Skip to content

Linktree Allegedly Scraped, Exposing 19.6 Million User Profiles with Linked Social Media Accounts

Dark Web Informer - Cyber Threat Intelligence

Linktree Allegedly Scraped, Exposing 19.6 Million User Profiles with Linked Social Media Accounts

Australia
Information Technology (IT) Services

🧩 Standalone API Access Now Available

Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.

View API Access

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)
Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)
Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat Feed
Live tracking with JSON export.
🔍
Leak and Breach Coverage
Direct access to claims and posts.
📡
Snippets and Quick Facts
Concise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet Resources
Verified index of dark web sites and services.
📊
Real Time Uptime Dashboard
Live status of 500+ sites.
🤖
WhiteIntel.io API
Integrated checks inside breach posts.
🖼️
High Resolution Images
Uncompressed, watermark free evidence.
🔑
Keyword Notifications
Browser alerts for tracked terms.

Quick Facts

Date and Time of Alert
2026-01-15 14:11:16 UTC
Threat Actor
tree_lover
Victim Country
Australia
Industry
Information Technology (IT) Services
Victim Org.
Linktree Pty Ltd
Victim Site
linktr.ee
Category
Data Breach (Scrape)
Severity
Medium
Network
Clear Web

Incident Overview

A threat actor operating under the handle "tree_lover" claims to be selling a scrape of 19.6 million unique Linktree (linktr.ee) profiles. According to the post, the dataset is 12GB compressed and 87GB uncompressed. The threat actor states this was achieved through enumeration on an exposed endpoint, noting that Linktree profiles are not supposed to be discoverable. The actor claims the biggest scrapes using Google and the profile directory sit at around 400K, with this dataset including approximately 330K of the top profiles on the platform.

The claimed data includes 1.17 million email addresses, 1.12 million phone numbers (50K directly, 1.15 million through WhatsApp profiles), and 12 million profiles linked to other platforms. The breakdown of linked social media profiles allegedly includes: Instagram (3,470,776), TikTok (1,626,542), Facebook (1,379,323), WhatsApp (1,128,282), YouTube (1,116,826), X/Twitter (669,042), LinkedIn (343,477), Spotify (191,444), Pinterest (183,667), Threads (183,223), Snapchat (177,760), Telegram (106,622), SoundCloud (102,721), Twitch (97,032), Website (94,535), Payment (74,685), Apple Music (71,978), Discord (67,382), Amazon (65,601), Bluesky (31,975), and 22 additional platforms.

The threat actor notes that all Linktree profiles contain an owner_id and account_id parameter, allowing correlation of multiple Linktrees belonging to one owner. The price is listed as TBD with a minimum of over $xxxx. Contact is offered through Telegram and Session.

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest