SoundCloud, the popular global audio streaming platform, has confirmed a large-scale data exposure incident affecting approximately 29.8 million user accounts, making it one of the most significant cybersecurity incidents reported in early 2026.

The breach traces back to unauthorized activity detected in December 2025, though the full scale of the incident became public only in January 2026 after the exposed dataset surfaced online. Unlike traditional cyberattacks involving direct database compromise, this incident stemmed from a sophisticated data enumeration and scraping technique that exploited platform functionality.
How the Breach Happened
According to cybersecurity researchers, the attackers abused a mechanism that allowed them to verify and map email addresses to publicly visible SoundCloud profiles. By automating this process, the threat actors were able to correlate private email addresses with public profile data at massive scale.
This method enabled attackers to successfully de-anonymize nearly 20% of SoundCloud’s total user base, resulting in a dataset containing 29.8 million unique records. The technique is commonly known as API misuse or data enumeration, where attackers extract sensitive associations without breaching core databases.
Extortion Attempt and Public Leak
After collecting the data, the attackers reportedly attempted to extort SoundCloud, demanding payment in exchange for not releasing the dataset. When the company refused to comply, the threat actors leaked the database publicly in January 2026, significantly increasing the potential risk to affected users.
The exposed dataset was later verified and officially indexed by the breach notification service Have I Been Pwned (HIBP) on January 27, 2026, confirming the authenticity of the leaked information.
What Data Was Exposed
The leaked information does not include passwords or payment details. However, the exposed dataset contains:
- Email addresses linked to SoundCloud accounts
- Usernames and display names
- Profile images and avatar URLs
- Follower and following counts
- Country information for a subset of users
While no credentials were leaked, the association of private email addresses with identifiable public profiles poses a serious security concern.
Security Risks and Impact

Cybersecurity experts warn that the exposed data can be weaponized for highly targeted phishing and social-engineering attacks. Attackers can impersonate SoundCloud support and reference real profile details — such as follower count or profile images — to make phishing emails appear legitimate.
Even without passwords, exposed email addresses often become targets for credential-stuffing attacks, where attackers test the same emails and passwords across multiple online services.
User Advisory
Security researchers recommend that affected users remain extremely cautious of emails claiming to be from SoundCloud or other audio streaming services. Users are strongly advised to:
- Avoid clicking suspicious links
- Use unique passwords for every platform
- Enable multi-factor authentication (MFA) wherever possible
Conclusion
This incident highlights the growing risk posed by API abuse and large-scale data scraping attacks, especially on platforms with extensive public-facing user data. The SoundCloud breach serves as a reminder that even without password leaks, exposed metadata can still lead to serious downstream cyber threats.
