Category: Data Breach News

Data Breach Summary

Sensitive user emails from live streaming platform were exposed online in December 2023. The 1.6KB data leak, discovered by InsecureWeb on January 31, 2024, was shared on Telegram by hacker @NinjaDefender.

Where and How?

Details on how the breach occurred remain unclear, but the leaked data originated from chat apps associated with While the impact appears limited, exposed email addresses can be used for phishing attacks, spam, and identity theft.

A Screenshot of the data can be found below:

Company Data Breach History

While this is the first publicly reported data breach for, concerns linger about their commitment to user privacy. In 2022, phishing campaigns targeting the platform used compromised access keys, highlighting potential vulnerabilities.

Further Action:

InsecureWeb encourages the breach victim to investigate the source of the breach, implement stronger security measures, and communicate transparently with its users about the incident and the measures taken to mitigate the risks.

Recommendations for Personal Data Protection

How Users Can Protect Their Information

To protect their personal information and accounts from being compromised, users should take the following steps:

– Change their passwords frequently, with a combination of letters, numbers, and symbols.

– Enable two-factor authentication whenever possible.

– Use unique passwords for each account, to prevent hackers from accessing multiple accounts with the same password.

– Be cautious of suspicious emails or messages, as they may contain phishing links that can compromise their accounts.

– Regularly monitor their accounts for any suspicious activity.

What is InsecureWeb?

InsecureWeb is a Dark Web monitoring service that keeps track of recent data breaches and tracks their impact by monitoring the darkest places of the internet.

Our commitment lies in providing top-notch cybersecurity services to our clients. Through continuous monitoring of the dark web and advanced threat detection methodologies, we strive to identify potential breaches promptly, enabling swift response and mitigation efforts. With our state-of-the-art tools and expertise, we prioritize the confidentiality, integrity, and availability of our clients’ data.