1.4 million
The online education platform Udemy, Inc. has suffered a major data breach at the hands of the ShinyHunters extortion group (also known as Scattered Lapsus). After a failed ransom demand, the threat actors publicly leaked a database containing the records of 1.4 million users and instructors. The leaked data, confirmed by Have I Been Pwned, is highly sensitive, including full names, email addresses, physical addresses, phone numbers, and critically, instructor financial payout information such as PayPal accounts and bank details. This incident places affected users at significant risk of targeted phishing, identity theft, and financial fraud. ShinyHunters has been particularly active in 2026, with this breach following similar high-profile attacks against other major corporations.
On April 24, 2026, ShinyHunters posted a threat on their dark web leak site, claiming to have breached Udemy and exfiltrated a large user database. They issued a "Pay or Leak" ultimatum with a deadline of April 27. When the deadline passed without a payment, the group followed through on its threat and released the entire dataset on April 26.
ShinyHunters is a well-known, financially motivated threat group that specializes in large-scale data theft for the purpose of extortion. Their tactics often involve gaining initial access through identity-based methods like vishing (voice phishing), SIM swapping, or using credentials stolen by infostealer malware.
The leaked database contains 1.4 million unique email addresses. The scope of the exposed Personally Identifiable Information (PII) is extensive and includes:
The presence of financial data makes this breach particularly severe. The initial access vector used by ShinyHunters to breach Udemy has not been publicly disclosed.
The consequences of this breach are severe for both Udemy and its users:
All Udemy users, especially instructors, should assume their data has been compromised and take immediate protective measures.
No specific technical Indicators of Compromise (IOCs) were mentioned in the source articles.
For affected individuals:
For affected individuals:
For organizations:
For users, enabling MFA on Udemy, email, and financial accounts is the most effective defense against account takeover following a credential leak.
Users should immediately change their passwords and ensure they are not reusing passwords across different services.
For organizations, encrypting sensitive data like financial information at rest can make exfiltrated data unusable to attackers.
For all individuals affected by the Udemy breach, the single most important action is to enable multi-factor authentication (MFA) on every possible account. Start with your Udemy account, then your primary email account, and most importantly, any financial accounts like PayPal or online banking. Even though your password may have been leaked, MFA acts as a crucial second barrier, requiring a code from your phone or another device before granting access. This will prevent attackers from taking over your accounts, even with your stolen credentials. This simple step is the most effective personal defense against the consequences of this data breach.
Following this breach, all Udemy users must immediately change their passwords. It is critical to create a new, unique, and complex password for Udemy that is not used on any other website. Data breaches like this are often followed by widespread 'credential stuffing' attacks, where attackers use the leaked username/password combinations to try and log into other popular services like banking, social media, and email. Using a password manager is highly recommended to generate and store unique, strong passwords for every online account, ensuring that a breach on one site does not compromise your security on others.
ShinyHunters posts a 'Pay or Leak' demand regarding Udemy data on its dark web site.
After the deadline passes, ShinyHunters leaks the database of 1.4 million Udemy records.
The extortion deadline set by ShinyHunters officially expires.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.