Lines.txt — 200k .us

Attackers craft convincing spam emails using the victim's real name and location to steal financial information.

Cybercriminals purchase or download these specific text files to execute targeted digital attacks.

Generate and store complex, unique passwords for every site you use to stop credential stuffing.

If you suspect your information has been included in a similar text file leak, take these immediate actions:

Hackers use automated software to test these 200,000 username and password combinations across other popular websites.