Saturday, May 31, 2025
HomeCVE/vulnerabilitySpotify Hack - Over 300k Accounts Hacked in Credential Stuffing Attack

Spotify Hack – Over 300k Accounts Hacked in Credential Stuffing Attack

Published on

SIEM as a Service

Follow Us on Google News

Spotify is a Swedish-based audio streaming and media services provider, with over 299 million active monthly users in 2020.

Noam Rotem and Ran Locar, vpnMentor’s research team have discovered a potential credential stuffing operation whose origins are unknown, but that affected some online users who even have Spotify accounts. Credential stuffing is a hacking technique that takes advantage of weak passwords that consumers use and frequently reuse online.

An Insight of the Incident

The 72-gigabyte database of 380+ million individual records, and was hosted on an unsecured Elasticsearch server. The database records contained information about potential Spotify users, like their Personally Identifiable Information (PII) data and Spotify login credentials such as account usernames and passwords verified on Spotify, email addresses, and countries of residence. There were also several server IP addresses exposed within the leak.

- Advertisement - Google News

A twist is that the database doesn’t belong to Spotify. The researchers, along with Spotify believe that the database was compiled by hackers possibly using login credentials stolen from other sources that were reused forcredential stuffing attacks against Spotify.

The process used here is known as Credential Stuffing. It involves hackers taking usernames and passwords stolen in one hack, then seeing if the credentials work on other sites moreover services provided that users often reuse passwords across multiple sites.

Spotify initiated a ‘rolling reset’ of passwords for all users affected. This implies the database would be voided and become useless in terms of accessing Spotify accounts.The affected users are still at risk of being hacked since the information in the database was likely stolen in another hack where users have reused credentials across multiple sites.

Potential Impacts of the Incident 

The fraudsters can involve in the following activities:

Financial Fraud and Identity Theft-  Make use of the exposed emails and names from the leak to identify users across other platforms and social media accounts. 

Phishing Scams and Malware- Utilize the contact information to directly target the exposed users with phishing emails, tricking them into providing sensitive data like credit card details, or clicking a fake link embedded with malware.

Account Abuse- Could use the stolen credentials to access a user’s account and take advantage of digital services paid for by the original user

Instructions provided by the Experts

  • If you reused your Spotify password on the other accounts, change it immediately to safeguard them from hacking
  • Use a password generator to make unique, strong passwords for each private account
  • Change the passwords periodically.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Victoria’s Secret Website Taken Offline After Cybersecurity Breach

Victoria’s Secret, the iconic lingerie retailer, has taken its US website offline and suspended...

Adidas Customer Information Compromised Through Third-Party Vendor

German sportswear giant Adidas has confirmed a data breach after cybercriminals accessed customer data...

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data

Cybersecurity experts have noted an increase in data breaches where threat actors are directly...