{
	"id": "9f2eeff8-d83e-4463-a6f7-6bc1f2202e2a",
	"created_at": "2026-04-06T00:14:03.312928Z",
	"updated_at": "2026-04-10T03:21:32.389251Z",
	"deleted_at": null,
	"sha1_hash": "cb1b12d2a551d243843f8e3ceed1b473818e845e",
	"title": "Hacker leaks 15 million records from Tokopedia, Indonesia's largest online store",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 487836,
	"plain_text": "Hacker leaks 15 million records from Tokopedia, Indonesia's\r\nlargest online store\r\nBy Written by Catalin Cimpanu, ContributorContributor May 2, 2020 at 7:10 a.m. PT\r\nArchived: 2026-04-05 16:55:54 UTC\r\nA hacker has leaked on Friday the details of 15 million users registered on Tokopedia, Indonesia's largest online\r\nstore.\r\nThe hacker claims the data was obtained in an intrusion that took place in March 2020 and is just a small part of\r\nthe site's entire user database that was obtained in the hack.\r\nThe leaker said he was sharing the 15 million users sample in the hopes someone could help crack the user\r\npasswords, so they could be used to access user accounts.\r\nZDNet has obtained a copy of the leaked file with the help of data breach monitoring service Under the Breach.\r\nThe file was a PostgreSQL database dump, containing user information such as full names, emails, phone\r\nnumbers, hashed passwords, dates of birth, and Tokopedia profile-related details (account creation date, last login,\r\nemail activation codes, password reset codes, location details, messenger IDs, hobbies, education, about-me fields,\r\nand lots more).\r\nImage: ZDNet\r\nZDNet has verified the authenticity of the leaked data against the official Tokopedia website.\r\nAn email containing a request for comment sent to Tokopedia returned an error message, but the company has told\r\nUnder The Breach in a private online conversation that they are investigating the incident.\r\nFor the time being, Tokopedia users are advised to reset their account passwords.\r\nhttps://www.zdnet.com/article/hacker-leaks-15-million-records-from-tokopedia-indonesias-largest-online-store/\r\nPage 1 of 2\n\nThe hashed passwords that the hacker wasn't able to crack were secured with the SHA2-384 hashing algorithm,\r\ncurrently considered to be secure, although not infallible.\r\nThe hacker also said the database didn't contain the \"salt\" random strings used to improve the security of the\r\nSHA2-384 hashing function. Without the salt strings, cracking the passwords would be a more time-consuming\r\ntask, giving users enough time to change passwords in the coming days.\r\nTokopedia has raised a total of $2.4 billion in funding over nine rounds, and is currently one of Indonesia's biggest\r\ntech unicorns.\r\nThe website is similar to Amazon, allowing users to buy products from the site or set up stores and sell products\r\nthemselves. The site is currently ranked in the Alexa Top 200 most popular sites on the internet, and it claims to\r\nhave more than 90 million monthly active users and more than 7 million registered merchants.\r\nUpdated on Sunday, May 3, to add that the hacker is now selling Tokopedia's entire user database on the Empire\r\ndark web marketplace. The hacker claims they're in possession of 91 million user accounts.\r\nThese were 2017's biggest hacks, leaks, and data breaches\r\nSecurity\r\nEditorial standards\r\nSource: https://www.zdnet.com/article/hacker-leaks-15-million-records-from-tokopedia-indonesias-largest-online-store/\r\nhttps://www.zdnet.com/article/hacker-leaks-15-million-records-from-tokopedia-indonesias-largest-online-store/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.zdnet.com/article/hacker-leaks-15-million-records-from-tokopedia-indonesias-largest-online-store/"
	],
	"report_names": [
		"hacker-leaks-15-million-records-from-tokopedia-indonesias-largest-online-store"
	],
	"threat_actors": [],
	"ts_created_at": 1775434443,
	"ts_updated_at": 1775791292,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/cb1b12d2a551d243843f8e3ceed1b473818e845e.pdf",
		"text": "https://archive.orkl.eu/cb1b12d2a551d243843f8e3ceed1b473818e845e.txt",
		"img": "https://archive.orkl.eu/cb1b12d2a551d243843f8e3ceed1b473818e845e.jpg"
	}
}