DATABASE [DB LEAK] APOLLO.COM.PH — 19,275 Records | Accounts / Emails / Password Hashes
by privilege - 17-09-25, 02:54 AM
#31
(17-09-25, 02:54 AM)特权 Wrote: 最新转储暴露了来自APOLLO.COM.PH的19,275 条用户记录,APOLLO.COM.PH 是一个菲律宾的公司帐户目录和客户管理系统。数据集包含帐户元数据、联系电子邮件、哈希密码、用户名、联系电话、创建和更新时间戳以及足以映射跨多个公司集团的内部角色和联系点的管理标志。列: ID、版本、帐户已过期、帐户已锁定、出生日期、客户 ID、联系电话、创建者 ID、创建日期、电子邮件、已启用、名字、姓氏、上次更新、中间名、密码(哈希)、密码已过期、更新者 ID、用户名、Tin关于 APOLLO.COM.PH:Apollo似乎是物流、货运和海关合作伙伴使用的公司用户/帐户注册表(许多行引用公司联系电子邮件和角色帐户)。导出的字段包括:账户状态标记(已过期/已锁定)、电子邮件地址(有时每条记录包含多个)、密码哈希值、用户名、联系电话以及创建和最后更新的时间戳。其中有多个条目涉及企业集团和服务账户。此次泄露揭示了个人和组织账户映射,可用于定向网络钓鱼、账户接管尝试以及针对业务流程的侦察。

(17-09-25, 02:54 AM)特权 Wrote: 最新转储暴露了来自APOLLO.COM.PH的19,275 条用户记录,APOLLO.COM.PH 是一个菲律宾的公司帐户目录和客户管理系统。数据集包含帐户元数据、联系电子邮件、哈希密码、用户名、联系电话、创建和更新时间戳以及足以映射跨多个公司集团的内部角色和联系点的管理标志。列: ID、版本、帐户已过期、帐户已锁定、出生日期、客户 ID、联系电话、创建者 ID、创建日期、电子邮件、已启用、名字、姓氏、上次更新、中间名、密码(哈希)、密码已过期、更新者 ID、用户名、Tin关于 APOLLO.COM.PH:Apollo似乎是物流、货运和海关合作伙伴使用的公司用户/帐户注册表(许多行引用公司联系电子邮件和角色帐户)。导出的字段包括:账户状态标记(已过期/已锁定)、电子邮件地址(有时每条记录包含多个)、密码哈希值、用户名、联系电话以及创建和最后更新的时间戳。其中有多个条目涉及企业集团和服务账户。此次泄露揭示了个人和组织账户映射,可用于定向网络钓鱼、账户接管尝试以及针对业务流程的侦察。
Reply
#32
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
Reply
#33
thanks
Reply
#34
thanks
Reply
#35
thanks brother
Ban reason: leeching (Permanent)
Reply
#36
thanks for the dump
Reply
#37
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.

wowwww
Reply
#38
thanks for the dump
Reply
#39
thanks
Reply
#40
thanks
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)