🧗 Kaneva
About this breach
In July 2016, a leak occurred in the game with the virtual world of Kaneva, which touched 3.9 million players. The violation included users' names, email addresses, date of birth and passwords in the form of salted hashes MD5. The site used the formula StrtoPper (MD5 ($ pass.strtolower ($ username)). $ SALT))). After hacking, the game was closed in 2017 and now the domain redirects to the website of the publisher of the game.
Compromised Data
This breach exposed the following types of personal information:
Email
3.9M
100% of accounts
Nick
3.9M
100% of accounts
Total data points: 7.8M
Unique accounts affected: 3.9M
🔐 What should I do?
- Change your password immediately if you had an account
- Enable two-factor authentication where possible
- Monitor your accounts for suspicious activity
- Be aware of potential phishing attempts
📊 Data Classes
📩 Email
👤 Nick
API Access
Get information about this breach programmatically:
GET https://data-wells.niamonx.io/api/breach/Kaneva