By ID Agent Insights on Mar 28, 2016 11:36:06 AM
Nintendo gamers – if you are registered on Digitalnintendo.com for updates you may be at risk for identity theft, with more than 23,000 users email addresses and passwords leaked over the weekend to the Dark Web. Party Perfect Rentals was another victim of a breach, with more than 10,000 users’ information leaked. More information on these breaches and more in today’s full data breach alert.
Welcome to Dark Web ID Data Breach Alerts. Using our proprietary monitoring solutions, we picked up the following leaked data exposed on the Dark Web.
Leaked Data Breach |
Accounts Leaked |
Information Included |
digitalnintendo.com |
23,749 Accounts |
Emails, Passwords |
drumnet.ru |
564 Accounts |
Emails, Passwords |
elite-pimps.com |
830 Accounts |
Emails, Passwords |
friv.org.es |
532 Accounts |
Emails, Passwords |
gammon.com.au |
5,323 Accounts |
Emails, Passwords |
interia.pl |
356 Accounts |
Usernames, Emails, Passwords |
iscomo.com |
51 Accounts |
Usernames, Emails, Passwords |
lesprosdemaville.fr |
796 Accounts |
Emails, Passwords |
moduter.es |
10,108 Accounts |
Emails, Passwords |
partyperfectrentals.com |
8,891 Accounts |
Usernames, Passwords |
polenow.com |
3,255 Accounts |
Emails, Passwords |
scardio.ru |
2,920 Accounts |
Emails, Passwords |
sfogliami.it |
28 Accounts |
Emails, Passwords |
sunlite.hk |
5,000 Accounts |
Emails, Passwords |
technospeed.fr |
24 Accounts |
Usernames, Emails, Passwords |
ID Agent solutions can help protect organizations and individuals from corporate and personal identity theft. Every day we monitor the Dark Web to ensure that the partners and companies we work with are secure.Breach reports are brought to you by ID Agent’s Dark Web ID monitoring tool. Contact us today to learn more about monitoring your own organizations’ domain for external cyber threats. No person or company is immune from the possibility of their information ending up in the trenches of the Dark Web. Are you a user on one of the websites below? Contact our team today to find out how to protect your identity following a data breach.
comments