DATABASE [DB LEAK] APOLLO.COM.PH — 19,275 Records | Accounts / Emails / Password Hashes
by privilege - 17-09-25, 02:54 AM
#21
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.


This looks like a big leak.  Props to you.
Reply
#22
thankss
Reply
#23
thanks
Reply
#24
lets see it, thanks bro
Reply
#25
letsee ty
Reply
#26
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
Thanks
Reply
#27
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.

Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin

About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.

thanks bro wll check
Reply
#28
Thanks for the dump
Reply
#29
is this valid?
Reply
#30
interesting, thanks
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)