HIGH SEVERITYBreach Compilation

X Data Breach

X (Twitter) Email Address Compilation (2025): 2.9 Billion Email Addresses Aggregated from Multiple Breach Sources

Aggregated compilation of X/Twitter email addresses from multiple breach sources'

Verified by ObscureIQ Intelligence

7.0Severity
2.9BRecords
1Fields
2025Year

ObscureIQ Breach Intelligence Scores
0.0
Breach Risk Index
4
Data Value
0
Market Recency
0
days
Since Breach

Risk Interpretation

High risk of identity linkage, doxxing, harassment, and large-scale profile enrichment. Recompiled social data is especially useful because it connects public-facing identities to additional external records.

🎯 Impact & Downstream Threats

This breach stemmed from a Twitter API vulnerability introduced in June 2021 that allowed attackers to correlate email addresses or phone numbers with public Twitter profiles, creating a high-value identity linkage dataset later circulated widely. Public breach tracking describes the exposed data as including email addresses or phone numbers alongside public profile information such as usernames, display names, bios, locations, and follower counts, which made the corpus useful for phishing, impe

Primary downstream threats:
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover

📋 Breach Intelligence

EntityX (X (formerly Twitter))
Organization • Global
Breach Date2025-04-02
DBC Added2025-04-02
Records~2.9B (2,873,876,432 records)
Attack VectorSocial Engineering
Data SubjectsUser
Breach PathwaySupply_Chain:Aggregator
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID1495.0
StatusConfirmed

📝 Executive Summary

X (Twitter) was at the center of a credential compilation event that surfaced in early 2025, when a dataset containing records linked to up to 2.9 billion accounts appeared on hacking forums and dark web marketplaces. The dataset was not the result of a direct hack of X's systems. Instead, it was assembled through a combination of large-scale scraping of public X profile data, exploitation of an API vulnerability first introduced in June 2021, and the merging of that information with records pulled from earlier, unrelated breaches at email providers, marketing databases, and other online services. The exposed data includes email addresses and phone numbers alongside public profile details such as usernames, display names, bios, locations, and follower counts. The risk comes from linkage. On their own, these pieces may seem harmless. Combined, they create detailed profiles that connect a person's real-world identity to their online presence, making the dataset a tool for phishing, impersonation, doxxing, and social graph analysis at scale. No confirmed regulatory action or breach notifications from X had been reported as of the time this summary was written. Affected users should treat any unsolicited contact referencing their X account or linked email with suspicion. Enabling two-factor authentication, auditing connected apps, and monitoring for impersonation attempts are practical steps to reduce exposure.

🏢 About X

Twitter was a global real-time social media and microblogging platform built around public posts, follower graphs, pseudonymous identity, direct messaging, and live discourse at scale. Before the later rebrand to X, Twitter’s core value came from making public conversation searchable, linkable, and easy to distribute across media, politics, business, and culture.

Breach Compilation | Aggregated social media profile data and linked external records | Recompiled social platform exposure dataset | Global
Global* compilation x.com

🗂 Why They Hold Your Data

Recompiled social-platform exposure datasets aggregate social profile data, linked contact details, usernames, posts, and externally joined records from one or more social ecosystems.

📰 Recent Developments

Twitter no longer operates under that name and now exists as X following Elon Musk’s 2023 rebrand of the platform. Even so, the breach remains tied to the Twitter-era service, product design, and API decisions that governed how user identity data could be queried and linked at the time.

🔍 Data Points Exposed

1 verified field types:
Email

Canonical Fields

email_address

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~2.9B records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: x-twitter-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of X
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

Social EngineeringSocialEmail

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom