Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Cerberus Stalkerware Abuses Google Play for Leverages Accessibility
May 5, 2026
Education Sector Under Attack: Espionage & Phishing
May 5, 2026
DAEMON Tools Hacked: Supply Chain Attack Software Deliver
May 5, 2026
Home/CyberSecurity News/Raaga Data Breach Exposes 10.2 Million User Records
CyberSecurity News

Raaga Data Breach Exposes 10.2 Million User Records

In December 2025, Indian music streaming platform Raaga experienced a significant data breach, compromising the personal information of 10.2 million users. The stolen database was subsequently...

David kimber
David kimber
January 20, 2026 2 Min Read
0 0

In December 2025, Indian music streaming platform Raaga experienced a significant data breach, compromising the personal information of 10.2 million users.

The stolen database was subsequently offered for sale on a prominent underground hacking forum, raising serious concerns about user privacy and platform security.

According to HIBP, the breach was detected when threat actors posted the alleged Raaga database on a cybercrime marketplace. The compromised dataset contains approximately 10 million unique email addresses alongside extensive personal information.

Attackers are actively marketing this stolen data to potential buyers on dark web forums, increasing the risk of secondary attacks against affected users.

The breach timeline indicates the data was exfiltrated sometime in December 2025, though the exact date of the initial compromise remains unclear.

Raaga has not publicly disclosed when they discovered the security incident or whether affected users received breach notifications.

Compromised Information

The exposed database includes sensitive personal details that could facilitate identity theft and targeted phishing campaigns. Affected users had the following information compromised:

  • Full names and email addresses
  • Gender information
  • Age data and partial dates of birth
  • Geographic location data, including postal codes
  • Account passwords stored as unsalted MD5 hashes

The most critical security vulnerability lies in Raaga’s password storage methodology. The platform used unsalted MD5 hashing, an outdated and cryptographically weak algorithm that security experts abandoned years ago.

Modern password cracking tools can rapidly reverse MD5 hashes, allowing attackers to obtain plaintext passwords within hours or days.

Individuals who reuse passwords across multiple platforms face an elevated risk of credential stuffing attacks.

Affected Raaga users should immediately change their account passwords and enable two-factor authentication if available. Anyone using similar passwords on other services should update those credentials as well.

Users should remain vigilant against phishing emails that leverage stolen personal information and monitor their financial accounts for suspicious activity.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachphishingSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Open Source Firewall OPNsense 25.7.11 Released With Host Discovery

Next Post

New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Framework Connects APT Campaigns Across All Layers
May 5, 2026
WhatsApp Flaw Uses Instagram Reels for Malicious URL Execution
May 5, 2026
Instagram Ending Encrypted Direct Messages Encryption
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us