Wishbone comes in the list of trending social platforms used by users to compare anything. It covers everything from fashion, celebrities, humor, music, and pretty much anything the user can think about. This social platform has allowed users to express themselves differently than through other social networking applications such as Snapchat, Facebook, etc.
Recently, Cyble’s researchers discovered a credible actor selling the Wishbone.io database via an online selling platform. This leaked database includes detailed information such as email addresses, names, usernames, phone numbers, geographic locations, genders, social media profiles, passwords of around 40 million user accounts. As soon as they came across this leak, Cyble acquired the entire database and indexed it on their amibreached search engine which is the largest data breach and darkweb monitoring search engine with over 40 billion dark web records. Below is the snapshot of the selling post of Wishbone’s database.

As per the internal research reports, Cyble had the information about this data leak since the month of March this year. But apparently, just two days back they got hold of this large Wishbone.io database.
About Cyble:
Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.
Cyble strives to be a reliable partner/facilitator to its clients allowing them with unprecedented security scoring of suppliers through cyber intelligence sourced from open and closed channels such as OSINT, the dark web, and deep web monitoring and passive scanning of internet presence. Furthermore, the intelligence clubbed with machine learning capabilities fused with human analysis also allows clients to gain real-time cyber threat intel and help build better and stronger resilience to cyber breaches and hacks. Due to the nature of the collected data, the company also offer threat intelligence capabilities out-of-box to their subscribers.