High Unverified

Baydöner: 3.6M Records Allegedly Leaked

Unverified dark web claim. This report is based on a post observed on a dark web forum. Yazoul Security has not independently verified the authenticity of this claim.

Leak Site Screenshot

Leak site post claiming Baydöner data breach

Screenshot captured at time of discovery. Sensitive data has been redacted.

Leak site post claiming Baydöner data breach - full size

Claim Summary

An actor using the alias “TurkGuvenligi” has posted on a dark web forum, claiming to have leaked a database allegedly belonging to Baydöner, a popular Turkish restaurant chain. The post, dated March 13, 2026, states the breach occurred in February 2026. The threat actor claims the leak contains approximately 3.6 million unique records, comprising both customer and user data. They have provided a file hash and details on the compressed and uncompressed file sizes, offering the data for download behind a forum registration wall.

What Is Allegedly Exposed

According to the unverified claim, the exposed dataset is extensive and highly sensitive. The threat actor alleges it includes nearly 1.3 million unique email addresses, full names, phone numbers, dates of birth, and geographic location data. Most critically, the post claims the data contains Turkish Republic Identity Numbers (TCKN), which are sensitive government-issued national identifiers. The actor also states that plaintext passwords were exposed, a significant security failure if true. Furthermore, the leak purportedly includes over 201,000 purchase records containing physical delivery addresses, order details, and payment amounts. The combination of national ID numbers, contact information, and financial purchase history would represent a severe compromise of personal data.

Threat Actor Profile

The post is authored by “TurkGuvenligi,” a handle that translates to “Turkish Security.” The actor claims responsibility for both the breach and the subsequent leak. There is no widely recognized reputation or history associated with this specific alias on major English-language forums, which raises immediate questions about credibility. The act of posting the data on a public forum for download suggests motivations that could range from notoriety-seeking to hacktivism, though no explicit motive is stated. The new or unknown nature of the actor is a red flag, often associated with exaggerated claims or re-posted old data.

Potential Impact

If the claims are valid, the potential impact on affected individuals is severe. The alleged exposure of TCKN numbers and plaintext passwords creates an immediate and high risk of identity theft, financial fraud, and targeted phishing campaigns. The inclusion of detailed purchase history and physical addresses could facilitate highly convincing spear-phishing attacks or even physical security threats. For the Baydöner organization, such a breach would likely trigger significant regulatory scrutiny under Turkey’s data protection law (KVKK), potentially resulting in heavy fines and severe reputational damage that could impact customer trust and business operations.

What to Watch For

  • Official Verification: Monitor for any official statement from Baydöner regarding a potential data security incident. Silence or denial does not disprove the claim, but confirmation would validate it.
  • Data Circulation: Watch for the alleged dataset or subsets of it appearing on other hacking forums, Telegram channels, or credential-stuffing lists. The provided MD5 hash (91125685A1629C6FBC833EA79AF8A1B0) can be used to identify this specific file in other locations.
  • Credential Stuffing Attacks: An increase in credential stuffing attacks against Baydöner’s online services or reports of account takeovers from customers could be an indirect indicator that the password data is genuine and in use.
  • Actor Follow-up: Note if “TurkGuvenligi” posts further evidence, makes demands, or claims other breaches, which could help assess their credibility.

Disclaimer

This report details unverified claims from a dark web forum. Yazoul Security has not independently confirmed the breach of Baydöner or the validity of the allegedly leaked data. The details presented, including the scale of the breach and the types of data exposed, are solely based on the threat actor’s post. The provided file hash and technical details do not constitute proof that the data is genuine or originates from the named organization. All claims should be treated as alleged until corroborated by credible evidence or an official statement.

CTI Research? Separate Your Traffic

Investigating dark web forums, threat actor infrastructure, or malware C2 panels? A VPN isolates your research traffic from your corporate IP. Layer it under Tor or route your sandbox egress through it for clean attribution separation.

Get NordVPN for CTI

Affiliate link — we may earn a commission at no extra cost to you.

Share:

Never miss a threat intelligence alert

Get real-time security alerts delivered to your preferred platform.

Related Claims

Related Across Yazoul

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.