{"id":25966,"date":"2019-03-08T21:45:06","date_gmt":"2019-03-08T21:45:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/"},"modified":"2019-03-08T21:45:06","modified_gmt":"2019-03-08T21:45:06","slug":"that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/","title":{"rendered":"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus"},"content":{"rendered":"<p>An unprotected MongoDB database belonging to a marketing tech company exposed up to 809 million email addresses, phone numbers, business leads, and bits of personal information to the public internet, it emerged yesterday.<\/p>\n<p>Today, however, it appears the scope of that security snafu was dramatically underestimated.<\/p>\n<p>According to cyber security biz Dynarisk, there were <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blog.dynarisk.com\/over-two-billion-records-exposed-by-email-validation-company\/\">four databases exposed<\/a> to the internet \u2013 rather than <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/securitydiscovery.com\/800-million-emails-leaked-online-by-email-verification-service\/\">just the one<\/a> previously reported \u2013 bringing the total to more than two billion records weighing in at 196GB rather than 150GB. Anyone knowing where to look on the &#8216;net would have been able to spot and siphon off the data, without any authentication.<\/p>\n<p>&#8220;There was one server that was exposed to the web,&#8221; explained Andrew Martin, CEO and founder of DynaRisk, in an email to <em>The Register<\/em> on Friday. &#8220;On this server were four databases. The original discovery analysed records from <code>mainEmailDatabase<\/code>. The additional three databases were hosted on the same server, which is no longer accessible.&#8221;<\/p>\n<p>Martin said he believes the original analysis may have been conducted with limited time or computing power, which would explain the lesser number of records found. &#8220;Our analysis was conducted over all four databases and extracted over two billion email addresses which is more than the 809 million first discussed,&#8221; he said.<\/p>\n<p>The databases were operated by Verifications.io, which provides enterprise email validation \u2013 a way for marketers to check that email addresses on their mailing lists are valid and active before firing off pitches. The Verifications.io website is currently inaccessible.<\/p>\n<p>The database first reported included the following data fields, some of which, such as date of birth, qualify as personal information under various data laws:<\/p>\n<p>Email Records (emailrecords): a JSON object with the keys id, zip, visit_date, phone, city, site_url, state, gender, email, user_ip, dob, firstname, lastname, done, and email_lower_sha265.<\/p>\n<p>Email With Phone (emailWithPhone): No example provided but presumably a JSON object with the two named attributes.<\/p>\n<p>Business Leads (businessLeads): a JSON object with the keys id, email, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.osha.gov\/pls\/imis\/sicsearch.html\">sic_code<\/a>, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.census.gov\/eos\/www\/naics\/\">naics_code<\/a>, company_name, title, address, city, state, country, phone, fax, company_website, revenue, employees, industry, desc, sic_code_description, firstname, lastname, and email_lower_sha256.<\/p>\n<p>The image below shows Verifications.io&#8217;s four MongoDB databases exposed to the internet, as identified by Dynarisk:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/03\/08\/4databases_dynarisk.jpg\" width=\"648\" height=\"541\" alt=\"Image of exposed databases\" title=\"Image of exposed databases\"><\/p>\n<p>Martin said the impact of the security blunder is less than it may be fear because there are no credit card numbers, medical records nor any other super-sensitive information involved.<\/p>\n<p>&#8220;The issue here is this is a gigantic amalgamation of data all in one place,&#8221; he explained. &#8220;The leaking of this information may breach data protection regulations in various countries. The leak may also violate the privacy and security provisions between Verification.io and their clients within their contracts.&#8221;<\/p>\n<p>Bob Diachenko, a security researcher for consultancy Security Discovery, found the first Verifications.io database online, and said the marketing tech biz, based in Tallinn, Estonia, acknowledged the gaffe and hid the data silos from public view after he flagged it up.<\/p>\n<p>Verifications.io told Diachenko that its company database was &#8220;built with public information, not client data.&#8221; This suggests at least some of email addresses and other details in the company&#8217;s databases were downloaded or scraped from the internet.<\/p>\n<p>Diachenko didn&#8217;t immediately respond to a request for comment.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/11\/07\/bucket_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"bucket\"><\/p>\n<h2 title=\"AWS comes up with blanket policies to smother public-facing cloud silos\">Amazon tries to ruin infosec world&#8217;s fastest-growing cottage industry (finding data-spaffing S3 storage buckets)<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/11\/16\/aws_s3_bucket_security\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Security researcher Troy Hunt, who maintains the <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/haveibeenpwned.com\/FAQs\">HaveIBeenPwned<\/a> database of email accounts that have been exposed in online data dumps, said about a third of the email addresses in the Verifications.io database are new to HaveIBeenPwned. The other two thirds presumably were culled from the same online sources that supplied Hunt&#8217;s archives.<\/p>\n<p>Martin said Verification.io&#8217;s claim that its data came from public sources is open to interpretation. &#8220;These data sources might have been public at one time in the past and then not public at a later time,&#8221; he said. &#8220;It would be interesting to know if the company had a process of continuous compliance where they would validate if they were still allowed to store the data over time.&#8221;<\/p>\n<p>Dtex, a security biz that focuses on the dangers of rogue or slipshod employees within businesses, said in its recent <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/dtexsystems.com\/2019-insider-threat-intelligence-report\/\">2019 Insider Threat Intelligence Report<\/a> that 98 per cent of incidents involving data left exposed in the cloud can be attributed to human error.<\/p>\n<p>MongoDB versions prior to 2.6.0, released in 2014, were network accessible by default. Reversing that default setting hasn&#8217;t persuaded people to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/01\/11\/mongodb_ransomware_followup\/\">securely configure their MongoDB installations<\/a>, though. Out of the box, MongoDB requires no authentication to access, a detail a lot of folks appear to overlook. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7143\/cloud-security-from-start-point-to-end-point?td=wptl1810\">Cloud Security: From Start Point to End Point<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/03\/08\/verificationio_database_hole\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;This is a gigantic amalgamation of data all in one place&#8217; expert tells El Reg An unprotected MongoDB database belonging to a marketing tech company exposed up to 809 million email addresses, phone numbers, business leads, and bits of personal information to the public internet, it emerged yesterday.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25967,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-25966","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T21:45:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"541\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus\",\"datePublished\":\"2019-03-08T21:45:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/\"},\"wordCount\":800,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/\",\"name\":\"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg\",\"datePublished\":\"2019-03-08T21:45:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg\",\"width\":648,\"height\":541},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/","og_locale":"en_US","og_type":"article","og_title":"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-08T21:45:06+00:00","og_image":[{"width":648,"height":541,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus","datePublished":"2019-03-08T21:45:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/"},"wordCount":800,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/","url":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/","name":"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg","datePublished":"2019-03-08T21:45:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus.jpg","width":648,"height":541},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/that-marketing-email-database-that-exposed-809-million-contact-records-maybe-make-that-two-billion-plus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25966"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25966\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25967"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}