In a significant breach of user data security, approximately 428 million unique TikTok user records are allegedly compromised by a threat actor known as “Often9”. This breach reportedly involves sensitive data, including private fields such as email addresses and mobile phone numbers, in addition to public metrics and profile information.
It is suggested that the attack either extracted this information from internal TikTok systems or a compromised third-party database, rather than through mere public scraping, indicating a serious vulnerability within TikTok’s data security architecture. The alleged dataset contains 428 million records, highlighting the extensive nature of the breach.
The data types exposed include personal identifiers like emails, phone numbers, and biographies, in conjunction with profile metadata such as avatar URLs and usernames. Furthermore, the breach has potentially put users at risk because of the exposure of account flags, which illustrate privacy preferences and verification states. The data may have been scraped from public profiles, highlighting the potential severity of the incident.
The breach exposes sensitive personal identifiers, profile metadata, and account flags, heightening privacy risks for affected users.
The combination of personally identifiable information (PII) and usage metrics renders this data sensitive to a medium-to-high degree, reflecting the serious implications for affected users globally. Similar to the zero-day vulnerabilities used in the Stuxnet attack, this breach demonstrates how sophisticated cyber threats can exploit previously unknown system weaknesses.
Although skepticism remains regarding the dataset’s authenticity because of some incomplete or generic fields, the majority of the entries are unique and align with previous breach data points.
Following the breach’s public disclosure in late May 2025, TikTok has initiated an internal investigation. No official confirmation of the breach’s authenticity has emerged yet, but TikTok is advising caution regarding the claims until thorough evaluations are conducted.
The threat actor’s intent appears to be financial gain, with the dataset listed for sale on dark web forums, further increasing the vulnerability of users and underlining the ongoing risks associated with data theft in the digital age.