Crunchbase Confirms Data Breach After Hacking Claims

Related

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

What happened Microsoft has developed a lightweight scanner designed to...

EDR-Killer Malware Abuse via SonicWall SSLVPN Exploit Chain

What happened Security researchers have detailed a malware campaign in...

Cisco Meeting Management Vulnerability Lets Remote Attackers Upload Arbitrary Files

What happened A high-severity vulnerability in Cisco Meeting Management was...

CISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks

What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

Share

What happened

Crunchbase confirms data breach after hacking claims when the market intelligence firm detected a cybersecurity incident involving unauthorized access and exfiltration of internal documents from its corporate network in late January 2026. The cybercrime group ShinyHunters claimed to have stolen more than 2 million records and made roughly 400 MB of compressed files available for download after Crunchbase declined to pay a ransom. In response, Crunchbase said it contained the incident, engaged external cybersecurity experts, and contacted federal law enforcement. A third-party analysis of leaked data indicated the presence of personally identifiable information (PII), internal contracts, and other corporate data in the leaked set. The breach did not disrupt operations according to the company’s statement, and the firm is reviewing impacted information consistent with legal obligations. 

Who is affected

Crunchbase customers, partners, and any individuals whose PII was included in the stolen dataset are directly affected. Indirect exposure could involve broader business intelligence and customer service data being used fraudulently beyond Crunchbase’s platform. 

Why CISOs should care

Breaches involving PII and corporate data can trigger regulatory reporting, identity risk, and corporate reputation impact. The involvement of a known data theft group highlights ongoing targeted extortion strategies and the necessity for strong perimeter and internal monitoring controls. 

3 practical actions

  • Verify compromised data scope: Review logs and forensic findings to precisely determine which systems and data sets were accessed and exfiltrated.

  • Reinforce anomaly detection: Strengthen monitoring for unusual data access patterns, large data exports, and lateral movement within corporate networks.

  • Update incident response plans: Integrate lessons learned from this event and clearly codify escalation paths and legal notification triggers.