Data Broker Infutor Breach Exposes 676 Million Consumer Records
Infutor data breach reportedly exposes 676 million consumer records including Social Security numbers. Misconfigured Elasticsearch database blamed for the exposure.
Consumer identity management platform Infutor has reportedly suffered a massive data breach exposing approximately 676 million records. The compromised data allegedly includes full names, dates of birth, physical addresses, phone numbers, and Social Security numbers—everything needed for identity theft.
A threat actor using the handle "Spirigatito" posted the database for sale on dark web forums on March 8, 2026. Security firms flagged the listing almost immediately, with analysts confirming the sheer scale places this among the most significant data broker breaches ever documented if verified.
What We Know
According to SOCRadar's analysis, the exposure resulted from a misconfigured Elasticsearch database—a depressingly common cause of large-scale breaches. Improperly configured databases left accessible on the public internet continue to enable some of the largest data exposures, despite years of warnings from security researchers.
Infutor serves industries including insurance, consumer finance, higher education, platforms and service providers, and real estate. Companies in these sectors use Infutor's data for marketing campaigns, customer verification, and identity insights. The breach doesn't just affect Infutor's direct customers—it potentially impacts anyone whose data flows through the consumer identity verification ecosystem.
The Data Broker Problem
Most people have never heard of Infutor, yet the company may hold detailed records about them. Data brokers operate in a shadow economy, collecting and aggregating information from public records, commercial transactions, and other sources to build consumer profiles.
This creates an asymmetric risk: consumers don't know what data exists about them or who holds it, making it impossible to take proactive protective measures. When a breach occurs, affected individuals learn about their exposure after the fact—if they learn at all.
The TELUS Digital breach we covered yesterday involved a BPO company holding data on behalf of clients. The Infutor breach demonstrates the same pattern at data broker scale: your information sits in systems you've never interacted with directly.
Corporate Ownership Changes
The timing is complicated. In January 2026, data analytics company Verisk Marketing Solutions—which acquired Infutor in 2022—was itself acquired by ActiveProspect. These ownership transitions can create security gaps as systems migrate between management teams and integration efforts compete with security priorities.
Whether the breach occurred before or after the ActiveProspect acquisition remains unclear. Investigators are still determining the timeline and scope.
Impact Assessment
If the 676 million figure is accurate, this breach potentially affects a majority of American adults. The United States has approximately 330 million people; accounting for deceased records and historical data, a 676 million record database could represent comprehensive coverage of the adult population over many years.
Social Security numbers are particularly dangerous. Unlike passwords, SSNs cannot be changed. Exposure creates permanent identity theft risk that no amount of credit monitoring can fully mitigate.
Affected individuals should assume their SSN is compromised and take protective measures:
- Freeze credit at all three bureaus (Equifax, Experian, TransUnion)—this is free and prevents new account fraud
- Monitor existing accounts for unauthorized activity
- Consider identity theft protection services that monitor dark web markets
- File IRS Identity Protection PIN to prevent tax refund fraud
Our data breach guide covers the immediate steps anyone should take after learning their information was exposed.
The Elasticsearch Pattern
Misconfigured Elasticsearch databases have caused dozens of major breaches over the past five years. The database technology itself is secure when properly configured, but default settings often allow unauthenticated access, and rushed deployments skip security hardening.
Organizations running Elasticsearch should immediately audit their configurations:
- Disable external network binding unless absolutely required
- Enable authentication (not optional, despite what defaults suggest)
- Configure TLS for transport layer encryption
- Implement proper access controls and API key management
- Monitor for unauthorized access attempts
Cloud providers offer managed Elasticsearch services with better default security postures. Organizations still running self-managed instances should strongly consider migration.
Why This Matters
Data brokers represent concentrated risk to consumer privacy. A single breach can expose more records than all retail breaches in a typical year combined. Yet data broker security practices receive far less scrutiny than consumer-facing companies because the general public doesn't interact with these businesses directly.
The Aura.com breach from the ShinyHunters campaign earlier this month affected a security company ironically focused on protecting consumer identity. The Infutor breach affects a company that profits from aggregating that same consumer data. Neither outcome inspires confidence in the data broker ecosystem's ability to protect what it collects.
Regulatory pressure on data brokers has increased, but breaches like this suggest industry practices haven't kept pace with the sensitivity of the data involved. Until that changes, consumers remain exposed through systems they cannot see and relationships they never consented to.
Related Articles
PayPal Breach Exposed SSNs for Six Months Before Detection
A coding error in PayPal Working Capital exposed customer SSNs and business data since July 2025. Unauthorized transactions detected on some affected accounts.
Feb 24, 2026AT&T Breach Data Resurfaces with 176M Enriched Records
Enriched AT&T breach dataset with 148M Social Security numbers and 133M addresses is circulating privately, creating fresh identity theft and SIM-swap risks.
Feb 8, 2026ShinyHunters Claims 1 Petabyte Theft from Telus Digital, Demands $65M
Canadian BPO giant confirms breach after ShinyHunters claims massive data theft including call recordings, source code, and FBI background checks. Ransom ignored.
Mar 17, 2026Companies House UK Flaw Exposed 5 Million Firms to Data Theft
British government registry's WebFiling vulnerability let logged-in users access other companies' dashboards since October 2025. Unauthorized filings were possible.
Mar 17, 2026