«

疑似微博4.7亿微博用户信息泄露

时间:2022-7-7 20:21     作者:admin     分类: 业界新闻


泄露详情

稍早时候,笔者收到某国外论坛新贴监测邮件通知,发现一篇名为:China Weibo.com data 470 million 的帖子,其中详细描述了数据泄露的具体数量,同时包括数据库名,表名和字段,总大小约1.83GB,在笔者发文这段时间,帖子已经被删除了。下面是从某通讯软件频道获得截图:

帖子详细情况如下:

Name of the requested database(s): weibo.com

Date of data breach: 2020-5 Amount of compromised users:

account.json - 475,232,651 count

userinfo.json - 431,685,225 count

code: 26970 files, 4966 folder 1.83GB

data from

mysql -hmysql -hmysql.data.sina.com.cn -usuda -p"XcuOX+&elyi#HIyPmvzLkli^Kx7f" -P4045 mysql -hmysql -h10.210.208.47 -usuda -p'wlz*od1ps"-P3306

u can proof it urself my bro.

columns:

DROP TABLE IF EXISTS account;

/*140101 SET @saved_cs_client = @@character_set_client */;

/*140101 SET character_set_client utf8 */

CREATE TABLE 'account (

uid int(11) NOT NULL auto_increment,

nick varchar(31) character set latin1 collate latin1_bin NOT NULL default' username varchar(63) character set latin1 collate latin1_bin NOT NULL default password varchar(63) character set latin1 collate latin1_ bin NOT NULL default' mail varchar(127) character set latin1 collate latin1 _bin NOT NULL default group tinyint(4) NOT NULL default '0',

avatar varchar(255) character set latin1 collate latin1_bin NOT NULL default" 'session' varchar(32) NOT NULL default

ip' varchar(15) NOT NULL default

flag' tinyint(4) NOT NULL default 1

Itime timestamp NOT NULL default CURRENT_TIMESTAMP on update CURRENT_TIMESTAMP NetiD int(11) unsigned NOT NULL default O'

NickiD* int(11) unsigned NOT NULL default '0

PRIMARY KEY (uid),

UNIQUE KEY 'mail_name (mail ,username),

KEY Itime' (Itime),

KEY mail (mair)

) ENGINE=MyISAM AUTO_INCREMENT=14665370 DEFAULT CHARSET=latin1;

DROP TABLE IF EXISTS user_info;

/*40101 SET @saved_cs_client = @ocharacter_set_client */;

/*!40101 SET character_set_client utf8 */;

这次的数据泄露和2020年的微博泄露的数据,看起来是不一样的(如果为真的话 )
PS:对这些所谓的泄露,请持怀疑态度!同时仅作为威胁情报参考。

标签: data-leak

版权所有:Mrxn's Blog
文章标题:疑似微博4.7亿微博用户信息泄露
除非注明,文章均为 Mrxn's Blog 原创,请勿用于任何商业用途,转载请注明作者和出处 Mrxn's Blog

扫描二维码,在手机上阅读

推荐阅读: