Skip to content

Max Messenger Suffers Alleged Complete Infrastructure Breach Exposing 154 Million Users

Dark Web Informer - Cyber Threat Intelligence

Max Messenger Suffers Alleged Complete Infrastructure Breach Exposing 154 Million Users

Unknown
Information Technology (IT) Services

🧩 Standalone API Access Now Available

Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more – independently from the above standard subscriptions.

View API Access

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)
Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)
Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat Feed
Live tracking with JSON export.
🔍
Leak and Breach Coverage
Direct access to claims and posts.
📡
Snippets and Quick Facts
Concise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet Resources
Verified index of dark web sites and services.
📊
Real Time Uptime Dashboard
Live status of 500+ sites.
🤖
WhiteIntel.io API
Integrated checks inside breach posts.
🖼️
High Resolution Images
Uncompressed, watermark free evidence.
🔑
Keyword Notifications
Browser alerts for tracked terms.

Quick Facts

Date and Time of Alert
2026-01-14 04:46:48 UTC
Threat Actor
CamelliaBtw
Victim Country
Unknown
Industry
Information Technology (IT) Services
Victim Org.
Max Messenger
Victim Site
Not Disclosed
Category
Data Breach
Severity
Medium
Network
Clear Web

Incident Overview

A threat actor operating under the handle "CamelliaBtw" claims to have fully compromised Max Messenger, a messaging platform that launched on March 26, 2025. The threat actor alleges that Max Messenger promoted itself with claims of "unrivaled security" and as a "new era of privacy," positioning itself as the "Telegram Killer." According to the post, this breach occurred exactly one year after the platform's launch.

The threat actor claims the dataset includes approximately 154 million user records containing full names, usernames, and verified phone numbers. The breach allegedly also includes valid session tokens that allow account hijacking by bypassing 2FA, along with Bcrypt password hashes. Additional compromised data reportedly consists of full communication logs with timestamps and sender/receiver IDs, internal SSH keys, API documentation, and AWS S3 bucket configurations containing unencrypted media assets. The threat actor also claims to have obtained the backend source code, including what they describe as a "proprietary" encryption module with several hardcoded backdoors.

According to the claim, the breach was executed via a critical 0-day Remote Code Execution vulnerability within the messenger's media processing engine. The threat actor states they injected a malformed payload into a sticker pack metadata file to gain persistent access. The post indicates the breach was executed within 5 days, remained undetected for 299 days, and was never patched.

The threat actor notes that verified accounts of several high-profile politicians and corporate executives who joined the platform during its "security hype" last year are included in the compromised data. They claim the first 5 gigabytes of raw SQL data will be mirrored across 10+ public torrent trackers within the next 24 hours. The post concludes with: "Happy Anniversary, Max Messenger. Privacy is a myth."

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest