Discord Refutes Breach Claims, Says 70,000 Government IDs Exposed Rather Than 2.1 Million

Ethan Cole
Ethan Cole I’m Ethan Cole, a digital journalist based in New York. I write about how technology shapes culture and everyday life — from AI and machine learning to cloud services, cybersecurity, hardware, mobile apps, software, and Web3. I’ve been working in tech media for over 7 years, covering everything from big industry news to indie app launches. I enjoy making complex topics easy to understand and showing how new tools actually matter in the real world. Outside of work, I’m a big fan of gaming, coffee, and sci-fi books. You’ll often find me testing a new mobile app, playing the latest indie game, or exploring AI tools for creativity.
5 min read 82 views
Discord Refutes Breach Claims, Says 70,000 Government IDs Exposed Rather Than 2.1 Million

Discord has pushed back against claims from hackers following a third-party service breach, stating that approximately 70,000 government ID photos may have been exposed—significantly fewer than the 2.1 million initially claimed by threat actors. The company has also confirmed it will not pay the demanded $3.5 million ransom and has severed all communications with those responsible.

The incident highlights ongoing challenges technology platforms face in securing third-party vendor relationships while protecting user data. As companies increasingly rely on external service providers for customer support and verification processes, the security of these integrations has become a critical concern for both platforms and users.

Third-Party Support System Compromised in September Attack

The breach occurred on September 20, 2025, when hackers gained unauthorized access to what is believed to be Discord’s customer support ticketing system. Through this compromise, threat actors obtained access to various types of personal information, including contact details, email addresses, real names, limited payment information, and government ID documents used for age verification purposes.

Importantly, Discord clarified that the platform itself was not directly breached, and no user passwords or Discord account credentials were compromised. The exposed data was extracted from the third-party service used to manage customer support operations, representing a supply chain security incident rather than a direct platform compromise.

The distinction is significant from both a technical and security perspective. While the exposed data creates privacy concerns for affected users, the integrity of Discord’s core infrastructure and authentication systems remained intact throughout the incident.

Discord Rejects Ransom Demands and Challenges Attacker Claims

Discord ransomware defense — glowing logo symbolizing cyberattack resistance and data protection.

In a direct statement addressing the breach, Discord made its position unequivocally clear: “We will not reward those responsible for their illegal actions.” The company has maintained this stance despite escalating threats from the attackers to publicly release the stolen data.

The threat actors initially demanded $5.5 million from Discord to delete the compromised information. Following several weeks of private discussions between Discord and those responsible, that figure was reduced to $3.5 million. Discord ultimately decided to cut all communications with the hackers rather than continue negotiations.

Discord also strongly contested the scale of the breach as characterized by the attackers. “First, as stated in our blog post, this was not a breach of Discord, but rather a third-party service we use to support our customer service efforts,” Discord stated. “Second, the numbers being shared are incorrect and part of an attempt to extort a payment from Discord. Of the accounts impacted globally, we have identified approximately 70,000 users that may have had government-ID photos exposed, which our vendor used to review age-related appeals.”

This significant discrepancy between Discord’s assessment and the hackers’ claims raises questions about the actual scope of the incident and the motivations behind inflated figures in ransomware negotiations.

Hackers Maintain Breach Affected Millions of Support Tickets

The threat actors behind the breach presented a substantially different narrative regarding the incident’s scope. In communications with security researchers, those responsible claimed access to over 8.4 million support tickets affecting more than 5.5 million unique users.

However, the attackers did acknowledge that their original figure of 2.1 million government ID documents may have been exaggerated. They now claim to possess over 521,000 age verification support tickets containing government identification documents—still significantly higher than Discord’s 70,000 figure.

These competing claims create uncertainty about the true extent of the exposure. The hackers allegedly provided samples of stolen data to security researchers as evidence, though the full scope of the breach remains unverified by independent parties.

The discrepancy between Discord’s assessment and the attackers’ claims is not unusual in ransomware and data breach scenarios, where threat actors often inflate figures to increase pressure for payment while victims may minimize public disclosure to limit reputational damage and user concern.

Broader Implications for Platform Security and Third-Party Risk

This incident underscores the complex security challenges facing digital platforms that rely on third-party vendors for essential operations. Customer support systems, in particular, often contain sensitive personal information necessary for account verification, dispute resolution, and identity confirmation.

The breach raises important questions about vendor security requirements and the extent to which platforms can realistically audit and control the security practices of their service providers. As regulatory frameworks like GDPR and various state privacy laws hold companies responsible for third-party breaches affecting their users, the pressure to ensure vendor security has intensified.

For users, the incident highlights the often-overlooked reality that their personal information may be stored not just by the platforms they use, but also by various third-party services supporting those platforms. Government ID documents submitted for age verification or identity confirmation can end up in multiple systems, each representing a potential point of vulnerability.

Discord’s decision not to pay the ransom aligns with guidance from law enforcement and cybersecurity experts, who generally recommend against paying threat actors. Such payments can fund further criminal activity, provide no guarantee that stolen data won’t be released or sold anyway, and potentially make the paying organization a more attractive target for future attacks.

The company’s approach also reflects a calculated assessment of the risks and benefits. While refusing to pay may result in the public release of stolen data, paying could set a precedent encouraging future attacks and still offer no assurance of data deletion.

As this situation develops, affected users should remain vigilant for potential phishing attempts or identity theft schemes that could leverage exposed personal information. Discord has not yet publicly disclosed whether it will offer identity protection services to affected users, a step that has become increasingly common following data breaches exposing sensitive personal information.

The incident serves as another reminder that even when users trust a platform with their data, that information may reside in third-party systems over which they have no direct control or visibility. As digital platforms continue expanding their reliance on specialized vendors for everything from customer support to payment processing, the security of these partnerships will remain a critical concern for users and regulators alike.

Share this article: