Impact & Downstream Threats
This breach carries high risk due to the nature of exposed data fields and the scale of affected records.
- Targeted phishing campaigns using exposed email addresses
Breach Intelligence
Executive Summary
What Happened in the X Data Breach? ,
, In March 2025, reports surfaced regarding a large dataset containing X (formerly Twitter) user information that had become available on various online hacking forums and dark web marketplaces. ,
,
While initial descriptions highlighted a significant volume of data, including 2.8 billion X user IDs and personal details for over 200 million users, further analysis indicated this was not the outcome of a new direct breach of X's systems. Instead, the dataset appeared to be a recompilation of information from multiple sources, including previously leaked data, scraped public records, and usernames. ,
About X
X is an organization whose data was exposed in this breach. The dataset has been verified by ObscureIQ intelligence and indexed across breach notification platforms.
Data Points Exposed
Dark Web Verification
Status: Confirmed
- Dataset containing approximately 2.9B records identified in breach intelligence sources.
- The data is indexed and searchable across breach notification platforms.
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Non-clients may request a breach impact review.
Frequently Asked Questions
In April 2025, X experienced a data breach that exposed approximately 2.9B records containing personal information.
The exposed data includes fields such as email address.
Approximately 2.9B records were affected based on current breach intelligence.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of X
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
