A reported hacker claims to have accessed a vast stash of Twitter user data, allegedly involving 400 million accounts. The person behind the claim, operating under a pseudonym on the dark web, suggests that Elon Musk, as Twitter’s chief executive, should acquire the data. The claim appeared on risk-focused security portals, which track and report on cyber incidents.
The individual, known as Ryushi, has offered a limited preview by granting “trial access” to 1,000 Twitter accounts. This sample is presented to potential buyers to demonstrate the leak’s authenticity. Investigators note that the exposed data allegedly includes personal details from notable figures, including public figures such as Donald Trump Jr. and prominent cybersecurity researchers, among others, though verification remains pending.
According to the offer, the full database could be sold along with the rights to access the accounts, with a specific nudge toward delivering it to Twitter’s leadership, including Elon Musk. The hacker argues that the breach, if true, could carry regulatory consequences in regions with stringent data-protection laws, pointing to penalties that have been imposed in other large-scale incidents as context for potential risk.
Media coverage has previously hinted at earlier data issues tied to Twitter prior to Musk’s acquisition, but observers caution that a past leak does not excuse responsibility for current or future leaks. Analysts note that if regulators obtain sufficient evidence of a data lapse, penalties could be substantial and could impact the company’s financial standing, depending on the jurisdiction and the scope of the information involved.
At the time of reporting, Elon Musk had not issued a public comment regarding the cybercriminal’s submission or the broader breach allegations. The absence of a direct response can complicate the public narrative and the ongoing investigative process, which aims to determine the legitimacy of the claim and the extent of any data exposure. Attribution for the release remains disputed among security researchers, with varying degrees of certainty about the specifics of the alleged leak and the scale of data implicated, as noted by industry observers in ongoing briefings and analyses.