11,297
Records Exposed
Jan 2015
Date of Breach
Database
Breach Type
Jul 2022
Added to Database
About This Breach
In January 2015, the hacker collective known as Lizard Squad created a DDoS service by the name of Lizard Stresser which could be procured to mount attacks against online targets. Shortly thereafter, the service suffered a data breach which resulted in the public disclosure of over 13k user accounts including passwords stored in plain text.
Compromised Data Types
Country
United Kingdom
Language
English
Password Storage
plaintext
Category
Booter
Indexed On
Jul 25, 2022
Breach Type
Database
What Should You Do?
Get Full Breach Details with LeakedSource Pro
Sign up for a LeakedSource Pro account to see exactly what data was exposed in this breach and get real-time notifications when your information appears in new breaches.
Sign Up for Pro- Change your password immediately on LizardSquad and any other site where you used the same password. Use a unique, strong password for each account.
- Watch for phishing emails targeting your inbox. Attackers may use your exposed email address to send convincing scam messages.
- Enable two-factor authentication (2FA) on all important accounts to add an extra layer of security.
- Use a password manager to generate and store unique, strong passwords for every account.
Were You Affected by This Breach?
Enter your email below to instantly check if your data was compromised in the LizardSquad breach and 12,000+ other known breaches.