• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Intruders Latest Cybersecurity News

3.8 billion phone numbers of Clubhouse data breach is available on Dark Web

William Marshal Posted On July 25, 2021
0



Clubhouse databreach

Social Media Platforms like Facebook, Instagram, WhatsApp, Twitter and others have always been a prime target for hackers for data breaches and data thefts. The latest popular social media platform called Clubhouse is known for the presence of top influencers and high profile individuals, and is becoming quite famous in recent times for its usability and uniqueness.

As per the tweet from a security researcher Marc Ruef, 3.8 billion phone numbers and contact details of the users of the platform has been announced for auction in the Dark Web.

More on Clubhouse data breach

Clubhouse currently valued at $3 billion dollars, has now been breached into and the statement made in the dark reveals that along with 3.8 billion phone numbers, contact details of the users have also been included in the stolen database. Clubhouse when installed requests access to your phone book, once the access is given, the clubhouse will add any new phone numbers that has been included into your contact list and replicate the same into its database. The below image shows the post from the Dark Web,

Full phone number database of #Clubhouse is up for sale on the #Darknet. It contains 3.8 billion phone numbers. These are not just members but also people in contact lists that were synced. Chances are high that you are listed even if you haven't had a Clubhouse login. pic.twitter.com/PfAkUJ0BL5

— Marc Ruef (@mruef) July 23, 2021

Then, it scans that new phone number to find how many other users within the Clubhouse data breach have the same phone number to identify the popular personalities in the database. The criminals claim that they can even list the top popular personalities based on the national and international level using this scoring metrics associated with the phone numbers and clubhouse database.

The user named ‘I Know A Guy Who Knows Another Guy’ has also published a sample of stolen data as a proof, and it maps to 83.5 million phone numbers of Japanese People.

The user also challenges GDPR authorities and their laws to see if they will sanction Clubhouse or let this slip under another bogus threat. He has also mentioned on Sep 04, 2021 the stolen data will be displayed for an auction and interested people are requested to comment for their interest. It is mentioned that the data will be sold only to one exclusive buyer and not distributed to many.

The exact modus operandi of this data breach is yet to be disclosed, but this looks threatening as Clubhouse has just began their campaign and the users can only be joined based on an invite from the existing users, which makes it look limited for public access. However, unfortunately this data breach news comes as a bummer for Clubhouse and its users.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends




Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search