Critical

Aura Breach - 903K Accounts Exposed

In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses . The data was primarily associated with a marketing tool from a previously acquired company, with fewer than 20k active Aura customers affected. Exposed data included names, phone numbers,...

Overview

A 2017 marketing tool from a company Aura had previously acquired was the source of a data breach now affecting 903,080 individuals, as reported to Have I Been Pwned in March 2026. While the company states fewer than 20,000 active Aura customers are involved, the breach exposed a dangerous combination of personally identifiable information (PII): names, email addresses, phone numbers, IP addresses, hashed passwords, and Social Security numbers (SSNs). The data surfaced for sale on underground forums, placing both past and present customers at elevated risk of identity theft and account takeover.

What Was Exposed

The exposed data set is comprehensive and sensitive:

  • Email addresses and passwords (hashed, but the hash type has not been confirmed as strong).
  • Names and phone numbers.
  • IP addresses.
  • Social Security numbers - the most critical item, as SSNs enable fraudsters to open accounts, file tax returns, or commit medical identity theft.

The inclusion of SSNs elevates this breach far beyond a typical credential dump. Even if passwords were securely hashed, SSNs are immutable data points that cannot be rotated like a password.

How the Breach Happened

Aura’s root cause was a legacy asset - a marketing tool from a company it acquired years earlier - that was never fully integrated into its modern security stack. The tool, still operational and containing a copy of old user data, was compromised by an external attacker. This incident highlights the persistent risk of “shadow infrastructure”: servers or databases that remain active post-acquisition but fall outside the company’s current security monitoring and patching cadence. For context, breaches involving orphaned systems have been exploited similarly in related cybersecurity news.

Who’s Actually Affected

Aura’s disclosure notes that fewer than 20,000 of the 903,080 impacted records belong to currently active Aura customers. The remainder are legacy users - people who signed up for the acquired company’s service before 2017 or who interacted with its marketing platform. Yet affected users may not even know they had data in that system. If you ever used a service purchased by Aura - including but not limited to identity theft protection tools - your data may be part of this exposure. Even “inactive” contacts are attractive to attackers because they often reuse passwords across services.

Identity Theft Risks

The presence of SSNs makes identity theft the primary concern. Attackers can combine SSNs with names and phone numbers to:

  • Submit fraudulent credit applications.
  • File fake tax returns for refunds.
  • Open new utility or mobile accounts in your name.

Unlike passwords, an SSN cannot simply be reset. Victims should place a freeze at all three credit bureaus - Equifax, Experian, and TransUnion - immediately. Monitor credit reports for unauthorized inquiries and consider an IRS Identity Protection PIN.

How to Check If You’re Affected

The breach data has been uploaded to Have I Been Pwned. Visit haveibeenpwned.com and enter the email address you would have used with Aura or any of its predecessor services. If your email appears, assume your data - including SSN - is compromised.

Security Insight

Aura sells itself as a safety and identity protection service, yet its own infrastructure harbored a decade-old marketing database with full PII including SSNs. This breach serves as a case study in acquisition hygiene: when a company buys another, it inherits not just the customers but all the technical debt. Failing to audit, migrate, or decommission legacy systems is a security failure indistinguishable from a direct attack. The lesson extends beyond Aura - any organization with a history of acquisitions should conduct a full data inventory of inherited assets, or risk exposing data they didn’t even know they held.

Further Reading

Investigate Breaches Safely with NordVPN

Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.

Get NordVPN for Research

Affiliate link — we may earn a commission at no extra cost to you.

Share:

Never miss a data breach report

Get real-time security alerts delivered to your preferred platform.

Related Breach Reports

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.