Grubhub 70,000,000+ US lines (incl. passwords) [JAN 2025]
by octagon - Thursday January 30, 2025 at 10:44 PM
#1
Earlier this month, we breached Grubhub and exported ~ 70 million lines of user information.

We are now listing the data for sale publicly. It includes:
- 66,000,000+ email addresses
- 22,000,000+ phone numbers
- 17,000,000+ passwords

The passwords are primarily hashed in SHA1.

2,000 line sample (full data dates up until 2025): https://biteblob.com/Information/i14dseG...amples.zip
Additional 1,500 line sample: https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt

Please note that the above samples do not contain every database, there are others with more user information. Further samples will only be provided to serious buyers upon request.

Offers start at $100,000, and the data will only be sold once. Do not reach out to us if you plan to offer any less.

Contact us on Session: 053875dd8274b0164ef85b5428bde4ac858e37dddceb2ce1c4edb70160986cc92a
Or send a DM on site
Reply
#2
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what

Here is 2,000 lines from two of the databases, one being some basic user information and the other being passwords.

https://biteblob.com/Information/i14dseG...amples.zip
Reply
#3
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what


>sample updated to 1k lines
>run hashcat to check if remotely hq 
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280

worth 100k i think, not sure though
Reply
#4
who the fuck would pay 100K+ for this shit
Reply
#5
(01-31-2025, 11:58 PM)IntelBroker Wrote:
(01-31-2025, 10:18 PM)kebabremover Wrote:
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what


>sample updated to 1k lines
>run hashcat to check if remotely hq 
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280

worth 100k i think, not sure though
i would pay max 40K for this data for 70mil lines

40K for 70 million US customers? In my honest opinion, super far off, especially considering what i’ve sold in the past to people who are serious and know how to use the data. Anyways, it won’t be sold for under 6 figures regardless, so what you would pay for it doesn’t really matter to me.
Reply
#6
(01-31-2025, 10:18 PM)kebabremover Wrote:
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what


>sample updated to 1k lines
>run hashcat to check if remotely hq 
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280

worth 100k i think, not sure though

Can provide further samples if need be, already cracked 500K+ with hashcat.
Reply
#7
(02-01-2025, 12:10 AM)octagon Wrote:
(01-31-2025, 10:18 PM)kebabremover Wrote:
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what


>sample updated to 1k lines
>run hashcat to check if remotely hq 
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280

worth 100k i think, not sure though

Can provide further samples if need be, already cracked 500K+ with hashcat.

you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.

have a staff member verify a 100k sample size
Reply
#8
(02-01-2025, 12:30 AM)kebabremover Wrote:
(02-01-2025, 12:10 AM)octagon Wrote:
(01-31-2025, 10:18 PM)kebabremover Wrote:
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what


>sample updated to 1k lines
>run hashcat to check if remotely hq 
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280

worth 100k i think, not sure though

Can provide further samples if need be, already cracked 500K+ with hashcat.

you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.

have a staff member verify a 100k sample size

Here is another 1.5K lines, update me with what you find. Unsure about the problem with the others.
https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt
Reply
#9
(02-01-2025, 12:44 AM)octagon Wrote:
(02-01-2025, 12:30 AM)kebabremover Wrote:
(02-01-2025, 12:10 AM)octagon Wrote:
(01-31-2025, 10:18 PM)kebabremover Wrote:
(01-30-2025, 10:45 PM)IntelBroker Wrote: > claims over 70million users
> shares 10 lines for a sample
nigga what


>sample updated to 1k lines
>run hashcat to check if remotely hq 
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280

worth 100k i think, not sure though

Can provide further samples if need be, already cracked 500K+ with hashcat.

you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.

have a staff member verify a 100k sample size

Here is another 1.5K lines, update me with what you find. Unsure about the problem with the others.
https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt


most emails not in any breaches ever despite it being US based, yet they are real and exist. as hq as is gets.
try to figure out why first simple was like that, only difference im noticing is creation date, other than that its extremely legit and hq. would be shame if only 10% of hashes are crackable.

GLWS
Reply
#10
(02-01-2025, 01:01 AM)kebabremover Wrote:
(02-01-2025, 12:44 AM)octagon Wrote:
(02-01-2025, 12:30 AM)kebabremover Wrote:
(02-01-2025, 12:10 AM)octagon Wrote:
(01-31-2025, 10:18 PM)kebabremover Wrote: >sample updated to 1k lines
>run hashcat to check if remotely hq 
3 cracked hashes instead of ~700 all in same pattern
57275
57277
57280

worth 100k i think, not sure though

Can provide further samples if need be, already cracked 500K+ with hashcat.

you should, because as it stands right now it looks like the hashes are not passwords, this is relatively a weak hash,in no world should i be getting only 3 cracked hashes when running it against 3b passwords.

have a staff member verify a 100k sample size

Here is another 1.5K lines, update me with what you find. Unsure about the problem with the others.
https://biteblob.com/Information/WwiV1RGTfRAQnL/3.txt


most emails not in any breaches ever despite it being US based, yet they are real and exist. as hq as is gets.
try to figure out why first simple was like that, only difference im noticing is creation date, other than that its extremely legit and hq. would be shame if only 10% of hashes are crackable.

GLWS

Thank you very much for your insight.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  SELLING My-Clic.fr Full Database 1.800.000 - France - Breach 22.07.2025 Satanic 0 226 47 minutes ago
Last Post: Satanic
  DATABASE SELLING KONECTA-GROUP.COM 69.000.000 LINES - LATIN AMERICA Satanic 3 2,998 47 minutes ago
Last Post: Satanic
  SELLING New Zealand Company Data +1M Lines r57 3 2,122 Yesterday, 01:15 PM
Last Post: Automation
  SELLING France Dating Site Oulfa.fr 644K 2025 Leak ErrorCODE1064 0 350 08-07-2025, 09:39 PM
Last Post: ErrorCODE1064
  SELLING SatuSehat Kotim Kabupaten - Patient Data + BPJS Exposed (2020-2025) bitElliot 0 87 08-07-2025, 05:40 AM
Last Post: bitElliot

Forum Jump:


 Users browsing this thread: 1 Guest(s)