Key facts: youX data breach
- Date reported: February 15, 2026.
- Unauthorized access identified: February 15, 2026.
- Target entity: youX (youxpowered.com.au).
- Source of breach: Unknown, unauthorized third-party.
- Data types: Financial details, names, government IDs, and over 629,000 loan applications.
- Status: Reported; exfiltration of 141GB from a MongoDB Atlas cluster and 16GB from prodApply confirmed in dark web reports.
- Severity: Medium; involves sensitive financial and government identification for over 444,000 borrowers.
Start continuous breach monitoring with UpGuard.
What happened in the youX data breach?
youX (youxpowered.com.au), an Australian B2B FinTech company formerly known as Drive IQ, was reportedly the subject of a data breach published on February 15, 2026. No specific threat actor was identified in the reports, which appeared as a breach preview on dark web platforms.
The breach involved the exfiltration of 141GB of data from a MongoDB Atlas cluster and 16GB from prodApply, impacting 444,538 unique borrowers. Exposed information includes sensitive financial details, names, government IDs, and over 629,000 loan applications. The severity is currently listed as informational, representing a notification of a security event. Security failures such as unrotated credentials and a lack of multi-factor authentication were cited as contributing factors. These types of exposures typically lead to significant risks of identity theft and credential abuse.
Who is behind the incident?
The attacker or cause of the incident has not been identified.
Impact and risks for youX customers
Borrowers and partners associated with youX face a variety of potential risks following this exposure. The inclusion of government IDs and financial data makes identity theft and fraudulent account creation a primary concern. Additionally, the leak of email addresses and phone numbers increases the likelihood of targeted phishing campaigns or social engineering attacks.
Organizations often face reputational damage and regulatory scrutiny following large-scale data exfiltrations. To mitigate personal risk, affected individuals should change passwords immediately, monitor financial statements for unauthorized charges, and enable multi-factor authentication on all accounts. Maintaining transparency during the recovery process helps restore user trust and provides necessary clarity for those impacted.
How to protect against similar security incidents
Get instant alerts when your data appears on the dark web
Frequently asked questions
What happened in the youX security breach?
On February 15, 2026, youX (youxpowered.com.au) disclosed a security breach. According to initial reports, a breach preview detailed the total exfiltration of data from the Australian B2B FinTech company, including sensitive personal and financial records of over 444,000 borrowers.
When did the youX breach occur?
The youX breach was publicly reported on February 15, 2026. The exact date of the attack has not been disclosed.
What data was exposed?
The types of data involved in the youX incident have not been disclosed. This page will be updated as verified information becomes available.
Is my personal information at risk?
If you interacted with youX, there's a possibility your personal information could be affected. Similar incidents often involve email addresses, login details, or financial records. Stay alert for updates and take precautionary measures to secure your accounts.
How can I protect myself after this data breach?
- Change your passwords and use unique credentials for every account
- Enable multi-factor authentication (MFA) to add a layer of security
- Monitor your financial accounts and credit reports for suspicious activity
- Stay alert for phishing attempts via email, SMS, or phone
- Use data breach monitoring tools to stay informed of future leaks
What steps should companies take after being impacted by this breach?
youX is expected to take steps to secure its production databases, notify all affected borrowers, and provide specific guidance on protective measures. The company should also review its credential management policies, implement multi-factor authentication, and deploy attack surface management tools to identify vulnerabilities.

.jpg)
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)