The incident, discovered in December 2025, marks a significant security failure that has prompted urgent warnings for all affected users to change their credentials immediately.
The compromised database contains approximately 10.2 million unique email addresses along with extensive personally identifiable information.
According to breach disclosure reports, threat actors gained unauthorized access to Raaga’s systems and extracted sensitive user records that were subsequently posted for sale on underground cybercriminal marketplaces.
The exposed dataset includes usernames, gender information, age data, and in many cases, complete dates of birth.
Geographic location data, such as postcodes, was also compromised, creating a comprehensive profile of affected users that increases the risk of targeted phishing attacks and identity theft.
The most alarming aspect of this breach involves how Raaga stored user passwords. The exposed records contain passwords hashed using unsalted MD5, a deprecated cryptographic method that security experts consider dangerously outdated.
This represents a critical infrastructure failure that further amplifies the incident’s severity.
MD5 is a legacy hashing algorithm that the security community has discouraged for over a decade. Its fundamental weakness lies in susceptibility to rainbow table attacks, where attackers use pre-computed hash databases to rapidly reverse-engineer passwords.
The absence of salt (random data added to hashes) makes this process exponentially easier, allowing attackers to crack passwords at scale using modern computational techniques.
This password storage methodology suggests serious deficiencies in Raaga’s data protection infrastructure and raises questions about the platform’s adherence to modern cybersecurity standards.
Industry best practices recommend using bcrypt, scrypt, or Argon2 algorithms, which are significantly more resistant to brute-force attacks than MD5.
Users who reuse passwords across multiple services are more vulnerable to credential stuffing attacks, in which compromised login credentials
are systematically tested against other platforms. The combined exposure of emails and weak password hashes creates a particularly dangerous scenario for affected users.
Cybersecurity experts advise all Raaga users to implement immediate protective measures:
This incident underscores ongoing challenges facing digital service providers in protecting user data against increasingly sophisticated cyber threats.
The reliance on deprecated cryptographic methods suggests that organizations must urgently audit their security infrastructure and implement modern data protection standards to safeguard user information effectively.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Raaga Data Breach Exposes Personal Data of 10.2 Million Users appeared first on Cyber Security News.
God of War developer Sony Santa Monica is reportedly working on a major spinoff focused…
The Marathon Server Slam is coming to an end, and Bungie has outlined the various…
This post was sent to our mailing list. Sign up for our free newsletter here.…
Juan Pujol García was one of the rare individuals whose participation in World War II…
The Neon supposedly includes actual neon lighting in the rear. | Image: Tecno After teasing…
Today: New Cybersecurity Products – February 2026 (Help Net Security) / Looking for Hardware Store /…
This website uses cookies.