X (Twitter) Breach
Apr 2, 2025
2,873,876,432 rows
What happened in the X (Twitter) Breach?
DataBreach.com Team · April 1st 2025, 8:00 pm EDT
What Happened in the X Data Breach?
In March 2025, reports surfaced regarding a large dataset containing X (formerly Twitter) user information that had become available on various online hacking forums and dark web marketplaces.
While initial descriptions highlighted a significant volume of data, including 2.8 billion X user IDs and personal details for over 200 million users, further analysis indicated this was not the outcome of a new direct breach of X's systems. Instead, the dataset appeared to be a recompilation of information from multiple sources, including previously leaked data, scraped public records, and usernames.
The assembly of this dataset is understood to have involved several methods. A primary component was the collection of public user profile data from X, likely using the platform's API during a period when its access permissions were less restrictive. This process allowed for the large-scale scraping of user IDs, account handles, and other publicly visible metadata.
Beyond the data scraped directly from X, the dataset was significantly augmented by incorporating information from earlier, unrelated data breaches. This involved matching the scraped X profile information (such as usernames or email address patterns if public) with details found in these other compromised databases-for example, leaks from email providers, marketing databases, or other online services where users might have used similar identifying information.
The main purpose of this aggregation seems to have been the creation of a comprehensive, searchable database that consolidated user information from disparate sources. While much of the underlying data, particularly personal details like email addresses associated with the 200 million more detailed profiles, had likely been exposed in previous incidents, this March 2025 compilation brought it together in a centralized format.
The novelty was less about a new intrusion into X and more about the scale and convenience of the aggregated information. This included names, self-disclosed locations, and email addresses for a large subset of users, and in some cases, even linked approximate geolocation or inferred activity data. The dataset's presence was confirmed when it began to circulate and was offered for sale on these online platforms.
Breach Timeline
The timeline for this incident primarily relates to the aggregation process and the dataset's appearance:
- Prior to March 2025 (Undisclosed Dates): Publicly available user data was scraped from X, reportedly utilizing its API during a period when access was more permissive. Data from various unrelated, older breaches was also collected by the assemblers of the dataset.
- March 2025: The large, recompiled dataset containing X user information, enriched with data from other breaches and public sources, was observed on hacking forums and dark web marketplaces.
Specific dates for the API scraping activities or the exact timing of the older breaches used for data enrichment were not detailed in the information surrounding this dataset's March 2025 emergence.
What Information Was Compromised in the X Breach?
The March 2025 X-related data incident involved a recompilation. The information was aggregated from public X profiles and other previously distinct data breaches, not from a new direct compromise of X's internal systems. The dataset reportedly included:
Personally Identifiable Information (PII):
- Full Names: Associated with a portion of the 200 million more detailed user profiles.
- Email Addresses: Linked to over 200 million user profiles. These were likely primarily sourced from previous, unrelated data breaches and then correlated with X profiles.
- Locations: Often as self-disclosed by users on their public X profiles.
- Approximate Geolocation Data: In some instances, this information was reportedly inferred or linked.
- Account Identifiers:
- X User IDs: A large volume, reportedly up to 2.8 billion, numerical identifiers for X accounts.
- X Handles (Usernames): Publicly visible and included as part of the scraped data.
It is important to note that for sensitive PII like email addresses, the original point of exposure was often an earlier data breach at a different organization.This information was then subsequently matched with publicly scraped X profile data.
What Are the Potential Risks for Affected Individuals?
The aggregation and consolidation of X user data, even if sourced from public information and older breaches, can lead to several potential risks, particularly for individuals among the over 200 million whose profiles were more detailed:
Phishing and Spear Phishing Attacks: With access to email addresses, names, and X handles, malicious actors may attempt to craft targeted phishing emails or direct messages. These could impersonate X or other services to try and obtain login credentials, financial information, or deploy malware.
Identity Theft: While comprehensive identity theft typically requires more extensive PII (like government ID numbers or detailed financial data, which were not specified as core components of this particular X dataset's contents), the available combination of names, email addresses, and location data could be used as a starting point by fraudsters.
Account Takeover Attempts: If the exposed email addresses are used for other online accounts, especially with reused or weak passwords, those accounts may become more vulnerable to unauthorized access.
Credential Stuffing Attacks: Lists of email addresses and usernames from such datasets are often used in automated attacks that try known breached passwords against various online services.
Social Engineering: Information like X handles, names, and locations can be used to make social engineering attempts more plausible.
Increased Spam: Exposed email addresses are likely to be targeted with unsolicited bulk emails, some of which may be malicious.
Potential for Harassment or Reputational Harm: The linking of public X activity with private email addresses could potentially be used in attempts to harass or defame individuals.
The availability of this data in a compiled format can make it accessible to a wider range of individuals who may seek to misuse it.
What is X (formerly Twitter) Doing in Response?
Specific details regarding an official response from X (formerly Twitter) to the surfacing of this particular recompiled dataset in March 2025 were not available in the provided information.
This includes any direct communications to users specifically concerning this aggregated dataset or new remediation measures taken as a direct result of its appearance.
Generally, when such data compilations surface, companies may reiterate existing security advice and clarify the nature of the data if it doesn't stem from a new system breach. They also typically continue ongoing efforts to secure APIs and protect user data against unauthorized scraping and access. Without a specific statement from X related to this March 2025 event, any description of their direct response remains unconfirmed.
What Should You Do If You Were Affected by the X Data Breach?
Given that this incident involves the recompilation of data, some of which was already public or from past breaches, it serves as a strong reminder to maintain good digital hygiene. While X has not issued specific instructions regarding this March 2025 data surfacing (based on available information), the following general advice is recommended for all users to protect their online presence:
Review and Strengthen Passwords: Ensure your X password is strong and unique. Avoid using passwords that you've used on other sites. Change passwords for any other online accounts that might have used the same email address and password combination, especially your email account itself. Consider using a password manager to create and store complex, unique passwords for all your accounts.
Enable Two-Factor/Multi-Factor Authentication (2FA/MFA): Enable 2FA/MFA on your X account. This adds an extra layer of security beyond just your password.
Enable 2FA/MFA on all critical online accounts, particularly email, banking, and other social media.
Be Vigilant Against Phishing and Suspicious Communications: Be wary of unsolicited emails, direct messages, or calls asking for personal information, login details, or prompting you to click on suspicious links, even if they appear to be from X or a known contact.
Verify the sender's identity before responding or clicking any links. Look for generic greetings, poor grammar, or urgent requests.
Monitor Your Accounts: Regularly review your X account for any suspicious activity, such as posts you didn't make or changes to your profile information.
Monitor your email account for unauthorized login attempts or unexpected password reset emails for other services. Keep an eye on your financial accounts (bank statements, credit card activity) for any unauthorized transactions.
Review Account Security and Privacy Settings: Periodically review the security and privacy settings on your X account and other social media platforms. Limit the amount of personal information you share publicly.
Check what third-party applications have access to your X account and revoke access for any services you no longer use or trust.
Consider a Credit Freeze or Fraud Alert (if concerned about broader identity theft): If you believe your more sensitive PII might have been compromised in other breaches and correlated, you might consider placing a fraud alert or credit freeze on your credit files with the major credit bureaus.
Stay Informed:
Pay attention to official communications from X regarding security and any steps they recommend.
Stay updated on common online threats and security best practices from reputable sources.
Remember, the data in this compilation was gathered over time and from various sources. These proactive steps can help mitigate risks associated not only with this specific dataset but also with the broader landscape of online data exposure.




