HIGH SEVERITYEducation

DreamUp Data Breach

DreamUp Space Education Company Breach (2026): 1.7 Million Records Including Home Address Exposed via LAPSUS$ Extortion Group

Space science education and outreach company.

Verified by ObscureIQ Intelligence

6.5Severity
1.7MRecords
4Fields
2026Year

ObscureIQ Breach Intelligence Scores
10.0
Breach Risk Index
8
Data Value
80
Market Recency
46
days
Since Breach

Risk Interpretation

Exposure enables phishing, identity theft, and education-themed scams. Student and enrollment data may also reveal minors, academic status, or school affiliation.

🎯 Impact & Downstream Threats

The institutional impact on DreamUp depends on the eventual scope and authenticity of the leaked data, which has not been independently verified beyond DataBreach.com's parsing of the files posted by the threat actor. The threat actor's leak-site framing of DreamUp as a 'ransomware-style' victim has not been corroborated with technical indicators of encryption or operational disruption, suggesting the incident may be primarily data exfiltration rather than encryption-based ransomware. As an educ

Primary downstream threats:
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Geolocation & property fraud

📋 Breach Intelligence

EntityDreamUp
Organization • Global
Breach Date2026-03-01
DBC Added2026-03-12
Added Date2026-03-12
Records~1.7M (1,652,692 records)
Attack VectorMisconfiguration
Threat Actor"new LAPSUS$" (distinct from original Arion Kurtaj group per SpyCloud)
Data SubjectsUser
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID418.0
StatusConfirmed

📝 Executive Summary

DreamUp, a U.S.-based space science education and outreach company, was listed on March 1, 2026 by an extortion group operating under the 'LAPSUS$' name on its dark-web data leak site. Security researchers and threat-intelligence analysts including SpyCloud have noted that this 2026 LAPSUS$ group is distinct from the original LAPSUS$ gang led by Arion Kurtaj that was active in 2021 and 2022, and that the connection between the two appears limited to shared branding and values rather than personnel continuity. The group's leak-site posting framed DreamUp as a ransomware-style victim, but the public posting did not include technical indicators of encryption or operational disruption, and DreamUp has not publicly confirmed or denied the claim.

The breach affected approximately 1.7 million email-address entries based on DataBreach.com's parsing of the leaked files, alongside approximately 213,000 phone numbers, 224,000 street addresses, and 7,600 names. The relatively small ratio of names and contact-detail records to email-address entries suggests the leaked data may primarily represent a marketing or outreach contact list rather than a comprehensive user-account database, with most records consisting of email addresses with limited associated identity information.

For affected individuals, the practical risk profile is moderate and primarily concerns phishing and contact-data exposure rather than credential or financial-fraud risk. The combination of email address with phone number, street address, or name supports targeted phishing referencing space-education programs, school partnerships, or student research opportunities. Recipients of the leaked data may receive education-themed phishing campaigns referencing real DreamUp programs or partner institutions. Affected individuals should remain alert to unsolicited contact referencing DreamUp, space-education programs, or student research opportunities, and should treat any communication requesting financial information, parental-consent forms, or login credentials with caution. Parents whose children's contact information may have been exposed through school-program enrollment should be alert to potential phishing campaigns targeting student or parent contacts.

🏢 About DreamUp

DreamUp is a U.S.-based space science education and outreach company that operates programs connecting K-12 schools, universities, and individual student researchers with space-based research opportunities including suborbital and low-Earth-orbit experiment platforms. The company partners with operators of commercial-space and government-space research platforms to enable student-designed experiments to be conducted in microgravity environments aboard the International Space Station and on suborbital flights. As an education-focused operator coordinating multi-institutional student research, DreamUp maintains substantial contact-record data including student, teacher, parent, school, and partner-institution information for enrollment management, experiment logistics, parental consent, and event coordination.

Platform | Education and academic services | Educational institution | Global
Globaldreamup.com

🗂 Why They Hold Your Data

Education platforms collect student identity, contact details, enrollment records, course participation, and account activity tied to institutional or online learning workflows.

📰 Recent Developments

DreamUp was listed by the 'new LAPSUS$' extortion group on March 1, 2026 on the group's dark-web data leak site. Security researchers and breach-tracking publications including SpyCloud have noted that the 2026 LAPSUS$ group operating these breach claims appears to have no apparent connection to the original LAPSUS$ gang led by Arion Kurtaj (which targeted Microsoft, Nvidia, Samsung, Okta, and others in 2021 to 2022) beyond shared values and branding choices. The new group is associated with the breached.st BreachForums successor site and has begun posting large breaches from major companies including a major pharmaceutical company and an AI-based talent recruiting tool. DreamUp has not publicly detailed the original incident or the specific vulnerability that enabled the compromise. DataBreach.com indexed and parsed the leaked files in mid-March 2026.

🔍 Data Points Exposed

4 verified field types:
Email
Phone Number
Name
Street Address

Exposure Categories

LocationPHYS ADDR

Canonical Fields

email_address, full_name, phone_number, physical_address:street

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~1.7M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: dreamup-2026

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of DreamUp
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom