
Due to multiple different sites being compromised, the impacted data is broad and ranges from relationship information to medical data to email addresses and passwords stored in plain text. Amongst the data was the LGBTQ dating site Atraf and the Machon Mor medical institute. In October 2021, the Israeli hosting provider CyberServe was breached and ransomed before having a substantial amount of their customer data leaked publicly by a group known as "Black Shadow". In July 2020, the data was also found to contain BeerAdvocate accounts sourced from a previously unknown breach.Ĭompromised data: Email addresses, Passwords The breach has subsequently been flagged as "unverified" as the source cannot be emphatically proven.

On disclosure to both organisations, each found that the data did not represent their entire customer base and possibly includes records from other sources with common subscribers.
#Update malwarebytes manually verification#
Subsequent verification with HIBP subscribers confirmed the passwords had previously been used and many subscribers had used either Coupon Mom or Armor Games in the past. On further investigation, the file was also found to contain data indicating it had been sourced from Armor Games. In 2014, a file allegedly containing data hacked from Coupon Mom was created and included 11 million email addresses and plain text passwords. The Apollo website has a contact form for those looking to get in touch with the organisation.Ĭompromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Salutations, Social media profiles Apollo stressed that the exposed data did not include sensitive information such as passwords, social security numbers or financial data.
#Update malwarebytes manually professional#
The data left exposed by Apollo was used in their "revenue acceleration platform" and included personal information such as names and email addresses as well as professional information including places of employment, the roles people hold and where they're located. The data was discovered by security researcher Vinny Troia who subsequently sent a subset of the data containing 126 million unique email addresses to Have I Been Pwned. In July 2018, the sales engagement startup Apollo left a database containing billions of data points publicly exposed without a password.
