Cock.li confirmed the validity of the breach based on sample data and column structure, stating that the exposed dataset includes roughly 1,023,800 user records. The compromised fields include email addresses, timestamps of first and last webmail logins, failed login attempt data, language preferences, and serialized Roundcube user settings such as webmail signatures and interface configurations. Additionally, approximately 93,000 contact entries associated with around 10,400 users were leaked, containing names, email addresses, comments, and vCard data.
Not sure why people ever trusted a meme email provider in the first place…
But PROTON is the honeypot, right???
No evidence of that.
Wooosh.
what is going to happen to my horsefucker.org email
Despite this exposure, Cock.li emphasizes that no passwords, email message contents, or IP addresses were included in the breach. Passwords were stored in a separate sessions table, which was not among the leaked assets. The breach only affects users who accessed their accounts via Roundcube’s webmail interface at any point between 2016 and the feature’s deprecation earlier this month. Cock.li administrators sent targeted notifications to users with contact data included in the leak.
Good to know. I think I maybe logged into webmail once, years ago, but I don’t care about any of the info listed here.
Oof, contacts being leaked is a bad one.
I was gonna make a pun, but I’m not in any hurry for it to come out.
i am