
The Gravatar leak is a reminder that even data many people consider low-risk or “public enough” can still become valuable in the hands of scammers. When names, usernames, and email addresses tied to widely used online identities are scraped at scale, the fallout can include phishing, account-targeting attempts, and easier identity profiling across multiple platforms.
In October 2020, a security researcher named Carlo Di Dato discovered a technique to exploit a vulnerability of the Gravatar online avatar service to collect data about its users. Although the available data was theoretically public, as Di Dato warned the community that “it’s unlikely users know their data can be accessed by querying Gravatar in a way which should not be possible."
Fast-forward to December 2021. HaveIBeenPwned revealed “167 million names, usernames and encrypted email addresses used to reference users’ avatars were scraped and distributed within the hacking community.” Just under 114 million, or 68% of the encrypted records, were cracked and distributed alongside the source hash, thus disclosing the original email address and accompanying data.
Gravatar is a service for providing globally unique avatars. Users can register an account based on their email address and upload a digital avatar to be associated with the account. Because Gravatar integrates with WordPress, GitHub and other platforms, the avatar is automatically displayed every time a user comments.
How does this affect you?
If you own a WordPress or GitHub account, you probably also have a Gravatar account, and your data was scraped in the leak. But there’s no reason to panic. While the situation isn’t ideal, the leaked data only includes names, usernames and email addresses. There’s no reason to believe passwords or other vital information were compromised.
Having said that, cybercriminals can still use the scraped data against you. For example, just by knowing your e-mail address, hackers can have a go at cracking your password. If your password is weak, or if it was reused on multiple accounts, your account can be easily hijacked.
Armed with just your name and e-mail address, scammers can cyberstalk you and target you with spam or spear-phishing. Unlike regular phishing, spear-phishing consists of compelling targeted messages, focused on a specific person of interest. Once “speared,” the victim is tricked into downloading malware or disclosing their password and financial data. Then the criminals take over.
Last but not least, hackers can link the scraped data with other personal information previously obtained on the Dark Web, build a complex digital profile and use your identity to commit fraud.
What can you do to stay safe?
Like it or not, data leaks happen all the time and changing our name or e-mail address isn’t an option, but we can take other steps to secure our accounts:
Yes, especially if that password is still in use anywhere. Have I Been Pwned’s password checker notes that breached passwords are commonly used in credential-stuffing attacks, where criminals try the same login on other services. The right response is to change that password immediately anywhere it was reused, turn on MFA, and switch to unique passwords or passkeys going forward.
Yes. One of the most widely used tools is Have I Been Pwned, which lets you check whether your email address has appeared in known breaches and sign up for future alerts. It is a practical first stop for consumers who want to see whether their data has shown up in public breach collections.
That depends on whether you mean a single company breach or a massive leaked compilation. For a single company incident, Yahoo’s 2013 breach is still widely cited as the largest, affecting all 3 billion user accounts. More recently, researchers have reported giant credential compilations far larger than that by raw record count, but those are aggregated datasets from many sources rather than one standalone breach.
Often, yes, but you should verify them carefully. Real warnings commonly come from breached companies, credit bureaus, banks, browser/password tools, or services like Have I Been Pwned. At the same time, scammers also exploit breach anxiety with fake alerts, so never click blindly from an unexpected message. Go directly to the company’s official site or use a known breach-checking service instead.
tags
Radu is a tech-geek with 15 years of experience in writing, journalism and copywriting. When he’s not writing he’s probably taking something apart, trying to figure out how things work.
View all posts