Circulating breaches are the breaches where data has moved beyond disclosure and is now in circulation. Available to search, trade, or exploit.
Let's unpack what's really going on.
When you hear about a breach, it can fall into one of two categories: Disclosed or Circulating. Knowing which kind you’re dealing with helps you understand what’s known, what’s still unknown, and how to respond.
A Disclosed Breach is one that's been reported or confirmed publicly. The company might have filed with the SEC, told the press, or notified customers. The key detail: the stolen data hasn’t been observed circulating on open or dark web sources. That doesn’t mean it’s safely contained — only that it hasn’t surfaced publicly.
Your stolen data may not be in active circulation. It may never appear publicly.
But it could still be in play privately — in criminal exchanges, nation-state archives, or exclusive data markets. Treat “not circulating” as unknown risk, not no risk.
If you are being notified of a Disclosed Breach this is likely because the company is legally required to notify you that they realize your data has been compromised in some way. They may not even know where it is. (Regulations often require notification even when there's no evidence of data misuse.)
So: Getting a notice from a disclosed breach doesn’t mean your data is safe. It means the breach has been acknowledged — but not yet confirmed as circulating. Disclosed breaches can still transition into circulation later.
A Circulating Breach is when the stolen data actually hits the wild. It's uploaded, sold, or shared on criminal forums, and often becomes part of searchable services like Have I Been Pwned or DataBreach.com. Lots other entities scoop that up too, like intelligence tools, data brokers, and foreign governments.
Because that's when things shift from theoretical to real.
If you are being notified of a Circulating Breach this is likely because you signed up for an alert service like ObscureIQ. Notification from us means that your data has come into play.
It's possible that data from breaches that have happened years ago can hit the dark web as a fresh release. This can still be dangerous, so don't ignore such alerts out of hand.
The 2012 LinkedIn breach was disclosed early—but didn't circulate widely until 2016. That's when the stolen data became searchable and weaponized.
That's why ObscureIQ monitors multiple breach intelligence sources.
To alert our clients the moment their data moves from disclosed to circulating.
Below you’ll find verified circulating breaches. Datasets that have surfaced publicly or through credible intelligence sources.
Each breach page includes:
The goal of the Circulating Breach Directory is to:
ObscureIQ scans multiple breach intelligence sources and dark web repositories to maintain this directory.
This resource is constantly updated as new circulating breaches are discovered.