Subscribe

0

  • Sign in with Email

By clicking the button, I accept the Terms of Use of the service and its Privacy Policy, as well as consent to the processing of personal data.

Don’t have an account? Signup

  • Bookmarks
  • My Profile
  • Log Out
  • News
    • Tech Buzz
    • Appointments
  • StraightTalk
    • Interview
    • Our Podcast
  • CXO of the week
    • CxO Insights
    • Founders
    • Strategy
  • Startup Circle
    • Funding
    • Spotlight
    • Entrepreneur of the month
  • Emerging Tech
    • Mobility
    • IOT
    • Generative AI
  • More
    • Virtual Events
    • Future Workspace
    • Social
    • C-Change 2017
    • Resources
    • Digital Transformation
    • Vlogs
      • Technews of the week
      • PCB Playbook Series
      • Interviews
      • Webinars
    • Nextgenit
    • SMB
    • Governance
    • Enterprise
ad_close_btn
  • News
  • straight-talk
  • CxO Of The Week
  • Startup Circle
  • Mobility
  • IoT
  • Generative AI

Powered by :

You have successfully subscribed the newsletter.
News

16 Billion Login Passwords Leaked: The Web’s Largest Credential Spill Yet

In a latest expose Cybernews uncovers 16 billion stolen login records- including Apple, Googel Facebook- from infostealers. This isn’t a recycled dump, it’s fresh, structured, and dangerously exploitable data at scale.

author-image
CIOL Bureau
20 Jun 2025 09:31 IST

Follow Us

New Update
Cybersecurity

Cybersecurity researchers at Cybernews have uncovered what may be the internet’s largest-ever unreported credential leak, a staggering 16 billion login records exposed across 30 datasets. The data, most of it collected by infostealing malware, was discovered in unsecured cloud storage, open to exploitation by cybercriminals.

Advertisment

“This is not just a leak – it’s a blueprint for mass exploitation,” the Cybernews team warned. “Cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing.”

What makes this breach so dangerous is how fresh and structured the data is. Unlike recycled leaks from past breaches, this cache is well-organised and packed with metadata that makes it far more dangerous.

Anatomy of the Breach

Advertisment

The 30 datasets differ in origin and scale, but collectively, they reflect a sweeping global exposure:

  • The largest dataset, tied to a Portuguese-speaking population, had over 3.5 billion records
  • A dataset referencing the Russian Federation contained 455 million entries
  • One labelled “Telegram” included 60 million records
  • Even the smallest, named after a malware strain, held over 16 million records

On average, each dataset held around 550 million credentials. Most followed a uniform pattern, such as, URL, username or email, and password, indicating their source as infostealer malware logs. Many also included cookies, tokens, device details, and session metadata, raising the risk of multi-factor authentication being bypassed.

Advertisment

Beyond Usernames and Passwords

This is not just about reused passwords. The presence of active session data, tokens, and browser fingerprints allows attackers to hijack accounts without ever entering a password. This enables stealthy attacks that can bypass even strong authentication measures.

The exposed credentials span popular services like Apple, Google, Facebook, Microsoft, Telegram, and various government and financial platforms. Some datasets contain entries from developer and gaming platforms as well.

Advertisment

The researchers estimate that if the credentials were printed out line by line, they would form a stack over 35 miles high.

Ever Evolving Threat Landscape

Cybernews notes that new credential dumps continue to surface every few weeks, underscoring the relentless pace at which infostealer malware is harvesting user data. Malware like Racoon, Redline, and Clipper are suspected to be behind much of the collection.

Advertisment

Worryingly, there is no known owner or origin for the exposed storage — suggesting that criminal actors are intentionally curating and assembling these datasets to industrialise credential-based attacks.

Time to Up the Digital Guardrails

For users, the options to defend against such exposures are frustratingly limited once their credentials are already out there. Even a tiny success rate for attackers can result in widespread harm at scale.

Advertisment

Experts recommend:

  • Using strong, unique passwords stored in a secure password manager
  • Enabling multi-factor authentication, ideally with hardware keys
  • Running frequent malware scans to detect infostealers
  • Monitoring dark web sources for signs of exposure
  • Locking down cloud storage and improving credential management practices

Tech platforms are already reacting. Google is encouraging users to migrate to passkeys. The FBI has warned against clicking links from unknown SMS sources, a common entry point for infostealers.

Advertisment

What we’re seeing is no longer about scattered, accidental leaks. This is curated, packaged, and monetisable intelligence. The very concept of digital identity is now under sustained threat.

The exposure of 16 billion login credentials marks a turning point in cybersecurity. It’s not just about defending systems, it’s about defending people.

 

 

breach
Subscribe to our Newsletter! Be the first to get exclusive offers and the latest news
logo

Related Articles
Read the Next Article
Latest Stories
Subscribe to our Newsletter! Be the first to get exclusive offers and the latest news

Latest Stories
Latest Stories
    Powered by


    Subscribe to our Newsletter!




    Powered by
    Select Language
    English

    Share this article

    If you liked this article share it with your friends.
    they will thank you later

    Facebook
    Twitter
    Whatsapp

    Copied!