Marcus & Millichap Breach: 1.8M Records Exposed (2026)
In April 2026, the commercial real estate brokerage firm Marcus & Millichap was named as one of multiple alleged victims of the ShinyHunters hacking and extortion group . Data alleged to have been obtained from the company was subsequently released publicly and included 1.8M unique email addresses, ...
Overview
On April 14, 2026, commercial real estate brokerage Marcus & Millichap confirmed a data breach affecting over 1.8 million individuals. The ShinyHunters hacking group claimed responsibility, posting stolen data publicly after an extortion attempt. The company’s disclosure stated that compromised data was limited to “company forms, templates, marketing materials, and general contact information,” but the leaked records include detailed personal and professional information for hundreds of thousands of business contacts, clients, and partners.
What Was Exposed
The breached dataset contains 1,837,078 unique email addresses along with:
- Full names – first and last names of individuals
- Phone numbers – direct dial and mobile numbers
- Employer names – current or previous companies
- Job titles – professional positions held
- Company addresses – physical business locations
Marcus & Millichap’s official statement downplays the scope, but the exposed data goes far beyond generic templates. The records appear to come from the company’s CRM system, contact databases, and business correspondence logs.
Potential Impact
While no financial data or Social Security numbers were directly exposed, the risks are significant:
- Phishing and spear-phishing attacks – With names, employers, and job titles, attackers can craft highly convincing targeted emails impersonating business partners or the company itself
- Business email compromise (BEC) – Fraudsters may use stolen contact details to impersonate executives or clients, requesting wire transfers or sensitive information
- Social engineering – Phone numbers and professional context enable direct calls to employees, vendors, or clients, posing as IT support or a colleague
- Reputational damage – Real estate professionals rely on trust and confidentiality; this breach erodes confidence in the firm’s data protection practices
Affected individuals may experience increased spam, unsolicited calls, or targeted scams leveraging their professional identity.
Recommendations
- Enable two-factor authentication (2FA) on all email and business accounts - especially if you use the same email for banking or client communications
- Beware of targeted messages - Do not click links or open attachments from unexpected emails referencing Marcus & Millichap or your real estate dealings
- Monitor for identity misuse - Check if your email appears in other breaches using a free service (see below)
- Update passwords - Change passwords for any accounts where you used the same email as your Marcus & Millichap contact
- Report suspicious activity - If you receive a strange email or call referencing this breach, forward it to the company’s security team or your IT department
How to Check If You’re Affected
Visit Have I Been Pwned and enter your email address. The site will show if your data appears in this breach. Marcus & Millichap has not provided a direct notification tool, but affected individuals should assume their information is now public.
Security Insight
This breach reveals a recurring pattern in the real estate industry: companies often treat professional contact information as low-sensitivity data, ignoring its value to attackers for phishing and impersonation schemes. Unlike retail breaches that expose credit cards, this leak weaponizes trust - when fraudsters know your boss’s name and your job title, a fraudulent wire transfer request becomes dangerously convincing. Marcus & Millichap’s minimal disclosure suggests they either underestimated the breach’s scope or prioritized minimizing legal liability over transparency, a common but damaging approach in the current cybersecurity news landscape.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses...
In April 2026, online training company Udemy was the victim of a “pay or leak” extortion attempt perpetrated by the ShinyHunters group. The data was subsequently leaked publicly and contained 1.4M unique email addresses belonging to customers and instructors. The data also included names, physical a...
In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group . The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of e...
In March 2026, the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness , a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threate...