Tuesday, December 3, 2024
HomeCyber Security News17 Million Instagram Accounts, 178 GB of TikTok and Yahoo Databases were...

17 Million Instagram Accounts, 178 GB of TikTok and Yahoo Databases were Leaked

Published on

SIEM as a Service

A Major Data Leak of information affects well-known social media sites, including TikTok, Instagram, and Yahoo.

The alleged data leak included a 178GB TikTok database, over 17 million records on Instagram accounts, and a database leak for Yahoo! accounts.

SOCRadar Dark Web Team has discovered significant database breaches in social media networks.

- Advertisement - SIEM as a Service

Additionally, they detected unauthorized admin access to a Spanish online store and the Mexican Youth Institute (IMJUVE) database being offered for sale.

Specifics of the Significant Data Leak

Reports say the data that was leaked from the TikTok database is purportedly in JSON format and came from tiktok.com. Although the leak’s exact date is uncertain, 178GB of data are said to have been exposed.

Data of TikTok are Leaked (Source: SOCRadar)

During the same week, another threat actor allegedly leaked identical information on a different forum.

This threat actor stated that the data dates back to 2022, implying that it could include older records.

Over 17 million records in JSON format, including usernames, email addresses, phone numbers, locations, and names, are purportedly included in the Instagram data leak.

Researchers claim that the data’s characteristics suggest that they could have been obtained from open source.

Instagram Database Leak

According to the reports, information on a potential Yahoo! account information breach has been uncovered.

Among other issues, the extent of the breach and the precise information impacted have not been disclosed.

Database of Yahoo! Leak

In addition, attacks are made against IMJUVE, the Instituto Mexicano de la Juventud. The threat actor states that they are offering complete access to the website’s database for sale and that they have access to all the leaked databases.

Furthermore, they claim to have more than 3,000 recordings available for sale.

Additionally, it was discovered that admin access was being sold illegally that allegedly belonged to a Spanish-based online store.

With Spain as the location, the threat actor claims to be offering administrative access to the store. 

The threat actor goes on to list the number of orders for May (467) and June (364), respectively. The admin access is priced at $150.

For both people and businesses, data leaking poses a severe security risk. Sensitive information, including emails, texts, social media postings, and more, can become available to persons who shouldn’t have access to it.

Thus, users must take precautions to safeguard their personal information, such as adopting secure passwords and being wary of concerning emails or communications.

“AI-based email security measures Protect your business From Email Threats!” – .

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...