1 Million User Records Exposed: A Deep Dive into the Komiko AI App Data Breach

1 Million User Records Exposed: A Deep Dive into the Komiko AI App Data Breach

Executive Summary

In February 2026, Brandefense threat analysts identified a high-severity post on an underground forum in which an unidentified threat actor claimed to have exfiltrated the complete database of a popular AI-powered application. The actor alleged that the breach affected more than 1,000,000 registered users and offered the full dataset for free download, with a credit requirement attached — a distribution model commonly used to build reputation within threat actor communities.

The leaked data, examined by our team, includes Google OAuth tokens, active session tokens, user-generated content, personal identifiers, subscription records, and account credentials. The exposure of OAuth tokens in particular presents a severe escalation risk, as these tokens can be used to access third-party services linked to the compromised accounts — extending the blast radius far beyond the breached platform itself.

  ⚠  CRITICAL: Active Google OAuth and session tokens were found in the dataset. If valid, these tokens allow attackers to authenticate as victims without needing a password.
brandefense.io 1 million user records exposed a deep dive into the komiko ai app data breach image Brandefense

What Was in the Leaked Database?

Our analysts reviewed a sample of the alleged dataset. The breach appears to encompass multiple database tables exported in JSON format — a structure consistent with a direct database dump rather than a scraping or API abuse incident. Below is a breakdown of each exposed data category:

Data CategoryFields ExposedRisk Level
Account / OAuth RecordsGoogle OAuth tokens, refresh tokens, access tokens, provider account IDs, token expiry timestampsCRITICAL
Session RecordsSession tokens, user IDs, expiry timestampsCRITICAL
User RecordsFull name, email address, username, profile picture URL (Google CDN), credit balance, invite codes, creation date, user unique IDsHIGH
Subscription RecordsStripe customer IDs, subscription IDs, plan names, plan codes, credit allocations, expiry dates, billing sourceHIGH
Verification TokensEmail verification tokens, associated email addresses, expiry timestampsHIGH
Messages / Content RecordsUser-generated content IDs, content type, host content references, aggregate IDs, creation timestampsMEDIUM
User BadgesBadge assignments, user identifiersMEDIUM
User Blocks / SharesBlock relationships, shared content recordsLOW
Push TokensDevice push notification tokens, user linkageMEDIUM
Multiple JSON database files exposed in a data breach dump
Complete database structure exposed by attackers
brandefense.io 1 million user records exposed a deep dive into the komiko ai app data breach image 2 Brandefense
brandefense.io 1 million user records exposed a deep dive into the komiko ai app data breach image 3 Brandefense

Technical Analysis: How the Breach Appears to Have Occurred

While the root cause has not been officially confirmed, the structure and completeness of the leaked dataset provides meaningful forensic clues. Based on our analysis:

Database Dump Indicators

The exported files follow a consistent, relational database structure. Each table is exported as a standalone JSON array — a pattern that aligns with direct database access via an ORM (Object Relational Mapper) export, a compromised backup file, or unauthorized administrative access. The breadth of coverage across all major tables rules out a targeted API abuse scenario.

OAuth Token Exposure

The Account.json file contains what appear to be live Google OAuth access tokens and refresh tokens. OAuth tokens are temporary credentials that allow applications to act on behalf of a user. A refresh token, if not revoked, can be used indefinitely to generate new access tokens — meaning attackers may retain persistent access to linked Google accounts even after the compromised platform rotates its own credentials.

  ⚠  IMPORTANT: Refresh tokens do not expire unless explicitly revoked by the user or Google. Any user who authenticated via Google OAuth on this platform should immediately revoke third-party access at myaccount.google.com/permissions.

Session Token Risk

Session.json contains active session tokens with future expiry timestamps (some extending to early 2026). Active session tokens can be used directly to hijack authenticated sessions without requiring any credentials — a technique known as session hijacking or cookie theft.

Stripe Customer ID Exposure

The Subscriptions.json file exposes Stripe customer IDs. While Stripe customer IDs alone do not grant access to payment card data, they can be used in combination with a compromised Stripe secret key to retrieve billing information or manipulate subscription states. Organizations using Stripe should rotate API keys immediately if this data is confirmed.

Cybersecurity CTA banner asking about dark web exposure monitoring
Identify threats before attackers act

Impact Assessment

Organizational Impact

The alleged compromise represents a significant reputational and regulatory risk for the affected platform. Under GDPR, CCPA, and other applicable data protection frameworks, the exposure of personal data — including email addresses, profile pictures, and unique identifiers — triggers mandatory breach notification obligations. Failure to comply with notification timelines can result in substantial regulatory fines.

The exposure of user-generated content, including AI prompts and generated media, raises additional privacy concerns. These records may reveal sensitive personal interests, business use cases, or private creative work, each carrying its own reputational risk for users if publicly disclosed.

End-User Impact

  • Account Takeover: Active session tokens and OAuth refresh tokens can be used to gain immediate, authenticated access to victim accounts.
  • Credential Stuffing: Exposed email addresses will be incorporated into credential stuffing lists and tested against other platforms where victims may reuse passwords.
  • Phishing & Spear Phishing: Full name, email, and profile data enable highly personalized phishing campaigns with elevated success rates.
  • Identity Theft: Combination of email, name, profile image, and account history provides sufficient data for synthetic identity fraud.
  • Financial Risk: Exposure of Stripe customer IDs, credit balances, and subscription details may enable subscription fraud or targeted billing manipulation.
  • Cross-Platform Risk: Google OAuth tokens may expose other services connected to the same Google account — including Google Drive, Gmail, Google Workspace, and third-party SaaS tools.
Attack VectorLikelihoodPotential Impact
OAuth Token Abuse / Account TakeoverCriticalImmediate account compromise across linked services
Session HijackingHighDirect access to active authenticated sessions
Targeted Phishing CampaignCriticalElevated open & click rates due to PII richness
Credential Stuffing Against Other PlatformsHighPassword reuse exploitation across unrelated services

What Has Komiko Confirmed in Its Official Statement?

  • They acknowledged receiving a credible threat that an external attacker had accessed their database.
  • They confirmed that user IDs, email addresses, and potentially user content had been compromised.
  • They announced that they do not store passwords or payment card data.
  • They stated that they worked with security experts and reported the incident to law enforcement.

Areas they said they are still investigating include:

  • The full scope of the accessed data,
  • How the attacker gained access,
  • Whether user-generated AI content (AI creations) was included.

For Affected Users — Immediate Actions

  If you have an account on the affected platform, take the following steps immediately:
  • Revoke Google OAuth access: Visit myaccount.google.com/permissions and remove the application’s access to your Google account.
  • Change your password on the affected platform and on any other service where you use the same password.
  • Enable Multi-Factor Authentication (MFA) on your Google account and any linked services immediately.
  • Review your Google account’s recent activity (myaccount.google.com/security) for any unauthorized sign-ins.
  • Be vigilant for phishing emails targeting your registered email address — attackers now have your name and account history.
  • Monitor your linked payment methods for suspicious charges, particularly if you had an active subscription.
  • Check if your email appears in additional breaches.

For the Affected Organization — Response Checklist

  • Immediately rotate all Google OAuth client secrets and force-revoke all existing OAuth tokens.
  • Invalidate all active session tokens and require all users to re-authenticate.
  • Rotate Stripe API keys and audit all recent API calls for suspicious activity.
  • Engage a forensic response team to determine the root cause, timeline, and full scope of the compromise.
  • Conduct an emergency security audit of database access controls, backup storage, and administrative account privileges.
  • Implement IP allowlisting and privileged access management (PAM) for all database and cloud infrastructure access.

Strategic Recommendations

  • Implement encryption at rest for all OAuth tokens, session tokens, and sensitive credentials stored in the database.
  • Adopt a token rotation policy: short-lived access tokens (1 hour) with server-side refresh token validation.
  • Deploy a Web Application Firewall (WAF) and database activity monitoring (DAM) to detect anomalous bulk export patterns.
  • Conduct regular penetration testing and red team exercises targeting authentication and data access flows.
  • Implement Data Loss Prevention (DLP) controls to alert on bulk data exfiltration events.

How Brandefense Detected This Threat

This breach was identified through Brandefense’s continuous dark web and underground forum monitoring infrastructure. Our platform maintains 24/7 automated surveillance across thousands of threat actor forums, leak sites, Telegram channels, and private marketplaces — enabling our analysts to surface high-severity incidents within hours of initial posting.

Upon detection, our Threat Intelligence team validated the claims by analyzing the provided sample data, cross-referencing the exposed fields against known database structures, and assessing the technical credibility of the actor’s claims.

Detection CapabilityValue Delivered
Underground Forum MonitoringBreach post identified within hours of initial publication
Dark Web Data ValidationSample analysis confirmed data authenticity and scope
Actor ProfilingDistribution model (free share + credit requirement) mapped to known reputation-building behavior
Impact ScoringHigh-severity classification triggered based on OAuth token exposure and user volume
Dark web monitoring dashboard with hacker silhouette and security alerts
Detect breaches before they escalate
Share This: