🏙 Metropolis

124.6k total records 17k unique accounts

About this breach

In February 2022, SQL Damp was posted in open access to the shadow forum containing the data of registered users of the application of the Moscow Metropolis Moscow shopping center (Metropolis-center.ru). The dump contains information on 86 thousand customers of the shopping center: telephones, mail, names, links to social networks and passwords in the form of hash BCRYPT.

Compromised Data

This breach exposed the following types of personal information:

📞
Telephone
86.4k
509.1% of accounts
📩
Email
17k
100% of accounts
👤
Nick
16.1k
94.9% of accounts
📷
Instagram identifier
3.7k
22.1% of accounts
🆔
VK ID
1.4k
8% of accounts

Total data points: 124.6k

Unique accounts affected: 17k

🔐 What should I do?

  • Change your password immediately if you had an account
  • Enable two-factor authentication where possible
  • Monitor your accounts for suspicious activity
  • Be aware of potential phishing attempts

📊 Data Classes

📞 Telephone 📩 Email 👤 Nick 📷 Instagram identifier 🆔 VK ID

API Access

Get information about this breach programmatically:

GET https://data-wells.niamonx.io/api/breach/Metropolis