In February 2017
the forum for the adult website FreeOnes suffered a data breach that was later redistributed as part of a larger corpus of data. The data included 960k unique email addresses alongside usernames
IP addresses and salted MD5 password hashes.
In August 2025
the Swedish system supplier Miljödata was the victim of a ransomware attack. Following the attack
data was subsequently published on the dark web and included 870k unique email addresses across various compromised files. Data also included names
phone numbers
physical addresses
dates of birth and government-issued personal identity numbers.
In August 2025
over 1M unique email addresses appeared in a breach allegedly obtained from Italian fashion designer Giglio. The data also included names
phone numbers and physical addresses. Giglio did not respond to repeated attempts to disclose the incident.
In June 2025
107k unique customer email addresses were allegedly obtained from TheSqua.re
the “easiest way to find your next serviced apartment”. The data also included names
phone numbers and cities which were subsequently posted to a popular hacking forum. TheSqua.re did not respond to repeated attempts to disclose the incident
however multiple impacted HIBP subscribers confirmed the legitimacy and accuracy of the data.
civilité
nom
prénom
email
adresse postale
numéro de téléphone
numéro de carte de fidélité
statut client
Autres fuites pour ce dossier :
In July 2025
Allianz Life was the victim of a cyber attack which resulted in millions of records later being leaked online. Allianz attributed the attack to “a social engineering technique” which targeted data on Salesforce and resulted in the exposure of 1.1M unique email addresses
names
genders
dates of birth
phone numbers and physical addresses.
In June 2025
headlines erupted over a “16 billion password” breach. In reality
the dataset was a compilation of publicly accessible stealer logs
mostly repurposed from older leaks
with only a small portion of genuinely new material. HIBP received 2.7B rows containing 109M unique email addresses
which was subsequently added to the service under the name “Data Troll”. The websites the stealer logs were captured against are searchable via the HIBP dashboard.