: Age, gender, and sometimes socio-economic indicators. Security Implications
: Use services like Have I Been Pwned to see if your email or phone number appears in known leaks.
Files with this naming convention generally contain or account credentials. Common data points found in such dumps include:
: Use Multi-Factor Authentication (preferably via an authenticator app) on all sensitive accounts.
: Full names, physical addresses, and phone numbers.
: Often formatted as "combo lists" (email:password) used for credential stuffing attacks.