🏙 Metropolis
About this breach
In February 2022, SQL Damp was posted in open access to the shadow forum containing the data of registered users of the application of the Moscow Metropolis Moscow shopping center (Metropolis-center.ru). The dump contains information on 86 thousand customers of the shopping center: telephones, mail, names, links to social networks and passwords in the form of hash BCRYPT.
Compromised Data
This breach exposed the following types of personal information:
Telephone
86.4k
509.1% of accounts
Email
17k
100% of accounts
Nick
16.1k
94.9% of accounts
Instagram identifier
3.7k
22.1% of accounts
VK ID
1.4k
8% of accounts
Total data points: 124.6k
Unique accounts affected: 17k
🔐 What should I do?
- Change your password immediately if you had an account
- Enable two-factor authentication where possible
- Monitor your accounts for suspicious activity
- Be aware of potential phishing attempts
📊 Data Classes
📞 Telephone
📩 Email
👤 Nick
📷 Instagram identifier
🆔 VK ID
API Access
Get information about this breach programmatically:
GET https://data-wells.niamonx.io/api/breach/Metropolis