{
	"id": "bad27e4c-3aa3-4c9c-82c7-290f694a2470",
	"created_at": "2026-04-06T00:11:22.071802Z",
	"updated_at": "2026-04-10T03:34:59.534852Z",
	"deleted_at": null,
	"sha1_hash": "b2761c56fe12bf91e43f626ab09b76f06f08e294",
	"title": "Havenly discloses data breach after 1.3M accounts leaked online",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2139887,
	"plain_text": "Havenly discloses data breach after 1.3M accounts leaked online\r\nBy Lawrence Abrams\r\nPublished: 2020-08-02 · Archived: 2026-04-05 18:03:11 UTC\r\nHavenly, a US-based interior design web site, has disclosed a data breach after a hacker posted a database containing 1.3\r\nmillion user records for free on a hacker forum.\r\nHavenly is an online interior design and home decoration site where users can get help designing a room in their house from\r\ncertified designers.\r\nLast week, BleepingComputer reported that the ShinyHunters hacking group had leaked the databases for 18 companies on a\r\nhacker forum for free. These databases contained a combined total of 386 million user records.\r\nhttps://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nOne of the leaked databases contained 1.3 million user records for Havenly.com. \r\nHavenly database leaked on a hacker forum\r\nFrom the samples of this database seen by BleepingComputer, the leaked data included a user's login name, full name, MD5\r\nhashed password, email address, phone number, zip, and various other data related to the usage of the site.\r\nSample of the leaked Havenly user database\r\nOn July 27th, BleepingComputer contacted Havenly to report the data breach but had not received a reply to our inquiry.\r\nYesterday, five days after we sent our email, Havenly officially disclosed the data breach and are emailing notifications to\r\nusers.\r\nHavenly issues data breach notification\r\nHavenly is sending out data breach notifications stating that they \"recently became aware of a potential incident\" and\r\nperformed a mandatory reset of all passwords.\r\n\"We take the security of our community very seriously. As a precaution, we wanted to let you know that we recently became\r\naware of a potential incident that may have affected the security of certain customer accounts. We are working with external\r\nsecurity experts to investigate this matter.\"\r\n\"However, in the meantime, out of an abundance of caution, we are logging all existing customers out of their Havenly\r\naccounts and asking our customers to reset their password when they next log in to the Havenly website. As a best practice,\r\nwe also encourage all of our customers to use different passwords across all online services and applications, and to update\r\nthose passwords now and on a regular basis,\" Havenly's data breach notification stated.\r\nHavenly stated that they do not store complete credit card information, and only the last four digits may have been exposed.\r\n\"We suspect that many of you will be concerned about the credit card numbers that you've used with Havenly in the past.\r\nPlease note: we do NOT store credit card information, apart from the last 4 digits of the card in some cases, which is not\r\nenough to engage in credit card fraud,\" Havenly disclosed.\r\nIn the limited sample seen by BleepingComputer, we did not see any credit card information, including the last four digits.\r\nIf you are concerned that your account was part of this data breach, Have I Been Pwned has added Havenly to their data\r\nbreach lookup service, and you can use it to check if your email address was involved.\r\nhttps://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/\r\nPage 3 of 4\n\nWhat Havenly customers should do\r\nWhile the passwords leaked in this data breach were hashed, it is still possible for threat actors to decrypt the password.\r\nAfter a user's password is cracked, threat actors would be able to use them to try and login at other sites you may have an\r\naccount.\r\nTherefore, if you are a Havenly customer, you should immediately change your password to a strong and unique one.\r\nIf that same password was used at another site, you should change it at any other site that also uses it.\r\nWhen changing your passwords, be sure to use a unique and strong password at every site so that a data breach does not\r\naffect your account at other companies.\r\nA password manager can make it much easier to use unique passwords at every site and is highly recommended.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/\r\nhttps://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/"
	],
	"report_names": [
		"havenly-discloses-data-breach-after-13m-accounts-leaked-online"
	],
	"threat_actors": [
		{
			"id": "c071c8cd-f854-4bad-b28f-0c59346ec348",
			"created_at": "2023-11-08T02:00:07.132524Z",
			"updated_at": "2026-04-10T02:00:03.422366Z",
			"deleted_at": null,
			"main_name": "ShinyHunters",
			"aliases": [],
			"source_name": "MISPGALAXY:ShinyHunters",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "6f7f2ed5-f30d-4a99-ab2d-f596c1d413b2",
			"created_at": "2025-10-24T02:04:50.086223Z",
			"updated_at": "2026-04-10T02:00:03.770068Z",
			"deleted_at": null,
			"main_name": "GOLD CRYSTAL",
			"aliases": [
				"Scattered LAPSUS$ Hunters",
				"ShinyCorp",
				"ShinyHunters"
			],
			"source_name": "Secureworks:GOLD CRYSTAL",
			"tools": [],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "d8dff631-87b0-4320-8352-becff28dbcf1",
			"created_at": "2022-10-25T16:07:24.565038Z",
			"updated_at": "2026-04-10T02:00:05.034516Z",
			"deleted_at": null,
			"main_name": "ShinyHunters",
			"aliases": [],
			"source_name": "ETDA:ShinyHunters",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434282,
	"ts_updated_at": 1775792099,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/b2761c56fe12bf91e43f626ab09b76f06f08e294.pdf",
		"text": "https://archive.orkl.eu/b2761c56fe12bf91e43f626ab09b76f06f08e294.txt",
		"img": "https://archive.orkl.eu/b2761c56fe12bf91e43f626ab09b76f06f08e294.jpg"
	}
}