3 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Pornhub has alerted Premium members about potential sextortion emails following a data breach at a third-party analytics provider. While no passwords or payment info were leaked, users should be vigilant for blackmail attempts and follow safety guidelines if they receive suspicious emails.
If you do, here's more
Pornhub is warning its Premium members about potential sextortion emails following a recent data breach linked to a third-party analytics provider, Mixpanel. On November 8, 2025, a security incident exposed a limited set of analytics events for some users. While Pornhub clarified that their own systems werenβt breached and sensitive data like passwords and payment details were not compromised, the threat remains. Cybercriminals often use any leaked data to launch extortion attempts, and users may receive emails claiming to have their personal information.
The scale of the breach remains unclear, but it's suggested that only Premium members had their data exposed. Given that one in six mobile users are targeted by sextortion scams, those with Pornhub accounts should be vigilant. If users receive emails referencing their Pornhub activity, they should treat them as attempts to exploit the breach. Pornhub has advised against sharing passwords or payment information via email and urged users to ignore blackmail demands.
To enhance safety, users should change their Pornhub passwords, enable multi-factor authentication on important accounts, and monitor bank statements for any unusual charges. If a real-name email address was used for Pornhub, itβs wise to switch to a pseudonymous email for sensitive subscriptions. The article also outlines a scam response framework called STOP, which encourages users to slow down, test the legitimacy of communications, opt out if something feels off, and prove the identity of anyone claiming to be from a legitimate source. Cybersecurity is a growing concern, and proactive measures are essential.
Questions about this article
No questions yet.