HIGH SEVERITY

Cutout.Pro Data Breach

Cutout.Pro AI Image Editing Platform Breach (2024): 40 Million User Accounts Including Passwords Exposed

AI-powered image editing platform.

Verified by ObscureIQ Intelligence

7.5Severity
40.4MRecords
4Fields
2024Year

ObscureIQ Breach Intelligence Scores
1.3
Breach Risk Index
5
Data Value
25
Market Recency
458
days
Since Breach

Risk Interpretation

Exposure enables phishing, account abuse, and leakage of uploaded images or design projects. Image-processing platforms can also reveal personal photos or business assets.

🎯 Impact & Downstream Threats

In February 2024 a hacker leaked a 5.93GB database from Cutout.Pro containing over 41 million records including names, email addresses, IP addresses, and hashed passwords. The data was published publicly. Cutout.Pro did not make prominent public statements about the breach at the time of exposure, and no formal notification to affected users has been widely documented. No class-action litigation or regulatory action specific to this incident has been prominently reported.

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
Geolocation & account flagging
Credential stuffing & account takeover

📋 Breach Intelligence

EntityCutout.Pro
Organization • Global
Breach Date2024-02-26
DBC Added2025-01-24
Added Date2025-01-24
Records~40.4M (40,404,024 records)
Attack VectorMisconfiguration
Data SubjectsUser
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityStandard
Breach ID350;351
StatusConfirmed

📝 Executive Summary

Cutout.Pro, an AI-powered image and video editing platform serving tens of millions of users globally, suffered a data breach in February 2024 after a misconfiguration exposed its internal database. A hacker obtained and leaked a 5.93 GB database directly on a public hacking forum and distributed it through Telegram channels. The exposed database contained over 41 million records tied to an estimated 20 million user accounts. The breach exposed names, email addresses, IP addresses, and hashed passwords. The passwords were protected with salted MD5 hashing, a relatively weak standard that determined attackers can crack with modern tools. For affected users, this combination of data creates real risk: exposed credentials can be tested against other accounts the person uses, and their email address and IP address can be used to craft convincing phishing attempts or identify their approximate location. Cutout.Pro did not make prominent public statements about the breach, and no formal notification to affected users has been widely documented. No regulatory action or class-action litigation specific to this incident has been reported. Users of the platform should treat their Cutout.Pro password as compromised, change it immediately, and update any other accounts where the same password was used. Because the platform handles personal photos and business design assets, affected users should also consider what images they may have uploaded and processed through the service.

🏢 About Cutout.Pro

Cutout.Pro is an AI-powered image and video editing platform offering background removal, photo enhancement, portrait retouching, and creative generation tools. The service operates on a credit-based freemium model and has attracted tens of millions of registered users globally, primarily serving content creators, designers, and small businesses who use the tools for social media and marketing assets.

Platform | AI-powered visual design and image editing services | AI visual design platform | Global
Globalcutout.pro

🗂 Why They Hold Your Data

AI visual-design platforms collect user accounts, uploaded images, project metadata, billing records, and usage activity tied to editing and generative design workflows.

📰 Recent Developments

Cutout.Pro continues to operate as an AI image processing platform. The market for AI-powered creative tools has become highly competitive. No major organizational changes have been prominently reported in public sources.

🔍 Data Points Exposed

4 verified field types:
IP Address
Email
Name;Email
IP addresses
Names
Passwords

Canonical Fields

email_address, full_name, ip_address, password

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Cutout.Pro
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom