Where is instagram breach

Checked on January 12, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

Reports say a dataset of roughly 17.5 million Instagram user records appeared for free on a hacking forum and on dark‑web markets, posted by an actor using the alias “Solonik,” and cybersecurity vendors trace that collection to scraping of an Instagram API in 2024 (i.e., the leaked data is circulating on the dark web) [1][2][3]. Instagram, however, rejects the characterization of a platform breach, saying it “fixed an issue that let an external party request password reset emails for some people” and that accounts are secure; the company states there was no breach of its systems [4][5].

1. What appeared where: dark‑web postings, forum listings and dataset claims

Multiple outlets and cybersecurity trackers report a 17.5 million‑record dataset surfaced on breach forums and dark‑web marketplaces under the listing “INSTAGRAM.COM 17M GLOBAL USERS — 2024 API LEAK,” posted by a threat actor identified as “Solonik,” with files in JSON/TXT allegedly containing usernames, phones, emails and addresses [1][3][2]. These reports describe the dataset as available for download or sale on criminal forums, which is the primary public locus of the alleged exposure [1][3].

2. The technical claim: an API scraping episode tied to 2024, not a headline intrustion

Cybersecurity analysis cited in reporting frames the incident as scraping or an “API leak” — automated harvesting of profiles via Instagram’s public interfaces — rather than an intrusion into Meta’s core servers, and suggests the data likely originated from queries against API endpoints in 2024 that bypassed rate limits or privacy safeguards [1][2]. Malwarebytes and other defenders observing the dark web say the dataset matches structured API output and therefore is consistent with an earlier data‑collection event rather than a fresh breach of internal infrastructure [5][1].

3. Instagram’s response and the competing narrative

Instagram’s public statement, carried on its official X account, says the company “fixed an issue that let an external party request password reset emails for some people” and that “there was no breach of our systems,” telling users to ignore unsolicited reset emails and that accounts remain secure [4]. That denial sits in tension with vendor alerts and forum postings claiming mass exposure of personal data; major outlets therefore present two competing narratives — dark‑web evidence of a large dataset versus Meta’s assertion that its systems were not breached [5][2].

4. Scale, impact and the open questions reporters still face

Reporting varies on the scale and contents of the dump — some sources assert 17.5 million records including addresses and phone numbers, while Instagram and Meta have not published a confirming incident report tied explicitly to that number, leaving gaps about exactly which fields were exposed, when the data was collected, and which safeguards failed [3][1][5]. Cybersecurity firms warn the data’s presence on criminal markets can fuel phishing and targeted fraud, but independent verification of the full dataset and a definitive attribution to a specific 2024 API flaw remain incomplete in the public record [5][2].

5. What to make of ‘where’ the breach is — a practical formulation

If the question “where is the Instagram breach?” is taken to mean “where can the exposed data be found,” the best‑documented answer in current reporting is: on dark‑web forums and marketplaces (not in a visible Meta data dump), posted by an actor on breach forums and traced by vendors to an API‑style collection likely performed in 2024 [1][2][3]. If the question means “where on Instagram’s systems did it occur,” public sources describe an API scraping/exposure scenario rather than an authenticated intrusion of Instagram’s core servers, and Meta/Instagram deny a platform breach while acknowledging a bug that allowed external password‑reset requests [1][4]. Reporting does not yet provide a fully corroborated, forensic map from forum files back to a specific server log or code‑level flaw inside Meta, so final technical attribution remains unresolved in the available sources [1][5].

Want to dive deeper?
How can users verify if their Instagram data appears in dark‑web leaks?
What is the difference between API scraping and a data breach under cybersecurity definitions?
What disclosures or fines have Meta faced historically for Instagram data exposures?