APOIA.se Breach: 451K Accounts Exposed
In December 2025, a database of the Brazilian crowdfunding platform APOIA.se was posted to an online forum . In January 2026, the company confirmed it had suffered a data breach. The incident exposed 451k unique email addresses along with names and physical addresses.
Overview
On December 11, 2025, a database from the Brazilian crowdfunding platform APOIA.se was posted to an online forum, exposing 450,764 unique user accounts. The company confirmed the breach in January 2026, revealing that the incident compromised email addresses, full names, and physical addresses of its users. The breach was reported to Have I Been Pwned (HIBP), allowing users to verify if their data was among those leaked.
APOIA.se is a popular platform in Brazil for crowdfunding creative projects, personal causes, and business ventures. The breach puts users at heightened risk for doxxing, targeted phishing, and physical security concerns - particularly given the sensitive nature of crowdfunding campaigns, which often involve personal appeals and financial transactions.
What Was Exposed
The compromised data includes three categories, each with distinct risks:
- Email Addresses - These are routinely weaponized for phishing attacks. With a confirmed APOIA.se account, scammers can craft convincing emails referencing specific campaigns or donation history to gain trust.
- Names - Full names help attackers personalize scams, making phishing emails appear more legitimate. Combined with email addresses, this increases the chance of victims clicking malicious links.
- Physical Addresses - This is the most concerning exposure. Physical addresses enable targeted mail fraud, identity theft, and, in extreme cases, physical stalking or harassment. For crowdfunding campaign creators, this data could be used to link their home address to sensitive causes or projects they supported.
How the Breach Happened
The exact attack vector has not been publicly detailed by APOIA.se. Based on the scope - a single database posted directly to a forum - it suggests either an SQL injection vulnerability, a compromised internal account, or an exposed cloud storage bucket. The company has not issued a full technical post-mortem, which is standard practice after such incidents to help the security community understand and prevent similar breaches.
Phishing and Social Engineering Risks
With email addresses and names in hand, attackers can craft highly targeted phishing campaigns. Expect emails that appear to come from APOIA.se support, claiming account issues or requesting password verification. A more dangerous scenario: scammers may contact users referencing their specific crowdfunding campaign by name, asking for “donation verification” or “funds release” - leading to credential theft or malware installation.
Physical addresses also open the door to postal mail scams - fake checks, invoices, or prize notifications designed to extract bank details or install malware via QR codes.
What to Do Right Now
- Check if you’re affected - Visit haveibeenpwned.com and search your email address. If APOIA.se appears in the results, your data was in this breach.
- Change your APOIA.se password immediately - Even if passwords weren’t exposed in this specific incident, use a unique, strong password for the platform. Enable two-factor authentication (2FA) if available.
- Watch for phishing emails - Be skeptical of any unsolicited emails referencing APOIA.se, especially those asking you to click links, download attachments, or provide personal information.
- Secure other accounts - If you reused your APOIA.se password elsewhere, change those passwords now. Use a password manager to generate and store unique credentials.
- Physical mail vigilance - Monitor your mailbox for suspicious letters or packages. Do not scan QR codes or click links from unknown senders.
Security Insight
This breach, while technically modest in scale, demonstrates the disproportionate risk crowdfunding platforms carry. Because these platforms handle personal appeals and financial transactions, exposed physical addresses can directly threaten a user’s safety - especially for creators running sensitive campaigns (e.g., medical fundraisers, LGBTQ+ support, or whistleblower funds). APOIA.se’s delayed confirmation and lack of a detailed technical disclosure - common among smaller Brazilian tech companies - underscores a gap in incident response transparency that the country’s broader cybersecurity regulatory framework, such as the Lei Geral de Proteção de Dados (LGPD), is designed to address. For threat actors, this data set is valuable not for credential reuse, but for building high-confidence social engineering profiles against a particularly vulnerable user base.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, Canada Life was the victim of a "pay or leak" extortion campaign by the ShinyHunters group . The group subsequently published the data which contained over 200k unique email addresses along with names, phone numbers, physical addresses and, in some cases, customer support tickets. In ...
In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group . The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of e...
In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign , with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on...
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses...