TopEaglerServers' Data Breach

View some of the proof, here. (For the time being).
As you may know by now, TES has had a data breach. This website explains how, when, and what happened.
Brought to you by Snelsterendier.
View their Privacy Policy at the time of the breach.
View their Terms Of Service at the time of the breach.

Visit Discord for real-time updates and proof.

Hello everyone, I am snelsterendier.
I want to inform all of you about the recent data breach at TES. You probably came across this site via one of our Discord announcements.
On 7 March 2026, I discovered that TES had left its entire database publicly accessible. No hacking was required only a free account and access to exposed API endpoints.
I immediately reported this to the team. A staff member (Josh) acknowledged the issue and claimed a fix was deployed, but the vulnerability remained accessible. No users were notified.
Under GDPR, organizations have 72 hours to report breaches. TES failed to do so, so we are informing users ourselves.

The Breach

TES exposed administrative API endpoints without authentication:

Additionally, internal directories were accessible via SFTP, exposing server infrastructure.

What Was Exposed

Impact

A total of 27,611 users were exposed, including over 5,800 school email domains, indicating likely exposure of children's data.

Timeline

Legal Issues

TES failed to comply with GDPR obligations, including:

What You Should Do

  1. Watch for phishing emails
  2. Change reused passwords
  3. Request deletion of your data
  4. File a complaint with the ICO
  5. Inform others who may be affected

Action Taken

A formal complaint has been submitted to the Information Commissioner's Office (ICO) by Snugent120. Since TES failed to notify users, we are spreading awareness ourselves.

CREDITS: