IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Email verification service takes itself offline after 800 million records get publicly exposed

Researchers find a non-protected MongoDB instance amounting to 150GB of unique data

Image depicting email security

An online email verification service has taken itself offline after approximately 809 million of its customers' emails were exposed through an unprotected server.

Researchers discovered a non-password protected MongoDB instance amounting to 150GB of data split across four separate collections last week. They analysed this exposed data, 808,593,939 records in total, and published their findings on Thursday.

The exposed records are owned by an email verifications service named, according to the researchers.

The largest drive, named 'mailEmailDatabase', itself contained three folders; Emailrecords (798,171,891 records exposed), emailWithPhone (4,150,600 records exposed) and businessLeads (6,217,358 records exposed).

Beyond names, email addresses and phone numbers, the exposed records may also have contained additional information such as city, phone number, date of birth, and gender.

Cyber security expert Bob Diachenko, who discovered and analysed the exposed data with NightLion Security's Vinny Troya, then cross-referenced these records with the HaveIBeenPwned database.

They established these were unique records that had never been exposed in any previous 'collections'. Included in this bracket, for example, are the monster Collections #1 to #5 leaks of 2.2 billion unique records exposed earlier this year.

"This is perhaps the biggest and most comprehensive email database I have ever reported," Diachenko wrote in his post.

"Upon verification, I was shocked at the massive number of emails that were publicly accessible for anyone with an internet connection. Some of data was much more detailed than just the email address and included personally identifiable information (PII)."

Clues within the dataset pointed Diachenko to as the likely owner of the non-password protected MongoDB instance.

The company, which offers 'enterprise email validation' as a service, then took its entire website offline the same day he reported the discovery to its support team.

"We appreciate you reaching out and informing us,"'s support team told Diachenko via email. "We were able to quickly secure the database. Goes to show, even with 12 years of experience you can't let your guard down.

"After closer inspection, it appears that the database used for appends was briefly exposed. This is our company database built with public information, not client data."

This fact has confused the researchers, however, who in their blog post posed the question "why close the database and take the site offline if it indeed was "public"?" remains offline at the time of publication.

Featured Resources

The COO's pocket guide to enterprise-wide intelligent automation

Automating more cross-enterprise and expert work for a better value stream for customers

Free Download

Introducing IBM Security QRadar XDR

A comprehensive open solution in a crowded and confusing space

Free Download

2021 Gartner critical capabilities for data integration tools

How to identify the right tool in support of your data management solutions

Free Download

Unified endpoint management solutions 2021-22

Analysing the UEM landscape

Free Download

Most Popular

Samsung proposes 11 Texas semiconductor plants worth $191 billion

Samsung proposes 11 Texas semiconductor plants worth $191 billion

21 Jul 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Should you take your password manager off the internet?

Should you take your password manager off the internet?

28 Jul 2022