URL LOGIN PASS SATANIC CLOUD PART 4 5M data breach

URL LOGIN PASS SATANIC CLOUD PART 4 5M

What Happened

In 2024, the “URL LOGIN PASS SATANIC CLOUD PART 4 5M” data breach refers to a massive leak of login credentials attributed to the “SATANIC CLOUD” hacking group, with a key file named “22M URL-LOGIN-PASS 22.05.2024 SATANIC CLOUD.txt” (1.5 GB, over 22 million lines in plain-text format of URL:email:password combinations) circulating on Telegram and dark web forums. Likely compiled from infostealer malware targeting browsers via phishing, cracks, or cloned sites, it exposed around 49,340 records for Mexican government .gob.mx portals (e.g., 23,712 for SAT tax site, 961 for CDMX government, 533 for ISSSTE, 649 for empleo.gob.mx), plus 53,600 for .com.mx domains, with many credentials still active as of May 22, 2024, enabling real account access and sensitive data theft like electronic health files. This appears to be part of a broader “SATANIC CLOUD” series involving URL-login-password “combolists,” distinct from unrelated 2024 leaks like POWERcloud (1.14GB emails, March 2024 by Mooncloud) or massive dark web dumps of 140M-900M credentials from cloud/Telegram logs, though no exact “PART 4 5M” subset was detailed.

Compromised Assets

  • url
  • email
  • password

Related Breaches

Check your company's
exposed credentials

Enter your work email to instantly access a free account
and see your company’s exposed credentials.