📯 CallCenter Ukraine
About this breach
At the end of 2023, an unloading from the CRM system of one of the Ukrainian fraudulent call centers that call the victims in Russia and bred them for money according to a one or another scheme got into open access. The unloading dating from 02.2023 contains 6.9 million lines, in which there are personal data of potential victims, as well as some internal information of the call center itself. The base contains names, telephones, addresses, date of birth and text comments from scammers, usually containing a divorce used and pseudonym.
Compromised Data
This breach exposed the following types of personal information:
Telephone
6.5M
5521.1% of accounts
Full name
5.1M
4385.9% of accounts
Nick
117k
100% of accounts
Total data points: 11.7M
Unique accounts affected: 117k
🔐 What should I do?
- Change your password immediately if you had an account
- Enable two-factor authentication where possible
- Monitor your accounts for suspicious activity
- Be aware of potential phishing attempts
📊 Data Classes
📞 Telephone
👤 Full name
👤 Nick
API Access
Get information about this breach programmatically:
GET https://data-wells.niamonx.io/api/breach/CallCenter-Ukraine