Post

OSINT EP03: Leaked Credentials & Personal Data Investigation

OSINT tutorial on understanding, locating, and analyzing leaked personal data from public and underground breach sources.


✅ What is a Data Breach / Data Leak

A data breach or data leak refers to any incident where sensitive or private information is accessed, exposed, stolen, or publicly distributed without authorization.
Breaches usually occur through hacking or malware, while leaks often happen due to misconfiguration or human error.

Leaked databases can contain one or more of the following:

  • Account credentials – emails, usernames, passwords
  • Contact data – phone numbers, email IDs
  • Government identifiers – SSN, Aadhaar, Passport numbers
  • Financial records – debit/credit card details, bank data
  • Personal profiles – addresses, date of birth
  • Health information – medical history, prescriptions
  • Technical data – IP logs, device fingerprints
  • Corporate secrets – internal documents, source code, API keys

🐝 Types of Leaks

TypeMeaning
BreachData stolen directly through hacking activity
LeakAccidental public exposure due to misconfiguration
DumpPublic release of stolen or leaked data
Combo ListCompiled email:password credential lists
PasteSmall, partial data samples posted publicly
ScrapeMass data collected using APIs or automation
Insider LeakData exposed intentionally or accidentally by employees

☢️ How Data Leaks Happen

  • Exposed databases (MongoDB, Elastic, Firebase)
  • SQL Injection (SQLi) and Remote Code Execution (RCE)
  • Third-party service provider compromise
  • Open cloud storage (e.g., public S3 buckets)
  • Phishing emails and malware infections

𒎓 Famous Breaches in History

LeakYearRecordsData
Collection #12019773MEmails, passwords
Collection #2–52019845MEmails, passwords, IPs
Facebook2019533MPhones, names, locations
Yahoo2013–143BEmails, passwords
LinkedIn2012/16700MEmails, hashed passwords
MySpace2013360MEmails, hashed passwords
Adobe2013153MEncrypted passwords
Equifax2017147MSSN, DOB
RockYou200932MPlaintext passwords
Canva2019137MEmails, passwords
Twitter2022235MEmails, phones
Aadhaar (India)20181.1BAadhaar, addresses
Marriott2018500MPassport & travel data
Experian SA202024MID & employment
Dropbox201268MEmails, hashed passwords

Using leaked data to access private accounts or systems is illegal.
Law-enforcement agencies has hundreds of ways to track you if caught in serious case.


🔎 Where Leaked Data Is Found

Leaked databases are distributed on:

  • Telegram leak channels
  • Dark-web forums
  • GitHub repositories and paste sites
  • Breach marketplaces / search engines

Known search engines

Cloud hosted search engines are efficient but costly, you can also download the databases locally for forever with below requirements but remember leaked databases often contain malware. They should be opened only in isolated environments (VMware / VirtualBox).

  • High disk space
  • Torrent client
  • Agent Ransack (for searching inside large dumps)

Known public database indexes

If these indexes does not work, you can also search on google by including magnet:? in search term to find torrent files. examples:

  • "twitter 200m" "magnet:?"
  • facebook data leak "magnet:?" github

🦺 Initial Recon Workflow

  1. Start with HaveIBeenPwned or Leakpeak or Dehashed to check if the target data exists in breaches.
  2. Identify which databases contain relevant information.
  3. Download only necessary dumps for deeper investigation.
This post is licensed under CC BY 4.0 by the author.