Nitro Data Breach
Nitro PDF Document Platform Breach (2020): 70 Million User Accounts Including Document Titles Exposed
Document productivity software company.
Risk Interpretation
Exposure enables account takeover, phishing, business impersonation, and document-themed scams. Even limited metadata can help attackers target organizations using document workflows.
Impact & Downstream Threats
The 2020 Nitro breach exposed a very large SaaS account dataset tied primarily to Nitro’s free online products rather than its core desktop PDF software. HIBP says 77.2 million accounts were affected and included email addresses, names, bcrypt password hashes, and titles of converted documents, while Nitro’s own public incident note said the impacted databases were used mainly for online services and that Nitro Pro and Nitro Analytics were not affected. That still made the breach highly useful f
- Credential stuffing against reused passwords across other platforms
- Targeted phishing campaigns using exposed email addresses
Threat Vectors
Breach Intelligence
Executive Summary
Nitro, a document productivity and PDF software company, suffered a data breach in September 2020 that exposed records tied to over 77 million user accounts. The breach stemmed from a misconfiguration and affected databases linked to Nitro's free online services. Nitro stated that its desktop software, Nitro Pro, and its analytics product were not involved. The exposed data included email addresses, names, bcrypt password hashes, and the titles of documents users had converted through the platform. The inclusion of document titles is an unusual detail. Those titles can reveal the nature of sensitive business, legal, or personal files, giving attackers context that goes beyond standard credential theft. Bcrypt hashing offers some protection for passwords, but the combination of email addresses, names, and document metadata still creates meaningful risk for affected users and their organizations. No widely reported regulatory actions or enforcement proceedings stemmed from the breach. The data was later shared with the breach notification service Have I Been Pwned through dehashed.com. Affected users should treat their Nitro account credentials as compromised, change any reused passwords, and stay alert to phishing attempts that may reference document-related activity, as attackers could use the exposed metadata to craft convincing, targeted messages.
About Nitro
Nitro is a document productivity software company focused on PDF editing, e-signature workflows, and enterprise document automation. It positions itself as a lower-friction alternative to Adobe-style document tooling, with products spanning PDF, eSign, APIs, and newer AI-assisted workflow features for business users.
Why They Hold Your Data
Document productivity platforms collect user accounts, emails, document metadata, billing records, and collaboration activity tied to PDF creation, editing, signing, and workflow automation.
Recent Developments
Nitro remains an active document-workflow software company and has recently emphasized AI, enterprise workflows, and channel expansion. Its recent public announcements highlight the Nitro Sign API, Smart Redact for regulated industries, a Canva partnership, expanded distribution in Europe, and multiple 2025 to 2026 product releases focused on automation and document workflow modernization.
Data Points Exposed
Canonical Fields
email_address, full_name, ip_address, password
Dark Web Verification
- Dataset containing ~77.2M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: Nitro Data Breach;gonitro.com-2020
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Nitro
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
