24,493
Records Exposed
Mar 2022
Date of Breach
Database
Breach Type
Jan 2025
Added to Database
About This Breach
In March 2022, Stresser, a Turkish DDoS-as-a-Service platform, suffered a data breach that impacted approximately 25,000 users. The leaked data included email addresses, IP addresses, usernames, and passwords stored as MD5 hashes. This breach underscores the importance of robust cybersecurity measures, especially for platforms dealing with sensitive user information.
Compromised Data Types
Country
Turkey
Language
English
Password Storage
MD5(Salt)
Category
Booter
Indexed On
Jan 23, 2025
Breach Type
Database
What Should You Do?
Get Full Breach Details with LeakedSource Pro
Sign up for a LeakedSource Pro account to see exactly what data was exposed in this breach and get real-time notifications when your information appears in new breaches.
Sign Up for Pro- Change your password immediately on Stresser and any other site where you used the same password. Use a unique, strong password for each account.
- Watch for phishing emails targeting your inbox. Attackers may use your exposed email address to send convincing scam messages.
- Enable two-factor authentication (2FA) on all important accounts to add an extra layer of security.
- Use a password manager to generate and store unique, strong passwords for every account.
Were You Affected by This Breach?
Enter your email below to instantly check if your data was compromised in the Stresser breach and 12,000+ other known breaches.