Not SOCRadar breach.... Or not?
What Exactly Happened in This Incident?
The investigation revealed that SOCRadarβs internal systems were not breached. The threat actor acquired a license from SOCRadar under a legitimate company name, providing access to the platform similar to any other customer. With this account, the actor could search for well-known domain names, collect Telegram channel names, and crawl these channels to harvest email addresses.
https://socradar.io/socradars-response-to-the-usdods-claim-of-scraping-330-million-emails/