SoundCloud Breach: 29.8M Accounts Exposed
In December 2025, SoundCloud announced it had discovered unauthorised activity on its platform . The incident allowed an attacker to map publicly available SoundCloud profile data to email addresses for approximately 20% of its users. The impacted data included 30M unique email addresses, names, use...
Overview
On December 23, 2025, SoundCloud disclosed a data breach affecting approximately 29.8 million user accounts - roughly 20% of its user base. The incident was reported to Have I Been Pwned (HIBP), which confirmed the exposed data included email addresses, usernames, and full names. The breach was discovered during a routine security review, where SoundCloud identified unauthorized activity that had harvested publicly available profile data and cross-referenced it with email addresses. This is the second major breach for SoundCloud, following a 2017 incident that exposed 15 million accounts.
What Was Exposed
The breached data consists of three types:
- Email Addresses (30 million unique) - The core of the exposure, allowing attackers to link SoundCloud profiles to real-world identities.
- Usernames - Public-facing handles, often reused across platforms, enabling account discovery on other services.
- Names - First and last names, which when paired with email addresses create a significant opportunity for phishing and social engineering.
No passwords, payment card data, or phone numbers were exposed in this incident. However, the combination of email and name data is valuable for targeted attacks.
How the Breach Happened
According to SoundCloud’s disclosure, the attacker exploited the platform’s publicly available profile information - user bios, profile pictures, and follower lists - and matched it against email addresses through an unspecified data correlation technique. This did not require direct access to SoundCloud’s internal systems; rather, it leveraged the public-facing API endpoints that were designed to show user profiles. The company has since “further limited” data accessible via public profiles and notified affected users.
Account Takeover Risks
While SoundCloud credentials were not stolen, the exposed data creates a significant account takeover risk because:
- Credential reuse: Many users reuse emails and usernames across platforms. Attackers can now feed these emails into credential-stuffing tools targeting other services.
- Phishing campaigns: Real names and email addresses make phishing emails far more convincing. Attackers can craft messages referencing your SoundCloud activity to trick you into revealing passwords or clicking malicious links.
- Social engineering: Knowing your username and real name, attackers can impersonate you or SoundCloud support to gain access to other accounts.
Identity Theft Risks
The risk of full-scale identity theft (such as opening credit cards or loans) is low, as no Social Security numbers, addresses, or financial data were exposed. However, the data is highly useful for targeted identity fraud - for example, filing fake tax returns or applying for government benefits using your name and email. The real-world likelihood remains moderate, as most identity theft requires additional PII such as addresses or dates of birth.
What to Do Right Now
- Check if you’re affected: Visit Have I Been Pwned and enter your email address. If SoundCloud appears in the results, your data was exposed.
- Enable two-factor authentication (2FA) on your SoundCloud account and any other services that share your email. This protects against credential-stuffing attacks.
- Watch for phishing emails: Be suspicious of any emails claiming to be from SoundCloud, especially those asking you to “verify your account” or “reset your password.” Hover over links to inspect the URL before clicking.
- Change passwords on shared accounts: If you use the same password for SoundCloud that you use on other services (banking, email, social media), change those passwords immediately. Use a password manager to generate unique, strong passwords.
- Monitor your accounts: Check your email for unauthorized login attempts and review your SoundCloud account activity for any changes you didn’t make.
Security Insight
This breach reveals a recurring blind spot in platform security: the assumption that “public” data is harmless. SoundCloud failed to anticipate that combining publicly visible profile data with email addresses - which they knew were private - could create a data map valuable to attackers. The incident mirrors the 2022 LinkedIn data scraping incident (which exposed 700 million profiles via API abuse) and underscores that any data accessible through a public endpoint, even if individually innocuous, is vulnerable to aggregation attacks. Companies must treat even “public” data as sensitive when it can be combined, and rate-limit API access to prevent mass scraping.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed . The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.
In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach . The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data . The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.