passwords, Usernames
Android Forums: In October 2011, the Android Forums website
was hacked and 745k user accounts were subsequently leaked publicly. The compromised data included email addresses, user birth dates and passwords stored as a salted MD5 hash.
Compromised data: Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords
Anti Public Combo List (
unverified): In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read
Password reuse, credential stuffing and another billion records in Have I Been Pwned.
Compromised data: Email addresses, Passwords
CD Projekt RED: In March 2016,
Polish game developer CD Projekt RED suffered a data breach. The hack of their forum led to the exposure of almost 1.9 million accounts along with usernames, email addresses and salted SHA1 passwords.
Compromised data: Email addresses, Passwords, Usernames
Cit0day (
unverified): In November 2020,
a collection of more than 23,000 allegedly breached websites known as Cit0day were made available for download on several hacking forums. The data consisted of 226M unique email address alongside password pairs, often represented as both password hashes and the cracked, plain text versions. Independent verification of the data established it contains many legitimate, previously undisclosed breaches. The data was provided to HIBP by
dehashed.com.
Compromised data: Email addresses, Passwords
Collection #1 (
unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7
billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post
The 773 Million Record "Collection #1" Data Breach.
Compromised data: Email addresses, Passwords
Evony: In June 2016, the online multiplayer game
Evony was hacked and over 29 million unique accounts were exposed. The attack led to the exposure of usernames, email and IP addresses and MD5 hashes of passwords (without salt).
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Gamigo: In March 2012, the German online game publisher Gamigo
was hacked and more than 8 million accounts publicly leaked. The breach included email addresses and passwords stored as weak MD5 hashes with no salt.
Compromised data: Email addresses, Passwords
Nexus Mods: In December 2015, the game modding site Nexus Mods
released a statement notifying users that they had been hacked. They subsequently dated the hack as having occurred in July 2013 although there is evidence to suggest the data was being traded months in advance of that. The breach contained usernames, email addresses and passwords stored as a salted hashes.
Compromised data: Email addresses, Passwords, Usernames
Onliner Spambot (
spam list): In August 2017, a spambot by the name of
Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled
Inside the Massive 711 Million Record Onliner Spambot Dump.
Compromised data: Email addresses, Passwords
771
pwned websites
13,080,233,673
pwned accounts
115,769
pastes
228,884,627
paste accounts
not just sony tbh