Utilising the HaveIBeenPwned.com API, check whether email addresses and/or user names have been present in a publicly disclosed data breach.
The R package aims to be / is a feature complete wrapper of the HaveIBeenPowned API, and is useful for situations where you may want to assess data breaches or check whether one or more email addresses have been compromised.
If you get a lot of value out of this package, do consider donating to HIBP since Troy Hunt does not put any limits on the API and it’s a tremendous service.
library("HIBPwned")
account_breaches("steff.sullivan@gmail.com", truncate=TRUE)
## $`steff.sullivan@gmail.com`
## Name
## 1 Adobe
## 2 LinkedIn
breached_sites("adobe.com")
## Title Name Domain BreachDate AddedDate PwnCount
## 1 Adobe Adobe adobe.com 2013-10-04 2013-12-04T00:00:00Z 152445165
## Description
## 1 In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, <em>encrypted</em> password and a password hint in plain text. The password cryptography was poorly done and <a href="http://stricture-group.com/files/adobe-top100.txt" target="_blank">many were quickly resolved back to plain text</a>. The unencrypted hints also <a href="http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html" target="_blank">disclosed much about the passwords</a> adding further to the risk that hundreds of millions of Adobe customers already faced.
## DataClasses IsVerified
## 1 Email addresses, Password hints, Passwords, Usernames TRUE
## IsSensitive IsActive IsRetired LogoType
## 1 FALSE TRUE FALSE svg
breached_site("Adobe")
## Title Name Domain BreachDate AddedDate PwnCount
## 1 Adobe Adobe adobe.com 2013-10-04 2013-12-04T00:00:00Z 152445165
## Description
## 1 In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, <em>encrypted</em> password and a password hint in plain text. The password cryptography was poorly done and <a href="http://stricture-group.com/files/adobe-top100.txt" target="_blank">many were quickly resolved back to plain text</a>. The unencrypted hints also <a href="http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html" target="_blank">disclosed much about the passwords</a> adding further to the risk that hundreds of millions of Adobe customers already faced.
## DataClasses IsVerified
## 1 Email addresses, Password hints, Passwords, Usernames TRUE
## IsSensitive IsActive IsRetired LogoType
## 1 FALSE TRUE FALSE svg
data_classes()
## [1] "Account balances" "Age groups"
## [3] "Astrological signs" "Avatars"
## [5] "Bank account numbers" "Banking PINs"
## [7] "Beauty ratings" "Biometric data"
## [9] "Car ownership statuses" "Career levels"
## [11] "Credit cards" "Customer feedback"
## [13] "Customer interactions" "Dates of birth"
## [15] "Device usage tracking data" "Drinking habits"
## [17] "Drug habits" "Education levels"
## [19] "Email addresses" "Email messages"
## [21] "Employers" "Ethnicities"
## [23] "Family members' names" "Family plans"
## [25] "Financial transactions" "Fitness levels"
## [27] "Genders" "Geographic locations"
## [29] "Government issued IDs" "Historical passwords"
## [31] "Home addresses" "Home ownership statuses"
## [33] "Homepage URLs" "Income levels"
## [35] "Instant messenger identities" "IP addresses"
## [37] "Job titles" "MAC addresses"
## [39] "Marital statuses" "Names"
## [41] "Nicknames" "Parenting plans"
## [43] "Passport numbers" "Password hints"
## [45] "Passwords" "Payment histories"
## [47] "Personal descriptions" "Personal interests"
## [49] "Phone numbers" "Physical attributes"
## [51] "Political views" "Private messages"
## [53] "Purchases" "Races"
## [55] "Recovery email addresses" "Relationship statuses"
## [57] "Religions" "Reward program balances"
## [59] "Salutations" "Security questions and answers"
## [61] "Sexual fetishes" "Sexual orientations"
## [63] "Smoking habits" "SMS messages"
## [65] "Social connections" "Spoken languages"
## [67] "Time zones" "Travel habits"
## [69] "User agent details" "User website URLs"
## [71] "Usernames" "Website activity"
## [73] "Work habits" "Years of birth"