This blog post is replicated from https://inteltechniques.com/exposure.html and is the final step of our four-step process for eliminating much of your online exposure. Steps One, Two, and Three can be found HERE. Any updates to this post will be published at https://inteltechniques.com/exposure.html.
We all have credential exposure. Within thousands of database breaches, our email addresses, usernames, passwords, and other sensitive details are being shared across the internet. This has created business opportunities for online services which sell access to our private details. Numerous websites allow anyone to search your email address and see the breach in which it was associated, often along with a partial password. For a few bucks, many sites will show anyone the full password. Let's do something about that. The following steps allow you to remove your email address and exposed credentials from these services.
Have I Been Pwned
- Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut.
- Click the link in the email confirmation.
- Choose the "Remove email address completely" option.
Dehashed
- Create a free burner account at https://dehashed.com.
- Conduct a search of your email address or username.
- Click "Request entry removal" link below each result.
- Click the confirmation link within each email.
Spycloud
- Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
- Search your email address at the first "Spycloud" option.
- If any results are present, navigate to https://spycloud.com/contact-us.
- Complete the from requesting removal of your records.
Leakcheck
- Register for a free burner account at https://leakcheck.net.
- Conduct a search of your email address.
- If entries are present , send an email from the exposed address with a written removal request to [email protected].
- Click the link within the confirmation email.
PSBDMP
- Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
- Search your email address at the first "PSBDMP" option.
- If any results are present, send an email to [email protected] requesting removal.
IntelX
- Conduct a search of your email address at https://intelx.io.
- Navigate to https://intelx.io/abuse.
- Paste any URLs associated with the found content "Full Data" links.
- Submit request.
HudsonRock
- Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
- Search your email address at the first "HudsonRock" option.
- If any results are present, send an email to [email protected] requesting removal. If that fails, use the contact page at https://www.hudsonrock.com/contact.
Leak-Lookup
- Register for a free burner account at https://leak-lookup.com.
- Conduct a search of your email address.
- If entries are present , send an email from the exposed address with a written removal request to [email protected].
HackCheck
- Register for a free burner account at https://hackcheck.io.
- Conduct a search of your email address.
- If entries are present , send an email from the exposed address with a written removal request to [email protected].
Breach Directory
- Navigate to https://breachdirectory.org.
- Search your email address.
- If any results are present, send an email to [email protected] requesting removal.
LeakPeek
- Navigate to https://leakpeek.com.
- Search your email address.
- If any results are present, send an email to [email protected] requesting removal.
This will not eliminate your exposed credentials within the original breaches or the countless copies which are floating around. However, it will remove them from the most commonly used lookup services. As always, change any exposed credentials immediately within your password manager and the services impacted.