Pornhub targeted in extortion attempt following Mixpanel breach exposing user activity

Security Affairs
Actively Exploited

Overview

Hackers linked to a group known as ShinyHunters have launched an extortion attempt against Pornhub following a data breach involving Mixpanel, an analytics platform. The breach exposed the search and viewing history of Premium users, raising serious privacy concerns. The attackers are reportedly demanding a ransom to prevent the release of this sensitive information. This incident not only affects Pornhub's reputation but also puts the personal data of its paying users at risk. As the situation unfolds, it serves as a stark reminder of the vulnerabilities that even major platforms face when it comes to user data protection.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Pornhub Premium users, Mixpanel analytics platform
  • Timeline: Ongoing since the breach occurred (specific date not mentioned)

Original Article Summary

Hackers tied to ShinyHunters extort PornHub after stealing search and viewing history of Premium users in a Mixpanel data breach. PornHub faces extortion after hackers linked to ShinyHunters allegedly stole search and viewing history of Premium users via a Mixpanel data breach. Mixpanel is a product analytics platform that companies use to understand how people interact […]

Impact

Pornhub Premium users, Mixpanel analytics platform

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Ongoing since the breach occurred (specific date not mentioned)

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Data Breach.

Related Coverage

Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026

darkreading

Franz Regul, the former Chief Information Security Officer for the Paris 2024 Olympics, addressed the unique cybersecurity challenges faced by the event, especially as it prepares for the upcoming games. With a focus on evolving threats, Regul implemented strategies to safeguard sensitive data and protect against potential attacks. As the Olympics draw nearer, the need for a strong cybersecurity framework becomes increasingly vital, particularly with the high-profile nature of the event attracting various malicious actors. The lessons learned from Paris 2024 will also inform security measures for the Milan Cortina 2026 Olympics, aiming to create a safer environment for athletes and spectators alike. This proactive approach to cybersecurity underscores the importance of preparedness in large-scale events.

Mar 17, 2026

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

The Hacker News

The GlassWorm malware campaign is actively exploiting stolen GitHub tokens to inject malicious code into numerous Python repositories. Researchers at StepSecurity reported that this attack primarily targets various Python projects, including Django applications, machine learning research code, and Streamlit dashboards. The attackers are modifying critical files like setup.py, main.py, and app.py to include obfuscated malware, which could compromise any project that relies on these repositories. This situation poses a significant risk to developers and organizations using Python, as running compromised code could lead to serious security breaches. Developers need to be vigilant about the integrity of their repositories and monitor for unauthorized changes.

Mar 16, 2026

ClickFix campaigns target macOS users via MacSync infostealer

SCM feed for Latest

Recent ClickFix campaigns are targeting macOS users through malicious tools disguised as ChatGPT applications. Attackers are utilizing deceptive tactics, including fake software and Terminal commands, to install the MacSync infostealer on infected systems. This infostealer is designed to harvest sensitive information from users, which poses a significant risk to personal and organizational security. Users who inadvertently download these fake tools could find their data compromised, leading to potential identity theft or financial loss. It's crucial for macOS users to remain vigilant and avoid downloading software from untrusted sources.

Mar 16, 2026

CISA flags Wing FTP Server flaw as actively exploited in attacks

BleepingComputer

The Cybersecurity and Infrastructure Security Agency (CISA) has alerted U.S. government agencies about a vulnerability in Wing FTP Server that is currently being exploited in attacks. This flaw could potentially allow attackers to execute remote code, raising the risk of severe security breaches. Organizations using this software need to take immediate action to secure their systems, as the vulnerability could be linked to more extensive exploitation tactics. The warning is particularly urgent for agencies that manage sensitive data, as the consequences of an attack could be significant. It's crucial for affected users to stay vigilant and apply any available security measures to mitigate risks.

Mar 16, 2026

UK’s Companies House confirms security flaw exposed business data

BleepingComputer

Companies House, the British agency responsible for company registration in the UK, recently confirmed that a security flaw in its WebFiling service exposed sensitive business information since October 2025. The agency temporarily took the service offline on Friday to address the issue, which raised concerns about the privacy of companies' data. While they have since restored the service, the breach could have serious implications for businesses relying on the registry for compliance and reporting. Companies should review their security practices and remain vigilant about potential misuse of their exposed information. This incident underscores the need for robust security measures in public-facing services.

Mar 16, 2026

FBI investigates malware in Steam games, seeks victim information

SCM feed for Latest

The FBI is investigating reports of malware affecting several games on the Steam platform. The games under scrutiny include BlockBlasters, Chemia, Dashverse/DashFPS, Lampy, Lunara, PirateFi, and Tokenova. This investigation comes as a response to concerns that these games may have been compromised, potentially putting users at risk. The FBI is looking to gather information from victims who may have been affected by this malware. This situation raises alarms about the security of online gaming platforms and the potential for malware to spread through popular titles, which could impact a large number of gamers. Users should remain vigilant and consider the security of the games they play.

Mar 16, 2026