DreamUp Data Breach
DreamUp Space Education Company Breach (2026): 1.7 Million Records Including Home Address Exposed via LAPSUS$ Extortion Group
Space science education and outreach company.
Risk Interpretation
Exposure enables phishing, identity theft, and education-themed scams. Student and enrollment data may also reveal minors, academic status, or school affiliation.
Impact & Downstream Threats
The institutional impact on DreamUp depends on the eventual scope and authenticity of the leaked data, which has not been independently verified beyond DataBreach.com's parsing of the files posted by the threat actor. The threat actor's leak-site framing of DreamUp as a 'ransomware-style' victim has not been corroborated with technical indicators of encryption or operational disruption, suggesting the incident may be primarily data exfiltration rather than encryption-based ransomware. As an educ
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
DreamUp, a U.S.-based space science education and outreach company, was listed on March 1, 2026 by an extortion group operating under the 'LAPSUS$' name on its dark-web data leak site. Security researchers and threat-intelligence analysts including SpyCloud have noted that this 2026 LAPSUS$ group is distinct from the original LAPSUS$ gang led by Arion Kurtaj that was active in 2021 and 2022, and that the connection between the two appears limited to shared branding and values rather than personnel continuity. The group's leak-site posting framed DreamUp as a ransomware-style victim, but the public posting did not include technical indicators of encryption or operational disruption, and DreamUp has not publicly confirmed or denied the claim.
The breach affected approximately 1.7 million email-address entries based on DataBreach.com's parsing of the leaked files, alongside approximately 213,000 phone numbers, 224,000 street addresses, and 7,600 names. The relatively small ratio of names and contact-detail records to email-address entries suggests the leaked data may primarily represent a marketing or outreach contact list rather than a comprehensive user-account database, with most records consisting of email addresses with limited associated identity information.
For affected individuals, the practical risk profile is moderate and primarily concerns phishing and contact-data exposure rather than credential or financial-fraud risk. The combination of email address with phone number, street address, or name supports targeted phishing referencing space-education programs, school partnerships, or student research opportunities. Recipients of the leaked data may receive education-themed phishing campaigns referencing real DreamUp programs or partner institutions. Affected individuals should remain alert to unsolicited contact referencing DreamUp, space-education programs, or student research opportunities, and should treat any communication requesting financial information, parental-consent forms, or login credentials with caution. Parents whose children's contact information may have been exposed through school-program enrollment should be alert to potential phishing campaigns targeting student or parent contacts.
About DreamUp
DreamUp is a U.S.-based space science education and outreach company that operates programs connecting K-12 schools, universities, and individual student researchers with space-based research opportunities including suborbital and low-Earth-orbit experiment platforms. The company partners with operators of commercial-space and government-space research platforms to enable student-designed experiments to be conducted in microgravity environments aboard the International Space Station and on suborbital flights. As an education-focused operator coordinating multi-institutional student research, DreamUp maintains substantial contact-record data including student, teacher, parent, school, and partner-institution information for enrollment management, experiment logistics, parental consent, and event coordination.
Why They Hold Your Data
Education platforms collect student identity, contact details, enrollment records, course participation, and account activity tied to institutional or online learning workflows.
Recent Developments
DreamUp was listed by the 'new LAPSUS$' extortion group on March 1, 2026 on the group's dark-web data leak site. Security researchers and breach-tracking publications including SpyCloud have noted that the 2026 LAPSUS$ group operating these breach claims appears to have no apparent connection to the original LAPSUS$ gang led by Arion Kurtaj (which targeted Microsoft, Nvidia, Samsung, Okta, and others in 2021 to 2022) beyond shared values and branding choices. The new group is associated with the breached.st BreachForums successor site and has begun posting large breaches from major companies including a major pharmaceutical company and an AI-based talent recruiting tool. DreamUp has not publicly detailed the original incident or the specific vulnerability that enabled the compromise. DataBreach.com indexed and parsed the leaked files in mid-March 2026.
Data Points Exposed
Exposure Categories
Canonical Fields
email_address, full_name, phone_number, physical_address:street
Dark Web Verification
- Dataset containing ~1.7M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: dreamup-2026
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of DreamUp
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
