A staggering breach of digital privacy, discovering 30 massive datasets containing over 16 billion login credentials from major platforms including Apple, Facebook, Google, GitHub, Telegram, and various government services.
The Cybernews research team’s investigation reveals an unprecedented scale of exposed personal data that poses significant risks for identity theft, account takeovers, and targeted phishing attacks.
The cybersecurity investigation, conducted throughout 2025, revealed datasets ranging from tens of millions to over 3.5 billion records each.
The largest dataset, believed to target Portuguese-speaking populations, contained 3.5 billion records, while the average dataset housed approximately 550 million credentials.
Notably, only one of these massive exposures had been previously reported – a “mysterious database” with 184 million records covered by Wired magazine in late May, which barely scratches the surface of the researchers’ findings.
The exposed datasets were temporarily accessible through unsecured Elasticsearch or object storage instances, allowing researchers to discover them before the data controllers secured or moved the information.
According to the research team, new massive datasets continue to emerge every few weeks, highlighting the pervasive nature of infostealer malware operations.
The structured nature of the data suggests most originated from stealer malware, credential stuffing operations, and repackaged previous breaches.
The discovered credentials follow a consistent structure of URL, login details, and passwords – a format typical of modern infostealer malware.
The datasets encompass virtually every major online service imaginable, creating what researchers describe as “a blueprint for mass exploitation.”
The inclusion of both historical and recent infostealer logs, complete with tokens, cookies, and metadata, makes this exposure particularly dangerous for organizations lacking robust multi-factor authentication or proper credential hygiene practices.
Some datasets were named generically as “logins” or “credentials,” while others provided hints about their origins.
One dataset containing over 455 million records appeared to originate from the Russian Federation, while another with 60 million records was specifically named after Telegram.
The ownership of these datasets remains unclear, though researchers suspect a combination of security researchers monitoring breaches and cybercriminals aggregating data for large-scale attacks.
The massive scale of this exposure enables cybercriminals to conduct sophisticated attacks including phishing campaigns, account takeovers, ransomware intrusions, and business email compromise operations.
Even with success rates below one percent, attackers could potentially compromise millions of accounts and trick users into revealing additional sensitive information, including financial details.
Since the dataset ownership remains unclear, users have limited recourse for immediate protection. However, cybersecurity experts emphasize the critical importance of basic digital hygiene practices.
Users should implement strong, frequently changed passwords across all accounts and enable multi-factor authentication wherever possible.
Additionally, individuals should regularly scan their systems for infostealer malware to prevent future credential theft.
This discovery joins a growing list of massive data breaches, including the “Mother of All Breaches” with 26 billion records discovered earlier in 2024, demonstrating the escalating scale of cybersecurity threats facing internet users worldwide.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…