DATABASE [DB LEAK] APOLLO.COM.PH — 19,275 Records | Accounts / Emails / Password Hashes
by privilege - 17-09-25, 02:54 AM
#1
Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.

Hidden Content
You must register or login to view this content.
Reply
#2
well thx
Ban reason: leeching (Permanent)
Reply
#3
thanks for the dump
Reply
#4
thanks
Reply
#5
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
Ban reason: leeching (Permanent)
Reply
#6
let me peek 😅
Reply
#7
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.

thanks man!
Reply
#8
thanks
Reply
#9
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
Reply
#10
Thanks for the dump
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)