HIGH SEVERITYAdult

Hjedd Data Breach

Hjedd Chinese Adult Content Platform Breach (2022): 13 Million User Accounts Including Passwords Exposed

Chinese adult content platform

Verified by ObscureIQ Intelligence

7.5Severity
13.4MRecords
4Fields
2022Year

ObscureIQ Breach Intelligence Scores
10.0
Breach Risk Index
25
Data Value
25
Market Recency
446
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure enables extortion, harassment, reputational harm, and identity linkage, while IP and credential data increase the risk of tracking and account compromise.

🎯 Impact & Downstream Threats

The institutional impact on Hjedd is difficult to assess given the platform's limited public profile and apparent unresponsiveness to disclosure. The platform did not issue a public statement, did not notify affected users, and reportedly did not secure the database in response to repeated researcher disclosure. Chinese regulatory authorities have not publicly announced enforcement action, and Hjedd faces no apparent civil litigation. Operationally, however, the breach exposed the platform's lac

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Geolocation & account flagging
Credential stuffing & account takeover
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityHjedd
Organization • Global
Breach Date2022-07-01
DBC Added2025-02-05
Added Date2025-02-05
Records~13.4M (13,406,542 records)
Attack VectorMisconfiguration
Threat Actorn/a (researcher disclosure – Anurag Sen)
Data SubjectsUser
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityElevated
Breach ID644;645
StatusConfirmed

📝 Executive Summary

Hjedd, a Chinese-language adult content and NSFW social platform, was found in July 2022 to be operating an unsecured ElasticSearch database that exposed personal information for over 14 million users. Independent security researcher Anurag Sen discovered the exposed server via Shodan and confirmed that no authentication was required to access the data, which totaled more than 24 gigabytes of records. Sen disclosed the issue to Hjedd on multiple occasions, but the platform did not respond or secure the server, and the database continued to update with newly registered users' data while remaining publicly accessible. Cybercriminals subsequently posted a downloadable copy of the dataset, containing approximately 13.4 million unique user accounts, on a hacker forum.

The breach affected approximately 13.4 million users in the publicly distributed dataset and over 14 million users in the broader exposed database. Compromised fields included usernames, nicknames, email addresses, phone numbers, member profile details, user comments, login IP addresses, bcrypt-hashed passwords, and direct messages exchanged between users. The exposure of direct messages is particularly consequential because these messages contain private communications about adult-content interests, sexual preferences, and arrangements between users.

For affected users, the practical risk profile is unusually severe because of the platform's adult-content context and the inclusion of direct messages. The combination of email address, IP address, and bcrypt-hashed password creates credential-stuffing and account-takeover risk on other platforms where users may have reused the same credentials. More distinctively, inclusion in the dataset confirms an adult-content-platform relationship and may include private messages that explicitly describe the user's sexual interests, partners, or arrangements. This creates substantial extortion risk, in which attackers threaten to disclose the user's account or message history to family members, employers, or social networks unless ransom payments are made. Affected users who receive extortion attempts should not pay ransom demands, as payment does not stop further extortion and may invite additional attempts. Users should change passwords on any other accounts where the same password was reused, enable two-factor authentication where available, document all extortion communications, and report extortion attempts to law enforcement. Users should also be aware that bcrypt password hashes can be cracked over time as computing capacity increases.

🏢 About Hjedd

Hjedd was a Chinese-language adult content and NSFW (not safe for work) social platform with a substantial user base. The platform combined adult content distribution, user-generated content, account-based social features including direct messaging between users, and forum-style interaction. As an adult content platform of significant scale, Hjedd maintained user account identifiers, email addresses, usernames, login credentials, IP addresses, mobile phone numbers, member profile details, user comments, and direct messages exchanged between users. The platform's user base was concentrated in Chinese-speaking regions but registration was not geographically restricted.

Platform | Adult content and social interaction | Account-based content platform | Global
Global* porn hjedd.com

🗂 Why They Hold Your Data

Adult social and content platforms collect highly sensitive account identifiers, emails, usernames, passwords, IP addresses, and usage activity tied to explicit-content participation.

📰 Recent Developments

Independent security researcher Anurag Sen discovered the unsecured Hjedd database via Shodan in July 2022 and documented that the server was publicly accessible without authentication. Sen disclosed the issue to Hjedd on multiple occasions, but the platform did not respond or secure the server. The database remained exposed for an extended period, during which it continued to update with newly registered users' data. Cybercriminals discovered the exposure independently and posted a free download of the Hjedd database on a hacker forum that had emerged as an alternative to the seized RaidForums. Have I Been Pwned indexed the breach in October 2023 and DataBreach.com indexed it in February 2025. The case has been widely cited in security research as an example of misconfigured ElasticSearch exposures and unresponsive vendor remediation.

🔍 Data Points Exposed

4 verified field types:
IP Address
Email;Email
IP addresses
Passwords
Usernames

Canonical Fields

email_address, ip_address, password, username

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~13.4M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: hjedd-2022;Hjedd Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Hjedd
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationAdultEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom