Skip to content

Recurpay SaaS Subscription Platform Allegedly Breached Again, Exposing Order and Payment Data

Dark Web Informer - Cyber Threat Intelligence

Recurpay SaaS Subscription Platform Allegedly Breached Again, Exposing Order and Payment Data

India
E-commerce & Online Stores

🧩 Standalone API Access Now Available

Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.

View API Access

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)
Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)
Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat Feed
Live tracking with JSON export.
🔍
Leak and Breach Coverage
Direct access to claims and posts.
📡
Snippets and Quick Facts
Concise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet Resources
Verified index of dark web sites and services.
📊
Real Time Uptime Dashboard
Live status of 500+ sites.
🤖
Whiteintel.io API
Integrated checks inside breach posts.
🖼️
High Resolution Images
Uncompressed, watermark free evidence.
🔑
Keyword Notifications
Browser alerts for tracked terms.

Quick Facts

Date and Time of Alert
2026-01-16 17:28:33 UTC
Threat Actor
aiyewumi
Victim Country
India
Industry
E-commerce & Online Stores
Victim Org.
Recurpay
Victim Site
recurpay.com
Category
Data Breach
Severity
Medium
Network
Clear Web
Previous Breach
July 2, 2025

Incident Overview

A threat actor operating under the handle "aiyewumi" claims to have breached Recurpay, an e-commerce recurring billing and subscription management SaaS platform based in India. The post describes Recurpay as handling "E-commerce / Recurring Billing / Order & PII Data" and lists the exposed fields as order details, email, full billing and shipping info, subscription ID, payment gateway data, and timestamps.

The sample data visible in the screenshot shows records containing customer names, email addresses, phone numbers, physical addresses across various Indian cities (Goa, West Bengal, Tamil Nadu, Maharashtra, Karnataka, Assam, Rajasthan), order amounts in INR, shipping methods ("Standard Shipping"), product details ("Friends Easy Adult Diapers.123", "Friends Premium Diapers", "Friends Premium Diaper Pants"), subscription statuses (fulfilled, cancelled), and timestamps ranging from 2020 to 2022. This marks the second reported breach of the platform, following a previous incident on July 2, 2025.

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest