Sound Radix Audio Tools Breach - 293K User Accounts Exposed
In March 2026, the audio production tools company Sound Radix disclosed a data breach that they subsequently self-submitted to HIBP . The incident impacted 293k unique email addresses and names. Sound Radix advised that it is possible that additional data including hashed passwords may have been exp...
Overview
In March 2026, Sound Radix, a developer of audio production tools for music and post-production professionals, disclosed a data breach affecting 292,993 users. The company self-submitted the incident to Have I Been Pwned (HIBP), confirming that unique email addresses, names, and potentially hashed passwords were exposed. Alarmingly, the breach also involved credit card data, elevating the risk far beyond typical credential leaks. Users who purchased plugins or licenses from Sound Radix may have had their payment information compromised.
What Was Exposed
The breached data includes email addresses, names, hashed passwords, and credit card details. Hashed passwords, while not readable directly, can often be cracked if weak or common. Credit card exposure is the most severe - it enables direct financial fraud, including unauthorized transactions and card cloning. Combined with names and email addresses, attackers have a rich profile for targeted phishing and identity theft.
How the Breach Happened
While Sound Radix has not publicly detailed the attack vector, the exposure of both credentials and payment data suggests a server-side intrusion or database compromise. Such breaches often stem from unpatched vulnerabilities, SQL injection, or compromised administrative credentials. The presence of credit card data indicates that Sound Radix was likely storing payment information in violation of PCI DSS best practices, which mandate tokenization or encryption of cardholder data.
Account Takeover and Financial Risks
This breach creates a dual threat. First, attackers can attempt to crack hashed passwords and use them to access Sound Radix accounts - and then reuse those credentials on other services if victims recycle passwords. Second, and more critically, exposed credit card data allows for immediate fraudulent charges, card-not-present fraud, and even full account takeover of the victim’s payment account if linked credentials are also compromised. Users should monitor bank and credit card statements for unauthorized activity.
How to Check If You’re Affected
Affected individuals can visit Have I Been Pwned and enter their email address. If the address appears in the Sound Radix breach, they will see a notification. Sound Radix may also be sending direct breach notifications to impacted users via email. If you have a Sound Radix account, assume your data is compromised and take immediate action.
What to Do Right Now
If you are affected, take these steps immediately:
- Change your Sound Radix password - and any other accounts using the same password.
- Contact your bank or credit card issuer to report the breach and request a replacement card.
- Enable two-factor authentication (2FA) on all accounts that support it, especially email and financial services.
- Monitor credit reports for unauthorized accounts or inquiries.
- Be alert for phishing emails that reference Sound Radix or attempt to exploit the breach.
Security Insight
This breach reveals that Sound Radix was storing sensitive payment data in a manner that allowed full exposure - a fundamental security failure in an industry where PCI DSS compliance is mandatory. For a company serving professional audio engineers and studios, the reputational damage may be severe, particularly if clients lose trust in its data handling. The incident underscores a broader lesson for niche software vendors: storing credit card data is a liability that should be eliminated through tokenization. For ongoing cybersecurity news coverage of similar vendor breaches, stay informed.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In October 2025, retailer Canadian Tire was the victim of a data breach that exposed almost 42M records. The data contained 38M unique email addresses along with names, phone numbers and physical addresses. Passwords were stored as PBKDF2 hashes and for a subset of records, dates of birth and partia...
In April 2026, the commercial residential and ISP proxy network LegionProxy suffered a data breach . The incident exposed 10k email addresses, bcrypt password hashes, names and purchases.
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach . The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders contai...