ReBreached Forums
[Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Printable Version

+- ReBreached Forums (https://rebreached.vc)
+-- Forum: Leaks (https://rebreached.vc/Forum-Leaks)
+--- Forum: Database (https://rebreached.vc/Forum-Database)
+--- Thread: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. (/Thread-Syrotech-LEAK-Database-leak-employee-credentials-server-credentials-and-more)

Pages: 1 2


[Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Krypt0n - 01-01-2024

Company Details
"Elevating Security, Empowering Networks."

Syrotech is said to be a security and tech firm that offers tech solutions to internet, hardware, cameras, and other IoT devices.
Syrotech deals with creating industrial systems as well such as gates.


[Image: Syrotech-Logo-white.png]



Data breach
The compromised data is from a server they used for their employees logging into to view tickets and other company details, along side an administration panel.

In the data breach there are multiple backups of the mysql database including financial information, employee information such as names, emails, credentials, password hashes, and much more.



Proof Of Breach

 
Code:
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| USER_LOGIN_ID | FROM_DATE               | THRU_DATE               | CURRENT_PASSWORD                              | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| admin         | 2021-12-11 11:04:42.000 | 2022-03-21 11:04:42.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 |
| admin         | 2022-02-04 11:36:04.000 | 2022-05-15 11:36:04.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 |
| admin         | 2022-06-28 12:53:16.000 | 2023-06-28 12:53:16.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 |
| APARNA        | 2022-02-26 10:09:27.000 | 2022-04-27 10:09:27.000 | {SHA}284ae5a0fab86db3772befef7d84d7f1ae40102a | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 |
| ARASAN        | 2022-01-29 12:12:38.000 | 2022-03-30 12:12:38.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 |
| ARASAN        | 2022-04-09 10:29:22.000 | 2022-06-08 10:29:22.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 |
| ARASAN        | 2022-04-11 10:13:24.000 | 2023-04-11 10:13:24.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 |
| ARULKUMAR     | 2022-03-04 03:56:46.000 | 2022-05-03 03:56:46.000 | {SHA}aa99b6ae37a33b6c7abc4d3279c0aefcd9e8408f | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 |
| ASHIKJNATH    | 2022-04-23 08:56:32.000 | 2023-04-23 08:56:32.000 | {SHA}33282c421f644d8289c7b2277248871e98485cd0 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 |
| cfactory      | 2022-02-11 10:14:49.000 | 2022-05-22 10:14:49.000 | {SHA}847715f8d476e5850c3bbbbef18429b3ffa175e6 | 2022-02-11 10:14:49.897 | 2022-02-11 10:14:49.896 | 2022-02-11 10:14:49.897 | 2022-02-11

+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CARD_TYPE           | ORGANIZATION_PARTY_ID | GL_ACCOUNT_ID | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CCT_AMERICANEXPRESS | Company               | 122100        | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 |
| CCT_DINERSCLUB      | Company               | 122100        | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 |

+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| PAYMENT_METHOD_ID | CARD_TYPE           | CARD_NUMBER                                  | VALID_FROM_DATE | EXPIRE_DATE | ISSUE_NUMBER | COMPANY_NAME_ON_CARD | TITLE_ON_CARD | FIRST_NAME_ON_CARD | MIDDLE_NAME_ON_CARD | LAST_NAME_ON_CARD | SUFFIX_ON_CARD | CONTACT_MECH_ID | CONSECUTIVE_FAILED_AUTHS | LAST_FAILED_AUTH_DATE | CONSECUTIVE_FAILED_NSF | LAST_FAILED_NSF_DATE | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| 9015              | CCT_VISA            | rIKUirmFyQwNTMPa6TAMWOcmKp8oDEjgLWzH+YE+/2s= | NULL            | 02/2100     | NULL         | NULL                 | NULL          | DEMO               | NULL                | CUSTOMER          | NULL           | 9015            |                     NULL | NULL                  |                   NULL | NULL                 | 2023-10-26 12:22:54.148 | 2023-10-26 12:22:51.131 | 2021-10-20 14:44:55.120 | 2021-10-20 14:44:53.353 |
| AMEX_01

I am selling the entire breach as well as the source code to their employment login server and access to said server for 1.22XMR PM me if you are interested.

PWNED BY KRYPT0N



RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Krypt0n - 01-02-2024

Due to the high demand of people buying this breached data and server access on other forums and marketplaces I have decided to increase the value to 5.96XMR


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - 4444z - 01-03-2024

you should tell us the employee login page 🗣🔥🔥🔥🔥🔥


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Krypt0n - 01-04-2024

(01-03-2024, 01:02 AM)4444z Wrote: you should tell us the employee login page 🗣🔥🔥🔥🔥🔥

Assets and access to the back end servers are being sold for 1.92XMR


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - 4444z - 01-04-2024

(01-04-2024, 12:50 AM)Krypt0n Wrote:
(01-03-2024, 01:02 AM)4444z Wrote: you should tell us the employee login page 🗣🔥🔥🔥🔥🔥

Assets and access to the back end servers are being sold for 1.92XMR

guess i ain't getting the access to back end servers, i'm broke asf 💀💀💀💀💀💀

mind if i post the cracked password hash?


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Krypt0n - 01-06-2024

(01-04-2024, 03:03 AM)4444z Wrote:
(01-04-2024, 12:50 AM)Krypt0n Wrote:
(01-03-2024, 01:02 AM)4444z Wrote: you should tell us the employee login page 🗣🔥🔥🔥🔥🔥

Assets and access to the back end servers are being sold for 1.92XMR

guess i ain't getting the access to back end servers, i'm broke asf 💀💀💀💀💀💀

mind if i post the cracked password hash?

Anyone who sees this post will be able to crack the hashes so there is no reason to


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - 4444z - 01-06-2024

(01-06-2024, 04:15 AM)Krypt0n Wrote:
(01-04-2024, 03:03 AM)4444z Wrote:
(01-04-2024, 12:50 AM)Krypt0n Wrote:
(01-03-2024, 01:02 AM)4444z Wrote: you should tell us the employee login page 🗣🔥🔥🔥🔥🔥

Assets and access to the back end servers are being sold for 1.92XMR

guess i ain't getting the access to back end servers, i'm broke asf 💀💀💀💀💀💀

mind if i post the cracked password hash?

Anyone who sees this post will be able to crack the hashes so there is no reason to

I was bored so I posted the cracked hashes.


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Beelzebub - 01-06-2024

(01-01-2024, 09:01 AM)Krypt0n Wrote:
Company Details
"Elevating Security, Empowering Networks."

Syrotech is said to be a security and tech firm that offers tech solutions to internet, hardware, cameras, and other IoT devices.
Syrotech deals with creating industrial systems as well such as gates.


[Image: Syrotech-Logo-white.png]



Data breach
The compromised data is from a server they used for their employees logging into to view tickets and other company details, along side an administration panel.

In the data breach there are multiple backups of the mysql database including financial information, employee information such as names, emails, credentials, password hashes, and much more.



Proof Of Breach

 
Code:
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| USER_LOGIN_ID | FROM_DATE               | THRU_DATE               | CURRENT_PASSWORD                              | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| admin         | 2021-12-11 11:04:42.000 | 2022-03-21 11:04:42.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 |
| admin         | 2022-02-04 11:36:04.000 | 2022-05-15 11:36:04.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 |
| admin         | 2022-06-28 12:53:16.000 | 2023-06-28 12:53:16.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 |
| APARNA        | 2022-02-26 10:09:27.000 | 2022-04-27 10:09:27.000 | {SHA}284ae5a0fab86db3772befef7d84d7f1ae40102a | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 |
| ARASAN        | 2022-01-29 12:12:38.000 | 2022-03-30 12:12:38.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 |
| ARASAN        | 2022-04-09 10:29:22.000 | 2022-06-08 10:29:22.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 |
| ARASAN        | 2022-04-11 10:13:24.000 | 2023-04-11 10:13:24.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 |
| ARULKUMAR     | 2022-03-04 03:56:46.000 | 2022-05-03 03:56:46.000 | {SHA}aa99b6ae37a33b6c7abc4d3279c0aefcd9e8408f | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 |
| ASHIKJNATH    | 2022-04-23 08:56:32.000 | 2023-04-23 08:56:32.000 | {SHA}33282c421f644d8289c7b2277248871e98485cd0 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 |
| cfactory      | 2022-02-11 10:14:49.000 | 2022-05-22 10:14:49.000 | {SHA}847715f8d476e5850c3bbbbef18429b3ffa175e6 | 2022-02-11 10:14:49.897 | 2022-02-11 10:14:49.896 | 2022-02-11 10:14:49.897 | 2022-02-11

+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CARD_TYPE           | ORGANIZATION_PARTY_ID | GL_ACCOUNT_ID | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CCT_AMERICANEXPRESS | Company               | 122100        | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 |
| CCT_DINERSCLUB      | Company               | 122100        | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 |

+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| PAYMENT_METHOD_ID | CARD_TYPE           | CARD_NUMBER                                  | VALID_FROM_DATE | EXPIRE_DATE | ISSUE_NUMBER | COMPANY_NAME_ON_CARD | TITLE_ON_CARD | FIRST_NAME_ON_CARD | MIDDLE_NAME_ON_CARD | LAST_NAME_ON_CARD | SUFFIX_ON_CARD | CONTACT_MECH_ID | CONSECUTIVE_FAILED_AUTHS | LAST_FAILED_AUTH_DATE | CONSECUTIVE_FAILED_NSF | LAST_FAILED_NSF_DATE | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| 9015              | CCT_VISA            | rIKUirmFyQwNTMPa6TAMWOcmKp8oDEjgLWzH+YE+/2s= | NULL            | 02/2100     | NULL         | NULL                 | NULL          | DEMO               | NULL                | CUSTOMER          | NULL           | 9015            |                     NULL | NULL                  |                   NULL | NULL                 | 2023-10-26 12:22:54.148 | 2023-10-26 12:22:51.131 | 2021-10-20 14:44:55.120 | 2021-10-20 14:44:53.353 |
| AMEX_01

I am selling the entire breach as well as the source code to their employment login server and access to said server for 1.22XMR PM me if you are interested.

PWNED BY KRYPT0N

Hello, Nice db up for sale (Add a way to contact you <Enable pms in settings>)


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - Krypt0n - 01-09-2024

(01-06-2024, 07:46 PM)Beelzebub Wrote:
(01-01-2024, 09:01 AM)Krypt0n Wrote:
Company Details
"Elevating Security, Empowering Networks."

Syrotech is said to be a security and tech firm that offers tech solutions to internet, hardware, cameras, and other IoT devices.
Syrotech deals with creating industrial systems as well such as gates.


[Image: Syrotech-Logo-white.png]



Data breach
The compromised data is from a server they used for their employees logging into to view tickets and other company details, along side an administration panel.

In the data breach there are multiple backups of the mysql database including financial information, employee information such as names, emails, credentials, password hashes, and much more.



Proof Of Breach

 
Code:
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| USER_LOGIN_ID | FROM_DATE               | THRU_DATE               | CURRENT_PASSWORD                              | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------+-------------------------+-------------------------+-----------------------------------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| admin         | 2021-12-11 11:04:42.000 | 2022-03-21 11:04:42.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 | 2021-12-11 11:04:42.507 | 2021-12-11 11:04:42.458 |
| admin         | 2022-02-04 11:36:04.000 | 2022-05-15 11:36:04.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 | 2022-02-04 11:36:04.715 | 2022-02-04 11:36:04.675 |
| admin         | 2022-06-28 12:53:16.000 | 2023-06-28 12:53:16.000 | {SHA}a29c57c6894dee6e8251510d58c07078ee3f49bf | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 | 2022-06-28 12:53:16.200 | 2022-06-28 12:53:16.146 |
| APARNA        | 2022-02-26 10:09:27.000 | 2022-04-27 10:09:27.000 | {SHA}284ae5a0fab86db3772befef7d84d7f1ae40102a | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 | 2022-02-26 10:09:28.024 | 2022-02-26 10:09:27.939 |
| ARASAN        | 2022-01-29 12:12:38.000 | 2022-03-30 12:12:38.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 | 2022-01-29 12:12:38.697 | 2022-01-29 12:12:38.592 |
| ARASAN        | 2022-04-09 10:29:22.000 | 2022-06-08 10:29:22.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 | 2022-04-09 10:29:22.234 | 2022-04-09 10:29:22.161 |
| ARASAN        | 2022-04-11 10:13:24.000 | 2023-04-11 10:13:24.000 | {SHA}15d00cb89a6dbbea4e6f8bd1044d316fb188a989 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 | 2022-04-11 10:13:24.680 | 2022-04-11 10:13:24.678 |
| ARULKUMAR     | 2022-03-04 03:56:46.000 | 2022-05-03 03:56:46.000 | {SHA}aa99b6ae37a33b6c7abc4d3279c0aefcd9e8408f | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 | 2022-03-04 15:56:46.498 | 2022-03-04 15:56:46.366 |
| ASHIKJNATH    | 2022-04-23 08:56:32.000 | 2023-04-23 08:56:32.000 | {SHA}33282c421f644d8289c7b2277248871e98485cd0 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 | 2022-04-23 08:56:33.124 | 2022-04-23 08:56:32.972 |
| cfactory      | 2022-02-11 10:14:49.000 | 2022-05-22 10:14:49.000 | {SHA}847715f8d476e5850c3bbbbef18429b3ffa175e6 | 2022-02-11 10:14:49.897 | 2022-02-11 10:14:49.896 | 2022-02-11 10:14:49.897 | 2022-02-11

+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CARD_TYPE           | ORGANIZATION_PARTY_ID | GL_ACCOUNT_ID | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+---------------------+-----------------------+---------------+-------------------------+-------------------------+-------------------------+-------------------------+
| CCT_AMERICANEXPRESS | Company               | 122100        | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.570 | 2021-10-20 14:44:24.585 |
| CCT_DINERSCLUB      | Company               | 122100        | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 | 2021-10-20 14:44:25.593 | 2021-10-20 14:44:24.585 |

+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| PAYMENT_METHOD_ID | CARD_TYPE           | CARD_NUMBER                                  | VALID_FROM_DATE | EXPIRE_DATE | ISSUE_NUMBER | COMPANY_NAME_ON_CARD | TITLE_ON_CARD | FIRST_NAME_ON_CARD | MIDDLE_NAME_ON_CARD | LAST_NAME_ON_CARD | SUFFIX_ON_CARD | CONTACT_MECH_ID | CONSECUTIVE_FAILED_AUTHS | LAST_FAILED_AUTH_DATE | CONSECUTIVE_FAILED_NSF | LAST_FAILED_NSF_DATE | LAST_UPDATED_STAMP      | LAST_UPDATED_TX_STAMP   | CREATED_STAMP           | CREATED_TX_STAMP        |
+-------------------+---------------------+----------------------------------------------+-----------------+-------------+--------------+----------------------+---------------+--------------------+---------------------+-------------------+----------------+-----------------+--------------------------+-----------------------+------------------------+----------------------+-------------------------+-------------------------+-------------------------+-------------------------+
| 9015              | CCT_VISA            | rIKUirmFyQwNTMPa6TAMWOcmKp8oDEjgLWzH+YE+/2s= | NULL            | 02/2100     | NULL         | NULL                 | NULL          | DEMO               | NULL                | CUSTOMER          | NULL           | 9015            |                     NULL | NULL                  |                   NULL | NULL                 | 2023-10-26 12:22:54.148 | 2023-10-26 12:22:51.131 | 2021-10-20 14:44:55.120 | 2021-10-20 14:44:53.353 |
| AMEX_01

I am selling the entire breach as well as the source code to their employment login server and access to said server for 1.22XMR PM me if you are interested.

PWNED BY KRYPT0N

Hello, Nice db up for sale (Add a way to contact you <Enable pms in settings>)
was not aware they were not on I will do so right now


RE: [Syrotech LEAK] Database leak employee credentials, server credentials, and more. - scarletcorrect - 01-18-2024

continue to spread this information