Wednesday, March 12, 2025
HomeData BreachImgur Data Breach Exposed 1.7 Million Users Emails and Passwords by Hackers

Imgur Data Breach Exposed 1.7 Million Users Emails and Passwords by Hackers

Published on

SIEM as a Service

Follow Us on Google News

Imgur Data Breach exposed almost 1.7 Million Users sensitive Emails and Passwords that was occurred in 2014.

Imgur is an online image sharing community which has 150 Million total users, 6 Billion page views per month, 1.5 Million Images uploading daily by Imgur visitors.

This potential Imgur Data Breach was reported by a Web security Expert Troy hunt who is actively running Data Breach services called  Have I Been Pwned.

Imgur Data Breach Investigation

After his Incident Report passed to Imgur’s Chief Operating Officer via Email. Further investigation revealed, and Imgur team finally confirmed that approximately 1.7 million Imgur user accounts were compromised in 2014.

Since Imgur has never asked for real names, addresses, phone numbers, or other personally-identifying information (“PII”), so the information that was compromised did NOT include such PII.

At that time Imgur used an older hashing algorithm that leads to hackers performing Brute force attack against the Imgur Website.

Troyhunt  said, “I disclosed this incident to Imgur late in the day in the midst of the US Thanksgiving holidays,” said Hunt. “That they could pick this up immediately, protect impacted accounts, notify individuals and prepare public statements in less than 24 hours is absolutely exemplary.”

Imgur Started notifying to impacted users via their registered email address, and they urged to update their passwords.

According to Imgur, we are still actively investigating the intrusion; we wanted to inform you as quickly as possible as to what we know and what we are doing in response. But Imgur said that site security had improved since the breach.

Some of Very Recent Data Leaked Online

  1. Famous Cosmetic Company “Tarte” leaked 2 Million Customers Personal Data Online
  2. Fashion Retailer FOREVER 21 Admits Payment Card Security Breach
  3. Accenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online
  4.  Deloitte Hacked by Cyber Criminals and Revealed Client & Employee’s Secret Emails
  5. Leading research and advisory firms Forrester was hacked
  6. Disqus confirms it’s been hacked and more than 17.5 Million Users Details Exposed
  7. Gaming Service R6DB Database deleted By Hackers and held for Ransom
  8. Biggest Hack Ever – Each and Every Single Yahoo Account Was Hacked in 2013
  9. Pizza Hut Hacked – Users Reporting Fraudulent Transactions on their Cards
  10. Hyatt Hotels Data Breach Exposed 41 Hotel Customers Payment Card Information
  11. Verizon Wireless Confidential DataLeaked Accidentally by Its Employee
  12. ABC Company Massive Data Leaked online from Amazon S3 Bucket
  13. Pentagon Data Leak Exposed 1.8 Billion of Social Media Surveillance Data
  14. Uber Data Breach Exposed Personal Information of 57 Million Uber Users
  15. HP Exposed more than 400,000 Customers Sensitive Information Online
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CYREBRO’s AI-Native MDR Platform Earns Silver at the 2025 Globee Cybersecurity Awards

CYREBRO, the AI-native Managed Detection and Response (MDR) solution, announced today that it won...

Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation

Aptori’s AI-Driven AppSec Platform Proactively Eliminates Vulnerabilities to Minimize Risk and Ensure Compliance.Aptori, a...

MirrorFace APT Using Custom Malware To Exploited Windows Sandbox & Visual Studio Code

The cybersecurity landscape witnessed a significant development when the National Police Agency (NPA) and...

CISA Issues Advisory on Windows NTFS Flaw Enabling Local Code Execution

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory regarding a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...