Dunzo Suffers Alleged Data Leak According to Dark Web Reports

UpGuard Team
UpGuard Team
January 28, 2026

Key facts: Dunzo data breach

  • Date reported: January 25, 2026 (Historical incident originally reported July 2020).
  • Records exposed: Approximately 3.4 million unique user accounts.
  • Data types: Email addresses, phone numbers, full names, IP addresses, last known locations, and device information.
  • Breach source: Unauthorized access to a database hosted on a compromised third-party server.
  • Status: While the breach originally occurred in 2019/2020, the database continues to circulate on dark web forums and was highlighted in recent 2026 security audits.
  • Severity: Classified as informational, though the combination of phone numbers and location data presents a high risk for social engineering.

What happened in the Dunzo data breach?

Dunzo (dunzo.com) was the subject of an alleged data leak incident on January 25, 2026. According to reports originating from the dark web, a high-value database containing approximately 3.4 million records was allegedly exposed. No specific threat actor has been officially identified or claimed responsibility for the event at this time.

The incident involves the alleged leak of sensitive user information, including email addresses, phone numbers, and full names. This event is currently classified with an informational severity level while the legitimacy of the database is evaluated. The exposure of such a significant volume of personal identifiers typically increases the risk of targeted phishing and unauthorized account access for the platform's users.

Who is behind the incident?

The attacker or cause of the incident has not been identified. However, Dunzo's internal investigations into this dataset previously indicated that the compromise originated from the servers of a third-party partner. The credentials and data were later found being traded on prominent cybercrime hubs, including BreachForums.

Impact and risks for Dunzo customers

For customers of Dunzo, the alleged exposure of names, phone numbers, and email addresses presents several security risks. Threat actors could potentially use this information to launch sophisticated phishing campaigns, attempt credential stuffing attacks, or engage in identity theft. While the full extent of the breach remains under investigation, users should remain cautious about unsolicited communications or unusual account activity.

Incidents of this nature often lead to increased fraudulent activity targeting the affected user base. To mitigate these risks, individuals should update their security settings and monitor their accounts for suspicious behavior. Maintaining transparency regarding the scope of the exposure is essential for helping users protect their digital identities.

Frequently asked questions

What happened in the Dunzo security breach?

On January 25, 2026, a database containing 3.4 million user records from Dunzo (dunzo.com) was resurfaced in dark web reports. The breach, which was initially identified in 2020, involved unauthorized access to a third-party server, resulting in the exposure of names, email addresses, phone numbers, and technical metadata like IP addresses and device info.

When did the Dunzo breach occur?

The Dunzo breach was publicly reported on January 25, 2026, as part of a renewed security alert. However, the original intrusion is believed to have taken place in June 2019, with the first wave of disclosures occurring in July 2020.

What data was exposed?

The types of data involved in the Dunzo incident include full names, phone numbers, email addresses, last known locations, IP addresses, and advertising IDs. Dunzo has confirmed that payment information and home addresses were not stored in the affected database and were not compromised.

Is my personal information at risk?

If you interacted with Dunzo prior to July 2020, there is a high possibility your personal information was included in this leak. Because this data is now widely distributed among threat actors, you may be at a higher risk for targeted SMS phishing (smishing) and email scams.

How can I protect myself after the Dunzo data breach?

  • Change your account passwords immediately.
  • Enable multi-factor authentication (MFA).
  • Monitor your financial statements for unauthorized charges.
  • Be wary of suspicious emails or text messages.
  • Utilize data breach monitoring services to track your exposure.

What steps should companies take after being impacted by the Dunzo data breach?

Organizations typically respond to such incidents by securing their internal systems, notifying all affected parties, and providing clear guidance on protective actions. They may also review existing security protocols and deploy advanced attack surface management tools to prevent impact from future similar events with other partners.

How secure is Dunzo?

Dunzo is an Indian hyper-local on-demand delivery service that connects users with nearby merchants to deliver groceries, medicine, food, and other essential items, while also providing a "pick and drop" courier service within cities.
  • Check icon
    View our free preliminary report on Dunzo’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
https://dunzo.com
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.

Latest news

Stay up-to-date with the latest news in cybersecurity.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating