The best thing with some of these hacks is that it is the Customer Support who probably got your account hacked in the first place, through social engineering by the culprit.
"hey, I have this and that information and I seem to have lost my email blabla, can you change it to … "
But when you then call them and claim (and are) the actual customer, they follow their script because they do not want to be socially engineered – since you’re just being honest.
Also there’s this:
https://www.leakedsource.com/
Post in your email adress and see all the places it is ‘matched’ and what kind of information leaked:
For example thanks to a few hacks this information is “leaked”
MySpace.com has: 1 result(s) found. This data was hacked on approximately 2013-06-11 00:00:00 email, username, hash, password2, Possible plaintext password, Real_Password2,
Adobe database has: 1 result(s) found. This data was hacked on approximately 2013-10-01 00:00:00
username, hash,
Unknown Emails has: 1 result(s) found. This data was hacked on approximately 0000-00-00 00:00:00
email, Possible plaintext password,
Xsplit Users has: 1 result(s) found. This data was hacked on approximately 2015-06-01 00:00:00
username, hash, Possible plaintext password, firstname, lastname, email, birthday, register_date, last_login,
Anandtech.com has: 1 result(s) found. This data was hacked on approximately 2016-03-15 00:00:00
username, Possible plaintext password, hash, email, register_date, last_login, birthday, ipaddress, salt,
Futuremark Forums has: 1 result(s) found. This data was hacked on approximately 0000-00-00 00:00:00
username, email, ipaddress, Possible plaintext password, hash, salt,
Hardforums Vbulletin Forums has: 1 result(s) found. This data was hacked on approximately 2015-04-27 00:00:00
username, email, ipaddress, Possible plaintext password, hash, salt,