HIGH SEVERITYViceCannabis

BudTrader Data Breach

BudTrader Cannabis Marketplace Breach (2024): 2.7 Million User Accounts Including Passwords Exposed

Online cannabis marketplace and classifieds platform.

Verified by ObscureIQ Intelligence

7.0Severity
2.7MRecords
3Fields
2024Year

ObscureIQ Breach Intelligence Scores
6.8
Breach Risk Index
25
Data Value
25
Market Recency
573
days
Since Breach

Risk Interpretation

Exposure enables harassment, fraud, and profiling tied to cannabis-related activity. Depending on jurisdiction and role, platform association may also create legal, employment, or reputational risk.

🎯 Impact & Downstream Threats

In July 2024 data from BudTrader dating to the prior month was posted for sale on a hacking forum. The exposed dataset contained approximately 2.7 million email addresses, usernames, and WordPress password hashes. Because BudTrader served a cannabis marketplace — a legal but socially sensitive consumer category — the exposure of user accounts carries elevated privacy implications for affected individuals, which is reflected in the elevated sensitivity tier classification. BudTrader made no publi

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Credential stuffing & account takeover
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityBudTrader
OrganizationPrivate Company • USA
Breach Date2024-06-01
HIBP Added2024-10-01
Records~2.7M (2,700,000 records)
Attack VectorMisconfiguration
Data SubjectsUser
Breach PathwayDirect
SourceHave I Been Pwned / ObscureIQ
SensitivityElevated
Breach ID232.0
StatusConfirmed

📝 Executive Summary

BudTrader, a now-defunct online cannabis marketplace and social platform, suffered a data breach that exposed records belonging to approximately 2.7 million users. The breach, which dates to June 2024, was posted for sale on a hacking forum the following month. The exposed data originated from a misconfiguration of the platform, and no external attacker group has been publicly attributed. The breach exposed email addresses, usernames, and WordPress password hashes. Password hashes are encoded versions of passwords that can potentially be cracked, meaning affected users who reused passwords across other sites face a real risk of account takeover. Because BudTrader served a cannabis marketplace, an industry that remains federally illegal in the United States despite state-level legalization, the exposure of user identities carries additional risks. Affected individuals could face legal scrutiny, employment consequences, or reputational harm depending on their jurisdiction and role on the platform. BudTrader made no public statements about the breach before ceasing operations, and no regulatory action or litigation has been documented in connection with the incident. Affected users should treat any passwords shared with their BudTrader account as compromised and update them immediately on any other services where they were reused. Due to the sensitive nature of the platform, this breach is not publicly searchable and is flagged for restricted disclosure.

🏢 About BudTrader

BudTrader was an online cannabis marketplace and social platform that connected buyers, sellers, and enthusiasts in legal cannabis markets across the United States. The platform operated as a classifieds-style service for cannabis products and related goods and attracted users in states where cannabis had been legalized for medical or recreational use. BudTrader has since ceased operations.

Platform | Cannabis marketplace and classifieds | Online listing platform | USA
Private CompanyUSAbudtrader.com

🗂 Why They Hold Your Data

Cannabis marketplaces and classifieds collect user accounts, contact details, listing activity, business relationships, and transaction-intent signals tied to cannabis products or services.

📰 Recent Developments

BudTrader no longer operates. The platform shut down prior to the breach's public disclosure.

🔍 Data Points Exposed

3 verified field types:
Email
Passwords
Usernames

Canonical Fields

email_address, password, username

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~2.7M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: BudTrader Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of BudTrader
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationViceCannabisEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom