Yesterday, 02:11 PM
Fresh dump exposing 139,123 user records from HEYFOOD.AFRICA, a food delivery and marketplace platform widely used across Africa.
The leaked dataset contains consumer, vendor, and driver information, including personally identifiable data, encrypted credentials, referral details, and account status information.
Columns:
ID, Name, First Name, Last Name, Phone, Email, Date Of Birth, Password (bcrypt), Join Date, Deactivated, Is Super Admin, Super Admin Role ID, Food App Tokens, Verified, Funnel Notification Count, Funnel Notification Last Sent, Is Vendor, Is Consumer, Is Driver, City ID, Priority Order Count, Reward Stars, Reward Stars Log, Is Guest, Guest ID, Referral Code, Referral Link, Referral Payments Disabled, Brought By Vendor ID, Search Text, Dob
About HEYFOOD.AFRICA:
HeyFood is a digital food ordering and delivery application connecting restaurants, customers, and drivers. The leaked database includes full names, phone numbers, email addresses, dates of birth, hashed passwords (bcrypt), account creation timestamps, vendor/consumer/driver roles, referral codes, reward stars, and guest identifiers. This represents a large-scale compromise of more than 139k accounts.
The leaked dataset contains consumer, vendor, and driver information, including personally identifiable data, encrypted credentials, referral details, and account status information.
Columns:
ID, Name, First Name, Last Name, Phone, Email, Date Of Birth, Password (bcrypt), Join Date, Deactivated, Is Super Admin, Super Admin Role ID, Food App Tokens, Verified, Funnel Notification Count, Funnel Notification Last Sent, Is Vendor, Is Consumer, Is Driver, City ID, Priority Order Count, Reward Stars, Reward Stars Log, Is Guest, Guest ID, Referral Code, Referral Link, Referral Payments Disabled, Brought By Vendor ID, Search Text, Dob
About HEYFOOD.AFRICA:
HeyFood is a digital food ordering and delivery application connecting restaurants, customers, and drivers. The leaked database includes full names, phone numbers, email addresses, dates of birth, hashed passwords (bcrypt), account creation timestamps, vendor/consumer/driver roles, referral codes, reward stars, and guest identifiers. This represents a large-scale compromise of more than 139k accounts.