article thumbnail

The Unattributable "db8151dd" Data Breach

Troy Hunt

I was reticent to write this blog post because it leaves a lot of questions unanswered, questions that we should be able to answer. It's about a data breach with almost 90GB of personal information in it across tens of millions of records - including mine.

article thumbnail

The Unattributable "Lead Hunter" Data Breach

Troy Hunt

That's me who's pwned again because my personal data has just turned up in yet another incident from a source I can't attribute. Less than 3 weeks ago I wrote about The Unattributable "db8151dd" Data Breach which, after posting that blog post and a sample of my own data, the community quickly attributed to Covve.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Breaches, Class Actions and Ambulance Chasing

Troy Hunt

This post has been brewing for a while, but the catalyst finally came after someone (I'll refer to him as Jimmy) recently emailed me regarding the LOQBOX data breach from 2020. A data breach made you sad and now you want money for being sad? If he's received more spam as a result of a breach, which breach was it?

article thumbnail

The Data Breach Disclosure Conundrum

Troy Hunt

I'm writing this after many recent such discussions with breached organisations where I've found myself wishing I had this blog post to point them to, so, here it is. You must do this within 72 hours of becoming aware of the breach, where feasible. No, of course not; how could you?

article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

That's the analogy I often use to describe the data breach "personal stash" ecosystem, but with one key difference: if you trade a baseball card then you no longer have the original card, but if you trade a data breach which is merely a digital file, it replicates.

article thumbnail

Inside the Massive Alleged AT&T Data Breach

Troy Hunt

I linked to the story from the beginning of this blog post and got a handful of willing respondents for whom I sent their data and asked two simple questions: Does this data look accurate? What I can't do is send you your breached data, or an indication of what fields you had exposed.

article thumbnail

Pwned - The Collected Blog Posts of Troy Hunt (Preview)

Troy Hunt

Using the word as it's intended outside the context of the data breach service I started remains apt as so much of what I've written is about pwning stuff. When I announced the book in April , I explained how Rob Conery has helped me curate a collection of blog posts. , has become synonymous with me personally.