Tuesday, April 8, 2025
HomeCyber Security News17 Million Instagram Accounts, 178 GB of TikTok and Yahoo Databases were...

17 Million Instagram Accounts, 178 GB of TikTok and Yahoo Databases were Leaked

Published on

SIEM as a Service

Follow Us on Google News

A Major Data Leak of information affects well-known social media sites, including TikTok, Instagram, and Yahoo.

The alleged data leak included a 178GB TikTok database, over 17 million records on Instagram accounts, and a database leak for Yahoo! accounts.

SOCRadar Dark Web Team has discovered significant database breaches in social media networks.

- Advertisement - Google News

Additionally, they detected unauthorized admin access to a Spanish online store and the Mexican Youth Institute (IMJUVE) database being offered for sale.

Specifics of the Significant Data Leak

Reports say the data that was leaked from the TikTok database is purportedly in JSON format and came from tiktok.com. Although the leak’s exact date is uncertain, 178GB of data are said to have been exposed.

Data of TikTok are Leaked (Source: SOCRadar)

During the same week, another threat actor allegedly leaked identical information on a different forum.

This threat actor stated that the data dates back to 2022, implying that it could include older records.

Over 17 million records in JSON format, including usernames, email addresses, phone numbers, locations, and names, are purportedly included in the Instagram data leak.

Researchers claim that the data’s characteristics suggest that they could have been obtained from open source.

Instagram Database Leak

According to the reports, information on a potential Yahoo! account information breach has been uncovered.

Among other issues, the extent of the breach and the precise information impacted have not been disclosed.

Database of Yahoo! Leak

In addition, attacks are made against IMJUVE, the Instituto Mexicano de la Juventud. The threat actor states that they are offering complete access to the website’s database for sale and that they have access to all the leaked databases.

Furthermore, they claim to have more than 3,000 recordings available for sale.

Additionally, it was discovered that admin access was being sold illegally that allegedly belonged to a Spanish-based online store.

With Spain as the location, the threat actor claims to be offering administrative access to the store. 

The threat actor goes on to list the number of orders for May (467) and June (364), respectively. The admin access is priced at $150.

For both people and businesses, data leaking poses a severe security risk. Sensitive information, including emails, texts, social media postings, and more, can become available to persons who shouldn’t have access to it.

Thus, users must take precautions to safeguard their personal information, such as adopting secure passwords and being wary of concerning emails or communications.

“AI-based email security measures Protect your business From Email Threats!” – .

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Patches Actively Exploited Android 0-Day Vulnerability

Google has issued critical security updates to address a recently discovered zero-day vulnerability actively...

Kellogg’s Servers Breached, Hackers Steal Sensitive Data

WK Kellogg Co., one of the world's leading cereal and snack manufacturers, has fallen...

Xanthorox AI: New Automated Hacking Tool Surfaces on Hacker Forums

A new malicious AI tool, Xanthorox AI, has emerged on underground hacker forums.Dubbed the "Killer...

Apollo Router Vulnerability Enables Resource Exhaustion via Optimization Bypass

A critical vulnerability (CVE-2025-32032) has been identified in Apollo Router, a widely used GraphQL...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Patches Actively Exploited Android 0-Day Vulnerability

Google has issued critical security updates to address a recently discovered zero-day vulnerability actively...

Kellogg’s Servers Breached, Hackers Steal Sensitive Data

WK Kellogg Co., one of the world's leading cereal and snack manufacturers, has fallen...

Xanthorox AI: New Automated Hacking Tool Surfaces on Hacker Forums

A new malicious AI tool, Xanthorox AI, has emerged on underground hacker forums.Dubbed the "Killer...