Event JSON
{
"id": "c6124396775aa9095370a24b6719cf9e971c868b4994107744b99505f1b98f9c",
"pubkey": "7c87470aa1d2e9727247b53d76e0295fb09be6497380b8ee6c9e8ee7a7f2fda1",
"created_at": 1705500465,
"kind": 1,
"tags": [
[
"p",
"956f16c5014877896aa5681df70ef31edcad9c82d1bce39751902d0247893094",
"wss://relay.mostr.pub"
],
[
"p",
"7c87470aa1d2e9727247b53d76e0295fb09be6497380b8ee6c9e8ee7a7f2fda1",
"wss://relay.mostr.pub"
],
[
"proxy",
"https://infosec.exchange/users/haveibeenpwned/statuses/111771678499034821",
"activitypub"
]
],
"content": "New breach: The Naz.API stealer logs and cred stuffing lists were posted to a hacking forum in Sep. Data included 71M email addresses and 100M plain text passwords, often alongside the service they were used for. 67% were already in nostr:npub1j4h3d3gpfpmcj649dqwlwrhnrmw2m8yz6x7w8963jqksy3ufxz2qumdf4l. More: https://www.troyhunt.com/inside-the-massive-naz-api-credential-stuffing-list/",
"sig": "a1aa0b562576dcd4464e18b67794765e5ba56f31ce681e63edb6afe080a3f491cca354e332e7e2fbaba599338688f678df9119beb743e9a491883661f0f584d2"
}