HIGH SEVERITYHostingDomains

Epik Data Breach

Verified by ObscureIQ Intelligence

7.0Severity
15.0MRecords
6Data Fields
2021Year

Impact & Downstream Threats

This breach carries high risk due to the nature of exposed data fields and the scale of affected records.

Primary downstream threats:
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

Breach Intelligence

EntityEpik
OrganizationPrivate Company • USA
Breach DateSeptember 2021
DisclosureAugust 2025
Records Exposed~15.0M
Attack VectorMisconfiguration
SourceHave I Been Pwned / DataBreach.com / ObscureIQ intelligence
StatusConfirmed

Executive Summary

later dumps even contained bootable disk images of Epik servers. Notably, the breach swept in millions of people who weren’t Epik customers at all because the company had stored large troves of scraped WHOIS records, turning otherwise “public” contact details into a sensitive centralized dataset. ([TechCrunch][1], [The Register][2], [Ars Technica][3])  ,

Epik’s early public stance shifted from saying it was unaware of a breach to acknowledging an “incident,” and then confirming exposure of customer data. Reporting and analyses at the time pointed to troubling security practices: weakly protected passwords and, more alarmingly, payment data risks. Materials reviewed by a major newspaper described full credit card numbers and unencrypted passwords in the leaked data, and industry coverage raised concerns that CVV codes-the three- or four-digit security numbers that should never be stored-were present, an egregious violation of PCI norms if accurate. ([SecurityWeek][4], [The Washington Post][5], [Domain Name Wire][6])  ,

The fallout extended beyond routine credential-theft risk. Because Epik has long catered to deplatformed or fringe communities, researchers used the dataset to map relationships among websites, operators, and organizers that had previously been obscured, calling the leak a Rosetta Stone for understanding that ecosystem. Follow-on releases of server images amplified that visibility by exposing configuration details and internal content at scale. ([The Washington Post][5], [The Register][2])  ,

If your details ever ran through Epik-or appeared in WHOIS that Epik cached-take standard precautions: change any reused passwords, enable two-factor authentication, and review saved payment methods and statements for unfamiliar charges. Consider privacy-protecting domain services and limiting the spread of physical addresses and phone numbers in registration records going forward. For organizations, the incident is a reminder that aggregating “public” data creates new risk. Inventory secondary data stores (like cached WHOIS), apply least-privilege access and encryption at rest, and enforce deletion schedules. Treat public feeds as sensitive once centralized: when a single provider hoards them, a breach can turn open records into a massive doxing and fraud vector. ([Ars Technica][3])  ,

About Epik

Domain registrar and web services company.

Private CompanyUSAepik.com

Data Points Exposed

Verified fields in the released dataset:
Email addresses
Full names
Phone numbers
Physical addresses

Dark Web Verification

Status: Confirmed

  • Dataset containing approximately 15.0M records identified in breach intelligence sources.
  • The data is indexed and searchable across breach notification platforms.

Recommended Actions

⚠️ Do not assume this is low sensitivity.

Expect Targeted Phishing
Watch for emails referencing this breach. Verify communications through official channels.
Secure Email & Enable MFA
Email compromise is often the first pivot point. Enable multi-factor authentication.
Monitor Financial Accounts
Watch for unauthorized credit applications and suspicious activity.
Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.
Non-clients may request a breach impact review.

Frequently Asked Questions

What happened in the Epik data breach?

In September 2021, Epik experienced a data breach that exposed approximately 15.0M records containing personal information.

What data was exposed?

The exposed data includes fields such as email address, full name, phone number, physical address, physical address:home.

How many records were affected?

Approximately 15.0M records were affected based on current breach intelligence.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Epik
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationHostingDomainsEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom