Quora Hacked – 100 Million User’s Data Stolen By Hackers

Quora hacked more than 100 million Quora users accounts. Hackers gained unauthorized access to the servers and stolen account information, Public content and actions, and Non-public content and actions.

On last Friday Quora discovered that a malicious third party gained unauthorized access to their systems. Quora started an investigation with the help of third-party digital forensics and security firm and the investigation is still in the progress.

Quora Hacked – 100 Million User’s Affected

Quora determined that approximately 100 million users affected with the breach and following are the information compromised.

  • Account information, e.g. name, email address, encrypted (hashed) password, data imported from linked networks when authorized by users.
  • Public content and actions, e.g. questions, answers, comments, upvotes.
  • Non-public content and actions, e.g. answer requests, downvotes, direct messages (note that a low percentage of Quora users have sent or received such messages)

Quora confirms that the answers that are written anonymously are not affected by the breach as they did not store the identities.

Quora started notifying users about the breach and they are logging out all the users who may have affected with the breach.

If your account invalidated by Quora you will be prompted to reset your password by the next time while you trying to login Quora.

While the investigation is still ongoing, we have already taken steps to contain the incident, and our efforts to prevent this type of event from happening in the future are ongoing and a top priority, reads the blog post.

Quora security breach followed by other social media giants such as Facebook, Google+ and Tumblr.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication…

4 hours ago

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities,…

4 hours ago

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86%…

4 hours ago

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with…

4 hours ago

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat…

4 hours ago

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool,…

6 hours ago