Skip to content

Alleged Dataset Leak of Canva Exposes 900,000 User Records With Bcrypt Passwords, OAuth Providers, and Design Platform Usage Data

Dark Web Informer - Cyber Threat Intelligence

Alleged Database Leak of Canva Exposes 900,000 User Records With Bcrypt Passwords, OAuth Providers, and Design Platform Usage Data

March 31, 2026 - 1:38:50 PM UTC
Australia
Technology / Design
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-31 13:38:50 UTC
Threat Actor xorcat
Victim Canva
Industry Technology / Design
Category Data Leak
Total Records 900,000 Users
Data Size 102 MB (Compressed)
Password Hashing Bcrypt ($2y$10$)
Price Free (Public Leak)
Network Open Web
Auth Methods Google, Facebook, Email
Country Australia

Incident Overview

A threat actor going by xorcat has uploaded a database allegedly from Canva, the widely used Australian design platform with over 170 million monthly active users worldwide. The leaked dataset contains 900,000 user records and has been published as a free download for registered forum members. The actor provided a 20-record sample to demonstrate the data's structure and authenticity.


The dataset contains the following fields per user record:

  • Account Identifiers: User IDs, email addresses, and full names.
  • Credentials: Passwords hashed with bcrypt ($2y$10$), which is a strong hashing algorithm. Unlike MD5 or SHA1 leaks, bcrypt hashes are computationally expensive to crack, though weak passwords are still vulnerable to targeted attacks.
  • Authentication Providers: Which OAuth method each user signed up with (Google, Facebook, or email), revealing which third-party accounts are linked to each Canva profile.
  • Geographic Data: Country codes for each user.
  • Account Metadata: Creation dates and last login timestamps, showing when accounts were created and when they were most recently active.
  • Platform Usage: Team/brand data, design counts, and storage usage, which reveals how actively each user engages with the platform and whether they are individual or enterprise users.

It's worth noting that Canva previously experienced a major breach in May 2019 that affected 137 million users. This appears to be a separate, smaller dataset of 900,000 records. The inclusion of design counts, storage usage, and team/brand data is particularly useful for identifying high-value enterprise accounts, professional designers, and business users who may store sensitive client work on the platform.

Compromised Data Categories

User IDs Email Addresses Full Names Bcrypt Hashed Passwords OAuth Provider (Google/Facebook/Email) Country Codes Account Creation Dates Last Login Timestamps Team / Brand Data Design Counts Storage Usage

Image Preview

Forum post by xorcat uploading Canva database with 900,000 user records showing database info, compromised data fields, and 20-record sample

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
Subscriber Access View the original listing URL and unredacted claim images on the feeds below.

Latest