Privacy Ninja

Anonymous Poop Gifting Site Hacked, Customers Exposed

Anonymous Poop Gifting Site Hacked, Customers Exposed

ShitExpress, a web service that lets you send a box of feces along with a personalized message to friends and enemies, has been breached after a “customer” spotted a vulnerability.

Except, in an interesting twist, rather than responsibly reporting the vulnerability, the customer who is a known threat actor ended up exploiting the bug and downloading the entire database.

This database was then shared on a hacking forum, exposing the angry, and sometimes hysterical, personal messages sent by the customers with the gifts.

Shit delivery service hacked

“A simple way to send a piece of shit in a box around the world,” ShitExpress describes what is a prank web service where customers can purchase and deliver real animal feces to friends or frenemies located anywhere in the world.

“Imagine all the people who annoy you the most. An irritating colleague. School teacher. Your ex-wife. Filthy boss. Jealous neighbour. That successful former classmate. Or all those pesky haters,” states the homepage of ShitExpress.

“What if you could send them a smelly surprise? There is nothing that could replace the expression on the recipient’s face after opening the box!”

Also Read: Completed DPIA Example: 7 Simple Helpful Steps To Create

ShitExpress’ 4-step buying process involves:

  • Choosing an animal, ahem excrement, e.g. organic, wet horse poop.
  • Providing a shipping address
  • Customizing packaging, e.g. with a smiley sticker
  • Paying for your order

Payments can be made via credit card or Bitcoin. The service promises its patrons complete anonymity, even when paying via credit card.

buying steps
ShitExpress 4-step buying process simplified

But this time around, ShitExpress was visited by an interesting customer—pompompurin, the owner of hacking forum and a well-known hacker who has previously stolen private data from companies like QuestionPro and Mangatoon. The hacker also previously put up stolen data of 7 million Robinhood customers for sale online.

According to a forum post authored by pompompurin, the hacker recently visited ShitExpress to send a box of poop to cybersecurity researcher Vinny Troia.

Former members of RaidForums including pompompurin (who now owns and Troia are purportedly in a long-standing feud with each other over the researcher’s interactions with the hacker community and a report on The Dark Overlord.

This feud has led to Pompompurin hacking the FBI servers to send false alerts about cyberattacks in November 2021, conducted by “threat actor” Vinny Troia.

At one point, Troia even mawkishly launched a petition, asking international leaders to extradite pompompurin to the U.S.

Recently, when pompompurin visited ShitExpress to send a token of appreciation to Troia, the hacker realized the website was vulnerable to SQL Injection.

The hacker was able to access customer messages, email addresses, and other private data associated with customer orders.

This Tuesday, pompompurin also shared a small sample data set containing a preview of multiple database tables hosted by ShitExpress.

Also Read: 12 Benefits of Data Protection for Business Success

Some of the messages contained in the orders are shown below. BleepingComputer has redacted messages with overly explicit wording that readers may find offensive.

Hacker posts ShtExpress data on forum post
Hacker shares ShitExpress sample data set on forum post (BleepingComputer)

Some other messages in the sample data set seen by BleepingComputer included:”I saw a cockroach today and thought of you… I stepped on it”
“This gift shows my thanks for your hard work, and is a symbol of how great my team thinks you are. ENJOY!”

When approached by BleepingComputer for verification, pompompurin states they were surprised that the customer database wasn’t as big as they had expected.

“It’s honestly not that big… There’s about 29,000 orders in the data,” pompompurin told BleepingComputer. The hacker stated on Twitter though, that the website had 60,000 users. It appears not every user who’s registered on the website has placed an order.

pompompurin further confirmed having exploited ShitExpress via SQL Injection but that they did not extort the site owners with a ransom demand.

“I gained access a day before I leaked it, and I notified the website owner after dumping the data. [I’m] not sure if they’ve acknowledged or anything as of yet,” concluded the hacker.

ShitExpress DOES give a crap about security

To confirm the authenticity of the forum post, we reached out to ShitExpress. A ShitExpress spokesperson told BleepingComputer:

“We have spotted some unusual activity on our server 4 days ago and found out that one of our script is vulnerable to SQL injection,” It’s purely our fault — a human error that could happen to anyone. It was found by one of our customers. We fixed the error immediately.

Please understand that this is a simple prank site. There is no ransom demand. Nothing really happened.

If a website visitor uses the form on our site, all the details are stored in our database. It’s mostly junk because people are pranking their friends — they enter their data + email address and leave. After that, we send them email to pay for their order and the pranked person is freaking out, trying to find out who did that.

As mentioned on our site, we never reveal the real identity — simply because we don’t have any personal information of the people who filled the form on our website. If someone pays with a cryptocurrency, it’s obviously very safe and anonymous. If they pay by credit card, all the information stays with the payment processor. It’s simple as that.”

More companies should follow ShitExpress’ lead when it comes down to promptly responding to security issues, and owning up to data breaches, transparently.

And, as they say, “This shit is hilarious!”



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us