🧗 Kaneva

7.8M total records 3.9M unique accounts

About this breach

In July 2016, a leak occurred in the game with the virtual world of Kaneva, which touched 3.9 million players. The violation included users' names, email addresses, date of birth and passwords in the form of salted hashes MD5. The site used the formula StrtoPper (MD5 ($ pass.strtolower ($ username)). $ SALT))). After hacking, the game was closed in 2017 and now the domain redirects to the website of the publisher of the game.

Compromised Data

This breach exposed the following types of personal information:

📩
Email
3.9M
100% of accounts
👤
Nick
3.9M
100% of accounts

Total data points: 7.8M

Unique accounts affected: 3.9M

🔐 What should I do?

  • Change your password immediately if you had an account
  • Enable two-factor authentication where possible
  • Monitor your accounts for suspicious activity
  • Be aware of potential phishing attempts

📊 Data Classes

📩 Email 👤 Nick

API Access

Get information about this breach programmatically:

GET https://data-wells.niamonx.io/api/breach/Kaneva