HIGH SEVERITYAdult

Eroticy Data Breach

Eroticy Adult Dating & Escort Platform Breach (2015): 1.4 Million User Records Including Payment History, Home Address & Passwords Exposed

Eroticy was an adult-oriented platform combining dating, escort listings, and user profiles. The service enabled users to create accounts, browse listings, and interact with others for casual or transactional encounters. The model blends social networking with classifieds-style adult services, creating strong linkage between identity and real-world activity. /// Exposed data includes Password, Email;Email, IP addresses, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Usernames, Website activity. High sensitivity. Elevated risk of extortion, reputational damage, and identity linkage.

Verified by ObscureIQ Intelligence

7.5Severity
1.6MRecords
9Fields
2015Year

ObscureIQ Breach Intelligence Scores
7.5
Breach Risk Index
25
Data Value
25
Market Recency
439
days
Since Breach

Risk Interpretation

Very high sensitivity. Exposure enables extortion, reputational harm, harassment, stalking, and identity linkage around sexual behavior or escort-related activity.

🎯 Impact & Downstream Threats

The institutional impact on Eroticy as an entity has been limited given the unconfirmed source attribution and the platform's apparent disappearance from active operation. No public regulatory action, civil litigation, or formal acknowledgment has been documented. The case has been cited in security research as a leading example of breach attribution challenges and the difficulty of confirming the original source when data circulates through hacker forums and third-party aggregators. The institu

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Behavioural profiling & blackmail
Phishing, credential stuffing & account takeover
Name-based social engineering
Geolocation & account flagging
Credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Extortion & fraud
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityEroticy
Organization • Global
Breach Date2015-06-01
DBC Added2025-02-12
Added Date2025-02-12
Records~1.6M (1,597,446 records)
Attack VectorMisconfiguration
Threat ActorUnknown (source attribution inconclusive per Troy Hunt)
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityElevated
Breach ID462;463
StatusConfirmed

📝 Executive Summary

A data breach affecting an adult dating and escort-style platform, attributed in initial reporting to a site known as Eroticy, surfaced in late 2016 when a 120-megabyte SQL dump file labeled 'Eroticy.com_June_2015.sql.zip' began circulating among breach researchers. The data was distributed to Have I Been Pwned, which loaded the breach as a sensitive entry under the Eroticy name with explicit unverified flags. Have I Been Pwned founder Troy Hunt published a detailed verification account, noting that while many subscribers confirmed individual records as accurate to them, the actual source of the breach could not be conclusively attributed to Eroticy. The platform itself has not publicly acknowledged or disputed the attribution.

The breach affected approximately 1.4 million to 1.6 million unique user accounts based on records indexed by breach-tracking services. Compromised fields included names, usernames, email addresses, phone numbers, physical addresses, IP addresses, passwords stored in plaintext for some records, payment histories including transaction records, and detailed website activity logs. The combination of plaintext passwords with payment history and home address from an adult-dating and escort-services context represents one of the most sensitive field combinations recorded in the historical adult-platform breach record.

For affected users, the practical risk profile is exceptionally severe because of the combination of identity-fraud exposure with adult-platform-specific reputational risk. The combination of name, address, phone number, and plaintext password supports both credential-stuffing attacks against other accounts and synthetic-identity-fraud risk. More distinctively, inclusion in the dataset confirms an adult-dating or escort-services relationship and may reference real payment transactions for adult services. This creates substantial extortion risk, in which attackers threaten disclosure to family members, employers, or social networks unless ransom is paid. Affected users who receive extortion attempts should not pay ransom demands because payment does not stop further extortion and often invites additional attempts. Users should change any reused passwords immediately, enable two-factor authentication where available, document all extortion communications, and report extortion attempts to law enforcement. Affected users should also be aware that the source of this breach remains unconfirmed, meaning the data may have originated from a different platform than the one named in the breach record.

🏢 About Eroticy

Eroticy was reportedly an adult dating and escort-style social platform that combined dating profiles, escort listings, and user accounts to facilitate discreet adult encounters. The platform operated as an account-based service blending social networking with classifieds-style adult services, with users creating profiles, browsing listings, and arranging interactions for casual or transactional encounters. As an adult dating platform, Eroticy maintained substantial user account data including names, usernames, email addresses, phone numbers, physical addresses, IP addresses, passwords, payment histories, and records of user activity tied to intimate-services arrangements.

Platform | Adult dating and escort services | Account-based adult social and classifieds platform | Global
Global* porn eroticy.com

🗂 Why They Hold Your Data

Adult dating and escort-style platforms collect highly sensitive profile data, emails, usernames, relationship or sexual-interest signals, messages, and account activity tied to intimate services.

📰 Recent Developments

The Eroticy breach is unusual within the historical adult-platform breach record because the source of the breach has not been definitively confirmed. Have I Been Pwned founder Troy Hunt published a detailed account of his verification process in late 2016, noting that while many HIBP subscribers confirmed individual records as accurate, the actual source of the data could not be conclusively attributed to Eroticy. The data was loaded into HIBP under the Eroticy name with explicit 'unverified' flags and accompanying explanation. As of current reporting, no entity has formally claimed the dataset or accepted responsibility for the breach, and Eroticy itself has not publicly acknowledged or disputed the attribution.

🔍 Data Points Exposed

9 verified field types:
Password
Email;Email
IP addresses
Names
Passwords
Payment histories
Phone numbers
Physical addresses
Usernames
Website activity

Exposure Categories

LocationPHYS ADDR

Canonical Fields

activity_history:website_activity, email_address, full_name, ip_address, password, phone_number, physical_address, transaction_history:payment, username

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~1.6M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: eroticy-2015;Eroticy Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Eroticy
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationAdultEmailPhoneAddressPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom