/ciol/media/media_files/2025/06/20/WotsFQg8nTJPOMsU6xac.jpg)
Cybersecurity researchers at Cybernews have uncovered what may be the internet’s largest-ever unreported credential leak, a staggering 16 billion login records exposed across 30 datasets. The data, most of it collected by infostealing malware, was discovered in unsecured cloud storage, open to exploitation by cybercriminals.
“This is not just a leak – it’s a blueprint for mass exploitation,” the Cybernews team warned. “Cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing.”
What makes this breach so dangerous is how fresh and structured the data is. Unlike recycled leaks from past breaches, this cache is well-organised and packed with metadata that makes it far more dangerous.
Anatomy of the Breach
The 30 datasets differ in origin and scale, but collectively, they reflect a sweeping global exposure:
- The largest dataset, tied to a Portuguese-speaking population, had over 3.5 billion records
- A dataset referencing the Russian Federation contained 455 million entries
- One labelled “Telegram” included 60 million records
- Even the smallest, named after a malware strain, held over 16 million records
On average, each dataset held around 550 million credentials. Most followed a uniform pattern, such as, URL, username or email, and password, indicating their source as infostealer malware logs. Many also included cookies, tokens, device details, and session metadata, raising the risk of multi-factor authentication being bypassed.
Beyond Usernames and Passwords
This is not just about reused passwords. The presence of active session data, tokens, and browser fingerprints allows attackers to hijack accounts without ever entering a password. This enables stealthy attacks that can bypass even strong authentication measures.
The exposed credentials span popular services like Apple, Google, Facebook, Microsoft, Telegram, and various government and financial platforms. Some datasets contain entries from developer and gaming platforms as well.
The researchers estimate that if the credentials were printed out line by line, they would form a stack over 35 miles high.
Ever Evolving Threat Landscape
Cybernews notes that new credential dumps continue to surface every few weeks, underscoring the relentless pace at which infostealer malware is harvesting user data. Malware like Racoon, Redline, and Clipper are suspected to be behind much of the collection.
Worryingly, there is no known owner or origin for the exposed storage — suggesting that criminal actors are intentionally curating and assembling these datasets to industrialise credential-based attacks.
Time to Up the Digital Guardrails
For users, the options to defend against such exposures are frustratingly limited once their credentials are already out there. Even a tiny success rate for attackers can result in widespread harm at scale.
Experts recommend:
- Using strong, unique passwords stored in a secure password manager
- Enabling multi-factor authentication, ideally with hardware keys
- Running frequent malware scans to detect infostealers
- Monitoring dark web sources for signs of exposure
- Locking down cloud storage and improving credential management practices
Tech platforms are already reacting. Google is encouraging users to migrate to passkeys. The FBI has warned against clicking links from unknown SMS sources, a common entry point for infostealers.
What we’re seeing is no longer about scattered, accidental leaks. This is curated, packaged, and monetisable intelligence. The very concept of digital identity is now under sustained threat.
The exposure of 16 billion login credentials marks a turning point in cybersecurity. It’s not just about defending systems, it’s about defending people.