16 Billion Passwords Leaked from Major Tech Platforms, Including Apple and Google

Security researchers have uncovered one of the largest data breaches in history, involving 16 billion login credentials across 30 distinct datasets.

This leak—primarily sourced from infostealer malware—exposes credentials for major platforms including Apple, Facebook, Google, GitHub, Telegram, and government services.

The data is fresh and highly structured, differing from recycled breaches, and creates a “blueprint for mass exploitation,” enabling phishing, identity theft, and account takeovers.

Technical Breakdown of the Breach

Researchers at Cybernews identified 30 datasets exposed via unsecured Elasticsearch instances and cloud storage since January 2025.

Key characteristics include:

Dataset FeatureDetails
Total Records16 billion
Dataset Size RangeTens of millions to 3.5 billion records per dataset
Data FreshnessNewly harvested (not recycled from past breaches)
Primary SourceInfostealer malware (e.g., AgentTesla, Lumma, Vidar)
StructureURL + username/email + password format
Notable Datasets3.5B records (Portuguese-speaking), 455M (Russian-linked), 60M (Telegram)

Only one dataset (184 million records) had been previously reported; the remaining 29 were newly discovered.

The data’s recency and organization make it “weaponizable intelligence at scale,” with tokens and metadata amplifying risks for organizations lacking multi-factor authentication

Leaked from 320 million computers, but not a new one!

Regarding this report, Alon Gal, CTO at Hudson Rock, talks with Cyber Press that an average infected computer has around 50 sets of credentials.

Given that there are 16 billion credentials, this would suggest that 320 million computers have been infected by infostealers. However, this claim is simply not true, regardless of how one might interpret the numbers.

“The leak is likely the result of a combination of legacy Infostealer credentials, data from older database leaks, and fabricated entries, similar to the ALIEN TXTBASE leak. For instance, the leaked information could include actual lines with slight variations in passwords or logins that can be used for brute-force attacks,” he added.

Some datasets were named generically as “logins” or “credentials,” while others bore specific geographical or service-related identifiers, including one with over 455 million records linked to Russian Federation origins and another containing 60 million Telegram-related credentials.

Global Implications and Mitigation

This breach fuels unprecedented cyber risks:

  • Credential stuffing: Attackers use leaked credentials to hijack accounts across services.
  • Phishing escalation: AI tools (e.g., deepfakes) leverage stolen data for targeted scams.
  • Ransomware pathways: 54% of ransomware victims had credentials in infostealer logs.

Critical steps for protection:

  1. Immediate password reset for high-value accounts (email, banking, social media).
  2. Adopt passkeys or password managers to generate unique credentials.
  3. Enable multi-factor authentication universally to block unauthorized access.

The scale of this breach—equivalent to two credentials per person alive—underscores the critical need for enhanced credential hygiene and corporate security overhauls.

As infostealer malware surges (tripling in 2023–2024), proactive defense is non-negotiable.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here