ReBreached Forums
[Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Printable Version

+- ReBreached Forums (https://rebreached.vc)
+-- Forum: Leaks (https://rebreached.vc/Forum-Leaks)
+--- Forum: Database (https://rebreached.vc/Forum-Database)
+--- Thread: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. (/Thread-Syrotech-LEAK-Database-leak-employee-credentials-server-credentials-and-more)

Pages: 1 2


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - turkogi - 01-18-2024

WWwoow thank you


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - erww - 01-19-2024

Database - Leaks, Download!


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - claudia526 - 01-20-2024

Hello all

Hello all


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Nazurey - 02-29-2024

goood


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - mitu1234 - 02-29-2024

(01-01-2024, 09:01 AM)Krypt0n Wrote:
Company Details
"Elevating Security, Empowering Networks."

Syrotech is said to be a security and tech firm that offers tech solutions to internet, hardware, cameras, and other IoT devices.
Syrotech deals with creating industrial systems as well such as gates.


[Image: Syrotech-Logo-white.png]



Data breach
The compromised data is from a server they used for their employees logging into to view tickets and other company details, along side an administration panel.

In the data breach there are multiple backups of the mysql database including financial information, employee information such as names, emails, credentials, password hashes, and much more.



Proof Of Breach

 
Code:
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| USER_LOGIN_ID | FROM_DATE               | THRU_DATE               | CURRENT_PASSWORD                              | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| admin         | 2021-12-11 11:04:42.000 | 2022-03-21 11:04:42.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 |
| admin         | 2022-02-04 11:36:04.000 | 2022-05-15 11:36:04.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 |
| admin         | 2022-06-28 12:53:16.000 | 2023-06-28 12:53:16.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 |
| APARNA        | 2022-02-26 10:09:27.000 | 2022-04-27 10:09:27.000 | {SHA}284ae5a0fab86db3772befef7d84d7f1ae40102a | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 |
| ARASAN        | 2022-01-29 12:12:38.000 | 2022-03-30 12:12:38.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 |
| ARASAN        | 2022-04-09 10:29:22.000 | 2022-06-08 10:29:22.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 |
| ARASAN        | 2022-04-11 10:13:24.000 | 2023-04-11 10:13:24.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 |
| ARULKUMAR     | 2022-03-04 03:56:46.000 | 2022-05-03 03:56:46.000 | {SHA}aa99b6ae37a33b6c7abc4d3279c0aefcd9e8408f | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 |
| ASHIKJNATH    | 2022-04-23 08:56:32.000 | 2023-04-23 08:56:32.000 | {SHA}33282c421f644d8289c7b2277248871e98485cd0 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 |
| cfactory      | 2022-02-11 10:14:49.000 | 2022-05-22 10:14:49.000 | {SHA}847715f8d476e5850c3bbbbef18429b3ffa175e6 | 2022-02-11 10:14:49.897 | 2022-02-11 10:14:49.896 | 2022-02-11 10:14:49.897 | 2022-02-11

+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CARD_TYPE           | ORGANIZATION_PARTY_ID | GL_ACCOUNT_ID | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CCT_AMERICANEXPRESS | Company               | 122100        | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 |
| CCT_DINERSCLUB      | Company               | 122100        | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 |

+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| PAYMENT_METHOD_ID | CARD_TYPE           | CARD_NUMBER                                  | VALID_FROM_DATE | EXPIRE_DATE | ISSUE_NUMBER | COMPANY_NAME_ON_CARD | TITLE_ON_CARD | FIRST_NAME_ON_CARD | MIDDLE_NAME_ON_CARD | LAST_NAME_ON_CARD | SUFFIX_ON_CARD | CONTACT_MECH_ID | CONSECUTIVE_FAILED_AUTHS | LAST_FAILED_AUTH_DATE | CONSECUTIVE_FAILED_NSF | LAST_FAILED_NSF_DATE | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| 9015              | CCT_VISA            | rIKUirmFyQwNTMPa6TAMWOcmKp8oDEjgLWzH+YE+/2s= | NULL            | 02/2100     | NULL         | NULL                 | NULL          | DEMO               | NULL                | CUSTOMER          | NULL           | 9015            |                     NULL | NULL                  |                   NULL | NULL                 | 2023-10-26 12:22:54.148 | 2023-10-26 12:22:51.131 | 2021-10-20 14:44:55.120 | 2021-10-20 14:44:53.353 |
| AMEX_01

I am selling the entire breach as well as the source code to their employment login server and access to said server for 1.22XMR PM me if you are interested.

PWNED BY KRYPT0N
nice db leak


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - vebey79663 - 05-25-2024

thanks or sharing