Severity
high
Records
29,800,000
Vector
Internal System Compromise — access to ancillary service dashboard
Organization
SoundCloud
Incident Date
2025-12-15

What Happened

SoundCloud, the popular audio streaming platform with approximately 140 million users, suffered a data breach that exposed personal information of 29.8 million accounts—roughly 20% of its user base. The ShinyHunters hacking group claimed responsibility and leaked the data after SoundCloud refused to pay an extortion demand.

Incident overview

AttributeDetails
VictimSoundCloud
IndustryMusic/Audio streaming
Discovery dateDecember 15, 2025
HIBP additionJanuary 2026
Accounts affected29,800,000
Attack methodInternal system compromise
Threat actorShinyHunters
Ransom demandedYes
Ransom paidNo
Data leakedYes (publicly released)

Timeline

DateEvent
December 15, 2025Users report 403 errors, VPN access blocked
December 15, 2025SoundCloud confirms breach
December 2025ShinyHunters issues extortion demand
January 2026SoundCloud refuses payment
January 2026ShinyHunters releases stolen data
January 2026Have I Been Pwned adds breach
January 2026Email flooding harassment campaign begins

Data exposed

Confirmed compromised

Data typeStatus
Email addressesConfirmed
Full namesConfirmed
UsernamesConfirmed
Profile imagesConfirmed
Geographic locationsSome users
Follower countsConfirmed
Following countsConfirmed
Profile statisticsConfirmed

NOT compromised

Data typeStatus
PasswordsNot exposed
Payment informationNot exposed
Private messagesNot exposed

How the breach occurred

StageDetails
Initial accessAttackers gained access to internal system
Data linkingConnected private emails to public profiles
AggregationBuilt dataset linking identities at scale
ExfiltrationExported 29.8 million user records

The breach did not involve direct access to SoundCloud’s main user database. Instead, attackers accessed an ancillary service dashboard that allowed them to link private email addresses with publicly visible profile information.

Why this matters

While much of the exposed data was publicly visible on SoundCloud profiles, the breach creates significant risk through data aggregation:

RiskImpact
Phishing attacksEmails linked to real identities
Credential stuffingEmail/username combinations for other services
Social engineeringProfile details enable targeted attacks
Spam campaigns29.8 million valid email addresses

ShinyHunters tactics

The threat actor employed multiple pressure tactics:

TacticDescription
Extortion demandPayment requested to prevent leak
Email floodingHarassment of users, employees, partners
Public leakData released after refused payment
Media notificationJournalists alerted to amplify pressure

Impact assessment

FactorAssessment
Scale~20% of SoundCloud users
SensitivityModerate (mostly public data + emails)
Business impactReputational damage
User riskPhishing, spam, credential stuffing

Recommendations

For SoundCloud users

PriorityAction
CriticalCheck Have I Been Pwned for your email
HighChange passwords if reused elsewhere
HighEnable two-factor authentication
HighWatch for phishing emails referencing SoundCloud
MediumReview connected apps and revoke unused

For organizations

PriorityAction
HighSegment ancillary systems from user data
HighLimit data linking capabilities
MediumMonitor for credential stuffing attempts
OngoingTrain users on phishing recognition

Context

The SoundCloud breach illustrates how even “limited” breaches create significant risk through data aggregation. By linking private email addresses to public profile information, attackers created a valuable dataset for phishing campaigns and credential attacks.

ShinyHunters has become one of the most prolific data extortion groups, responsible for numerous high-profile breaches in 2025-2026 including Match Group, Crunchbase, Harvard, UPenn, and Panera Bread. Their consistent playbook—breach, extort, leak—demonstrates that refusing ransom doesn’t prevent data exposure but does avoid funding criminal operations.

For affected users, the primary risk is phishing. Attackers now have email addresses linked to real names and profile details, enabling highly targeted social engineering. Vigilance for suspicious emails—particularly those referencing SoundCloud or music-related topics—is essential.