WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2026 Poal.co

319

This morning I received a number of emails from hungerrush, an online menu/ordering service. I've used them before when ordering pizza, in particular Jet's Pizza uses them for their order backend.

The emails indicate that the sender is has contacted hungerrush, has not received a reply, and is going to do malicious things with their database if they don't comply. Header analysis seems to indicate that the sender information is correct, although some tools seem unsure. Information in the email seems to indicate that it's a flex on the scammer's part and isn't directed at me.

I've notified some interested parties of this potential breach, but I thought it might be prudent to drop a note here for anyone that may have used that service.

email analysis

This morning I received a number of emails from hungerrush, an online menu/ordering service. I've used them before when ordering pizza, in particular Jet's Pizza uses them for their order backend. The emails indicate that the sender is has contacted hungerrush, has not received a reply, and is going to do malicious things with their database if they don't comply. Header analysis seems to indicate that the sender information is correct, although some tools seem unsure. Information in the email seems to indicate that it's a flex on the scammer's part and isn't directed at me. I've notified some interested parties of this potential breach, but I thought it might be prudent to drop a note here for anyone that may have used that service. [email analysis](https://poal.co/static/images/867c606660e4e482.png)
[–] 0 pt

Pro tip: they won’t. They don’t. They never do (statically).

I’m Always like what leaked? Do I care? My social number and all my data is online and on the dark.

Who gives fuck.

Lock your credit down and forget about it. Then start using unique emails for each login with a password keeper.

They want logins to money and crypto, that’s all they can really hope to get.

<Pink-bunny-turd@doesnotexist.com> is not used anywhere else on the web. So they have no cross hack vector.