HomeNewsBreachesAPIAboutAccount
cit0day.in-2020

Cit0day Breach

Nov 4, 2020

195,411,793 rows

Added on Dec 1, 2024
Data Found in the Breach
Password
Email

Search the Leak

Email

What happened in the Cit0day Breach?

DataBreach.com Team · November 30th 2024, 7:00 pm EST

In November 2020, a 120 GB archive nick-named Cit0day—containing credential dumps from more than 23,000 hacked websites—was posted on several Russian-language hacking forums and mirrored on RaidForums within hours. The cache, split into 23,618 compressed files, was described as a full backup of Cit0day.in, a now-defunct credential-selling portal that had reportedly been seized by U.S. law-enforcement two months earlier. Researchers who grabbed the torrent discovered roughly 195 million unique email-and-password pairs amassed over a decade.

Security analysts noted the trove blended well-known breaches with hundreds of previously unreported compromises; in many cases the files still held clear-text passwords or unsalted MD5 and SHA-1 hashes. Preliminary reviews by Authlogics and Have I Been Pwned confirmed a high hit-rate when testing random samples, indicating the data was largely authentic even though each individual breach remains formally “unverified.”

Cit0day’s operators had run a subscription model—customers paid about US $1.50 per day for on-demand credential look-ups—so the public leak effectively made a commercial underground service free, dramatically lowering the barrier for credential-stuffing and account-takeover attacks. Threat-intel firm Flare reported that 57 percent of the leaked logins used popular free-mail domains such as Gmail, Hotmail and Yahoo, making them attractive targets for phishing and business-email compromise.

Created and maintained by
For media inquiries, contact us at contact@databreach.com