Hacker dumps Guns.com database with customers, admin data

Hacker dumps Guns.com database with customers, admin data

As seen by Hackread.com, among other sensitive data, the database includes Guns.com administrator, WordPress, and Cloud log in credentials in plain-text format.

As the domain name indicates, Guns.com is a major Minnesota, US-based platform to buy and sell guns online. It is also home to news and updates for gun owners and enthusiasts around the world. However, on March 9th, 2021, a database apparently belonging to Guns.com was dumped on an infamous hacker forum.


The actor behind the data dump claimed that it includes a complete database of Guns.com along with its source code. They further added that the breach took place somewhere around the end of 2020 and the data was sold privately meaning on Telegram channels or dark web marketplaces.


What data has been leaked?


According to Hackread.com’s analysis, the data contains highly sensitive information of Guns.com’s administrators and customers including:


• User IDs


• Full names


• Almost 400,000 email addresses


• Password hashes


• Physical addresses


• Zipcodes


• City


• State


• Magneto IDs


• Phone numbers


• Account creation date

One of the folders in the leaked database includes customers’ bank account details including:



• Full name


• Bank name


• Account type


• Dwolla IDs


However, credit card numbers or VCC numbers were not leaked.


Guns.com admin login credentials also leaked


Additionally, an Excel file in the database as seen by Hackread.com seems to contain sensitive login details of Guns.com including its administrator’s WordPress, MYSQL, and Cloud (Azure) credentials. However, it is unclear whether these credentials are recent, old, or already changed by the site’s administrators amid the breach.

..

Support the originator by clicking the read the rest link below.