Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Top 10 Best Interactive Malware Analysis Tools for
May 11, 2026
10 Best Full Disk Encryption Tools in 2026
May 11, 2026
ODINI Malware Breaches Air-Gapped Exploits Magnetic
May 11, 2026
Home/CyberSecurity News/Threat Actors Claim 78M Discord User Files Allegedly Dataset
CyberSecurity News

Threat Actors Claim 78M Discord User Files Allegedly Dataset

Threat actor HawkSec claims to be auctioning a Discord dataset comprising 78,541,207 files. This collection, organized into messages, voice sessions, actions, and servers, reportedly stems from an...

Jennifer sherman
Jennifer sherman
January 12, 2026 2 Min Read
4 0

Threat actor HawkSec claims to be auctioning a Discord dataset comprising 78,541,207 files. This collection, organized into messages, voice sessions, actions, and servers, reportedly stems from an abandoned OSINT/CSINT project that spanned several months.

HawkSec promoted the dataset in their Discord server, titled “Hello Hawks Community,” announcing availability for purchase via designated channels.

Files purportedly cover public Discord interactions, with specifics like “ME files,” voice data, and server metadata highlighted in screenshots. No pricing details surfaced publicly, but the actor invited inquiries for samples.

Similar sales have appeared before, such as a 2025 listing of 348 million scraped messages from nearly 1,000 public servers on cybercrime forums.

Researchers have also released large public datasets, such as “Discord Unveiled,” which contains over 2 billion messages from 3,167 servers via Discord’s API.

Discord Breach Claim
Discord Breach Claim

The 78 million files suggest extensive scraping, possibly targeting Discovery-listed public servers averaging 1,200 members each. HawkSec described the effort as originally aimed at advanced intelligence tools before pivoting to commercialization.

While no private data is confirmed, aggregated public logs raise re-identification risks when cross-referenced with other sources.

Discord has faced scrutiny over public scraping; past incidents involved tools like Spy.pet selling billions of messages. Legitimate academic scrapes emphasize anonymization and API compliance, unlike underground sales.

Public Discord data can fuel harassment, doxxing, or targeted phishing, even without a breach. Users in visible servers face amplified exposure, mirroring 2025 concerns over 2 billion-message datasets sparking privacy debates. No evidence ties this to Discord’s infrastructure; it aligns with API-accessible public content.

Discord maintains that public channels are openly accessible, distinguishing scrapes from breaches. In 2025, a third-party vendor incident exposed 70,000 government IDs via Zendesk, but attackers exaggerated the scope to 5.5 million users. Officials urged vigilance against phishing post-leak.

No response from Discord on HawkSec yet, as of January 12, 2026. Cybersecurity experts recommend reviewing server visibility settings and monitoring for misuse.

HawkSec’s claim remains unverified beyond the shared image, underscoring ongoing threats from data commodification in gaming communities.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityphishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

YARA-X 1.11.0 Released With a New Hash Function Warnings

Next Post

InvisibleJS Hides ES Modules in Files via Zero Tool Executable

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Let’s Encrypt Halts Certificate Issuance Due to Let’s After
May 9, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us