Cybernews has reported one of the largest credential breaches in digital history, revealing over 16 billion login credentials leaked online. These records were discovered across 30 datasets, many originating from infostealer malware. The breach includes usernames, passwords, tokens, cookies, and potentially session data, impacting access to a wide array of services including Facebook, Google, Apple, GitHub, Telegram, and government portals.
The exposed datasets appear to have been harvested through infostealer malware, a type of malicious software designed to exfiltrate login credentials, cookies, and session tokens from infected systems. These logs are later aggregated and stored in various locations, including:
Cybernews did not find evidence of targeted breaches on Apple, Google, or Facebook, but credentials associated with login URLs to these services were found in the infostealer logs.
The breach involved a mix of new and previously unreported data, including:
Researchers reported:
These records provide sufficient access for account takeovers, phishing campaigns, BEC (Business Email Compromise), and ransomware attacks.
The root cause of this mass exposure stems from a combination of:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy