VKontakte Data Breach
VK (VKontakte) Russian Social Network Credential Breach (2012, Disclosed 2016): 93 Million User Accounts Including Passwords Exposed
Russian social networking platform.
Risk Interpretation
Severe risk of account takeover, harassment, phishing, and identity linkage. Social-graph and messaging data also support surveillance, stalking, and large-scale profiling.
Impact & Downstream Threats
The 2012 breach exposed approximately 100 million accounts including names, phone numbers, email addresses, and plaintext passwords. The data did not surface publicly until 2016 when it appeared for sale on dark web markets. VK responded by forcing password resets for affected accounts. The use of plaintext password storage — rather than hashing — made the credentials immediately usable by anyone who obtained the dataset. The incident is cited as one of the larger social platform credential expo
- Credential stuffing against reused passwords across other platforms
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
Threat Vectors
Breach Intelligence
Executive Summary
VKontakte, Russia's largest social network, suffered a credential-theft breach around late 2012 that exposed approximately 93 million user accounts. The intrusion went undetected for nearly four years before surfacing on 5 June 2016, when a hacker known as "Peace" listed the stolen data for sale on a Tor-based dark web marketplace for 1 Bitcoin. The breach is attributed to a misconfiguration that allowed direct access to user account data. The exposed data included full names, email addresses, phone numbers, and passwords. The passwords were stored using unsalted MD5 hashing, an extremely weak protection that researchers at LeakedSource cracked at a rate of roughly 90 percent within three hours of obtaining the dataset. This made the credentials immediately usable. The dump quickly circulated across criminal forums, where attackers used the email-and-password pairs in credential-stuffing attacks targeting platforms including Gmail, PayPal, and Steam, and bundled them into phishing and spam toolkits. No major regulatory action has been publicly documented in connection with this breach. VK responded by forcing password resets for affected accounts. Affected individuals face lasting risk: even years after the fact, these credentials remain in active circulation on criminal networks. Anyone who used the same password on VK as on other services should treat those accounts as compromised and update them immediately.
About VKontakte
VKontakte, commonly known as VK, is Russia's largest social network and digital services platform. The company operates a broad suite of services including social networking, messaging, music streaming, video, gaming, and payments under the VK brand. It is headquartered in Saint Petersburg and is publicly listed on the Moscow Exchange. VK serves hundreds of millions of registered users, concentrated in Russia and Russian-speaking communities globally, and functions as a dominant internet platform across multiple content and communications categories.
Why They Hold Your Data
Social-media platforms collect user identity, contact details, messages, social graphs, posts, media uploads, behavioral signals, and account records across large communication ecosystems.
Recent Developments
VK has operated under sustained western sanctions and geopolitical pressure following Russia's invasion of Ukraine in 2022, limiting its partnerships and investment options in European and American markets. The company has continued expanding domestic Russian digital services and has been associated with compliance with Russian state data localization laws. International growth has effectively stalled. No major structural or ownership changes have been reported in the most recent period.
Data Points Exposed
Canonical Fields
email_address, full_name, password, phone_number
Dark Web Verification
- Dataset containing ~93.3M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: VK Data Breach; vk.com-2012
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of VKontakte
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
