Posts: 10
Threads: 4
Joined: Oct 2024
01-30-2025, 10:44 PM
(This post was last modified: 02-04-2025, 10:32 PM by octagon.)
Earlier this month, we breached Grubhub and exported ~ 70 million lines of user information.
We are now listing the data for sale publicly. It includes:
- 66,000,000+ email addresses
- 22,000,000+ phone numbers
- 17,000,000+ passwords
The passwords are primarily hashed in SHA1.
2,000 line sample (full data dates up until 2025): https://biteblob.com/Information/i14dseG...amples.zip
Additional 1,500 line sample: https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt
Please note that the above samples do not contain every database, there are others with more user information. Further samples will only be provided to serious buyers upon request.
Offers start at $100,000, and the data will only be sold once. Do not reach out to us if you plan to offer any less.
Contact us on Session: 053875dd8274b0164ef85b5428bde4ac858e37dddceb2ce1c4edb70160986cc92a
Or send a DM on site
Posts: 10
Threads: 4
Joined: Oct 2024
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what
Here is 2,000 lines from two of the databases, one being some basic user information and the other being passwords.
https://biteblob.com/Information/i14dseG...amples.zip
Posts: 19
Threads: 1
Joined: Mar 2024

(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what
>sample updated to 1k lines
>run hashcat to check if remotely hq
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280
worth 100k i think, not sure though
Posts: 20
Threads: 2
Joined: Nov 2024
who the fuck would pay 100K+ for this shit
Posts: 10
Threads: 4
Joined: Oct 2024
(01-31-2025, 11:58 PM)IntelBroker Wrote: (01-31-2025, 10:18 PM)kebabremover Wrote: (01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what
>sample updated to 1k lines
>run hashcat to check if remotely hq
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280
worth 100k i think, not sure though i would pay max 40K for this data for 70mil lines
40K for 70 million US customers? In my honest opinion, super far off, especially considering what i’ve sold in the past to people who are serious and know how to use the data. Anyways, it won’t be sold for under 6 figures regardless, so what you would pay for it doesn’t really matter to me.
Posts: 10
Threads: 4
Joined: Oct 2024
(01-31-2025, 10:18 PM)kebabremover Wrote: (01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what
>sample updated to 1k lines
>run hashcat to check if remotely hq
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280
worth 100k i think, not sure though
Can provide further samples if need be, already cracked 500K+ with hashcat.
Posts: 19
Threads: 1
Joined: Mar 2024

02-01-2025, 12:30 AM
(This post was last modified: 02-01-2025, 01:00 AM by retard.)
(02-01-2025, 12:10 AM)octagon Wrote: (01-31-2025, 10:18 PM)kebabremover Wrote: (01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what
>sample updated to 1k lines
>run hashcat to check if remotely hq
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280
worth 100k i think, not sure though
Can provide further samples if need be, already cracked 500K+ with hashcat.
you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.
have a staff member verify a 100k sample size
Posts: 10
Threads: 4
Joined: Oct 2024
(02-01-2025, 12:30 AM)kebabremover Wrote: (02-01-2025, 12:10 AM)octagon Wrote: (01-31-2025, 10:18 PM)kebabremover Wrote: (01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what
>sample updated to 1k lines
>run hashcat to check if remotely hq
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280
worth 100k i think, not sure though
Can provide further samples if need be, already cracked 500K+ with hashcat.
you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.
have a staff member verify a 100k sample size
Here is another 1.5K lines, update me with what you find. Unsure about the problem with the others.
https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt
Posts: 19
Threads: 1
Joined: Mar 2024

(02-01-2025, 12:44 AM)octagon Wrote: (02-01-2025, 12:30 AM)kebabremover Wrote: (02-01-2025, 12:10 AM)octagon Wrote: (01-31-2025, 10:18 PM)kebabremover Wrote: (01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what
>sample updated to 1k lines
>run hashcat to check if remotely hq
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280
worth 100k i think, not sure though
Can provide further samples if need be, already cracked 500K+ with hashcat.
you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.
have a staff member verify a 100k sample size
Here is another 1.5K lines, update me with what you find. Unsure about the problem with the others.
https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt
most emails not in any breaches ever despite it being US based, yet they are real and exist. as hq as is gets.
try to figure out why first simple was like that, only difference im noticing is creation date, other than that its extremely legit and hq. would be shame if only 10% of hashes are crackable.
GLWS
Posts: 10
Threads: 4
Joined: Oct 2024
(02-01-2025, 01:01 AM)kebabremover Wrote: (02-01-2025, 12:44 AM)octagon Wrote: (02-01-2025, 12:30 AM)kebabremover Wrote: (02-01-2025, 12:10 AM)octagon Wrote: (01-31-2025, 10:18 PM)kebabremover Wrote: >sample updated to 1k lines
>run hashcat to check if remotely hq
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280
worth 100k i think, not sure though
Can provide further samples if need be, already cracked 500K+ with hashcat.
you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.
have a staff member verify a 100k sample size
Here is another 1.5K lines, update me with what you find. Unsure about the problem with the others.
https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt
most emails not in any breaches ever despite it being US based, yet they are real and exist. as hq as is gets.
try to figure out why first simple was like that, only difference im noticing is creation date, other than that its extremely legit and hq. would be shame if only 10% of hashes are crackable.
GLWS
Thank you very much for your insight.
|