0% found this document useful (0 votes)
34 views6 pages

Export Rollercoasterbill@

The report provides an overview of the online presence and data breaches associated with the email address rollercoasterbill@yahoo.com. It details registrations on platforms like Google, Facebook, and MySpace, along with multiple significant data breaches affecting Adobe, MySpace, and others, highlighting the risks posed by these incidents. The timeline includes key dates of breaches and last activity on Google.

Uploaded by

Pixelmator
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views6 pages

Export Rollercoasterbill@

The report provides an overview of the online presence and data breaches associated with the email address rollercoasterbill@yahoo.com. It details registrations on platforms like Google, Facebook, and MySpace, along with multiple significant data breaches affecting Adobe, MySpace, and others, highlighting the risks posed by these incidents. The timeline includes key dates of breaches and last activity on Google.

Uploaded by

Pixelmator
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

12/24/24, 1:01 AM export_rollercoasterbill@yahoo.com.

pdf

OSINT Industries
Report for: rollercoasterbill@yahoo.com
As of 2024-12-24T00:01:15.813Z
Map • Modules • Timeline

Module Responses
GOOGLE
Registered : true
Id : 115739540718982568294
Last Seen : 2023-07-28T15:47:36

FACEBOOK
Registered : true

HIBP
Registered : true
Breach : true
Name : Adobe
Website : adobe.com
Bio : In October 2013, 153 million Adobe accounts were
breached with each containing an internal ID, username,
email, <em>encrypted</em> password and a password
hint in plain text. The password cryptography was poorly
done and many were quickly resolved back to plain text.
The unencrypted hints also <a
https://app.osint.industries/pdf?id=aef365ac-7424-4615-b41b-d091fd219b0c 1/6
12/24/24, 1:01 AM export_rollercoasterbill@yahoo.com.pdf

href="http://www.troyhunt.com/2013/11/adobe-
credentials-and-serious.html" target="_blank"
rel="noopener">disclosed much about the passwords</a>
adding further to the risk that hundreds of millions of
Adobe customers already faced.
Creation Date : 2013-10-04T00:00:00

Registered : true
Breach : true
Name : MySpace
Website : myspace.com
Bio : In approximately 2008, <a
href="http://motherboard.vice.com/read/427-million-
myspace-passwords-emails-data-breach" target="_blank"
rel="noopener">MySpace suffered a data breach that
exposed almost 360 million accounts</a>. In May 2016 the
data was offered up for sale on the &quot;Real Deal&quot;
dark market website and included email addresses,
usernames and SHA1 hashes of the first 10 characters of
the password converted to lowercase and stored without a
salt. The exact breach date is unknown, but <a
href="https://www.troyhunt.com/dating-the-ginormous-
myspace-breach" target="_blank" rel="noopener">analysis
of the data suggests it was 8 years before being made
public</a>.
Creation Date : 2008-07-01T00:00:00

Registered : true
Breach : true
Name : Anti Public Combo List
Bio : In December 2016, a huge list of email address and
password pairs appeared in a &quot;combo list&quot;
referred to as &quot;Anti Public&quot;. The list contained
458 million unique email addresses, many with multiple
different passwords hacked from various online systems.
The list was broadly circulated and used for
&quot;credential stuffing&quot;, that is attackers employ it

https://app.osint.industries/pdf?id=aef365ac-7424-4615-b41b-d091fd219b0c 2/6
12/24/24, 1:01 AM export_rollercoasterbill@yahoo.com.pdf

in an attempt to identify other online systems where the


account owner had reused their password. For detailed
background on this incident, read <a
href="https://www.troyhunt.com/password-reuse-
credential-stuffing-and-another-1-billion-records-in-have-i-
been-pwned" target="_blank" rel="noopener">Password
reuse, credential stuffing and another billion records in
Have I Been Pwned</a>.
Creation Date : 2016-12-16T00:00:00

Registered : true
Breach : true
Name : Exploit.In
Bio : In late 2016, a huge list of email address and
password pairs appeared in a &quot;combo list&quot;
referred to as &quot;Exploit.In&quot;. The list contained
593 million unique email addresses, many with multiple
different passwords hacked from various online systems.
The list was broadly circulated and used for
&quot;credential stuffing&quot;, that is attackers employ it
in an attempt to identify other online systems where the
account owner had reused their password. For detailed
background on this incident, read <a
href="https://www.troyhunt.com/password-reuse-
credential-stuffing-and-another-1-billion-records-in-have-i-
been-pwned" target="_blank" rel="noopener">Password
reuse, credential stuffing and another billion records in
Have I Been Pwned</a>.
Creation Date : 2016-10-13T00:00:00

https://app.osint.industries/pdf?id=aef365ac-7424-4615-b41b-d091fd219b0c 3/6
12/24/24, 1:01 AM export_rollercoasterbill@yahoo.com.pdf

Registered : true
Breach : true
Name : Collection #1
Bio : In January 2019, a large collection of credential
stuffing lists (combinations of email addresses and
passwords used to hijack accounts on other services) was
discovered being distributed on a popular hacking forum.
The data contained almost 2.7 <em>billion</em> records
including 773 million unique email addresses alongside
passwords those addresses had used on other breached
services. Full details on the incident and how to search the
breached passwords are provided in the blog post <a
href="https://www.troyhunt.com/the-773-million-record-
collection-1-data-reach" target="_blank"
rel="noopener">The 773 Million Record "Collection #1"
Data Breach</a>.
Creation Date : 2019-01-07T00:00:00

Registered : true
Breach : true
Name : National Public Data
Bio : In April 2024, <a
href="https://www.troyhunt.com/inside-the-3-billion-
people-national-public-data-breach" target="_blank"
rel="noopener">a large trove of data made headlines as
having exposed &quot;3 billion people&quot; due to a
breach of the National Public Data background check
service</a>. The initial corpus of data released in the
breach contained billions of rows of personal information,
including US social security numbers. Further partial data
sets were later released including extensive personal
information and 134M unique email addresses, although
the origin and accuracy of the data remains in question.
This breach has been flagged as &quot;unverified&quot;
and a full description of the incident is in the link above.
Creation Date : 2024-04-09T00:00:00

https://app.osint.industries/pdf?id=aef365ac-7424-4615-b41b-d091fd219b0c 4/6
12/24/24, 1:01 AM export_rollercoasterbill@yahoo.com.pdf

MYSPACE
Registered : true

PAYPAL
Registered : true
Email Hint : *** ll@ya *** .com
Phone Hint : +16 *** 3442

PHOTOBUCKET
Registered : true

MAPS
Registered : true
Profile Url : https://www.google.com/maps/contrib/115739540718982568294/reviews

https://app.osint.industries/pdf?id=aef365ac-7424-4615-b41b-d091fd219b0c 5/6
12/24/24, 1:01 AM export_rollercoasterbill@yahoo.com.pdf

Timeline
Content: Breached on Adobe
Date/Year: 2013-10-04T00:00:00

Content: Breached on MySpace


Date/Year: 2008-07-01T00:00:00

Content: Breached on Anti Public Combo List


Date/Year: 2016-12-16T00:00:00

Content: Breached on Exploit.In


Date/Year: 2016-10-13T00:00:00

Content: Breached on Collection #1


Date/Year: 2019-01-07T00:00:00

Content: Breached on National Public Data


Date/Year: 2024-04-09T00:00:00

Content: Last Active (Google)


Date/Year: 2023-07-28T15:47:36

osint.industries

https://app.osint.industries/pdf?id=aef365ac-7424-4615-b41b-d091fd219b0c 6/6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy