[Syrotech LEAK] Database leak employee credentials, server credentials, and more.
by Krypt0n - 01-01-2024, 09:01 AM
#11
WWwoow thank you
Reply
#12
Database - Leaks, Download!
Reply
#13
Hello all

Hello all
Reply
#14
goood
Reply
#15
(01-01-2024, 09:01 AM)Krypt0n Wrote:
Company Details
"Elevating Security, Empowering Networks."

Syrotech is said to be a security and tech firm that offers tech solutions to internet, hardware, cameras, and other IoT devices.
Syrotech deals with creating industrial systems as well such as gates.


[Image: Syrotech-Logo-white.png]



Data breach
The compromised data is from a server they used for their employees logging into to view tickets and other company details, along side an administration panel.

In the data breach there are multiple backups of the mysql database including financial information, employee information such as names, emails, credentials, password hashes, and much more.



Proof Of Breach

 
Code:
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| USER_LOGIN_ID | FROM_DATE               | THRU_DATE               | CURRENT_PASSWORD                              | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| admin         | 2021-12-11 11:04:42.000 | 2022-03-21 11:04:42.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 |
| admin         | 2022-02-04 11:36:04.000 | 2022-05-15 11:36:04.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 |
| admin         | 2022-06-28 12:53:16.000 | 2023-06-28 12:53:16.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 |
| APARNA        | 2022-02-26 10:09:27.000 | 2022-04-27 10:09:27.000 | {SHA}284ae5a0fab86db3772befef7d84d7f1ae40102a | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 |
| ARASAN        | 2022-01-29 12:12:38.000 | 2022-03-30 12:12:38.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 |
| ARASAN        | 2022-04-09 10:29:22.000 | 2022-06-08 10:29:22.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 |
| ARASAN        | 2022-04-11 10:13:24.000 | 2023-04-11 10:13:24.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 |
| ARULKUMAR     | 2022-03-04 03:56:46.000 | 2022-05-03 03:56:46.000 | {SHA}aa99b6ae37a33b6c7abc4d3279c0aefcd9e8408f | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 |
| ASHIKJNATH    | 2022-04-23 08:56:32.000 | 2023-04-23 08:56:32.000 | {SHA}33282c421f644d8289c7b2277248871e98485cd0 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 |
| cfactory      | 2022-02-11 10:14:49.000 | 2022-05-22 10:14:49.000 | {SHA}847715f8d476e5850c3bbbbef18429b3ffa175e6 | 2022-02-11 10:14:49.897 | 2022-02-11 10:14:49.896 | 2022-02-11 10:14:49.897 | 2022-02-11

+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CARD_TYPE           | ORGANIZATION_PARTY_ID | GL_ACCOUNT_ID | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CCT_AMERICANEXPRESS | Company               | 122100        | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 |
| CCT_DINERSCLUB      | Company               | 122100        | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 |

+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| PAYMENT_METHOD_ID | CARD_TYPE           | CARD_NUMBER                                  | VALID_FROM_DATE | EXPIRE_DATE | ISSUE_NUMBER | COMPANY_NAME_ON_CARD | TITLE_ON_CARD | FIRST_NAME_ON_CARD | MIDDLE_NAME_ON_CARD | LAST_NAME_ON_CARD | SUFFIX_ON_CARD | CONTACT_MECH_ID | CONSECUTIVE_FAILED_AUTHS | LAST_FAILED_AUTH_DATE | CONSECUTIVE_FAILED_NSF | LAST_FAILED_NSF_DATE | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| 9015              | CCT_VISA            | rIKUirmFyQwNTMPa6TAMWOcmKp8oDEjgLWzH+YE+/2s= | NULL            | 02/2100     | NULL         | NULL                 | NULL          | DEMO               | NULL                | CUSTOMER          | NULL           | 9015            |                     NULL | NULL                  |                   NULL | NULL                 | 2023-10-26 12:22:54.148 | 2023-10-26 12:22:51.131 | 2021-10-20 14:44:55.120 | 2021-10-20 14:44:53.353 |
| AMEX_01

I am selling the entire breach as well as the source code to their employment login server and access to said server for 1.22XMR PM me if you are interested.

PWNED BY KRYPT0N
nice db leak
Reply
#16
thanks or sharing
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  CSV www.boksha.com leak qwan 0 494 11-22-2024, 10:05 AM
Last Post: qwan
  CSV 24 Database company FREE LEAKS CDN PRIVATE LockBit 3.0 0 397 11-20-2024, 11:30 PM
Last Post: LockBit 3.0
  anyone have the internet archive leak justcrackitz 0 196 11-20-2024, 02:53 AM
Last Post: justcrackitz
  CSV iShopping.pk Database qwan 6 9,695 11-15-2024, 09:06 PM
Last Post: lucid

Forum Jump:


Users browsing this thread: 1 Guest(s)