Wednesday, May 14, 2025
HomeData BreachOver 7 Million Robinhood Customers' Data Stolen & Sold on a Popular...

Over 7 Million Robinhood Customers’ Data Stolen & Sold on a Popular Hacking Forum

Published on

SIEM as a Service

Follow Us on Google News

On a popular hacking forum, and marketplace recently data for almost 7 million Robinhood customers was stolen and sold. In this event, the threat actors have abused the network of Robinhood by hacking one of its employees.

The hacker got access to the information of approximately 7 million Robinhood users through the customer support systems of Robinhood, all thanks to the hacked accounts of employees.

Data Exposed

Types of data that has been compromised by the hacker are mentioned below:-

- Advertisement - Google News
  • Email addresses of 5 million customers
  • Full names of 2 million other customers
  • Name of 300 people
  • Date of birth of 300 people
  • Zip code of 300 people
  • More extensive account information of ten people

In this incident, for not releasing the compromised data, the hacker tried to extort the company. While among threat actors these types of data are particularly popular since they use these data for performing other cyberattacks like phishing attacks.

Data Sold on a Hacking Forum

A threat actor named ‘pompompurin’ has proclaimed that on a popular hacking forum they were selling the data that they have stolen, and pompompurin announced this just after the two days when Robinhood disclosed the attack.

For at least five figures, which is about $10,000 or higher than this, pompompurin was selling the stolen data of the 7 million Robinhood customers, and this statement is stated by the pompompurin itself.

When performing Know Your Customer (KYC) requirements a secure file transfer service known as SendSafely is used by the trading platform, and here the hacker downloaded ID cards from SendSafely.

Recommendation

On the matter of safety, Robinhood Chief Security Officer Caleb Sima stated:-

“As a Safety First company, we owe it to our customers to be transparent and act with integrity. Following a diligent review, putting the entire Robinhood community on notice of this incident now is the right thing to do.”

To keep your account secure Robinhood recommended visiting:-

  • Help Center > My Account & Login > Account Security

Moreover, they have also confirmed that in a security alert they never include any link to access your account.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into...