Mar 26, 2026
5,118,184 accounts
In March 2026,
the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness, a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threatened to publish it if a ransom was not paid. The following month, after claiming payment had not been made, ShinyHunters publicly released the data. The collection amounted to many terabytes across thousands of files that appeared to originate from multiple systems and business functions, including leads, support records and other CRM-related data. The data contained approximately 5M unique email addresses, often accompanied by name and phone number depending on the source file.
Email addresses
Names
Phone numbers
Apr 19, 2026
215,563 accounts
In April 2026, the ultra-luxury hotel brand
Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign, with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on all records, the data also included genders, physical addresses, phone numbers, nationalities, dates of birth, spouse names and VIP status codes.
Dates of birth
Email addresses
Genders
Language preferences
Names
Nationalities
Phone numbers
Physical addresses
Spouses names
VIP statuses
Apr 19, 2026
8,243,989 accounts
In April 2026, the hacking collective
ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses, along with names, phone numbers and physical addresses. A subset of the data also included Pitney Bowes employee records with job titles.
Email addresses
Job titles
Names
Phone numbers
Physical addresses
Apr 19, 2026
5,488,888 accounts
In April 2026, home security firm
ADT confirmed a data breach by ShinyHunters, which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included" and that it had contacted all affected people.
Dates of birth
Email addresses
Names
Partial government issued IDs
Phone numbers
Physical addresses
Apr 23, 2026
1,401,259 accounts
In April 2026, online training company
Udemy was the victim of a “pay or leak” extortion attempt perpetrated by the ShinyHunters group. The data was subsequently leaked publicly and contained 1.4M unique email addresses belonging to customers and instructors. The data also included names, physical addresses, phone numbers, employer information and instructor payout methods including PayPal, cheque and bank transfer.
Email addresses
Employers
Job titles
Names
Payment methods
Phone numbers
Physical addresses
Apr 17, 2026
7,531,359 accounts
In April 2026, the notorious hacking collective
ShinyHunters claimed they had obtained a substantial volume of data belonging to the Carnival cruise operator and attempted to extort the organisation to prevent the data from being leaked. The following week, the group published the data publicly, which contained 8.7M records with 7.5M unique email addresses. The data contained fields indicating it related to the Mariner Society loyalty program run by Holland America, a cruise line brand under Carnival, and included names, dates of birth, genders and data relating to status within the loyalty program. Carnival acknowledged a phishing incident involving a single user account and advised they were working to better understand the scope of the unauthorised activity.
Dates of birth
Email addresses
Genders
Geographic locations
Loyalty program details
Names
Salutations
Apr 2, 2026
2,147,679 accounts
In April 2026, the hacking group
ShinyHunters claimed they had breached Amtrak. The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M unique email addresses along with names, physical addresses and customer support records.
Email addresses
Names
Physical addresses
Support tickets
Apr 9, 2026
13,500,136 accounts
In April 2026, education company
McGraw Hill confirmed a data breach following an extortion attempt. Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later publicly distributed, containing 13.5M unique email addresses across multiple files, with additional fields such as name, physical address and phone number appearing inconsistently across some records.
Email addresses
Names
Phone numbers
Physical addresses
Mar 30, 2026
1,736,520 accounts
In March 2026,
Hallmark suffered an alleged breach and subsequent extortion after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service, along with names, phone numbers, physical addresses and support tickets.
Email addresses
Names
Phone numbers
Physical addresses
Support tickets
Apr 6, 2026
106,271 accounts
Email addresses
Social media profiles
Mar 11, 2026
1,195,684 accounts
Email addresses
Apr 1, 2026
291,739 accounts
Auth tokens
Avatars
Email addresses
Names
Passwords
Usernames
Mar 3, 2026
253,510 accounts
In March 2026, the personal development and achievement media brand
SUCCESS suffered a data breach. The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders containing physical addresses and the payment method used. In
SUCCESS' disclosure notice, they advised their system had also been abused to send offensive newsletters with quotes falsely attributed to contributors.
Device information
Email addresses
IP addresses
Names
Passwords
Phone numbers
Physical addresses
Purchases
Mar 20, 2025
144,250 accounts
Avatars
Display names
Email addresses
Mar 25, 2026
339,778 accounts
Email addresses
Passwords
Usernames
Jun 4, 2015
128,683 accounts
In June 2015, custom gaming controller maker
Scuf Gaming suffered a data breach. The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
Display names
Email addresses
IP addresses
Passwords
Usernames
Mar 24, 2026
292,993 accounts
Email addresses
Names
Passwords
Dec 25, 2011
222,762 accounts
Email addresses
IP addresses
Passwords
Usernames
Mar 5, 2026
903,080 accounts
Customer service comments
Email addresses
IP addresses
Names
Phone numbers
Physical addresses
Mar 12, 2026
105,814 accounts
Email addresses
Purchases
Usernames
Mar 7, 2026
1,266,822 accounts
Dates of birth
Email addresses
Genders
Geographic locations
Government issued IDs
Names
Passwords
Phone numbers
Purchases
Jan 29, 2026
712,904 accounts
In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with username and the creator account holders followed. Provecho has been notified and is aware of the claims surrounding the incident.
Email addresses
Usernames
Feb 24, 2026
495,556 accounts
In February 2026, the couples and relationship app Lovora allegedly suffered a data breach that exposed 496k unique email addresses. The data also included users’ display names and profile photos, along with other personal information collected through use of the app. The app’s maker, Plantake, did not respond to multiple attempts to contact them about the incident.
Display names
Email addresses
Profile photos
Feb 16, 2026
22,874 accounts
In February 2026, the porn addiction app Quitbro allegedly suffered a data breach that exposed 23k unique email addresses. The data also included users’ years of birth, responses to questions within the app and their last recorded relapse time. The app’s maker, Plantake, did not respond to multiple attempts to contact them about the incident.
Email addresses
Partial dates of birth
Usernames