Addi Breach: 34M Emails & IDs Exposed by ShinyHunters (2026)
In March 2026, the Colombian fintech company Addi identified unauthorised activity on its platform and advised customers that "it is possible that your personal information may have been compromised". The "pay or leak" extortion group ShinyHunters subsequently claimed responsibility and published a ...
Overview
On March 30, 2026, the Colombian fintech company Addi detected unauthorised activity on its platform. In a notification to customers, Addi warned that “it is possible that your personal information may have been compromised.” The “pay or leak” extortion group ShinyHunters quickly claimed responsibility, publishing a massive trove of data that includes 34,532,941 unique email addresses, along with extensive credit and identity records. The breach was reported to Have I Been Pwned, making it one of the largest data leak events linked to a Latin American fintech company.
What Was Exposed
The leaked dataset is not limited to email addresses. According to the breach description, the exposed records include a wide range of sensitive information:
- Email addresses (34 million unique entries)
- Government-issued IDs (Cédula de Ciudadanía)
- Estimated income and socioeconomic levels
- Credit scoring requests and credit bureau records
- Customer identity records
- Email validation logs
- Purchase history and other credit-related data points
The presence of government IDs and financial data elevates the severity of this breach far beyond a standard credential dump.
How the Breach Happened
Addi has not publicly detailed the initial attack vector, but the breach aligns with a common pattern among ShinyHunters attacks. The group typically gains access through compromised credentials, unsecured databases, or third-party vulnerabilities. Given the breadth of data - spanning credit scoring logs, identity records, and purchase data - the attacker likely obtained database-level access rather than exploiting a single application flaw. For related vulnerability trends in the region, see our cybersecurity news coverage.
The Attacker
ShinyHunters is a well-known “pay or leak” extortion group. The group does not deploy ransomware; instead, it exfiltrates data and demands payment to prevent public release. When victims do not pay, ShinyHunters publishes the entire dataset. In Addi’s case, the data was published in full, indicating the ransom was not met.
Identity Theft Risks
The exposure of government-issued IDs (Cédula de Ciudadanía) combined with income, socioeconomic data, and purchase history creates a severe identity theft risk. With a Colombian national ID number, a determined attacker can:
- Apply for fraudulent loans or credit lines
- Open accounts in the victim’s name
- Exploit the socioeconomic data for targeted phishing or social engineering scams
Victims should monitor their credit reports with Colombian credit bureaus (such as Datacrédito and Procrédito) for any unauthorised inquiries or accounts.
How to Check If You’re Affected
Addi customers and Colombian residents who have interacted with the company should check if their email addresses appear in the breach. The dataset has been loaded into Have I Been Pwned. Visit haveibeenpwned.com and enter your email address. If your address appears, your identity data (including your Cédula de Ciudadanía) may be in the hands of attackers.
What to Do Right Now
If you are affected:
- Place a fraud alert on your credit report with Datacrédito and Procrédito.
- Review all recent financial statements and credit inquiries for unauthorised activity.
- Enable two-factor authentication on your Addi account and any service using the same email address.
- Be vigilant for phishing attempts referencing your income, credit score, or purchases - attackers have detailed personal data to make scams convincing.
- Change your password on Addi and any other accounts using the same credentials.
Security Insight
This breach reveals a troubling gap in data governance at Addi. The inclusion of credit bureau records and email validation logs suggests that Addi retained more customer data - for longer - than necessary for its core business. Fintech companies handling government IDs and credit data must implement strict data minimisation policies and rigorous access controls. Breaches of this scale at a single fintech platform undermine consumer trust in the broader digital banking ecosystem in Latin America. For more on related vulnerabilities, see the CVE-2026-31944: LibreChat advisory and the Addi ransomware attack summary at Addi.com Ransomware Attack by ShinyHunters.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In December 2025, the European Dragonica private server Dragonica Lunaris suffered a data breach. The incident exposed 126k email addresses, usernames, dates of birth and bcrypt password hashes. The service operator confirmed the breach and advised it has since been fixed.
In April 2026, the fashion brand Zara was among a number of organisations targeted by the ShinyHunters extortion group as part of their "pay or leak" campaign. The group claimed the breach was related to a compromise of the Anodot analytics platform and subsequently published a terabyte of data alle...
In April 2026, the commercial residential and ISP proxy network LegionProxy suffered a data breach . The incident exposed 10k email addresses, bcrypt password hashes, names and purchases.
In April 2026, home security firm ADT confirmed a data breach by ShinyHunters , which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a sm...