{
	"id": "d2fed31c-c951-4a44-b69a-6c798e76ebc5",
	"created_at": "2026-04-06T00:14:40.526666Z",
	"updated_at": "2026-04-10T03:34:59.55979Z",
	"deleted_at": null,
	"sha1_hash": "05c24d8a63e74d008a35052d39d40d8f8e272e5c",
	"title": "ShinyHunters hacker leaks 5.22GB worth of Mashable.com database",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 140976,
	"plain_text": "ShinyHunters hacker leaks 5.22GB worth of Mashable.com\r\ndatabase\r\nBy Waqas\r\nPublished: 2020-11-05 · Archived: 2026-04-05 22:07:39 UTC\r\nShinyHunters leaked the database earlier today revealing that it does not contain\r\nany password.\r\nAnother day, another data breach. This time, the infamous hacker going by the online handle of ShinyHunters has\r\nleaked a database belonging to Mashable.com, a global media, and entertainment company.\r\nThe 5.22GB worth of database was leaked earlier today on a prominent hacker forum. It can be confirmed that the\r\ndatabase is now available on several other forums including Russian-speaking ones.\r\nLeaked database\r\nAfter analyzing some of the data, Hackread.com can confirm that the leaked database contains staff, users, and\r\nsubscribers data such as full names, email addresses, country, gender, job description, online behavior related\r\ndetails, date of registration, IP addresses, social media profile links, and authentication tokens, etc.\r\nhttps://www.hackread.com/shinyhunters-hacker-leaks-mashable-database/\r\nPage 1 of 3\n\nHowever, a sigh of relief for Mashable is that the database does not contain any password or financial details since\r\nthe company runs an online shop on the same domain. The hacker, ShinyHinters, has also stated in their post on\r\nhacker forum that the “it (database) does not contain any password.\r\nWe have informed Mashable about the breach and this article will be updated in case the media giant gets back to\r\nus with a statement.\r\nDiscover more\r\nLatest hacking news\r\nSecure cloud storage\r\nPrivacy protection software\r\nAs for ShinyHunters; Mashable breach is another addition to their “portfolio.” In the last few months, the hacker\r\nleaked dozens of databases stolen from prominent companies including:\r\nWattPad – 271 million accounts leaked\r\nDunzo – 11GB worth of data leaked\r\nDave.com – 7 million accounts leaked\r\nBhinneka – 1 million+ accounts leaked\r\nMinted – 5 million accounts leaked\r\nProctorU – 444,267 accounts leaked\r\nTokopedia – 91 million accounts leaked\r\nCouchsurfing – 17 million accounts leaked\r\nUpdate (Tuesday- 10/11/2020): \r\nMashable did not respond to our email even though Hackread.com was probably the very first publication to alert\r\nthe company about the breach. However, according to their official statement published yesterday, the company\r\nhas acknowledged the breach.\r\nBased on our review, the database breach related to a feature that, in the past, had allowed readers to use\r\ntheir social media account sign-in (such as Facebook or Twitter) to make sharing content from\r\nMashable easier.\r\nThe types of data in the database included first and last names, general location (such as city or\r\ncountry), email addresses, gender, date of registration, IP addresses, links to social media profiles,\r\nexpired OAuth tokens, and month and day of user birthdays (but not year).\r\nDid you enjoy reading this article? Do like our page on Facebook and follow us on Twitter.\r\nhttps://www.hackread.com/shinyhunters-hacker-leaks-mashable-database/\r\nPage 2 of 3\n\nSource: https://www.hackread.com/shinyhunters-hacker-leaks-mashable-database/\r\nhttps://www.hackread.com/shinyhunters-hacker-leaks-mashable-database/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.hackread.com/shinyhunters-hacker-leaks-mashable-database/"
	],
	"report_names": [
		"shinyhunters-hacker-leaks-mashable-database"
	],
	"threat_actors": [
		{
			"id": "c071c8cd-f854-4bad-b28f-0c59346ec348",
			"created_at": "2023-11-08T02:00:07.132524Z",
			"updated_at": "2026-04-10T02:00:03.422366Z",
			"deleted_at": null,
			"main_name": "ShinyHunters",
			"aliases": [],
			"source_name": "MISPGALAXY:ShinyHunters",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "6f7f2ed5-f30d-4a99-ab2d-f596c1d413b2",
			"created_at": "2025-10-24T02:04:50.086223Z",
			"updated_at": "2026-04-10T02:00:03.770068Z",
			"deleted_at": null,
			"main_name": "GOLD CRYSTAL",
			"aliases": [
				"Scattered LAPSUS$ Hunters",
				"ShinyCorp",
				"ShinyHunters"
			],
			"source_name": "Secureworks:GOLD CRYSTAL",
			"tools": [],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "d8dff631-87b0-4320-8352-becff28dbcf1",
			"created_at": "2022-10-25T16:07:24.565038Z",
			"updated_at": "2026-04-10T02:00:05.034516Z",
			"deleted_at": null,
			"main_name": "ShinyHunters",
			"aliases": [],
			"source_name": "ETDA:ShinyHunters",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434480,
	"ts_updated_at": 1775792099,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/05c24d8a63e74d008a35052d39d40d8f8e272e5c.pdf",
		"text": "https://archive.orkl.eu/05c24d8a63e74d008a35052d39d40d8f8e272e5c.txt",
		"img": "https://archive.orkl.eu/05c24d8a63e74d008a35052d39d40d8f8e272e5c.jpg"
	}
}