- Total Records131,718,570
- Unique Emails114,185,792
- Unique Email Providers857,812
- Unique Passwords59,823,732
The Pemiblanc Data Breach: What Happened in April 2018?
In early April 2018, cybersecurity researchers discovered something alarming—a massive repository of stolen credentials dubbed the "Pemiblanc Collection" sitting publicly accessible on a French server. This cache held information on over 131 million unique accounts, primarily consisting of email addresses and passwords. What made the Pemiblanc breach especially noteworthy was not just its scale or the exposure of sensitive data, but also the way it was used: the dataset was actively leveraged in credential stuffing attacks, enabling bad actors to automatically try these email and password pairs across various online services, hoping to hijack other accounts belonging to the same users. Although much of the collection originated from older breaches, Pemiblanc became a critical resource for large-scale account takeover attempts across the internet.
The Scope and Impact of the Breach
The Pemiblanc breach involved a staggering total of 131,718,571 accounts. The collection was not the result of a new hack against a single company—instead, it was an aggregation of data from prior compromises. The exposed information primarily included email addresses and associated passwords, making it easy for malicious actors to test these pairs against different sites in search of accounts that reused the same credentials, potentially facilitating wide-ranging account compromise.
What Information Was Leaked?
The core data exposed in the Pemiblanc collection was straightforward but potent: email addresses and passwords. While these fields might seem basic, together they represent the keys to countless online accounts. Attackers could utilize these details for credential stuffing, automated login attempts, and other malicious activity on multiple platforms.
Pemiblanc Breach Timeline
- Early 2018: Credential data is aggregated and stored on a French server. The collection consists mostly of records from previous data breaches.
- April 2018: Security researchers first discover the Pemiblanc Collection online, drawing attention to the scale of the aggregated dataset and its availability.
- Following months: The collection is linked to ongoing credential stuffing operations, with widespread attempts to compromise user accounts on a variety of online services.
Frequently Asked Questions About the Pemiblanc Data Breach
What happened in the Pemiblanc data breach?
The Pemiblanc data breach involved the discovery of a large dataset—over 131 million email and password pairs—compiled from previous breaches and found on a publicly accessible French server in April 2018. It was widely used in credential stuffing attacks.
How many users were affected by the Pemiblanc breach?
The Pemiblanc breach exposed information from approximately 131,718,571 unique accounts.
What data was leaked in the Pemiblanc Collection?
The leaked information primarily included email addresses and passwords, gathered and compiled from earlier data breaches.
Who was behind the Pemiblanc data breach?
The Pemiblanc collection was not tied to a specific individual or hacking group but was an aggregation of previously compromised data made accessible by unknown parties, likely for use in credential stuffing and account takeover attacks.
How can I check if I'm in the Pemiblanc breach?
You can check if your information was part of the Pemiblanc breach by utilizing the DeHashed search engine.