Email addresses of 15 million Trello users leaked on hacking forum

Teilen:

A threat actor has released over 15 million email addresses associated with Trello accounts that were collected using an unsecured API in January.

Trello is an online project management tool owned by Atlassian. Businesses commonly use it to organize data and tasks into boards, cards, and lists.

In January, BleepingComputer reported that a threat actor known as ’emo’ was selling profiles for 15,115,516 Trello members on a popular hacking forum.

While almost all of the data in these profiles is public information, each profile also contained a non-public email address associated with the account.

While Atlassian, the owner of Trello, did not confirm at the time how the data was stolen, emo told BleepingComputer it was collected using an unsecured REST API that allowed developers to query for public information about a profile based on users’ Trello ID, username, or email address.

emo created a list of 500 million email addresses and fed it into the API to determine if they were linked to a Trello account. The list was then combined with the returned account information to create member profiles for over 15 million users.

Today, emo shared the entire list of 15,115,516 profiles on the Breached hacking forum for eight site credits (worth $2.32).

“Trello had an open API endpoint that allows any unauthenticated user to map an email address to a trello account,” emo explained in the forum post.

“I originally was only going to feed the endpoint emails from ‘com’ (OGU, RF, Breached, etc.) databases but I just decided to keep going with emails until I was bored.”

The leaked data includes email addresses and public Trello account information, including the user’s full name.

This information can be used in targeted phishing attacks to steal more sensitive information, such as passwords. emo also says the data can be used for doxxing, allowing threat actors to link email addresses to people and their aliases.

Atlassian confirmed to BleepingComputer today that the information was collected through a Trello REST API that was secured in January.

“Enabled by the Trello REST API, Trello users have been enabled to invite members or guests to their public boards by email address. However, given the misuse of the API uncovered in this January 2024 investigation, we made a change to it so that unauthenticated users/services cannot request another user’s public information by email. Authenticated users can still request information that is publicly available on another user’s profile using this API. This change strikes a balance between preventing misuse of the API while keeping the ‘invite to a public board by email’ feature working for our users. We will continue to monitor the use of the API and take any necessary actions.”

❖ Atlassian

Unsecured APIs have become a popular target for threat actors, who abuse them to combine non-public information, such as email addresses and phone numbers, with public profiles.

In 2021, threat actors abused an API to link phone numbers to Facebook accounts, creating profiles for 533 million users.

In 2022, Twitter suffered a similar breach when threat actors abused an unsecured API to link phone numbers and email addresses to millions of users.

As many people post anonymously on social media, this data allowed for the unmasking of these people, posing a significant privacy risk.

More recently, an unsecured Twilio API was used to confirm the phone numbers of 33 million Authy multi-factor authentication app users.

Many organizations attempt to secure APIs using rate-limiting rather than through authentication via an API key.

However, threat actors simply purchase hundreds of proxy servers and rotate the connections to constantly query the API, making the rate limiting useless.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
11:27 am, Mai 9, 2025
Wetter-Symbol 16°C
L: 15° | H: 18°
wenige Wolken
Luftfeuchtigkeit: 56 %
Druck: 1020 mb
Wind: 11 mph E
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 20%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:17 am
Sonnenuntergang: 8:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
15° | 18°°C 0 mm 0% 12 mph 63 % 1022 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
9° | 20°°C 0 mm 0% 12 mph 86 % 1021 mb 0 mm/h
So. Mai 11 10:00 pm
Wetter-Symbol
11° | 23°°C 0.94 mm 94% 12 mph 86 % 1015 mb 0 mm/h
Mo. Mai 12 10:00 pm
Wetter-Symbol
12° | 21°°C 0.97 mm 97% 11 mph 95 % 1016 mb 0 mm/h
Di. Mai 13 10:00 pm
Wetter-Symbol
13° | 21°°C 0.46 mm 46% 11 mph 77 % 1022 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
16° | 17°°C 0 mm 0% 12 mph 50 % 1021 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 11 mph 43 % 1020 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
15° | 15°°C 0 mm 0% 9 mph 40 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
12° | 12°°C 0 mm 0% 8 mph 63 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
9° | 9°°C 0 mm 0% 4 mph 86 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 79 % 1020 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 8 mph 47 % 1020 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,699.80
3.28%
Ethereum(ETH)
€2,081.36
20.39%
Fesseln(USDT)
€0.89
-0.01%
XRP(XRP)
€2.11
6.92%
Solana(SOL)
€149.15
8.15%
USDC(USDC)
€0.89
0.01%
Dogecoin(DOGE)
€0.183800
12.27%
Shiba Inu(SHIB)
€0.000013
13.00%
Pepe(PEPE)
€0.000012
43.04%
Peanut das Eichhörnchen(PNUT)
€0.243882
58.27%
Nach oben scrollen