Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
404 SELLING 🇲🇾 Sweetmag.my Breach — 44.7M SQL Records — Admin Credentials, Orders, Phones, Paym
STAFF TEAM
#1
Star 
🔥 Fresh drop from Malaysia's biggest online sportswear retailer Sweetmag.my — 10GB SQL leak with over 44,760,815 records. Contains admin panels, customer orders, phones, emails, hashed passwords, transaction logs, and more.
🗓️ Leak Date: June 20, 2025
📦 Size: 10GB SQL
📁 Records: 44.7M rows
🌍 Target: Malaysia (verified retail company breach)

📂 Leak Highlights:
  • 🛠️ Admin Data: Email addresses, usernames, password hashes, session data.
  • 👤 Customer Info: Full names, phone numbers, email addresses, and shipping locations.
  • 🛒 Orders: Product IDs, prices, descriptions, billing data, and payment method trails.
  • 📦 Inventory Tables: Stocked products, quantities, brand breakdowns.

🔍 Real Sample Excerpts:
  • Code:
    Admin:
    user_id: 2, email: amelia.natasha@sweetmag.com.my
    username: admin-amy, hash:
    Code:
    0a0fd99ac286c40ba332240bd4e44232b45cd7569ae193b03e2369b0fa6c5cb5
  • Code:
    Customer:
    entity_id: 198836, name: MUHAMAD ADIL HAFIZ BIN ISHAK
    phone: +601131360270, address: Kuala Selangor
  • Code:
    Order:
    entity_id: 68915, name: Nurul Asfahlina
    email: asfahlina@hotmail.com, phone: [not provided]
    address: Taman Saga Fasa 2, Alor Setar, Kedah, 05400
  • Code:
    Product:
    entity_id: 259306, price: 579.0000

📎 Sample available (200 lines) — signed by
Code:
@ICap0ne

🔗 Contact: https://t.me/lCap0ne
🔗 Vouches: https://t.me/+HH7eh4-mh1MzYWI8

Reply to this thread