The Post Millennial Data Breach
The Post Millennial Conservative News Website Breach (2024): 57 Million Email Addresses & User Records Exposed
Online news and media publication.
Risk Interpretation
Exposure enables phishing, account takeover, and profiling based on media consumption or ideological interest. Subscriber data may also support politically motivated harassment.
Impact & Downstream Threats
In May 2024 The Post Millennial suffered a breach in which the website was defaced and links were posted to three separate data corpuses. The exposed data covered several distinct groups: hundreds of writers and editors whose IP addresses, physical addresses, and email addresses were exposed; tens of thousands of newsletter subscribers including email addresses; and a large corpus of approximately 57 million records from what appeared to be a broader mailing list or data aggregation tied to the
- Credential stuffing against reused passwords across other platforms
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
The Post Millennial, a Canadian conservative news website, suffered a data breach in May 2024 after attackers used social engineering to gain access to its systems. The breach affected three separate groups: hundreds of writers and editors, tens of thousands of newsletter subscribers, and a far larger corpus of approximately 57 million records drawn from what appear to be mailing lists associated with the publication's digital campaigns. Alongside the data theft, attackers defaced the website's homepage with a fabricated political statement, suggesting ideological rather than financial motivation. The stolen data was subsequently posted to a hacking forum and widely distributed via torrents. The exposed information varied by group. Staff and contributors had IP addresses, physical addresses, and email addresses exposed. Subscribers had names, email addresses, usernames, phone numbers, and plain text passwords taken, meaning passwords were stored without encryption and are immediately usable by anyone who obtained the file. The broader mailing list corpus, which has not been independently verified as belonging to The Post Millennial, contained combinations of names, phone numbers, home addresses, and email addresses depending on the campaign source. The nature of the outlet means the breach also exposes the political and ideological interests of those affected, which carries its own risks. The Post Millennial has not made detailed public statements about the full scope of the breach or any investigation into it. No regulatory actions or legal proceedings have been publicly confirmed. For affected individuals, the practical risks are serious: plain text passwords should be changed immediately on any account where they were reused, and those whose home addresses or names were exposed should be alert to targeted phishing, harassment, or unsolicited contact given the politically sensitive nature of the data.
About The Post Millennial
The Post Millennial is a Canadian conservative news and commentary website covering politics, culture, and current events with a right-leaning editorial perspective. It operates as a digital-only publication with a predominantly North American audience and maintains a sister publication, Human Events, aimed at U.S. conservative readers. The outlet is associated with American conservative media personality Andy Ngo, who served as editor-at-large.
Why They Hold Your Data
Digital media outlets collect subscriber identity, emails, billing records, newsletter activity, and content-engagement data across publishing and audience-management systems.
Recent Developments
The Post Millennial has continued operating as a digital conservative publication following the 2024 breach. No major organizational changes beyond the breach aftermath have been prominently reported. The outlet's editorial operations continued across its Canadian and U.S. properties.
Data Points Exposed
Exposure Categories
Canonical Fields
email_address, full_name, gender, ip_address, password, phone_number, physical_address, physical_address:home, username
Dark Web Verification
- Dataset containing ~57.0M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: The Post Millennial Data Breach;thepostmillennial.com-2024
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of The Post Millennial
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
