Leakbase, a notorious user at BreachForum, has allegedly added the database of the popular gaming website Gamekaking.com to the hacker’s forum.
According to the post, Leakbase claims that the database contains 19 million rows of data, which includes user IDs, transaction IDs, email addresses, phone numbers, and other sensitive information.
The database is also available for download in .SQL format and has a file size of 5.5 GB (compressed to 500 MB).
Gamekaking.com offers a variety of online games, including multiplayer games that require users to create accounts and provide personal information.
Gamekaking data breach explained
If the claims by Leakbase regarding the Gamekaking data breach are true, then the exposed database can be a serious concern for the website’s users, as their personal information can be easily accessed by hackers.
Moreover, the information in the database could be used for various malicious activities, including identity theft, phishing attacks, and spamming.
Though the data breach is yet to be confirmed, there can be multiple ways Leakbase could have obtained the database.
Leakbase is a well-known hacker and has a history of selling databases and other sensitive information on the dark web. The fact that they are offering the Gamekaking.com database for free suggests that they may be trying to build their reputation or attract more customers.
Gamekaking data breach: More damage to come
In addition to the Gamekaking.com database, Leakbase is also offering access to CRM panels and selling SQL dumps and access to servers, including Cpanel, PhpMyAdm, Plesk, Magneto, CRM JIRA, and Confluence.
This indicates that they may have access to a large amount of sensitive information and actively seek to profit from it.
The leak of the Gamekaking.com database, if true, highlights the importance of maintaining strong security measures when storing personal information.
Websites that collect and store user data must protect that information from cyberattacks and data breaches. This includes using strong encryption methods, regularly updating software and systems, and conducting regular security audits.
NOTE: The above information is provided for informational purposes only and is yet to be verified by The Cyber Express. Any reliance on such information is at the user’s own risk. For any queries related to the content, please contact us at [email protected]
The Cyber Express will not be liable for any errors or omissions in the information provided, or for any actions taken by users based on such information until it is verified.
Leave a Reply