Pokemon GO servers website was targeted in a denial-of-service (DoS) attack that hacked their site, dumped the database, and shared it with data breach index service LeakedSource.
The database contains tables that hold information on the botnet's slaves (bots), control panel logins, logs, payment details, payment plans, support tickets, servers, and attack gateways.
TPRM report: https://scoringcyber.rankiteo.com/company/pok%C3%A9mon-go-hub
"id": "pok18283622",
"linkid": "pok%C3%A9mon-go-hub",
"type": "Breach",
"date": "08/2016",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Gaming',
'name': 'Pokemon GO',
'type': 'Company'}],
'attack_vector': 'DoS',
'data_breach': {'data_exfiltration': True,
'type_of_data_compromised': ["botnet's slaves (bots)",
'control panel logins',
'logs',
'payment details',
'payment plans',
'support tickets',
'servers',
'attack gateways']},
'description': 'Pokemon GO servers website was targeted in a '
'denial-of-service (DoS) attack that hacked their site, dumped '
'the database, and shared it with data breach index service '
'LeakedSource.',
'impact': {'data_compromised': ["botnet's slaves (bots)",
'control panel logins',
'logs',
'payment details',
'payment plans',
'support tickets',
'servers',
'attack gateways']},
'title': 'Pokemon GO Servers DoS Attack and Data Breach',
'type': 'Denial-of-Service (DoS) Attack'}