V.I.P
Posts
40
Threads
40
Joined
Sep 2025
2 Months
Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.
Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin
About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
Hidden Content
You must register or login to view this content.
Banned
Posts
100
Threads
0
Joined
Aug 2025
Reputation
3 Months
well thx
Ban reason: leeching (Permanent)
DarkForums Members
Posts
20
Threads
0
Joined
Nov 2024
1 Year
DarkForums Members
Posts
98
Threads
0
Joined
Aug 2025
4 Months
Banned
Posts
120
Threads
0
Joined
Sep 2025
Reputation
2 Months
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.
Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin
About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
Ban reason: leeching (Permanent)
DarkForums Members
Posts
14
Threads
4
Joined
Sep 2025
2 Months
DarkForums Members
Posts
22
Threads
0
Joined
Sep 2025
2 Months
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.
Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin
About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
thanks man!
DarkForums Members
Posts
100
Threads
0
Joined
Aug 2025
4 Months
DarkForums Members
Posts
9
Threads
0
Joined
Sep 2025
2 Months
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.
Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin
About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
DarkForums Members
Posts
5
Threads
0
Joined
May 2025
6 Months
|