Posts: 5
Threads: 0
Joined: Feb 2026
best TurkNet database
Posts: 20
Threads: 0
Joined: Feb 2026
02-07-2026, 12:16 PM
(This post was last modified: 02-07-2026, 12:17 PM by weykoffa.)
[citation="dejavu" pid='1240416' dateline='1767554820']
Bonjour Forums sur les violations Communauté,
Aujourd'hui, j'ai téléchargé le Turknet Base de données à télécharger, merci de votre lecture et profitez-en !
En mars 2025, Turknet, l'un des plus grands fournisseurs de services Internet de Turquie, a été piraté par un acteur malveillant nommé « hades_hgs » qui utilisait l'injection SQL. Plus tard, cette violation a été découverte par @ dejavu et divulguée sur BreachForums. Les données exposées contenaient plus de 2,8 millions de clients, notamment des dates de naissance, des adresses e-mail (personnalisées), des adresses IP statiques, des noms, des numéros d'identification nationaux, des numéros de téléphone et des adresses physiques. Un petit nombre de lignes comprenaient également des mots de passe et des noms d'utilisateur en texte clair. @ dejavu a décrit l'histoire de la façon dont il a obtenu la fuite « Il y a 7 mois, un acteur nommé hades_hgs a trouvé une injection SQL sur Turknet et était sur le point de faire une grosse fuite lorsqu'il s'est trahi à cause de sa stupidité. Avant d'être attrapé, il a publié une URL de service cachée en oignon avec un compte à rebours à l'écran,les données étaient censées être publiées dans environ 3 jours, mais elles n'ont jamais été publiées, probablement la police a accédé et déconnecté le service onion. Avant que ce service onion ne soit arrêté, j'ai commencé à tester en connectant le socket TOR à un outil de fuzzer de répertoire, l'outil a rapidement détecté qu'il y avait un chemin appelé "/files/" sur le service onion, lorsque j'ai entré ce chemin, j'ai vu que les fichiers appartenant à la base de données étaient répertoriés dans ce chemin et je l'ai téléchargé, puis j'ai oublié que j'avais téléchargé cette base de données, hier j'ai vu la base de données en examinant mes fichiers et maintenant nous sommes là" et j'ai accusé Turknet de mentir "Turknet a signalé au gouvernement que les données de 280 000 utilisateurs avaient été volées, mais en réalité il y en avait 2,8 millions, et ils n'ont pas corrigé les vulnérabilités de leurs systèmes,j'ai donc fait quelques recherches et trouvé une autre vulnérabilité d'injection SQL, si quelqu'un qui vient de s'abonner me donne son nom, son prénom et sa date de naissance, je peux jeter les nouvelles informations d'abonnement"
Données compromises : Dates de naissance, Adresses e-mail (personnalisées), Adresses IP, Noms, Numéros d'identification nationaux, Mots de passe, Numéros de téléphone, Adresses physiques, Noms d'utilisateur.
Contenu Spoiler Le hachage MD5 du fichier .7z est 6E77CB7B6BCB9F67B7D8AA78602647DA. Au total, il y a 2806537 enregistrements. Le fichier est 3,64 Go non compressé et 692,94 Mo compressé.
[/citation]
nicee man thank you
Posts: 16
Threads: 0
Joined: Mar 2025
Posts: 1
Threads: 0
Joined: Mar 2025
Posts: 39
Threads: 1
Joined: Jan 2026
(01-04-2026, 07:27 PM)dejavu Wrote: Hello BreachForums Community,
Today I have uploaded the Turknet Database for you to download, thanks for reading and enjoy!
In March 2025, one of Türkiye's largest internet service providers, Turknet was breached by threat actor named "hades_hgs" who used SQL injection. Later this breach was found by @ dejavu and leaked on BreachForums. The exposed data contained over 2.8 million customers which included dates of birth, email addresses (custom ones), static IP addresses, names, National Identification Numbers, phone numbers and physical addresses. Small number of lines also included plaintext passwords and usernames. @ dejavu described the story of how he got the leak "7 months ago, an actor named hades_hgs found SQL injection on Turknet and was about to make a big leak when he gave himself away thanks to his stupidity. Before he was caught, he published an onion hidden service url with a countdown timer on the screen, the data was supposed to be published in about 3 days, but it was never published, probably the police accessed and disconnected the onion service. Before this onion service was shut down, I started testing by connecting the TOR socket to a directory fuzzer tool, the tool quickly detected that there was a path called "/files/" on the onion service, when I entered this path, I saw that the files belonging to the database were listed in that path and downloaded it, then I forgot that I downloaded this database, yesterday I saw the db while examining my files and now we are here" and accused Turknet of lying "Turknet reported to the goverment that the data of 280k users was stolen, but in reality there were 2.8 million, and they did not fix the vulnerabilities in their systems, so I did some research and found another SQL injection vulnerability, if someone who has just subscribed gives me their name, surname and date of birth, I can throw away the fresh subscription information"
Compromised data: Dates of birth, Email addresses (custom ones), IP addresses, Names, National Identification Numbers, Passwords, Phone numbers, Physical addresses, Usernames.
Contents Spoiler The .7z File's MD5 Hash is 6E77CB7B6BCB9F67B7D8AA78602647DA. In total, there are 2806537 records. The file is 3.64GB uncompressed and 692.94MB compressed.
d it, then I forgot that I downloaded this database, yesterday I saw the db while examining my files and now we are here" and accused Turknet of lying "Turknet reported to the goverment that the data of 280k users was stolen, but in reality
Posts: 4
Threads: 0
Joined: Feb 2026
(01-04-2026, 07:27 PM)dejavu Wrote: Hello BreachForums Community,
Today I have uploaded the Turknet Database for you to download, thanks for reading and enjoy!
In March 2025, one of Türkiye's largest internet service providers, Turknet was breached by threat actor named "hades_hgs" who used SQL injection. Later this breach was found by @ dejavu and leaked on BreachForums. The exposed data contained over 2.8 million customers which included dates of birth, email addresses (custom ones), static IP addresses, names, National Identification Numbers, phone numbers and physical addresses. Small number of lines also included plaintext passwords and usernames. @ dejavu described the story of how he got the leak "7 months ago, an actor named hades_hgs found SQL injection on Turknet and was about to make a big leak when he gave himself away thanks to his stupidity. Before he was caught, he published an onion hidden service url with a countdown timer on the screen, the data was supposed to be published in about 3 days, but it was never published, probably the police accessed and disconnected the onion service. Before this onion service was shut down, I started testing by connecting the TOR socket to a directory fuzzer tool, the tool quickly detected that there was a path called "/files/" on the onion service, when I entered this path, I saw that the files belonging to the database were listed in that path and downloaded it, then I forgot that I downloaded this database, yesterday I saw the db while examining my files and now we are here" and accused Turknet of lying "Turknet reported to the goverment that the data of 280k users was stolen, but in reality there were 2.8 million, and they did not fix the vulnerabilities in their systems, so I did some research and found another SQL injection vulnerability, if someone who has just subscribed gives me their name, surname and date of birth, I can throw away the fresh subscription information"
Compromised data: Dates of birth, Email addresses (custom ones), IP addresses, Names, National Identification Numbers, Passwords, Phone numbers, Physical addresses, Usernames.
Contents Spoiler The .7z File's MD5 Hash is 6E77CB7B6BCB9F67B7D8AA78602647DA. In total, there are 2806537 records. The file is 3.64GB uncompressed and 692.94MB compressed. thanks for sharing!
Posts: 6
Threads: 0
Joined: Jan 2026
thank you thank you thank you
Posts: 4
Threads: 0
Joined: Jan 2026
Really interesting not gonna lie
Posts: 2
Threads: 0
Joined: Mar 2026
(01-04-2026, 07:27 PM)dejavu Wrote: Hello BreachForums Community,
Today I have uploaded the Turknet Database for you to download, thanks for reading and enjoy!
In March 2025, one of Türkiye's largest internet service providers, Turknet was breached by threat actor named "hades_hgs" who used SQL injection. Later this breach was found by @ dejavu and leaked on BreachForums. The exposed data contained over 2.8 million customers which included dates of birth, email addresses (custom ones), static IP addresses, names, National Identification Numbers, phone numbers and physical addresses. Small number of lines also included plaintext passwords and usernames. @ dejavu described the story of how he got the leak "7 months ago, an actor named hades_hgs found SQL injection on Turknet and was about to make a big leak when he gave himself away thanks to his stupidity. Before he was caught, he published an onion hidden service url with a countdown timer on the screen, the data was supposed to be published in about 3 days, but it was never published, probably the police accessed and disconnected the onion service. Before this onion service was shut down, I started testing by connecting the TOR socket to a directory fuzzer tool, the tool quickly detected that there was a path called "/files/" on the onion service, when I entered this path, I saw that the files belonging to the database were listed in that path and downloaded it, then I forgot that I downloaded this database, yesterday I saw the db while examining my files and now we are here" and accused Turknet of lying "Turknet reported to the goverment that the data of 280k users was stolen, but in reality there were 2.8 million, and they did not fix the vulnerabilities in their systems, so I did some research and found another SQL injection vulnerability, if someone who has just subscribed gives me their name, surname and date of birth, I can throw away the fresh subscription information"
Compromised data: Dates of birth, Email addresses (custom ones), IP addresses, Names, National Identification Numbers, Passwords, Phone numbers, Physical addresses, Usernames.
Contents Spoiler The .7z File's MD5 Hash is 6E77CB7B6BCB9F67B7D8AA78602647DA. In total, there are 2806537 records. The file is 3.64GB uncompressed and 692.94MB compressed.
nice broo
Posts: 38
Threads: 2
Joined: Feb 2025
halll othanks for theinfo sir
|