URL LOGIN PASS SATANIC CLOUD PART 1 5M data breach

URL LOGIN PASS SATANIC CLOUD PART 1 5M

What Happened

In 2024, the “URL LOGIN PASS SATANIC CLOUD PART 1 5M” data breach involved a group called SATANIC CLOUD leaking a massive 1.5 GB plain-text file named “22M URL-LOGIN-PASS 22.05.2024 SATANIC CLOUD.txt” containing over 22 million lines of URL, email, and password combinations, which was shared on Telegram channels. This combolist, likely compiled from infostealer malware targeting browsers, session cookies, and documents, included approximately 49,340 records tied to Mexican government sites (.gob.mx domains like SAT, ISSSTE, empleo.gob.mx, and Mexico City systems), plus 53,600 for .com.mx pages, with many credentials remaining active and enabling unauthorized access to citizens’ accounts. No specific company was directly breached; instead, it aggregated stolen data across platforms, heightening risks of phishing, account takeovers, and targeted attacks, though the “5M” in the query may refer to a subset or related dump not explicitly detailed.

Compromised Assets

  • url
  • email
  • password

Related Breaches

Check your company's
exposed credentials

Enter your work email to instantly access a free account
and see your company’s exposed credentials.