SUCCESS: 141k Records Allegedly Leaked
Unverified dark web claim. This report is based on a post observed on a dark web forum. Yazoul Security has not independently verified the authenticity of this claim.
Leak Site Screenshot
Screenshot captured at time of discovery. Sensitive data has been redacted.
Claim Summary
An unverified claim has surfaced on a dark web forum alleging a significant data breach of SUCCESS (success.com), described as a newsletter and article platform. The post, authored by a user named “Sythe,” was published on March 12, 2026. The threat actor claims to have uploaded a database containing information on over 141,000 unique users, which they attribute to a breach conducted by a group referred to as “Ni**erHunters.” The post includes a file hash and size details, and asserts that SUCCESS has posted an official statement confirming the incident. These claims have not been independently verified by Yazoul Security.
What Is Allegedly Exposed
According to the forum post, the compromised database purportedly contains a wide array of sensitive user and transactional data. The alleged data types include:
- Personal Identifiable Information (PII): Email addresses, full names, phone numbers, and physical addresses.
- Profile Data: User avatars and author bios.
- Financial & Commercial Data: Purchase history, including paid amounts and physical shipping addresses, as well as subscription data. The post claims the uncompressed data totals approximately 845 MB across roughly 141,866 records. The inclusion of purchase and subscription details could potentially allow for highly targeted phishing or fraud campaigns.
Threat Actor Profile
The post author, “Sythe,” does not appear to be a widely recognized or established threat actor based on this alias alone, which is a red flag for credibility. The claim attributes the original breach to a group named “Ni**erHunters,” a name not commonly associated with major, verified breaches in current threat intelligence reporting. The lack of a known reputation for either entity reduces the inherent credibility of the claim. The post follows a common template for sharing alleged breaches, offering a file hash (MD5: F182D9068A9B73817CEA3655FB4D71B9) and instructions to earn forum credits to access the download, which is a standard practice but not proof of legitimacy.
Potential Impact
If the claims are true, the impact on affected users could be severe. The combination of PII, physical addresses, and purchase history creates a rich dataset for identity theft, targeted phishing (spear-phishing), and financial fraud. Authors on the platform could face reputational damage if their bios and associated data are misused. For the organization SUCCESS, a confirmed breach of this nature would likely result in significant reputational harm, regulatory scrutiny-especially concerning financial data-and potential legal liabilities.
What to Watch For
- Official Confirmation: Monitor for any official breach notification or statement from SUCCESS (success.com) regarding a security incident.
- Data Validation: Watch for other threat actors or sources discussing or validating this specific dataset. The provided MD5 hash can be used to identify the same file if it appears elsewhere.
- Credential Stuffing Campaigns: Even if unverified, users of the platform should be vigilant for phishing emails referencing SUCCESS, their name, or purchase details, and should enable multi-factor authentication where possible.
- Actor Activity: Note if “Sythe” or the mentioned group “Ni**erHunters” are linked to other, more credible data leaks in the future.
Disclaimer
This report details an unverified claim from a dark web forum. Yazoul Security has not independently confirmed the breach of SUCCESS, the validity of the alleged data, or the existence of the referenced threat actors. The claims are based solely on a single forum post. The provided details, including data types, record counts, and file hashes, are allegations made by the poster and should be treated as potentially fabricated or exaggerated until corroborated by credible evidence or an official statement.
CTI Research? Separate Your Traffic
Investigating dark web forums, threat actor infrastructure, or malware C2 panels? A VPN isolates your research traffic from your corporate IP. Layer it under Tor or route your sandbox egress through it for clean attribution separation.
Get NordVPN for CTIAffiliate link — we may earn a commission at no extra cost to you.
Never miss a threat intelligence alert
Get real-time security alerts delivered to your preferred platform.
Related Claims
bbalawgroup.com — safepay
cheeky.com.ar — safepay
firstcambodia.com.kh — safepay
The Epoch Times — coinbasecartel