DevaOnBreaches

1.5K Followers
5K Following
1.7K Posts
Sharing insights on data breach investigations, information security, & password best practices • @XposedOrNot
Websitehttps://XposedOrNot.com
Bloghttps://blog.xposedornot.com/
GitHubhttps://github.com/DevaOnBreaches
Websitehttps://plus.xposedornot.com/

@XposedOrNot += SongTrivia2 Data Breach

The SongTrivia2 #databreach occurred in April 2026 when the platform was compromised, with data later published on a public hacking forum exposing 291K unique email addresses and associated account information.

Exposed data: Email addresses, Names, Usernames, Passwords (bcrypt hashes)

Potential risks: Account takeover, Credential stuffing, Phishing, Targeted scams, Privacy breaches

@XposedOrNot += Cuties AI Data Breach

The Cuties AI #databreach occurred in March 2026 when the NSFW AI companion platform was compromised, with data later published on a public hacking forum exposing 153K unique email addresses and associated user content.

Exposed data: Email addresses, Display names, Avatars, Prompts and descriptions, URLs to generated content

Potential risks: Phishing, Targeted scams, and privacy breaches

@nihkeys Actual use cases are large and beneficial. However in this case and based on the style, it maybe attributed as such.

Unless and until a full forensic report is published with verifiable evidences , I do not think anything else matters.

@XposedOrNot += Success Data Breach

The Success #databreach occurred in March 2026 and exposed 142K unique email addresses along with associated personal and order information, with the system also abused to send offensive newsletters.

Exposed data: Email addresses, Names, IP addresses, Phone numbers, Passwords (bcrypt hashes), Physical addresses, Payment methods

Potential risks: Phishing, Identity theft, Account takeover, Credential stuffing, Financial fraud, Targeted scams, Privacy breaches

@XposedOrNot += Infinite Campus Data Breach

The Infinite Campus #databreach occurred in March 2026 and exposed 137K records from the education technology platform, including sensitive personal and account information.

Exposed data: Email addresses, Phone numbers, Names, Physical addresses, Usernames, Dates of birth, Genders, Geographic locations, Passwords

Potential risks: Identity theft, Account takeover, Credential stuffing, Phishing, Targeted scams, Privacy breaches

@XposedOrNot += CFGI Data Breach

The CFGI #databreach occurred in March 2026 and exposed over 800K records, including more than 40K financial documents and internal corporate data, with 250K unique email addresses impacted.

Exposed data: Email addresses, Names, Phone numbers, Physical addresses, Usernames, Geographic locations, Financial documents, Internal corporate data

Potential risks: Identity theft, Financial fraud, Phishing, Targeted scams, Privacy breaches

Hims & Hers confirms #databreach of third-party support system (Feb 4–7) via social engineering. Hackers stole customer tickets incl. names, emails + other personal data (medical records not affected).

https://techcrunch.com/2026/04/02/telehealth-giant-hims-hers-says-its-customer-support-system-was-hacked/

Telehealth giant Hims & Hers says its customer support system was hacked | TechCrunch

The U.S. telehealth giant says hackers stole customer support ticket data over the course of several days in February.

TechCrunch

Drift Protocol hacked for ~$280M after attacker seized Security Council admin control via pre-signed txs + multisig manipulation (no smart contract flaw). DPRK-linked tactics suspected.

https://www.bleepingcomputer.com/news/security/drift-loses-280-million-north-korean-hackers-seize-security-council-powers/

Drift loses $280 million North Korean hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation.

BleepingComputer

Duc App (by Duales) exposed 360K+ sensitive files (passports, licenses, selfies, transactions) via a public, unencrypted Amazon storage bucket. #dataleak

https://techcrunch.com/2026/04/02/canadian-money-transfer-app-duc-expose-drivers-licenses-passports-amazon-server/

Exclusive: Money transfer app Duc exposed thousands of driver's licenses and passports to the open web

An exposed Amazon-hosted server allowed anyone to access reams of customer data without needing a password.

TechCrunch

Mercor confirms #databreach tied to compromised LiteLLM supply chain attack (malicious PyPI versions live ~40 mins). TeamPCP linked to initial access; Lapsus$ claims 4TB stolen (PII, code, APIs).

https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/

AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data

AI firm Mercor confirms a breach linked to a LiteLLM supply chain attack, as hackers claim to have stolen 4TB of sensitive data and internal systems.

Hackread - Cybersecurity News, Data Breaches, AI and More