|
Task Description
Title
Critical Exposure of alwaysdata.com User Credentials via Alien TxtBase (Plaintext Passwords, Emails & Phone Numbers)
URL
Multiple alwaysdata endpoints are present in the leak, including:
https://alwaysdata.com/
https://alwaysdata.com/fr/inscription
https://alwaysdata.com/fr/inscription/
https://alwaysdata.com/en/register
https://alwaysdata.com/en/register/
https://alwaysdata.com/en/signup/account/
https://alwaysdata.com/fr/signup/account/
https://alwaysdata.com/fr/signup/
https://alwaysdata.com/en/marketplace/bookstack/
Evidence spread across all uploaded LeakBase / Alien TxtBase HTML files.
Description
The uploaded Alien TxtBase datasets show large-scale exposure of alwaysdata.com account credentials, collected by infostealer malware that steals browser-saved logins.
Across all the files, there are hundreds of entries for alwaysdata.com, including:
Emails (Gmail, Hotmail, Yahoo, corporate domains, etc.)
Plaintext passwords
Nicknames / device usernames
Phone numbers in some entries
Direct registration and signup URLs on alwaysdata.com
Examples of leaked patterns (all values redacted here):
Email + password + registration link, e.g.: Email: …@gmail.com / Password: Fahendrena / Link: alwaysdata.com/fr/inscription
5202727960
Password + nick + registration URL (no email), e.g.: Password: Footballclub972 / Nick: nathanv / Link: alwaysdata.com
5202727960
Email + password + /en/register or /fr/signup/account URLs, e.g. multiple developer / project owner accounts
Entries including phone number and “App: alwaysdata.com” metadata
The data confirms that real alwaysdata.com user accounts, including hosting users, developers and small businesses, have their credentials exposed in plaintext in a public leak collection.
While the initial compromise is on user devices (infostealers), the effect is a direct, ongoing compromise of alwaysdata.com accounts, as the credentials are valid and can be reused by attackers at any time.
Impact
Severity: CRITICAL
1. Full Account Takeover (ATO)
Attackers can use any email/password pair from the logs to log into alwaysdata.com and:
Access hosting control panels for websites and apps
Modify or delete customer sites
Inject malicious content, phishing pages, or malware
Change account email, password, and billing details
Because passwords are in clear text, there is no need for cracking or guessing.
2. Website & Application Compromise
As alwaysdata is a hosting provider, compromised accounts may be:
Production sites for individuals, startups, and small businesses
Internal dashboards or admin panels
Hosted APIs or backends
This allows attackers to:
Deface or replace websites
Steal data from web applications
Use compromised infrastructure for further attacks (phishing, malware hosting, C2, etc.)
3. Reputational & Legal Risk
Leaked credentials include:
Emails
Passwords
In some cases, phone numbers
This exposes alwaysdata users to:
Identity theft
Targeted phishing
Credential reuse on other services
It may also create privacy and regulatory exposure for alwaysdata if not addressed (e.g., GDPR if EU users are affected).
4. Ongoing Automated Exploitation
Alien TxtBase:
Is widely shared through Telegram breach channels
Is integrated into OSINT and credential-stuffing tools
Is resold on dark-web marketplaces
This means alwaysdata.com accounts will be continuously targeted, not just once.
Evidence (Redacted)
Representative examples from the uploaded leak files (all real, but anonymized):
Email: <redacted>@gmail.com Password: Link: alwaysdata.com/en/register/
5202727960
Password: Nick: Powerbyte Link: alwaysdata.com/fr/signup/account/
Email: <redacted>@hotmail.com Password: Link: alwaysdata.com/fr/inscription/
Email: <redacted>@gmail.com Telephone: <redacted> App: alwaysdata.com
No raw passwords, emails or phone numbers are reproduced in this report.
Recommendation Immediate
Force password reset for all alwaysdata.com accounts whose credentials appear in Alien TxtBase.
Invalidate active sessions and login cookies for those users.
Alert affected users and advise them to:
Clean their devices of infostealer malware
Change reused passwords on other platforms.
Short-Term
Implement breached-password protection:
Block login with passwords known to be exposed in public leaks (including Alien TxtBase).
Enforce or strongly encourage MFA for all alwaysdata accounts.
Add rate limiting and bot protection on login, signup and password reset endpoints.
Monitor for abnormal login patterns from known bad IP ranges or TOR exit nodes.
Long-Term
Move toward passwordless authentication (WebAuthn / security keys) for control-panel access.
Deploy continuous dark-web / Telegram breach monitoring for “alwaysdata.com” credentials.
Provide security guidance for customers (blog / documentation) on:
Risks of storing passwords in browsers
Infostealer malware
Using password managers and MFA.
|