Surprise! We've been running on hardware provided by BuyVM for a few months and wanted to show them a little appreciation.
Running a paste site comes with unique challenges, ones that aren't always obvious and hard to control. As such, BuyVM offered us a home where we could worry less about the hosting side of things and focus on maintaining a clean and useful service! Go check them out and show them some love!
Submitted on December 24, 2022 at 02:28 AM
Expires on January 23, 2023 at 02:28 AM (4 weeks from now)

Use case for this breach:
SIM swap
Crypto scams
BEC scams
Phishing accounts or crypto users
Selling verified, rare username, and special usernames
Make xxx, xxx $ by doing crypto scams https://www.bleepingcomputer.com/news/security/verified-twitter-accounts-hacked-in-580k-elon-musk-crypto-scam/

find private emails for employees and send malware to, for example IT employee laptop and once hacked they can pivot once he connects the laptop to the company network

And for any other government if you are reading this  you can simply buy this data and you spy at citizens you want also you can track their location by sending them an email for example to @DrAbolfotoh his scraped email is [email protected] the email must contain a GIF image that when the victim open it can grab his IP address and thus tracking him
Or just find their phone numbers from here and send them your Pegasus exploit or any other to target them without leaving a trace.

You can get a lot of $ by contacting, phishing og usernames like @x and verified accounts, then selling them, twitter is the biggest platform for nft and crypto so this data is 10x more valuable than any other platform

You can also compare the usernames from for example @ledger @metamask @coinbase or @exodus_io or users that have .eth in their name and then you will have an email list that you know is super targeted for example you can send phishing emails with a stealer malware or make fake website with 12-word secret recovery phrase grabber so you can drain their wallets easily, you can even search emails in this data breach
Through leaked Databases to get home_address, passwords and other info you may like of potential people who lets say follow ledger or Coinbase (the ledger data leak that was sold for xxx, xxx $ it only had 9,500 home_address and emails on it)

I mean what you can do with this data is amazing