— #FreeThePassword

Asian breaches are nothing new, the folks at DeHashed see these breaches on the daily basis. Breaches like this are not uncommon; but a breach of this scale (12M users & 18M users) and no confirmation leads to some uncertainty. Here’s what we know:

 

Site: tgbus.com

Record count: 12,966,100

Compromised data: id, username, password, email, salt

Hash Type: vBulletin

 

DeHashed has reached out to TGBus.com for a statement, Users can now use DeHashed to confirm if they’ve been affected by this breach.

 

Site: 17173.com

Record count: 18,333,811

Compromised data: username, md5hash, email, plain_password

Hash Type: MD5 & Plaintext

 

DeHashed has reached out to 17173.com for a statement, Users can now use DeHashed to confirm if they’ve been affected by this breach.

 

Site: vng.com.vn

Record count: 163,666,443

Compromised data: passportid,accountname,accountstatus,password,gamecode,email,questionid,answer,personaltypeid,personalid,issuedate,

issueplace,fullname,gender,birthday,telephone,address,countryid,cityid,districtid,lastmodifieddate,regproductid,regdate,

regip,regaccountstatus,maritalstatus,occupationid,educationid,paymenttel01,paymenttel02,paymenttel03,csttel,lastupdatedpaymenttel,

lastupdatedpassword,lastupdatedemail,lastupdatedcmnd,firstchargedate,referid,refername,email2,accountstatus2,text01,text02,text03,

text04,text05,number01,number02,number03,number04,number05,datetime01,datetime02,datetime03,datetime04,datetime05

Hash Type: MD5

DeHashed has reached out to VNG.com.vn for a statement, Users can now use DeHashed to confirm if they’ve been affected by this breach.