DATABASE LUMINPDF.COM — 15.4M USERS EXPOSED (EMAIL, HASHES, TOKENS, GENDER, LANG)

DBHunter

Infinity Member
Golden Member
Joined
August 23, 2025
Messages
1,021
Reaction score
1,111
Points
113
Hello DNA Community,
Dropping the full dump of LuminPDF — a New Zealand-based document workflow platform, breached back in April 2019.




This breach was never officially disclosed by the company. Instead, over 15 million user records were found publicly exposed via a misconfigured MongoDB instance, allegedly ignored by the vendor despite multiple contact attempts.
The dataset was eventually dumped on a well-known hacking forum in late 2019.
It contains rich user profiles ideal for credential analysis, phishing or takeover campaigns — including:

• Full names, usernames
• Email addresses
• Genders
• Spoken languages
• Either bcrypt password hashes or Google auth tokens


All users were active LuminPDF members between ~2016–2019.
This is the **original full breach** — not a sample, not partial.

Target: luminpdf.com
Format: MongoDB Dump → JSON/CSV
Records: 15,453,048
Data: Name, Email, Gender, Language, Bcrypt Hash or Google Token





Breached: 1 April 2019
Re-leaked: 9 January 2026

DL
To see this hidden content, you must react with one of the following reactions : Like, Love, Haha, Wow
 
Reactions: Aayesha and verydarkman
  • Tags
    cyber-security-breaches database-leak-download download-hashed-data luminpdf-hack user-data-exposure