Hacker Leaks 2.3 Million WIRED Records, Threatens 40 Million More from Condé Nast
Database dump posted Christmas Day includes subscriber emails, names, and addresses. Attacker 'Lovely' claims access to broader Condé Nast data spanning multiple publications.
A hacker dumped 2.3 million WIRED subscriber records on hacking forums on Christmas Day, marking a significant breach at Condé Nast, the media giant behind publications including The New Yorker, Vanity Fair, Vogue, and GQ. And according to the attacker, this is just the beginning.
The leaked database contains 2.3 million email addresses, 285,936 names, 102,479 home addresses, and 32,426 phone numbers belonging to WIRED subscribers. The data has already been added to Have I Been Pwned, allowing affected individuals to check their exposure.
The Threat of More to Come
After posting the WIRED data, the hacker—operating under the handle "Lovely"—claimed to possess more than 40 million additional records from Condé Nast's broader infrastructure. The attacker threatened to release this data "over the next few weeks," though no additional dumps have appeared as of this writing.
If the 40-million-record claim proves accurate, the breach could encompass subscriber and customer data from across Condé Nast's portfolio: Vogue, GQ, Vanity Fair, The New Yorker, Architectural Digest, and others. A combined leak of that scale would represent one of the larger media industry breaches on record.
Condé Nast hasn't publicly confirmed the scope of the intrusion or addressed the attacker's claims about additional data. The company operates both subscription-based publications and extensive digital properties with registered user accounts, meaning the total exposure could include a mix of paying subscribers and free account holders.
What's Actually in the Leak
The WIRED dump is fairly typical subscriber data—the kind collected through magazine subscriptions and newsletter signups:
- Email addresses (2.3 million)
- Full names (285,936)
- Physical addresses (102,479)
- Phone numbers (32,426)
No passwords appear in the leak, which suggests the attacker accessed a subscriber database rather than an authentication system. Still, the combination of email addresses with physical addresses and phone numbers creates real exposure for targeted phishing and social engineering.
For WIRED's subscriber base—largely tech-savvy professionals—the irony of appearing in a breach database won't be lost. Security professionals and technology journalists who've covered countless data breaches now find themselves on the other side of the notification.
Attack Details Remain Unclear
Neither the attacker nor Condé Nast has disclosed how the breach occurred. The timing—a Christmas Day dump—suggests either an opportunistic holiday release designed for maximum attention or an attacker operating in a timezone where December 25th holds less significance.
The gap between the WIRED leak and the threatened release of additional data could indicate ongoing negotiations, an attempt to pressure Condé Nast into payment, or simply an attacker working through a large dataset before making it available.
What Affected Subscribers Should Do
Anyone with a WIRED subscription or Condé Nast account should:
- Check Have I Been Pwned to confirm exposure
- Watch for targeted phishing emails referencing WIRED or Condé Nast publications
- Be skeptical of any communication requesting account verification or payment updates
- Consider that physical address exposure enables more sophisticated social engineering
The exposed data is exactly what an attacker would need to craft convincing phishing emails. Messages referencing specific subscriptions or publications a target actually receives are far more likely to succeed than generic phishing attempts.
Why This Matters
Media companies sit on vast subscriber databases but often treat security as an afterthought compared to editorial and advertising priorities. The WIRED breach arrives at a moment when media organizations face pressure from multiple directions—declining advertising revenue, subscription fatigue, and staff reductions that often hit IT and security teams hard.
For Condé Nast specifically, the question now is whether the 40-million-record threat materializes. If it does, the company faces a cascade of notifications across multiple publications and jurisdictions, with corresponding regulatory exposure under GDPR, CCPA, and other data protection frameworks.
Subscribers across Condé Nast's portfolio should treat this as a probable exposure and adjust their expectations accordingly.
Related Articles
ShinyHunters Breaches Rockstar Games via Anodot Token Theft
GTA 6 developer Rockstar Games confirms third-party breach after ShinyHunters stole Snowflake credentials through Anodot. Ransom deadline set for April 14.
Apr 12, 2026Mercor Breach Exposes 4TB of AI Training Data After LiteLLM Attack
AI startup Mercor confirms breach via LiteLLM supply chain attack. Lapsus$ claims 4TB stolen including candidate data, source code, and API keys. Meta pauses contracts.
Apr 10, 2026ShinyHunters Breach Anodot, Steal Data From Snowflake Customers
ShinyHunters compromised SaaS analytics provider Anodot, using stolen authentication tokens to access and exfiltrate data from dozens of Snowflake customers.
Apr 10, 2026LAPD Records Exposed in City Attorney Breach: 337K Files Leaked
World Leaks gang dumps 7TB of sensitive police data including personnel files and Internal Affairs investigations after breaching LA City Attorney's Office.
Apr 9, 2026