These files are actively traded, sold, and shared in cybercriminal communities to fuel identity theft and phishing operations. 📁 Anatomy of the File

If you suspect your information has been included in a similar text file leak, take these immediate actions:

Hackers use automated software to test these 200,000 username and password combinations across other popular websites.

  • Download Now
    Please select all that apply
  • MENTOR National and Affiliates will use the information you provide to better inform future publications and keep you up to date with advancements in the mentoring field. For more information, check out our privacy policy.