DarkForums Members
Posts
2
Threads
0
Joined
Aug 2025
3 Months
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.
Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin
About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
This looks like a big leak. Props to you.
DarkForums Members
Posts
16
Threads
0
Joined
Sep 2025
2 Months
DarkForums Members
Posts
8
Threads
0
Joined
Aug 2025
3 Months
DarkForums Members
Posts
28
Threads
0
Joined
Sep 2025
2 Months
DarkForums Members
Posts
10
Threads
0
Joined
Sep 2025
2 Months
DarkForums Members
Posts
14
Threads
0
Joined
Aug 2025
3 Months
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.
Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin
About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes. Thanks
DarkForums Members
Posts
31
Threads
6
Joined
Aug 2025
3 Months
(17-09-25, 02:54 AM)privilege Wrote: Fresh dump exposing 19,275 user records from APOLLO.COM.PH, a Philippines-based corporate account directory and client management system.
The dataset contains account metadata, contact emails, hashed passwords, usernames, contact numbers, creation and update timestamps, and administrative flags enough to map internal roles and contact points across multiple corporate groups.
Columns:
ID, Version, Account Expired, Account Locked, Birth Date, Client ID, Contact No, Created By ID, Date Created, Email, Enabled, First Name, Last Name, Last Updated, Middle Name, Password (hashes), Password Expired, Updated By ID, Username, Tin
About APOLLO.COM.PH:
Apollo appears to be a corporate user/account registry used by logistics, cargo and customs partners (many rows reference corporate contact emails and role accounts). The exported fields include: account status flags (expired/locked), email addresses (sometimes multiple per record), password hashes, usernames, contact numbers, and timestamps for creation and last update. Several entries reference corporate groups and service accounts. This leak reveals both individual and organizational account mappings that can be used for targeted phishing, account takeover attempts, and reconnaissance against business processes.
thanks bro wll check
DarkForums Members
Posts
9
Threads
0
Joined
Aug 2025
3 Months
DarkForums Members
Posts
89
Threads
0
Joined
Oct 2024
1 Year
DarkForums Members
Posts
32
Threads
0
Joined
Jul 2025
4 Months
|