Threat actor lulzintel published the full PrestaShop database of Polish eco-retailer VegeHome (vegehome.pl), exposing data for over 100,000 customers in April 2026. Leaked fields include names, emails, hashed passwords, password reset tokens, secure keys, company identifiers (SIRET/AP E), payment terms, and internal mail records, creating high risk of account takeover and business identity theft. #lulzintel #VegeHome
Keypoints
- lulzintel publicly leaked VegeHomeβs PrestaShop database in April 2026, exposing data for 100,000+ customers.
- Compromised fields include full names, email addresses, birthdays, and hashed passwords.
- Leaked password reset tokens and secure keys could enable account takeover if still valid.
- B2B data such as company names, SIRET numbers, APE codes, and payment terms were exposed, increasing business identity theft risk.
- The ps_mail table and account metadata were included, revealing internal emails and customer account details; the dump is available as a free forum download.
DarkWebInformer.com Providing intel from some of the darkest places on the Dark Web & Clearnet. Breaches, Darknet Markets, Ransomware, Threat Alerts, & more!