{
	"id": "c58aae03-d429-427c-a5de-e230ec4ab7dd",
	"created_at": "2026-04-06T00:09:39.851603Z",
	"updated_at": "2026-04-10T13:12:57.288171Z",
	"deleted_at": null,
	"sha1_hash": "da61407f4aff22e33cb5919cca6a15653b8255a1",
	"title": "Major IR leaks",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 96285,
	"plain_text": "Major IR leaks\r\nPublished: 2024-09-04 · Archived: 2026-04-05 18:03:06 UTC\r\nLEAKFA\r\nCurrently includes:\r\n48 major leaks\r\n10 minor leaks\r\nfor a total of 58 leaks\r\nSource and statement\r\nThis page only shows leaks over 5k lines. Minor leaks are only available for victim inquiries.\r\nThe magnitude of the leak, exposed items and affected accounts are obtained after removing duplicates and\r\nincorrect items and may differ from the original data.\r\nThe information sources of this website are taken from available and public databases on the Internet, the website\r\ndoes not save the original information of the databases, only the things needed for users’ searches are stored in\r\ncoded form. Attacking this website does not provide you with any information. This website will take legal action\r\nif any intrusion attempt is detected.\r\nNational Bank of IranThe magnitude of the leak69,900,000confirmedgeneralimportant\r\nDisclosed items\r\nName, surname, father’s name, date of birth, national number, card number, mobile phone number, city, province,\r\naddress\r\nnarration\r\nIn 1400, a database containing the information of more than 70 million real and legal customers of the National\r\nBank of Iran was put up for sale on dark web markets. A few days later, a part of this database was published in a\r\nhacker forum. This data included first name, last name, father’s name, date of birth, national number and other\r\ninformation of customers. In an announcement, National Bank Public Relations, while emphasizing the use of\r\ninformation security equipment, controls, policies and procedures based on standards and methods and upstream\r\nrequirements, denied the published claims regarding the leakage of customer information and added, “Currently,\r\nthe investigations are also continues, but no results have been obtained regarding the validity of this claim”.\r\nLeak date: 12 January 1400\r\nAffected accounts: 69,976,577\r\nIn the news: attached reportExport Bank of IranThe magnitude of the leak63,000,000confirmedgeneral\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 1 of 21\n\nDisclosed items\r\nAccount number, customer number, name, surname, card number, username, internet bank password, password\r\nreminder, email address, mobile phone number, account type, account opening date, branch code\r\nnarration\r\nIn April 2019, a database containing the information of 63 million real and legal customers of Saderat Bank of\r\nIran was put up for sale in one of the hacker forums. family name, account number, customer number, card\r\nnumber, account type, email address and other information. Saderat Bank of Iran has not shown any official\r\nreaction to this issue, but Saderat Bank’s public relations in a conversation with Mahname Farahed announced that\r\n“initial checks of the published information show that this news is not very accurate and they are investigating it\r\nmore closely.”\r\nLeak date: April 19, 2019\r\nAffected accounts: 63,091,551\r\nIn the news: Euronews reportInstagramThe magnitude of the leak40,000,000confirmedgeneral\r\nDisclosed items\r\nUser ID, Username, Full Name, Email Address, Mobile Number, Profile Picture, Privacy Status, Account\r\nVerification Status\r\nnarration\r\nIn Isfand 1400, security researcher Bob Dyachenko announced the disclosure of the information of millions of\r\nIranian users by an unprotected Elasticsearch. It was made publicly available due to misconfiguration of security\r\nsettings. A few months later, a database containing information on more than 40 million Instagram accounts and\r\n1.2 million Twitter accounts, including user IDs, usernames, full names, locations, website addresses, profile\r\npictures, profile bios, mobile phone numbers, and email addresses. which was hosted on this website, was put up\r\nfor sale on a hacker forum.\r\nLeak date: March 4, 1400\r\nAffected accounts: 40,694,833\r\nin the news: Tejaratnews reportIrancellThe magnitude of the leak37,000,000confirmedgeneralimportant\r\nDisclosed items\r\nName, surname, landline phone number, mobile phone number, city, place of residence, postal code, national\r\nnumber\r\nnarration\r\nIn June 2014, Irancell, a communication service company that operates Iran’s largest mobile phone network,\r\nsuffered a data failure. This data breach led to the disclosure of its customers’ information, including more than 37\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 2 of 21\n\nmillion names, surnames, mobile and landline numbers, provinces, cities, residential addresses, zip codes and\r\nnational codes. Irancell did not take responsibility for the leak of this data and blamed the competitors for the\r\nconfusion caused by this news.\r\nLeak date: June 27, 2013\r\nAffected accounts: 37,084,245\r\nOfficial statement: Irancell statementhunting systemThe magnitude of the leak35,200,000confirmedgeneral\r\nDisclosed items\r\nFull name, username, user ID, profile biography, mobile phone number\r\nnarration\r\nIn April 2019, Bob Dyachenko, a security researcher, discovered a huge collection of data that was related to\r\nIranians and was placed in an unprotected database. According to him, it took 11 days for this database, which was\r\nhosted on a service called “Samaneh Shekar”, to become unavailable, which has caused other people to gain\r\naccess to it and put the data up for sale. This incident led to the disclosure of the information of 35 million\r\nTelegram user accounts, including names, user IDs, usernames, phone numbers, hashes, and secret keys, along\r\nwith the information of 4 million Instagram user accounts, including usernames, profile pictures, names, and\r\nbiographies. (Bio) became users.\r\nLeak date: April 2, 2019\r\nAffected accounts: 35,253,119\r\nIn the news: ISNA reportMellat BankThe magnitude of the leak30,000,000confirmedgeneralimportant\r\nDisclosed items\r\nName, surname, father’s name, birth certificate number, national number, date of birth, city, province, city of birth,\r\nprovince of birth, address or address, account number, card number, mobile phone number\r\nnarration\r\nIn May 1400, a database containing the information of more than 30 million real and legal customers of Bank\r\nMellat was put up for sale in one of the hacker forums. These data include name, surname, father’s name, national\r\nID number, national code, date of birth, city. , province, address and other information of customers. Bank Mellat\r\nhas not yet taken responsibility for the leakage of this data, and by publishing a notice, while emphasizing the\r\nbank’s commitment to protect the information of its customers, it announced that “the dimensions of this claim are\r\nbeing investigated by the bank’s specialized and technical teams”.\r\nLeak date: May 22, 1400\r\nAffected accounts: 30,099,465\r\nIn the news: Mehr reporttraysThe magnitude of the leak26,300,000confirmedgeneralimportant\r\nDisclosed items\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 3 of 21\n\nName, Surname, National Number, Date of Birth, Gender, Email Address, Mobile Phone Number, User ID, User\r\nStatus, Platform Type, Software Market, Software Code Version, Google Advertising ID, Device ID, Device\r\nModel, Matrix Session ID, Matrix user ID, city, geographic coordinates, last activity time, trip code, trip status,\r\nservice type, trip date, trip start time, trip origin and destination, driver ID, driver’s name and surname, driver’s\r\nphone number, trip cost, share the traveler\r\nnarration\r\nIn September 1402, Tapsi, one of the largest active software in the field of Internet taxis, was infiltrated by a group\r\nof hackers known as “IRLeaks”. Some time later, Tapsy’s CEO announced on Twitter that “Hackers have accessed\r\nsome of Tapsy’s users’ information and were looking for extortion, but Tapsy has decided not to cooperate with\r\nthem.” This decision, however, did not prevent the disclosure of user information, and finally the data was put up\r\nfor sale in dark web markets. This data contained the personal and identity information of more than 26 million\r\npassengers and 3 million Tapsi drivers, along with travel information and the source code of all products such as\r\npassenger and ambassador software, development, support, back-end and other departments. Until now, Tapsi has\r\nnot taken responsibility for the leakage of this data and has not published any official announcement in this regard.\r\nLeak date: September 11, 1402\r\nAffected accounts: 26,334,060\r\nIn the news: Tejaratnews reportTelegramThe magnitude of the leak21,000,000confirmedgeneral\r\nDisclosed items\r\nName, surname, username, user ID, mobile phone number\r\nnarration\r\nIn May 2019, Telegram, a multi-platform open source messaging service focused on privacy, suffered a data\r\nbreach. The report of this incident was first published by the Russian website active in the field of technology\r\n“Kod.ru”. According to this report, a database was put up for sale on the dark web markets, which contains the\r\ndata of more than 30 million Telegram user accounts (21 million Iranians and 12 million Russians) included\r\nnames, usernames, user IDs and mobile phone numbers. The approximate simultaneity of this event with the\r\n“Hunting System” data leak led to this news being interpreted and not covered in the Persian language media.\r\nLeak date: May 6, 2019\r\nAffected accounts: 21,056,273\r\nIn the news: Medusa reportTraffic police – license plateThe magnitude of the\r\nleak11,000,000confirmedgeneralimportant\r\nDisclosed items\r\nFirst name, last name, father’s name, national number, birth certificate number, date of birth, mobile phone\r\nnumber, landline number, address, car license plate number, car class, car brand, car type, car color, car body\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 4 of 21\n\nnumber, number Engine serial, manufacturer, year of manufacture, VIN number, type, date and description of\r\ncourt orders issued for the vehicle\r\nnarration\r\nIn July 1400, a database containing about 14 million lines of information on the owners of all types of vehicles\r\nthat were registered by the traffic police until the end of 2019 was put up for sale in a hacker forum. Rahor Police\r\ndid not react to this incident at first, but about a month after the publication of this news, Colonel Hossein\r\nRamezani, Executive Deputy of Rahor Naja Police, while rejecting the published news regarding the disclosure of\r\ninformation, stated: “So far, not even one bit of this information It has not been published and this issue is only an\r\nallegation.” Unfortunately, a total of 11,033,390 license plates of personal vehicles, government offices and\r\ninstitutions, taxis, public vehicles, agricultural machinery, disabled and veterans, and 2,621,698 motorcycle\r\nlicense plates were affected by this data leak. , last name, father’s name, birth certificate number, national number,\r\ndate of birth, mobile phone number, address, license plate number, manufacturer, year of manufacture and other\r\ninformation of the owners of active license plates in Iran.\r\nLeak date: July 31, 1400\r\nAffected accounts: 11,033,390\r\nIn the news: Rukna reportQalamchi CenterThe magnitude of the leak4,300,000confirmedimportant\r\nDisclosed items\r\nFirst name, last name, father’s name, national number, gender, date of birth, numerator, test group, field location,\r\nfield address, representative name, backup, director’s name, exam contact number, school name, registration date,\r\nlandline phone number, Cell phone number, supervisor’s cell phone number, province, city, address, grade point\r\naverage, first and second semester average balance, average exam balance, number of registration exams, absentee\r\nand attended summer and normal\r\nnarration\r\nOn the 1400th day, one of the servers of the “Education Cultural Center”. Qalam Chi” was hacked by an unknown\r\nperson. A few days later, a database containing more than 6 million lines of personal information, registrations and\r\ntests of students in the collection was put up for sale on a hacker forum. These data included name, surname,\r\nfather’s name, national number, gender, date of birth and other information of students. Kalamchi Education\r\nCultural Center has not taken responsibility for the leakage of this data and only warned the students about\r\nchanging their password every two weeks by sending a short message.\r\nDate of leak: 9 January 1400\r\nAffected accounts: 4,328,721Badsaba call to prayer calendarThe magnitude of the leak4,200,000confirmed\r\nDisclosed items\r\nName, surname, father’s name, user ID, email address, country, province, city, time zone, geographic coordinates,\r\nmobile phone number, device brand, device model, IMEI ID, software code version, Android version, registration\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 5 of 21\n\ndate, Comments and suggestions, tracking code\r\nnarration\r\nIn Mehr 2019, the hosting server of Azan Go Badsaba calendar, one of the most installed and popular Iranian\r\nsoftware, was hacked by an unknown person. Aggregating the main and supporting data of different software on\r\none server and not following the basic principles of security and network security made it easy for an intruder to\r\ntake control of other software by infiltrating the server of one software. This incident eventually led to the\r\ndisclosure of various information from the employees and users of Badsaba call to prayer calendar software,\r\nMufatih al-Jinan audio Bab al-Naim, Habal al-Matin audio Quran, Nahj al-Balagheh audio chemistry, better score\r\neducational software, Parsman Islamic software, and Shia Rooz Shamar software. And several other\r\nservices/software became “mobile wave pioneers” that are available for victim inquiries.\r\nLeak date: January 24, 2019\r\nAffected accounts: 4,279,930Driver’s trayThe magnitude of the leak3,600,000confirmedgeneralimportant\r\nDisclosed items\r\nName, Surname, National Number, Date of Birth, Gender, Email Address, Mobile Phone Number, User ID, User\r\nStatus, Platform Type, Software Market, Software Code Version, Google Advertising ID, Device ID, Device\r\nModel, Matrix Session ID, Metrics user ID, city, geographic coordinates, last activity time\r\nnarration\r\nIn September 1402, Tapsi, one of the largest active software in the field of Internet taxis, was infiltrated by a group\r\nof hackers known as “IRLeaks”. Some time later, Tapsy’s CEO announced on Twitter that “Hackers have accessed\r\nsome of Tapsy’s users’ information and were looking for extortion, but Tapsy has decided not to cooperate with\r\nthem.” This decision, however, did not prevent the disclosure of user information, and finally the data was put up\r\nfor sale in dark web markets. This data contained the personal and identity information of more than 26 million\r\npassengers and 3 million Tapsi drivers, along with travel information and the source code of all products such as\r\npassenger and ambassador software, development, support, back-end and other departments. Until now, Tapsi has\r\nnot taken responsibility for the leakage of this data and has not published any official announcement in this regard.\r\nLeak date: September 11, 1402\r\nAffected accounts: 3,666,198\r\nIn the news: Tejaratnews reportAudio Qur’an of Habal al-MateenThe magnitude of the leak2,800,000confirmed\r\nDisclosed items\r\nFull name, username, user ID, password, city, email address, mobile phone number, device brand, device model,\r\nIMEI ID, Wi-Fi mac address, software code version, software serial, Android version, Android ID, Tertiles,\r\nregistration date Name, Internet connection status\r\nnarration\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 6 of 21\n\nIn Mehr 2019, the hosting server of Azan Go Badsaba calendar, one of the most installed and popular Iranian\r\nsoftware, was hacked by an unknown person. Aggregating the main and supporting data of different software on\r\none server and not following the basic principles of security and network security made it easy for an intruder to\r\ntake control of other software by infiltrating the server of one software. This incident finally led to the disclosure\r\nof about 2 million and 900 thousand lines of name, username, password, city, email address, mobile phone\r\nnumber, mobile phone brand, mobile phone model, IMEI ID, Wi-Fi MAC address and other information of\r\n“Quran” software users. “Habal El Matin Audio” and several other services/software became “Mobile Wave\r\nPioneers Company”.\r\nLeak date: January 24, 2019\r\nAffected accounts: 2,856,963Traffic Police – Engine license plateThe magnitude of the\r\nleak2,600,000confirmedgeneralimportant\r\nDisclosed items\r\nName, surname, father’s name, national number, date of birth, mobile phone number, landline number, address,\r\nmotorcycle license plate number, motorcycle brand, motorcycle type, motorcycle color, motorcycle body number,\r\nengine serial number, manufacturer , year of manufacture, VIN number, type, date and description of court orders\r\nissued for the motorcycle\r\nnarration\r\nIn July 1400, a database containing about 14 million lines of information on the owners of all types of vehicles\r\nthat were registered by the traffic police until the end of 2019 was put up for sale in a hacker forum. Rahor Police\r\ndid not react to this incident at first, but about a month after the publication of this news, Colonel Hossein\r\nRamezani, Executive Deputy of Rahor Naja Police, while rejecting the published news regarding the disclosure of\r\ninformation, stated: “So far, not even one bit of this information It has not been published and this issue is only an\r\nallegation.” Unfortunately, a total of 11,033,390 license plates of personal vehicles, government offices and\r\ninstitutions, taxis, public vehicles, agricultural machinery, disabled and veterans, and 2,621,698 motorcycle\r\nlicense plates were affected by this data leak. , last name, father’s name, birth certificate number, national number,\r\ndate of birth, mobile phone number, address, license plate number, manufacturer, year of manufacture and other\r\ninformation of the owners of active license plates in Iran.\r\nLeak date: July 31, 1400\r\nAffected accounts: 2,621,698\r\nIn the news: Rokna reportAudio Mufatih Bab Al-NaimThe magnitude of the leak2,100,000confirmed\r\nDisclosed items\r\nFull name, username, user ID, password, city, email address, mobile phone number, device brand, device model,\r\nIMEI ID, Wi-Fi mac address, software code version, software serial, Android version, Android ID, Tertiles,\r\nregistration date Name, Internet connection status\r\nnarration\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 7 of 21\n\nIn Mehr 2019, the hosting server of Azan Go Badsaba calendar, one of the most installed and popular Iranian\r\nsoftware, was hacked by an unknown person. Aggregating the main and supporting data of different software on\r\none server and not following the basic principles of security and network security made it easy for an intruder to\r\ntake control of other software by infiltrating the server of one software. This incident finally led to the disclosure\r\nof about 2 million and 200 thousand lines of name, username, password, city, email address, mobile phone\r\nnumber, mobile phone brand, mobile phone model, IMEI ID, Wi-Fi MAC address and other information of\r\nMofatih software users. “Bob Al-Naim Audio” and several other services/software became “Mobile Wave\r\nPioneers Company”.\r\nLeak date: January 24, 2019\r\nAffected accounts: 2,176,234Judiciary – case management systemThe magnitude of the\r\nleak1,900,000confirmedgeneralimportant\r\nDisclosed items\r\nName, surname, father’s name, national number, birth certificate number, educational qualification, religion,\r\ngender, date of birth, address or address, mobile phone number, landline number, email address, personal\r\npassword number, file number, file title, type Case, case subject, case summary, case status, case charge, case code\r\nnumber, registration date, confidentiality status, investigative branch, registering unit, assembly report, text of\r\nassembly report, date of meeting, penalty request, letters\r\nnarration\r\nIn March 1402, the judiciary’s case management system was infiltrated by a group of hackers known as “Adalat\r\nAli”. A few days later, hackers made the data extracted from this system available to the public on a website. This\r\naction caused the personal and identity information of millions of Iranian citizens whose information was\r\nregistered in this system to be exposed and put at risk. The reaction of the Judiciary, like the previous leaks, was\r\ndenial. A well-informed judicial official, whose name is usually not published, in a conversation with Isna, denied\r\nthe issue of hacking the judiciary’s systems and said: “Many of these documents are fake and fictitious and even\r\nold administrative letters that were previously published in cyberspace and Reposted again.” At the request of\r\nusers, Likfa is currently hosting the latest version of the data for this leak. If the site is updated, new data will be\r\nchecked and added.\r\nLeak date: March 1, 1402\r\nAffected accounts: 1,197,241\r\nIn the news: Zomit reportFacebookThe magnitude of the leak1,600,000confirmedgeneral\r\nDisclosed items\r\nName, surname, gender, date of birth, user ID, mobile phone number, email address, place of birth, place of\r\nresidence, marital status, employment status, registration date, date of obtaining the last degree.\r\nnarration\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 8 of 21\n\nIn June 2019, a database containing the information of more than 530 million Facebook users from all over the\r\nworld was put up for sale in a hacker forum. This data, which contained the information of 1.6 million Iranian\r\nusers, includes name, surname, gender, date of birth, user ID, mobile phone number, email address, place of birth,\r\nplace of residence, marital status, employment status, and registration date. The name and date of obtaining the\r\nlast academic degree. Facebook announced that the source of extracting this information was a vulnerability that\r\nwas fixed in August 2018.\r\nLeak date: June 17, 2019\r\nAffected accounts: 1,685,080\r\nIn the news: Verge reportRaichtThe magnitude of the leak1,200,000confirmedgeneral\r\nDisclosed items\r\nFull name, email address, mobile phone number, password, IP address, profile picture, geographic coordinates,\r\nuser browser details, last visited page\r\nnarration\r\nIn February 2019, Bob Dyachenko, a security researcher, discovered a huge collection of data related to the online\r\nchat platform “Raichat” and was placed in an unprotected database. The registration of this database in the search\r\nengines of devices connected to the Internet made it accessible to other people. A few months later, a database\r\ncontaining more than 150 million lines of data including names, email addresses, mobile phone numbers,\r\npasswords, profile pictures, IP addresses and other information of the website’s users was put up for sale on a\r\nhacker forum.\r\nLeak date: February 9, 2019\r\nAffected accounts: 1,268,558\r\nOfficial statement: Raicht’s statementTwitterThe magnitude of the leak1,200,000confirmedgeneral\r\nDisclosed items\r\nUser ID, Username, Full Name, Location, Website Address, Profile Picture, Profile Biography, Mobile Number,\r\nEmail Address\r\nnarration\r\nIn Isfand 1400, security researcher Bob Dyachenko announced the disclosure of the information of millions of\r\nIranian users by an unprotected Elasticsearch. It was made publicly available due to misconfiguration of security\r\nsettings. A few months later, a database containing the information of 1.2 million Twitter accounts and more than\r\n40 million Instagram accounts including user ID, username, full name, email address, mobile phone number,\r\nprofile picture, privacy status and account verification status (Verified Badge) of users, which was hosted on this\r\nwebsite, was put up for sale in one of the hacker forums.\r\nLeak date: March 4, 1400\r\nAffected accounts: 1,214,286\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 9 of 21\n\nIn the news: Tejaratnews reportPunishaThe magnitude of the leak786,000confirmedgeneralimportant\r\nDisclosed items\r\nName, Surname, Gender, National Number, Date of Birth, Username, User ID, Mobile Number, City, Country,\r\nAddress or Address, Subscription Type, Profile Image, Cover Image, Projects, Contests, Website Address, Skills\r\nwork portfolio, resume, fluent languages, work history, education history, achievements, marital status, time zone,\r\nlast time of activity\r\nnarration\r\nIn July 2019, the freelancer recruitment service or online project “Punisha” was leaked due to the\r\nmisconfiguration of Elasticsearch. A few months later, a database containing the information of more than 270,000\r\nusers of this website was put up for sale on a hacker forum. This information included name, surname, gender,\r\nnational number, date of birth, username, mobile phone number, city, country, account type and other user\r\ninformation. Two years later, on February 28, 1401, this site suffered a data leak again in the same way. This time,\r\nhowever, the information included about 800,000 users, along with the data related to competitions and projects.\r\nBut the new CEO Punisha attributed the reason for this new leak to the hacker attack and said, “The amount of\r\nsensitive information leaked is less than a tenth of this (announced) amount.”\r\nLeak date: July 1, 2019\r\nAffected accounts: 786,202\r\nIn the news: Attached report\r\nRead more: Punisha and multiple leaksMinistry of Cooperation – Tehran Labor DepartmentThe magnitude of the\r\nleak598,000confirmedimportant\r\nDisclosed items\r\nUser ID, username, password, first name, last name, father’s name, birth certificate number, national number,\r\ngender, date of birth, education level, email address, mobile phone number, landline number, city, area code,\r\naddress or address , zip code, personnel code, workplace, IP address, last entry date\r\nnarration\r\nIn December 2019, a database containing more than 630 thousand lines of information related to the “General\r\nDepartment of Cooperative, Labor and Social Welfare of Tehran Province” was put up for sale in one of the\r\nhacker forums. The data included name, surname, national code, date of birth, gender, personnel code, educational\r\nqualification, email address, address, postal code and other information of users/employees of the Ministry of\r\nCooperatives, Labor and Social Welfare. Unfortunately, no reaction has been shown from the Ministry of Home\r\nAffairs or the relevant news agencies regarding this information leak. The data was provided to Leakfa by a source\r\nwho asked to be identified as “Sm0rfZ”.\r\nLeak date: January 11, 2019\r\nAffected accounts: 598,157RoseblogThe magnitude of the leak288,000confirmed\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 10 of 21\n\nDisclosed items\r\nFull name, username, password, email address, IP address, website address\r\nnarration\r\nIn December 2012, Roseblog, one of the providers of web writing services (blog) in Persian language, was hacked\r\nby an unknown person. A few months later, the database of this site containing the information of more than 280\r\nthousand users, including names, usernames, passwords, email addresses and IP addresses of users, was published\r\namong hacker forums and groups.\r\nLeak date: January 11, 2012\r\nAffected accounts: 288,585Smalayo educational systemThe magnitude of the leak238,000confirmedimportant\r\nDisclosed items\r\nUser ID, username, password, first name, last name, national number, date of birth, gender, email address, mobile\r\nphone number, year of study, credits obtained, study center\r\nnarration\r\nIn July 1401, the comprehensive educational system of Samalayo suffered a data leak due to the misconfiguration\r\nof security settings. A few days later, a database containing the information of more than 200,000 users of this\r\nwebsite was put up for sale on a hacker forum, and some time later it was released to the public. This information\r\nincluded name, surname, national number, date of birth, gender, email address, mobile phone number and other\r\ninformation of the students.\r\nLeak date: July 5, 1401\r\nAffected accounts: 238,807Nahj al-Balagha audio chemistryThe magnitude of the leak224,000confirmed\r\nDisclosed items\r\nFull name, username, user ID, password, city, email address, mobile phone number, device brand, device model,\r\nIMEI ID, Wi-Fi mac address, software code version, software serial, Android version, Android ID, Tertiles,\r\nregistration date Name, Internet connection status\r\nnarration\r\nIn Mehr 2019, the hosting server of Azan Go Badsaba calendar, one of the most installed and popular Iranian\r\nsoftware, was hacked by an unknown person. Aggregating the main and supporting data of different software on\r\none server and not following the basic principles of security and network security made it easy for an intruder to\r\ntake control of other software by infiltrating the server of one software. This incident finally led to the disclosure\r\nof about 225,000 lines of name, username, password, city, email address, mobile phone number, mobile phone\r\nbrand, mobile phone model, IMEI ID, Wi-Fi MAC address and other information of the users of “Nahj Balaghah\r\nAudio Kimia” software. ” and several other services/software became “mobile pioneer company”.\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 11 of 21\n\nLeak date: January 24, 2019\r\nAffected accounts: 224,234Ministry of Interior – Seman SystemThe magnitude of the\r\nleak126,000confirmedimportant\r\nDisclosed items\r\nName, surname, national number, date of birth, gender, marital status, profile type, profile picture, sample\r\nsignature, education degree, specialization, email address, mobile phone number, landline number, address, city,\r\nprovince, Postal code, bank account number\r\nnarration\r\nIn March 2019, a database containing the information of about 130 thousand users of the Ministry of Interior’s\r\n“Non-Governmental Organization Establishment System” was put up for sale in one of the hacker forums. The\r\ndata included name, surname, national code, date of birth, gender, marital status, educational qualification,\r\nspecialization, email address, address, postal code and other information of the users of this system. Unfortunately,\r\nthere has been no reaction from the Ministry of Home Affairs or relevant news agencies regarding this information\r\nleak. The data was provided to Leakfa by a source who asked to be identified as “Dominic Vaughan”.\r\nLeak date: March 8, 2019\r\nAffected accounts: 126,170face viewThe magnitude of the leak116,000confirmedgeneral\r\nDisclosed items\r\nFull name, username, password, email address\r\nnarration\r\nIn December 2013, the largest social network in Persian language, “Face Nama”, was hacked by a person who\r\ncalls himself “Mr_TOROJAN”. Minutes later, the extracted data, which included 116,000 unique email addresses\r\nalong with names, usernames, and passwords with the MD5 algorithm, was posted on the site.\r\nLeak date: January 10, 2013\r\nAffected accounts: 116,478\r\nIn the news: Asr Iran reportKarbankThe magnitude of the leak106,000confirmedimportant\r\nDisclosed items\r\nName, surname, date of birth, username, password, gender, landline phone number, mobile phone number, email\r\naddress, profile picture, identifier, registration date, last entry date, work history, marital status, province, city,\r\nAddress, degree, university, GPA, skills, resume, scanned documents\r\nnarration\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 12 of 21\n\nIn April 2019, a database containing the information of more than 100,000 users of the recruitment, job search,\r\nresume search and job advertisement service “Carbank” was put up for sale in one of the hacker forums. The\r\ninformation includes name, surname, date of birth, gender, username, password, landline phone, mobile phone,\r\nemail address, work experience, marital status, city, province, address, degree, field of study and other information\r\nof users. It was the employees of this service. The data was provided to Leakfa by a source who asked to be\r\nidentified as “Hermann Goering”.\r\nLeak date: April 30, 2016\r\nAffected accounts: 106,667my electricityThe magnitude of the leak79,000confirmedgeneralsample\r\nDisclosed items\r\nFirst name, last name, national number, mobile phone number, user ID, region code, city code, payment amount,\r\npayment date, tracking number, PSP company code, card number (incomplete), model ID, model name, make ID,\r\nwarehouse Delivery and name of the electricity meter manufacturer\r\nnarration\r\nIn Mehr 1401, Barqman, the official portal for inquiry and payment of electricity distribution companies of the\r\ncountry, suffered a data leak. This data, which included name, surname, national number, mobile phone and other\r\ninformation of thousands of users related to this system, was placed on an unprotected Elasticsearch. At the\r\nrequest of users and in cooperation with security researcher Bob Dyachenko, Likfa is currently hosting sample\r\ndata for this leak, if you have the original data, please contact us.\r\nLeak date: 8 Mehr 1401\r\nAffected accounts: 79,581\r\nIn the news: Barqnews reportJudiciary – Sana systemThe magnitude of the\r\nleak50,000confirmedgeneralimportantsample\r\nDisclosed items\r\nFirst name, last name, father’s name, religion, gender, marital status, landline phone number, mobile phone\r\nnumber, phone number, national number, address, postal code, place of birth, place of residence, level of\r\neducation, one-time password, password Personal, last password change date\r\nnarration\r\nIn February 2019, Sana’s authentication system suffered a data breach. This data, which was put up for sale in one\r\nof the hacker forums, according to the seller, contains 25 million and 300 thousand lines of email address, date of\r\nbirth, birth certificate number, name, surname, father’s name, gender, landline phone, mobile phone, National\r\ncode, address/address, place of birth, education level, one-time password (hashed), personal password (hashed)\r\nand other information of the users, the judiciary did not react to this incident at first, but a few days later, Mr.\r\nMohammad Kazemi Fard, Deputy of Judicial Intelligence and Systems Affairs of the Statistics and Information\r\nTechnology Center of the Judiciary, regarding the leakage of information of the users of the judicial electronic\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 13 of 21\n\nnotification system, announced that there was no hacking or information leakage in the judicial system. At the\r\nrequest of users, Likfa is currently hosting sample data for this leak, if you have the original data, please contact\r\nus.\r\nLeak date: 29 February 2019\r\nAffected accounts: 50,432\r\nIn the news: Zomit report\r\nVideos: Sana system information leak investigationAsiatechThe magnitude of the\r\nleak49,000confirmedgeneralsample\r\nDisclosed items\r\nName, surname, national number, landline number, mobile number, ADSL number\r\nnarration\r\nIn June 2019, Asiatech, one of the Internet Service Providers (ISP) in Iran, suffered a data leak. This data, which\r\nwas put up for sale in one of the hacker forums, contained the name, surname, national code, landline phone\r\nnumber, mobile phone number and other information of the company’s employees and users. Asiatec first\r\npublished the news in its official statement. Regarding the leak of users’ information, he denied it, but the next\r\nday, according to a statement published in one of the media, they confirmed the data leak and announced that “the\r\nstolen information is related to one of the representative offices of this company.” At the request of users, Likfa is\r\ncurrently hosting sample data for this leak, if you have the original data, please contact us.\r\nLeak date: June 3, 2019\r\nAffected accounts: 49,828\r\nIn the news: Zomit reportSharif University of TechnologyThe magnitude of the leak48,000confirmedimportant\r\nDisclosed items\r\nName, surname, father’s name, birth certificate number, national number, student number, gender, place of birth,\r\ndate of birth, place of residence, life status, previous name and surname, landline phone number, mobile phone\r\nnumber, phone number, email address , username, password, job position, work history, address, city, province,\r\nzip code\r\nnarration\r\nIn December 2019, one of the servers of Sharif University of Technology, one of the most well-known universities\r\nin the country, was hacked by an unknown person. A few months later, a set of several databases containing name,\r\nsurname, father’s name, ID number, national code, gender, date of birth, email address, landline phone, mobile\r\nphone and other information of employees/professors and students of this university, It was put up for sale in one\r\nof the hacker forums.\r\nDate of leak: 29 December 2019\r\nAffected accounts: 48,492Khwaja Nasir UniversityThe magnitude of the leak45,000confirmedgeneralimportant\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 14 of 21\n\nDisclosed items\r\nName, surname, father’s name, national number, birth certificate number, place of issue, date of birth, gender,\r\nsemester of entry, student number, field of study, course, course, grade point average, unit passed, conditional\r\nnumber, type of admission to the university, type of quota , military status, religion, religion, marital status, mobile\r\nphone number, landline number, email address, place of birth, province of residence, city of residence, address or\r\naddress, postal code, years of studentship\r\nnarration\r\nIn Shahrivar 1400, one of the systems of Khwaja Nasiruddin Tusi University of Technology, one of the top\r\nuniversities in the country, was hacked by an unknown person. A few days later, a collection of several databases\r\ncontaining about 100,000 lines of data was put up for sale on a hacker forum. These data included name, surname,\r\nfather’s name, national number, birth certificate number, place of issue and other identity and personal information\r\nof the students. The Research and Technology Vice-Chancellor of the University published a notice in this regard,\r\nwhich attributed the leaked information through the thieves’ access to the personal files of the current affairs\r\nreport of various university units.\r\nDate of leak: 7 Shahrivar 1400\r\nAffected accounts: 45,454\r\nOfficial statement: University Research and Technology Vice-ChancellorEducational media for better gradesThe\r\nmagnitude of the leak41,000confirmed\r\nDisclosed items\r\nFull name, username, user ID, password, city, email address, mobile phone number, device brand, device model,\r\nIMEI ID, Wi-Fi McAddress, software code version, software serial, Android version, Android ID, registration\r\ndate, Internet connection status\r\nnarration\r\nIn Mehr 2019, the hosting server of Azan Go Badsaba calendar, one of the most installed and popular Iranian\r\nsoftware, was hacked by an unknown person. Aggregating the main and supporting data of different software on\r\none server and not following the basic principles of security and network security made it easy for an intruder to\r\ntake control of other software by infiltrating the server of one software. This incident finally led to the disclosure\r\nof about 42 thousand lines of name, username, password, city, email address, mobile phone number, mobile phone\r\nbrand, mobile phone model, IMEI ID, Wi-Fi McAddress and other information of the users of the “Better Score\r\nEducational Media” software. ” and several other services/software became “mobile pioneer company”.\r\nLeak date: January 24, 2019\r\nAffected accounts: 41,890Etude Plus educational systemThe magnitude of the leak34,000confirmedimportant\r\nDisclosed items\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 15 of 21\n\nName, surname, father’s name, national number, username, password, account type, mobile phone number, profile\r\npicture, contact list, father’s mobile phone number, mother’s mobile phone number, school ID, school name,\r\nschool address, school principal’s name school principal’s cell phone, school principal’s username, school\r\nprincipal’s password, list of school classes, list of school entertainment bells\r\nnarration\r\nIn May 1400, a database containing the information of more than 34,000 users of the Etude Plus online training\r\nsystem was placed in one of the hacker forums. The data included name, surname, father’s name, national code,\r\nusername, password, account type, mobile phone number, profile picture, contact list of father’s mobile phone\r\nnumber, mother’s mobile phone number and other information of users. This data included the first name, last\r\nname, father’s name, national code and mobile phone number of the teachers, as well as the contact list of the\r\nusers of this system, which included about 200 thousand lines of first name, last name and mobile phone number,\r\nwas also disclosed in this incident. Available for victim inquiries.\r\nLeak date: May 26, 1400\r\nAffected accounts: 34,071ClassinoThe magnitude of the leak30,000confirmed\r\nDisclosed items\r\nName, surname, national number, educational level, field of study, province, gender, mobile phone number, user\r\nID, registration date, account credit\r\nnarration\r\nOn December 1400, Classino, the first and largest online exam school and class in the country, experienced a data\r\nfailure. This data, which contained more than 30 thousand lines of name, surname, national number, educational\r\nlevel, field of study, province, gender, mobile phone number and other information of users, was first put up for\r\nsale in one of the hacker forums. And then it was published publicly.\r\nDate of leak: 8 December 1400\r\nAffected accounts: 30,744Iranian language referenceThe magnitude of the leak24,000confirmed\r\nDisclosed items\r\nUsername, password, IP address, email address\r\nnarration\r\nIn September 2016, the website of the country’s most comprehensive language school on the web platform known\r\nas “Iranian Language Reference” was hacked by a group of hackers known as “Priv8_Team”. This incident led to\r\nthe disclosure of the site’s database, which contained 24,000 lines of usernames, email addresses, passwords with\r\nthe MD5 algorithm, and users’ IP addresses.\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 16 of 21\n\nLeak date: 11 Mehr 1396\r\nAffected accounts: 24,898DeltafoxThe magnitude of the leak23,000confirmed\r\nDisclosed items\r\nUsername, password, email address, website address\r\nnarration\r\nIn March of 2013, Deltafox, the download authority for computer games, was hacked by a person who calls\r\nhimself “MR. HOSSEIN”. This incident led to the disclosure of the site’s database, which contained 23,000 lines\r\nof usernames, email addresses, passwords with the MD5 algorithm, and website addresses of users.\r\nLeak date: April 3, 2014\r\nAffected accounts: 23,214Payam Noor UniversityThe magnitude of the leak19,000confirmedimportant\r\nDisclosed items\r\nName, surname, student number, father’s name, date of birth, birth certificate number, serial number of birth\r\ncertificate, national number, military status, marital status, province, city, postal code, place of residence, place of\r\nbirth, landline phone number, mobile phone number , email address, school name, grade point average, 3×4\r\nphotos\r\nnarration\r\nIn July 2019, the website of Payam Noor University, one of the top universities in the country, was hacked by an\r\nunknown person. A few months later, a database from this site containing more than 19 thousand lines of first and\r\nlast name, father’s name, date of birth, birth certificate number, national code, mobile phone number, email\r\naddress and other personal information of students, in one of the hacker forums. It was put up for sale. In Mehr\r\n1400, we witnessed a new data leak from this university, a collection containing more than 13 thousand lines\r\ncontaining identity information, student information, certificate date, certificate number, and landline and cell\r\nphone numbers of students. The possibility of querying this data is also available for the victims.\r\nLeak date: July 24, 2019\r\nAffected accounts: 19,155Tehran University of Medical SciencesThe magnitude of the leak18,000confirmed\r\nDisclosed items\r\nFirst name, last name, national number, email address, username, password, landline phone number, mobile phone\r\nnumber, emergency contact number, father’s cell phone number, mother’s cell phone number, IP address, user ID\r\nnarration\r\nOn March 3, 2019, a database containing the information of more than 18 thousand students of “Tehran University\r\nof Medical Sciences and Health Services” which included name, surname, national code, email address, username,\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 17 of 21\n\npassword, mobile phone number and other information. , was put up for sale in one of the hacker forums. One of\r\nthe other systems of this university suffered a data leak last month, which eventually led to the disclosure of the\r\ninformation of 3,000 of its employees, including name, surname, father’s name, national code, ID number, job\r\nposition, landline number, Cell phone numbers, latest salaries and other information are available for victim\r\ninquiries.\r\nLeak date: March 3, 2019\r\nAffected accounts: 18,507Luxa PlusThe magnitude of the leak14,000confirmed\r\nDisclosed items\r\nName, surname, mobile phone number, email address\r\nnarration\r\nIn November 2016, Luxa Plus, a social network designed to provide VIP services to the affluent segment of the\r\nsociety, was hacked by an unknown person. 3 years later, its database containing more than 14,000 user\r\ninformation, including first and last names, email addresses and mobile phone numbers, was put up for sale on a\r\nhacker forum.\r\nLeak date: November 30, 2016\r\nAffected accounts: 14,725IranplastThe magnitude of the leak14,000confirmed\r\nDisclosed items\r\nFull name, landline phone number, mobile phone number, password, email address, place of residence, company\r\nname, company website address, company activity, company registration number\r\nnarration\r\nIn December 2018, the website of the international exhibition of plastics, rubber, machinery and equipment known\r\nas “Iranplast” was infiltrated by a group of hackers known as “Liosion Team”. This incident led to the disclosure\r\nof the information of about 17 thousand traders from all over the world (14 thousand from Iran) who had\r\nregistered to receive services in this exhibition.\r\nDate of leak: December 30, 2018\r\nAffected accounts: 14,716Samsung CenterThe magnitude of the leak12,000confirmed\r\nDisclosed items\r\nFirst name, last name, landline phone number, mobile phone number, password, IP address, email address\r\nnarration\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 18 of 21\n\nIn April 2013, the website of the official sales representative of Samsung products since 2007 in Iran, known as\r\n“Samsung Center”, was hacked by a group of hackers known as “Zurael sTz”. This incident led to the disclosure\r\nof about 20,000 data containing 12,000 personal information of customers, including names, surnames, email\r\naddresses, mobile and landline numbers, IP addresses and passwords with the MD5 algorithm.\r\nLeak date: April 18, 2016\r\nAffected accounts: 12,992Parsman Islamic softwareThe magnitude of the leak9,000confirmed\r\nDisclosed items\r\nUser ID, email address, mobile phone number, device brand, device model, registration date\r\nnarration\r\nIn Mehr 2019, the hosting server of Azan Go Badsaba calendar, one of the most installed and popular Iranian\r\nsoftware, was hacked by an unknown person. Aggregating the main and supporting data of different software on\r\none server and not following the basic principles of security and network security made it easy for an intruder to\r\ntake control of other software by infiltrating the server of one software. This incident finally led to the disclosure\r\nof about 9 thousand lines of user ID, email address, mobile phone number, mobile phone brand, mobile phone\r\nmodel and other information of users of “Persman Islamic Software” and several other services/software of\r\n“Pishgaman Moj Mobile Company”.\r\nLeak date: January 24, 2019\r\nAffected accounts: 9,099Ports and Maritime OrganizationThe magnitude of the\r\nleak9,000confirmedgeneralimportant\r\nDisclosed items\r\nName, surname, father’s name, national number, birth certificate number, serial number of birth certificate, date of\r\nbirth, religion, gender, marital status, date of marriage, spouse’s occupation, number of children, organizational\r\nposition code, signatory’s name, signatory’s job position, last salary date of official employment (permanent), date\r\nof contract employment (temporary), military status, duration of military service, mobilization status, address,\r\npostal code, landline phone number, mobile phone number, email address, place of birth\r\nnarration\r\nIn October 2019, the Iranian Ports and Maritime Organization witnessed a massive cyber attack against its\r\ninfrastructure, about 48 hours later, a large collection of about 15 gigabytes of data of this organization, including\r\nthe information of employees, customers, contracts, shipments, payments and information Another of various\r\nports such as Bandar Bushehr, Imam Khomeini, Shahid Rajaei and Shahid Bahnar was included in a telegram\r\nchannel. The Ports and Maritime Organization of Iran, while confirming that the infrastructure of this organization\r\nhas been targeted by a cyber attack, announced that preventive and appropriate measures have been taken against\r\nthis attack and the missions of the Ports and Maritime Organization are ongoing without interruption. In an\r\nannouncement, the Maher center announced the cyber attack on two government organizations, although it did not\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 19 of 21\n\nname them, and announced the temporary suspension of some services and technical tests of these centers as a\r\nprecaution after receiving the warnings.\r\nDate of leak: 22 Mehr 1399\r\nAffected accounts: 9,749\r\nIn the news: Moj reportIran’s security teamThe magnitude of the leak6,000confirmed\r\nDisclosed items\r\nUsername, password, IP address, email address, date of birth\r\nnarration\r\nIn July 2013, Iran’s security team, a specialized authority on hacking and security, was infiltrated by a group of\r\nhackers known as “ISG \u0026 RST”. A few months later, its database was posted on a popular hacker forum,\r\ncontaining more than 6,000 usernames, dates of birth, email addresses, IP addresses, and MD5 passwords.\r\nLeak date: July 7, 2013\r\nAffected accounts: 6,523Shia daily calendarThe magnitude of the leak6,000confirmed\r\nDisclosed items\r\nUser ID, email address, mobile phone number, device brand, device model, registration date\r\nnarration\r\nIn Mehr 2019, the hosting server of Azan Go Badsaba calendar, one of the most installed and popular Iranian\r\nsoftware, was hacked by an unknown person. Aggregating the main and supporting data of different software on\r\none server and not following the basic principles of security and network security made it easy for an intruder to\r\ntake control of other software by infiltrating the server of one software. This incident finally led to the disclosure\r\nof about 7 thousand lines of user ID, email address, mobile phone number, mobile phone brand, mobile phone\r\nmodel and other information of the users of “Shi’a Zahi Calendar” and several other services/software\r\n“Pishgaman Moj Mobile Company”. became.\r\nLeak date: January 24, 2019\r\nAffected accounts: 6,758Check light forumThe magnitude of the leak5,000confirmed\r\nDisclosed items\r\nUser ID, Username, Email Address, IP Address, Password, Salt\r\nnarration\r\nIn Mehr 2019, Chirag Chek Association, a specialized authority on the basics of electrical and automotive\r\nelectronics, suffered a data leak. A few months later, a database containing the information of more than 6,000\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 20 of 21\n\nusers of this website, including user IDs, usernames, passwords, salt, email addresses, and IP addresses of users,\r\nwas released among hacking forums and groups.\r\nDate of leak: 10 October 2019\r\nAffected accounts: 5,970Post office – Sarpol ZahabThe magnitude of the leak5,000confirmed\r\nDisclosed items\r\nFirst name, last name, father’s name, national ID number, birth certificate number, date of birth, tracking code,\r\nsending date, landline phone number, mobile phone number\r\nnarration\r\nIn April 1400, a database containing the information of more than 5,000 customers of the Islamic Republic of Iran\r\nPost Company was put up for sale in one of the hacker forums. Name, surname, father’s name, national number,\r\nbirth certificate number, date of birth, tracking code, date of sending, landline phone number and mobile phone\r\nnumber. The data was provided to Leakfa by a source who asked to be referred to as “DeathAngle”.\r\nLeak date: April 5, 1400\r\nAffected accounts: 5,394\r\nIranian information leak tracking system\r\nCopyright © 2024 All rights reserved.\r\nSource: https://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nhttps://cybershafarat.com/2024/09/04/major-ir-leaks/\r\nPage 21 of 21",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://cybershafarat.com/2024/09/04/major-ir-leaks/"
	],
	"report_names": [
		"major-ir-leaks"
	],
	"threat_actors": [
		{
			"id": "99c72af2-9b8a-412d-840b-09a9d54dec81",
			"created_at": "2024-09-20T02:00:04.583095Z",
			"updated_at": "2026-04-10T02:00:03.699949Z",
			"deleted_at": null,
			"main_name": "IRLeaks",
			"aliases": [],
			"source_name": "MISPGALAXY:IRLeaks",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434179,
	"ts_updated_at": 1775826777,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/da61407f4aff22e33cb5919cca6a15653b8255a1.pdf",
		"text": "https://archive.orkl.eu/da61407f4aff22e33cb5919cca6a15653b8255a1.txt",
		"img": "https://archive.orkl.eu/da61407f4aff22e33cb5919cca6a15653b8255a1.jpg"
	}
}