02-06-25, 11:40 PM
DATA TYPE: Privileged MySQL User Dump
FORMAT: .json (structured export from mysql.user table)
SOURCE: Internal access to French OPCO/OPCAEP-related infrastructure
STATUS: Freshly exploited – credentials confirmed valid (Q2 2025)
LEAK STATUS: PRIVATE – NOT PUBLICLY LEAKED
SYSTEM: MariaDB / MySQL – Localhost Access – Full privilege scope
USER ACCOUNTS INCLUDED
- root@localhost – full administrative access (WITH GRANT OPTION)
- opcaappli@localhost – privileged application account
- mysql@localhost – system-level MySQL internal user
- mariadb.sys@localhost – locked system user
HASH TYPE: SHA1 (MySQL's mysql_native_password format)
FORMAT SAMPLE (JSON SNIPPET)
{
"user": "opcaappli",
"host": "localhost",
"plugin": "mysql_native_password",
"authentication_string": "*C814DB13F1D6AB4B76690....",
"access": 549755812863,
"password_last_changed": 1638368951
}
HASH PREVIEW (Partial)
root → *40E2E24C5606A6B3F7D0B99E...
opcaappli → *C814DB13F1D6AB4B766906FB...
Authentication plugin: mysql_native_password
Secondary method: unix_socket (enabled on some accounts)
TIMESTAMP DETAILS
- Dump created: November 2021
- Last password change: Nov 26, 2021
- Credentials confirmed active as of May 2025
NOTES
- Host set to localhost: indicates internal access
- opcaappli likely tied to ERP or HR systems (production use)
- Structured JSON format: easy integration for tooling and testing
PRICING
- Starting bid: $1,200
- Buy It Now (BIN): $3,500
- Escrow available | Trusted middlemen accepted
RULES
- Private Sale – NO LEAK
- Proof available for serious buyers (metadata, redacted screenshots, hash validation)
- No resell, no mirror, no leak
CONTACT
- DM Telegram: @Jeremydurvier
- English/French OK
- Listing Ref: OPCOEP-MYSQL-112021-JSON-PRIV8
FORMAT: .json (structured export from mysql.user table)
SOURCE: Internal access to French OPCO/OPCAEP-related infrastructure
STATUS: Freshly exploited – credentials confirmed valid (Q2 2025)
LEAK STATUS: PRIVATE – NOT PUBLICLY LEAKED
SYSTEM: MariaDB / MySQL – Localhost Access – Full privilege scope
USER ACCOUNTS INCLUDED
- root@localhost – full administrative access (WITH GRANT OPTION)
- opcaappli@localhost – privileged application account
- mysql@localhost – system-level MySQL internal user
- mariadb.sys@localhost – locked system user
HASH TYPE: SHA1 (MySQL's mysql_native_password format)
FORMAT SAMPLE (JSON SNIPPET)
{
"user": "opcaappli",
"host": "localhost",
"plugin": "mysql_native_password",
"authentication_string": "*C814DB13F1D6AB4B76690....",
"access": 549755812863,
"password_last_changed": 1638368951
}
HASH PREVIEW (Partial)
root → *40E2E24C5606A6B3F7D0B99E...
opcaappli → *C814DB13F1D6AB4B766906FB...
Authentication plugin: mysql_native_password
Secondary method: unix_socket (enabled on some accounts)
TIMESTAMP DETAILS
- Dump created: November 2021
- Last password change: Nov 26, 2021
- Credentials confirmed active as of May 2025
NOTES
- Host set to localhost: indicates internal access
- opcaappli likely tied to ERP or HR systems (production use)
- Structured JSON format: easy integration for tooling and testing
PRICING
- Starting bid: $1,200
- Buy It Now (BIN): $3,500
- Escrow available | Trusted middlemen accepted
RULES
- Private Sale – NO LEAK
- Proof available for serious buyers (metadata, redacted screenshots, hash validation)
- No resell, no mirror, no leak
CONTACT
- DM Telegram: @Jeremydurvier
- English/French OK
- Listing Ref: OPCOEP-MYSQL-112021-JSON-PRIV8