Cuties AI Breach Exposes 144K User Profiles
In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum . The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to...
Overview
In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that exposed 144,250 unique user accounts. The compromised data was subsequently published to a public hacking forum, revealing a trove of personally identifiable information (PII) alongside platform-specific content. The incident, now indexed on Have I Been Pwned, underscores the risks of sharing intimate data with AI services that may lack robust security measures.
What Was Exposed
The breach exposed a combination of standard account data and sensitive platform-specific content. The confirmed data types include:
- Email addresses (all 144,250 accounts)
- Display names (usernames or chosen nicknames)
- Avatars (user-uploaded profile images)
- AI prompts (text descriptions used to generate adult images)
- Image generation descriptions (detailed queries for NSFW content)
- URLs to generated content (links to AI-created images hosted on the platform)
While no financial data or plaintext passwords appear to be exposed, the combination of personal details and explicit content presents unique privacy risks for affected users.
How the Breach Happened
The specific attack vector has not been publicly confirmed by Cuties AI, but the breach was reported to Have I Been Pwned on March 2026. The data appeared on a public hacking forum shortly after, suggesting either an external intrusion (e.g., SQL injection, credential stuffing) or an insider threat. The presence of user-uploaded avatars and AI prompts indicates the attacker accessed the platform’s database rather than a third-party service.
Why This Matters
NSFW AI companion platforms like Cuties AI collect uniquely sensitive data. Even without passwords, the exposed AI prompts and generated image URLs can reveal intimate user preferences, fantasies, or personal scenarios. If linked to a real identity - which is possible if the email address is associated with other accounts - this information could be weaponized for harassment, blackmail, or public shaming. Unlike a typical data breach where you change a password, there is no easy fix for leaked sexual content.
What to Do Right Now
- Check if you’re affected - Visit Have I Been Pwned and search your email address. If it’s in the breach, proceed immediately.
- Consider email hygiene - If you used the same email for Cuties AI and other sensitive accounts, monitor those accounts for phishing attempts. Attackers may try to leverage the leak.
- Review platform trust - If you continue using Cuties AI or similar services, consider using a dedicated email address and pseudonym to limit exposure in future breaches.
- Watch for targeted scams - Scammers may reference your AI prompts or generated image URLs in phishing emails to appear credible. Do not click links or download attachments from unsolicited messages.
- Delete or archive content - If the platform allows, remove or request deletion of any stored prompts, avatars, or generated images to reduce your digital footprint.
How to Check If You’re Affected
The easiest way to verify your exposure is through Have I Been Pwned. Enter the email address you registered with Cuties AI. If it appears in the breach, HIBP will show the date and the types of data exposed. Cuties AI has not publicly offered a direct verification tool as of this writing.
Security Insight
This breach highlights a critical blind spot in user privacy: AI companion platforms collect highly sensitive data but often lack the transparency and security maturity of mainstream services. The exposure of AI prompts - essentially a detailed transcript of intimate user interactions - cannot be undone by a password reset. Companies in this space must treat user content as the crown jewel of their security posture, not just account credentials. If a platform’s terms of service allow it to store user prompts and generated content in plaintext in its database, it is not secure enough for the data it collects.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the ShinyHunters extortion group listed Vimeo on their extortion portal as part of their "pay or leak" campaign . They subsequently published hundreds of gigabytes of data, predominantly consisting of video titles, technical data and metadata. The data also included 119k unique email ...
In March 2026, the League of Legends custom skins service Divine Skins suffered a data breach . The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email ...
In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with username and the creator account holders followed. Provecho has been notified and is aware of the c...
In February 2026, the couples and relationship app Lovora allegedly suffered a data breach that exposed 496k unique email addresses. The data also included users’ display names and profile photos, along with other personal information collected through use of the app. The app’s maker, Plantake, did ...