🦴 Wishbone 2020
About this breach
In January 2020, a mobile application was injured for “comparing anything” of Wishbone. This is the second leakage of the application data, the first was in 2016. The published data included almost 10 million unique email addresses, passwords, names, telephones, geographical locations and other personal attributes of users. Passwords were stored in the form of drift md5 without salt.
Compromised Data
This breach exposed the following types of personal information:
Nick
31.1M
174.7% of accounts
Email
17.8M
100% of accounts
IP
15M
84.4% of accounts
Password
7.4M
41.5% of accounts
Full name
5.3M
29.7% of accounts
fFacebookid
2.5M
14.2% of accounts
Total data points: 79M
Unique accounts affected: 17.8M
🔐 What should I do?
- Change your password immediately if you had an account
- Enable two-factor authentication where possible
- Monitor your accounts for suspicious activity
- Be aware of potential phishing attempts
📊 Data Classes
👤 Nick
📩 Email
🎯 IP
🔑 Password
👤 Full name
fFacebookid
API Access
Get information about this breach programmatically:
GET https://data-wells.niamonx.io/api/breach/Wishbone-2020