Exploit.In
Overview
On October 13, 2016, Exploit.In was breached. Once the breach was discovered and verified, it was added to our database on May 6, 2017.
Find out if you were involved in this breach
We’ll help you quickly see if your email address was exposed in this breach, and understand what to do next.What to do for this breach
We recommend you take these steps to keep your personal info safe and protect your digital identity.
- Change your password
Make this password unique and different from any others you use. A good strategy to follow is to combine two or more unrelated words to create an entire passphrase, and include numbers and symbols.
- Update other logins using the same password
Reusing passwords turns a single data breach into many. Now that this password is out there, hackers could use it to get in to other accounts.
- Use an email mask
Giving out your real email address makes it easier for hackers or trackers to find your passwords or target you online. A service like Firefox Relay hides your real email address while forwarding emails to your real inbox.
Try Firefox Relay- Use unique, strong passwords for every account
Password reuse puts all your accounts at risk. This means that if one password gets exposed, hackers have the keys to many accounts.
- Store passwords in a safe place
Put your login details in a secure place only you can access, such as a password manager. This also makes it easy to keep track of all your different passwords.
- Be cautious about giving out personal information
Don’t hand out personal data if you don’t have to. If you are asked to enter or give out your email address, ZIP code, or phone number, you can say no.
- Update software and apps regularly
Updating your smartphone apps, browsers, and operating systems makes your devices more secure. These updates fix bugs, software vulnerabilities, and security problems.
What is a data aggregator?
Data aggregators, or data brokers, collect information from public records and buy it from other companies. They compile this data to sell it to companies for marketing purposes. Victims of these breaches are less likely to experience financial fraud, but hackers could use this data to impersonate or profile them.
Why did it take so long to report this breach?
It can sometimes take months or years for credentials exposed in a data breach to appear on the dark web. Breaches get added to our database as soon as they have been discovered and verified.