Massive Data Breach Exposes 284 Million Accounts as Cybercriminals Shift to Telegram
Cybersecurity5 min read

Massive Data Breach Exposes 284 Million Accounts as Cybercriminals Shift to Telegram

3 Mar 20253 Mar 2025 enterprisesecuritytech.com

A massive data breach has exposed 284 million compromised accounts from Telegram's 'ALIEN TXTBASE' channel, revealing a 1.5TB dataset with 23 billion rows of data. The breach, disclosed by Have I Been Pwned, highlights cybercriminals' shift from dark web marketplaces to mainstream platforms like Telegram. In response, HIBP has launched new API tools to help organizations proactively defend against credential-based attacks, while experts warn that the threat actor may resurface under a new identity despite announcing their intention to cease operations.

Key Takeaways

  • 1.> "ALIEN TXTBASE" "We've also added 244 million passwords we've never seen before to Pwned Passwords and updated the counts against another 199 million that were already in there," Hunt revealed in a recent blog entry, highlighting the fresh nature of much of the compromised data.
  • 2.> "Our experience indicates that such actors often resurface under new identities, making ongoing vigilance essential," While the sheer scale of this breach—284 million accounts—is undeniably significant, experts suggest it represents part of a larger pattern rather than an isolated incident.
  • 3.The massive leak originated from a Telegram channel called "ALIEN TXTBASE" and contains an enormous 1.5TB dataset comprising 23 billion rows of data.

A staggering data breach has exposed 284 million compromised accounts from the messaging platform Telegram, marking what cybersecurity experts are calling a significant shift in how criminals operate online. The breach was disclosed by Have I Been Pwned (HIBP), the widely-respected data breach notification service that has become the go-to resource for tracking compromised credentials.

The massive leak originated from a Telegram channel called "ALIEN TXTBASE" and contains an enormous 1.5TB dataset comprising 23 billion rows of data. According to HIBP founder Troy Hunt, the breach includes 493 million unique pairs of emails and website addresses, ultimately compromising 284 million individual email accounts. The scale becomes even more alarming when considering the password component of the breach.

"ALIEN TXTBASE"

"We've also added 244 million passwords we've never seen before to Pwned Passwords and updated the counts against another 199 million that were already in there," Hunt revealed in a recent blog entry, highlighting the fresh nature of much of the compromised data.

"We've also added 244 million passwords we've never seen before to Pwned Passwords and updated the counts against another 199 million that were already in there,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

The breach represents more than just another data security incident—it signals a fundamental shift in cybercriminal operations. Victor Acin, Head of Threat Intel at Outpost24, emphasized that this massive compromise underscores a troubling evolution in criminal tactics.

"The addition of 284 million compromised accounts to Have I Been Pwned underscores a growing trend in cybercriminal tactics—shifting from dark web marketplaces to more accessible platforms like Telegram for data sharing and sales," Acin explained. This migration from traditional dark web venues to mainstream communication platforms presents new challenges for law enforcement and cybersecurity professionals.

"The addition of 284 million compromised accounts to Have I Been Pwned underscores a growing trend in cybercriminal tactics—shifting from dark web marketplaces to more accessible platforms like Telegram for data sharing and sales,"

The strategic implications of this shift cannot be overstated. Acin noted that the transition has made it increasingly difficult for authorities and security experts to monitor and dismantle criminal operations. "This aligns with what we've observed in recent years, where threat actors increasingly use communication platforms for illicit activities due to their ease of access and lower risk of takedowns," he elaborated.

"This aligns with what we've observed in recent years, where threat actors increasingly use communication platforms for illicit activities due to their ease of access and lower risk of takedowns,"

In response to this unprecedented breach, HIBP has launched new API capabilities designed to help organizations mount proactive defenses. These tools allow subscribed domain owners and website administrators to search up to 1,000 email addresses per minute against the newly leaked data, providing a powerful weapon in the fight against credential-based attacks.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

Hunt explained the careful balance between transparency and privacy in releasing this information to individual users. When asked about personal access to check compromised credentials, he clarified that while users can verify if their accounts were included in the ALIEN TXTBASE leak, detailed website information is only shown to those who use the notification service to verify their address.

"I didn't want to show that info publicly as it can expose the use of sensitive services," Hunt said, demonstrating the delicate considerations involved in breach disclosure. The new API tools are expected to significantly enhance organizational security capabilities.

"I didn't want to show that info publicly as it can expose the use of sensitive services,"

"The introduction of these new APIs today will finally help many organizations identify the source of malicious activity and even more importantly, get ahead of it and block it before it does damage," Hunt added, emphasizing the proactive rather than reactive approach these tools enable.

"The introduction of these new APIs today will finally help many organizations identify the source of malicious activity and even more importantly, get ahead of it and block it before it does damage,"

Cybersecurity researchers have been closely monitoring the ALIEN TXTBASE operation for months. Borja Rodriguez, Manager of Threat Intelligence Operations at Outpost24, revealed that his team at KrakenLabs has been tracking the threat actor behind this leak, observing their pattern of releasing stolen credentials over an extended period.

"The recent addition of 284 million compromised accounts to Have I Been Pwned underscores the persistent threat posed by information stealer malware," Rodriguez remarked, placing the breach within the broader context of ongoing cyber threats.

"The recent addition of 284 million compromised accounts to Have I Been Pwned underscores the persistent threat posed by information stealer malware,"

Impact and Legacy

In an interesting development following increased media attention, the individual responsible for ALIEN TXTBASE announced their intention to cease operations. In a post on Breach Forums, they stated plans to close all related activities and even changed their forum alias, suggesting the pressure from public exposure had an impact.

However, Rodriguez cautioned against viewing this as a permanent victory. "Our experience indicates that such actors often resurface under new identities, making ongoing vigilance essential," he warned, reflecting the persistent nature of cybercriminal operations.

"Our experience indicates that such actors often resurface under new identities, making ongoing vigilance essential,"

While the sheer scale of this breach—284 million accounts—is undeniably significant, experts suggest it represents part of a larger pattern rather than an isolated incident. The breach serves as a stark reminder of the evolving threat landscape, where traditional boundaries between legitimate communication platforms and criminal marketplaces continue to blur.

For organizations and individuals alike, this breach underscores the critical importance of robust cybersecurity practices, including the use of unique passwords, multi-factor authentication, and regular monitoring of potentially compromised accounts through services like Have I Been Pwned.

More Stories