676 Million Americans' SSNs Are on the Dark Web — Infutor Left 91.7 GB Exposed with No Password
On March 3, 2026, a threat intelligence researcher at SOCRadar discovered something remarkable and catastrophic: a 91.7-gigabyte Elasticsearch database sitting completely open on the public internet, port 9200, no authentication required. The database belonged to Infutor — a consumer identity management and data brokerage firm owned by Verisk Analytics — and it contained 676,798,866 records representing the most sensitive personal identifiers that exist for American consumers: full legal names, complete Social Security numbers, dates of birth, address histories spanning decades, and phone numbers. The Infutor data breach exposed every piece of data a criminal needs to impersonate any of the 676 million individuals in the dataset, and to do so for the rest of their lives.
Five days after SOCRadar's discovery, on March 8, 2026, a threat actor using the handle 'Spirigatito' posted the complete dataset on BreachForums — the most active English-language cybercriminal forum — making it instantly available to the global criminal underground. The posting circulated rapidly through dark web channels and Telegram criminal groups within hours. Identity theft researchers who reviewed samples of the dataset confirmed the records are genuine, recently verified Infutor data broker quality records — not the recycled, duplicated compilations that characterise lower-quality dark web dumps. This is the complete toolkit for identity fraud, available free of charge to anyone with a BreachForums account.
What makes the Infutor exposure the most consequential dark web data listing of 2026 is not the scale — though 676 million records is staggering relative to the 330 million living Americans in the census. It is the permanence. Social Security numbers cannot be changed. A compromised SSN follows its owner for life, enabling fraudsters to open credit lines, file fraudulent tax returns, obtain medical services using stolen insurance identifiers, and impersonate victims in government and legal systems for decades after the initial exposure. The 676 million individuals whose data is now on BreachForums cannot rotate their Social Security numbers the way they can change a password. They can only freeze, monitor, and respond — and very few of them know they need to.
How Infutor's Unprotected Elasticsearch Database Exposed 676 Million SSNs
Elasticsearch is an open-source search and analytics engine widely used for large-scale data indexing. By default, Elasticsearch 8.x requires authentication — but misconfiguration remains alarmingly common. In Infutor's case, the database was reachable on port 9200 with no password, no IP allowlisting, and no TLS encryption requirement. Any actor who discovered the server URL could execute a single HTTP GET request to enumerate the indices and download every record.
Automatic discovery of misconfigured databases is a mature criminal capability. Services like Shodan and Censys continuously index open internet ports and their associated service banners, making every unprotected Elasticsearch instance discoverable within hours of exposure. Threat actors operate automated scrapers that query these services daily for newly exposed databases meeting high-value criteria — large record counts, presence of fields named 'ssn', 'social_security', 'dob', or 'address_history'. An Elasticsearch server containing 676 million identity records with SSN fields would appear as an extremely high-value target within hours of becoming discoverable.
SOCRadar's discovery on March 3 does not represent the earliest possible discovery — it represents the earliest known documented discovery. The server may have been open for days, weeks, or longer before SOCRadar flagged it. Critically, Elasticsearch does not natively log unauthenticated access attempts against an open server — there may be no way for Infutor or Verisk to determine how many actors accessed the database before it was secured, or for how long. The gap between when Spirigatito's BreachForums post appeared (March 8) and when SOCRadar flagged the server (March 3) suggests the harvesting happened in this window, but earlier access cannot be ruled out.
What the Infutor Dataset Contains — and Why 676 Million Records Includes You
The exposed Infutor Elasticsearch database contained 676,798,866 records — more than twice the current US adult population. The record count exceeds the number of living Americans because the dataset includes deceased individuals, historical records for individuals who have moved, and in some cases multiple records per individual across different data vintages. Security researchers describe the data quality as 'broker-grade' — meaning records are regularly verified and enriched by the commercial customers who purchase them, not scraped and left to decay.
Each record includes: full legal name; complete Social Security number (nine digits, unmasked); date of birth; current address; and address history spanning decades of residential moves. Phone number fields appear in a significant proportion of records. The presence of historical address data is particularly dangerous for identity verification systems that use 'knowledge-based authentication' — the 'what street did you live on in 2009?' questions used by banks, the IRS, and government agencies. With complete address histories, an attacker can answer these questions as if they were the genuine account holder.
Infutor serves industries including insurance underwriting, consumer finance, higher education enrollment, and real estate. If you are a US resident who has ever applied for auto insurance, a mortgage, a student loan, or a credit card, there is a high probability that your data passed through Infutor's systems and appears in this dataset. Infutor's own documentation states the company maintains identity records on 'virtually every US consumer.'
Spirigatito's BreachForums Post: From Open Server to Criminal Marketplace
On March 8, 2026, a BreachForums user operating under the handle 'Spirigatito' published a thread titled 'United States — Infutor Consumer Identity Management Platform — 676,798,866 Records' with samples confirming the data's authenticity. The post included field-level confirmation of SSN, DOB, and address data across multiple sample records, and offered the full 91.7 GB dataset for download. Dark web intelligence trackers documented the posting spreading to Telegram criminal channels and secondary forums within hours.
BreachForums operates as the primary English-language marketplace for stolen data following a series of law enforcement seizures of predecessor forums. Despite FBI takedown operations, the forum has rebooted multiple times — in January 2026, the BreachForums database itself was breached, exposing over 324,000 registered users in an incident covered across threat intelligence feeds. The January 2026 BreachForums leak demonstrated that even the forum's own operational security is compromised. Separately, the [Amtrak breach we reported on April 19](/blog/amtrak-shinyhunters-salesforce-breach-9-million-records) was also listed on BreachForums by the ShinyHunters group — illustrating how the forum functions as the primary publication venue for exfiltrated data across multiple threat actors.
The Spirigatito handle has no documented prior activity in threat intelligence reporting before the Infutor post, suggesting either a new actor or an established actor operating under a fresh alias. The name references a first-stage evolution Pokémon character — a common pattern in criminal forum naming conventions that blends mundane pop-culture references with anonymity. Verification of the sample records by multiple independent researchers confirmed the data is genuine Infutor output, not a fabricated dump.
“United States — Infutor has allegedly suffered a breach to its consumer identity management platform, exposing over 676 million citizen records that include SSNs, DOBs, and phone numbers.”
— Dark Web Intelligence (@DailyDarkWeb) — BreachForums posting alert, March 8, 2026
Dark Web Indicators: Signs Your Identity Is Being Used from the Infutor Dataset
Unlike traditional intrusion-based breaches where network IOCs (IP addresses, domains, hashes) are actionable for defenders, the Infutor exposure is a data-at-rest breach where the harm manifests in downstream identity fraud rather than network activity. The relevant indicators are personal identity misuse signals, not network artifacts.
Key identity fraud signals to monitor following the Infutor exposure: unexpected credit inquiries from financial institutions you have not contacted; new accounts appearing on credit reports you did not open; IRS notices about duplicate tax filings or unexpected tax returns in your name; Social Security Administration alerts about earnings you did not record (visible at ssa.gov/myaccount); health insurance explanation-of-benefits statements for services you did not receive; and collection notices for debts on accounts you never opened.
For organisations, the Infutor dataset significantly amplifies the risk of spear-phishing attacks targeting employees. A threat actor with name, employer address, and SSN for a target can craft highly credible pretexting scenarios impersonating the IRS, Social Security Administration, health insurers, or financial institutions — all using details that appear to verify the caller's legitimacy.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| Elasticsearch port 9200 — open, unauthenticated, Infutor consumer identity data | Exposed Service (now remediated) | SOCRadar discovery March 3, 2026 — server secured after discovery notification |
| BreachForums thread: 'Infutor Consumer Identity Management Platform — 676,798,866 Records' | Dark Web Listing | Posted March 8, 2026 by user 'Spirigatito' — full dataset offered for download |
| Fields: ssn, dob, full_name, address_history, phone | Exposed Data Fields | Confirmed by independent researchers reviewing Spirigatito sample records |
| Unexpected credit inquiry from unknown lender | Identity Fraud Signal | Monitor weekly at AnnualCreditReport.com — new inquiries indicate attempted account opening |
| IRS CP01A notice or tax return rejection for duplicate filing | Tax Fraud Signal | Indicates fraudulent tax return filed using your SSN — contact IRS Identity Protection unit immediately |
| SSA MyAccount — earnings record discrepancy | SSN Misuse Signal | Login at ssa.gov/myaccount — unexpected earnings indicate someone using your SSN for employment |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
Why the Infutor Breach Is More Dangerous Than National Public Data: The Data Broker Multiplier
The 2024 National Public Data breach — which exposed 2.9 billion records — generated significant coverage, yet downstream identity fraud from that incident was lower than the scale suggested. The reason is data quality. NPD aggregated records from public sources, voter rolls, and court records with limited verification. Many records were duplicate, outdated, or contained partial SSNs. The Infutor dataset is structurally different.
Data brokers like Infutor are paid by insurance companies, mortgage lenders, and financial institutions specifically because their records are accurate and current. These companies run identity verification checks that depend on Infutor data being right. Every Infutor SSN in the dataset has been used for a real-world transaction within a system that required it to be valid. This means the Infutor dataset has an unusually high 'hit rate' for fraud: a random record from the Infutor dump is far more likely to enable successful identity fraud than a random record from a scraped compilation.
The [ShinyHunters McGraw-Hill breach](/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million) we covered previously exposed 13.5 million student and educator records — significant but bounded to a specific population. The Infutor dataset spans virtually every adult American who has participated in the formal financial system over the past several decades. The attack surface is not a company's customers — it is the American population itself.
The data broker ecosystem creates a structural amplification risk that individual breach notifications cannot address. Infutor sold this data to dozens of downstream buyers in insurance, finance, and real estate. Those buyers integrated it into their own systems. The Infutor exposure means that in addition to the direct BreachForums listing, criminal actors who purchase or inherit this data can use it to reverse-engineer downstream business datasets — a multiplier effect that extends the breach impact far beyond Infutor's own customer base.
Immediate Remediation: Seven Steps to Protect Your Identity After the Infutor Breach
Because the Infutor dataset contains SSNs that cannot be changed, remediation is not about reversing the exposure — it is about making the exposed data useless to fraudsters. The seven steps below represent the most effective personal mitigation actions available. None of them require waiting for Infutor or Verisk to issue a formal notification. Every US resident should complete these steps regardless of whether they believe they are specifically in the dataset.
Freeze your credit at all five bureaus — free and immediate
Place a security freeze at Equifax (equifax.com), Experian (experian.com/freeze), and TransUnion (transunion.com/credit-freeze). Also freeze at Innovis (innovis.com/personal/securityFreeze) and ChexSystems (chexsystems.com), used by banks for checking account applications. A freeze prevents new credit accounts from being opened in your name until you unfreeze. It costs nothing, does not affect your credit score, and is the single most effective action you can take. Save the PINs you receive — you will need them to temporarily lift the freeze for legitimate credit applications.
Get an IRS Identity Protection PIN immediately
The IRS Identity Protection PIN program issues a 6-digit code that must accompany any tax return filed under your SSN. Without the correct PIN, a fraudulent return using your SSN is rejected. Apply at IRS.gov/identity-protection — the process requires identity verification but can be completed online. With a valid SSN and DOB from the Infutor dataset, a fraudster can file for your tax refund before you do. An IP PIN makes that impossible.
Create an SSA account at ssa.gov/myaccount
Creating your my Social Security account at ssa.gov/myaccount prevents anyone else from creating an account using your SSN. Once your account is established, review your earnings record annually — any earnings you did not record indicate someone is using your SSN for employment. An unexpected earnings entry is a major fraud signal requiring immediate action: contact the SSA fraud hotline at 1-800-269-0271.
Request free weekly credit reports and set up monitoring
You are entitled to free weekly credit reports from all three major bureaus at AnnualCreditReport.com. Review each report for accounts you did not open, inquiries from companies you did not contact, and addresses you have not lived at. Set up free credit monitoring through your bank or credit card provider. Paid services like LifeLock, Aura, or IDShield offer dark web monitoring that can alert you when your SSN appears in newly indexed criminal datasets.
File a proactive FTC identity theft report at IdentityTheft.gov
Filing a report at IdentityTheft.gov before fraud occurs creates a documented baseline for your identity state. If fraud does occur, your report makes it easier to dispute fraudulent accounts and obtain extended fraud alerts. The FTC's report also generates a personalized recovery plan based on the specific fraud that occurs. Some creditors give higher priority to disputes backed by an existing FTC report.
Enroll in the E-Verify myE-Verify self-lock service
E-Verify is used by employers to confirm employment eligibility. The myE-Verify self-lock program at myeverify.uscis.gov allows you to lock your SSN in the E-Verify system, preventing anyone from using it to establish employment eligibility without your active participation. This directly counters the employment identity theft risk from the Infutor SSN exposure.
Alert financial institutions you work with proactively
Contact your primary bank, mortgage servicer, credit card issuers, and investment accounts and ask them to note potential identity fraud exposure on your accounts. Request that they require additional verification before processing account changes, address updates, or new credit applications. Some institutions will add a verbal password or step-up authentication requirement for account modification requests when you notify them of a potential identity compromise.
The bottom line
The Infutor data breach exposes a structural vulnerability in the American identity system: we have outsourced our most sensitive personal identifiers to an industry that is not required to secure them, does not notify the individuals affected when it fails, and whose errors cannot be corrected because Social Security numbers cannot be changed. The 676 million records on BreachForums represent the complete identity toolkit for virtually every American who has participated in the formal financial system — and most of them do not know it yet. Freeze your credit today. Get an IRS Identity Protection PIN today. Create your SSA account today. These three actions cost nothing and make the Infutor dataset useless for the frauds it most enables. Do not wait for Infutor or Verisk Analytics to tell you to do this.
Frequently asked questions
What is Infutor and why do they have my data?
Infutor is a consumer identity management and data brokerage company, acquired by Verisk Analytics in 2023. Infutor does not collect data directly from consumers — it aggregates records from public sources, credit bureau data partnerships, property records, and commercial data exchanges. If you have ever held a credit card, taken out a mortgage, held insurance, or enrolled in higher education in the United States, Infutor almost certainly holds a record containing your name, address, phone number, date of birth, and Social Security number. Most consumers have never heard of Infutor and have no direct relationship with the company.
What data was exposed in the Infutor breach?
The exposed Infutor Elasticsearch database contained 676,798,866 records across 91.7 gigabytes. Each record included full legal names, complete Social Security numbers, dates of birth, current and historical physical addresses spanning decades, and phone numbers. Security researchers note the dataset includes records for deceased individuals alongside living Americans. The combination of SSN, DOB, and address history is the complete toolkit for identity fraud: opening credit accounts, filing fraudulent tax returns, impersonating victims in medical or government systems, or committing synthetic identity fraud.
How did the Infutor data breach happen?
Infutor's Elasticsearch 8.15.2 database was exposed on port 9200 to the public internet with no authentication requirement. On March 3, 2026, threat intelligence firm SOCRadar discovered the exposed instance during routine scanning of internet-facing databases. Automated scanners used by threat actors — tools that continuously probe Shodan and Censys for open Elasticsearch, MongoDB, and Redis instances — typically discover misconfigured databases within hours of exposure. The database contained no password protection, IP allowlisting, or TLS certificate requirement. Any actor who located the server could download the entire 91.7 GB dataset without credentials.
Is the Infutor breach bigger than the National Public Data breach?
By record count, the 2024 National Public Data breach involved approximately 2.9 billion records, making it numerically larger. However, the Infutor dataset is widely considered more dangerous by identity theft researchers because of data quality. National Public Data records were largely compiled from aggregated public sources and contained significant duplication and inaccuracy. Infutor's data broker records are regularly verified, enriched, and updated by the industries that purchase them — insurance, finance, and real estate. A verified Infutor SSN+DOB combination is far more reliable for fraud than an aggregated NPD record.
Was my SSN in the Infutor breach — how do I check?
Infutor has not published a breach notification portal and the dataset has not been added to Have I Been Pwned as of April 2026. Practically, security researchers advise treating exposure as confirmed if you are a US resident who has held insurance, a mortgage, a credit card, or attended college — you are almost certainly in Infutor's database. Rather than waiting to confirm individual exposure, take protective action immediately: freeze your credit at all three bureaus, obtain an IRS Identity Protection PIN, and create an account at ssa.gov to monitor for fraudulent Social Security activity.
What can criminals do with my SSN if it's on the dark web?
A Social Security number combined with date of birth and address history enables a wide range of identity crimes. Fraudsters can open credit card accounts, auto loans, or personal loans in your name; file a fraudulent federal tax return to claim your refund; obtain medical services or prescription drugs using your insurance; impersonate you in government benefit systems; or create synthetic identities that combine your SSN with a different name to build a fraudulent credit history. Unlike a compromised password or credit card number, a Social Security number cannot be changed. Victims of SSN-based identity theft manage consequences for years or decades.
How do I freeze my credit after a data broker breach?
Place a security freeze at all three major bureaus — Equifax (equifax.com/personal/credit-report-services), Experian (experian.com/freeze), and TransUnion (transunion.com/credit-freeze) — as well as the smaller bureaus Innovis and ChexSystems, which are used by some lenders and banks. A freeze is free, does not affect your credit score, and prevents new accounts from being opened in your name until you unfreeze. You will receive a PIN for each bureau to use when you need to temporarily lift the freeze for legitimate applications. A fraud alert (90-day warning to creditors) is weaker protection — a freeze is the appropriate response to confirmed SSN exposure.
What is Verisk Analytics doing about the Infutor data breach?
As of April 2026, Verisk Analytics has not issued a public breach notification on behalf of Infutor. No regulatory filing under applicable state breach notification laws has been publicly confirmed. Multiple class action lawsuits have been filed against Infutor and Verisk, alleging negligent data security practices and failure to notify affected individuals. Security researchers note that Elasticsearch misconfiguration — leaving a database accessible on port 9200 with no authentication — represents a basic, well-documented security failure that has caused dozens of high-profile breaches since 2017. Verisk acquired Infutor in 2023, assuming responsibility for its data security practices.
Sources & references
- SOCRadar — Infutor Elasticsearch Database Exposed, 676 Million Records at Risk
- DailyDarkWeb — Infutor Data Breach Exposes 676 Million Consumer Records
- State of Surveillance — Infutor Data Breach: 676 Million Americans' SSNs Left Exposed on Misconfigured Server
- PrismNews — Dark-Web Forum Post Claims Infutor Leak Exposing 676 Million Consumer Records
- DarknetSearch — Infutor Data Breach Revealed: 676M Records Allegedly Leaked Online
- DataBreach.io — Alleged Infutor Data Breach Involves 676 Million Consumer Records
- classaction.org — Infutor Data Breach Reportedly Exposes 676M Records, Including SSNs
- HackNotice — Infutor Data Breach Exposes 676 Million Consumer Records
- VECERT Radar — Urgent Alert: Infutor 676M Record Breach
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities — CVSS scores, exploit status, and patch availability. The reference card your SOC team needs, free with your newsletter subscription.
No spam. Unsubscribe anytime.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
