Cybersecurity researchers uncover largest credential collection in history, affecting users of Apple, Google, Facebook and government services worldwide. Around 16 billion passwords leaked in this largest ever breach.
Cybersecurity researchers have discovered what they’re calling the largest compilation of stolen login credentials in history, with a staggering 16 billion usernames and passwords exposed across 30 separate databases.
The massive collection, uncovered by cybersecurity firm Cybernews during an ongoing investigation that began earlier this year, contains credentials for virtually every major online service including Apple, Google, Facebook, GitHub, Telegram, and various government platforms. This is similar to Turkish Citizenship data breach but the difference is that it doesn’t have more personal details like Date of Birth etc.
“This is not just a leak – it’s a blueprint for mass exploitation,” said researchers from Cybernews, who discovered the exposed databases. “These aren’t just old breaches being recycled. This is fresh, weaponisable intelligence at scale.”
Contrary to initial reports suggesting a single massive hack, cybersecurity experts have clarified that this represents a compilation of stolen data gathered over years through various criminal methods.
“This is not just a leak – it’s a blueprint for mass exploitation,” said researchers from Cybernews, who discovered the exposed databases. “These aren’t just old breaches being recycled. This is fresh, weaponisable intelligence at scale.”
The data primarily originates from:
Lawrence Abrams, a cybersecurity expert from BleepingComputer, emphasised that “this is not a new data breach, or a breach at all, and the websites involved were not recently compromised to steal these credentials.”
The 30 databases range dramatically in size, from 16 million records in the smallest collection to over 3.5 billion in the largest. On average, each database contained approximately 550 million credentials.
The credentials follow a standard format used by infostealer malware: URL:username:password
Some notable patterns emerged:
The databases were only accessible for a short period through unsecured Elasticsearch instances and misconfigured cloud storage systems. Researchers discovered them before they could determine who controlled the vast collections.
“The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data,” the Cybernews team reported.
However, the brief exposure doesn’t diminish the threat. Cybercriminals have been circulating similar credential collections on platforms like Telegram and Discord for years, often sharing massive archives for free to build reputation in criminal communities.
The discovery highlights the escalating threat from infostealer malware – malicious software that steals saved passwords, cryptocurrency wallets, and other sensitive data from infected devices.
These programs have become so prevalent that law enforcement agencies worldwide have launched coordinated efforts to combat them, including “Operation Secure” and recent actions against the LummaStealer malware family.
When executed on a victim’s computer, infostealers create “logs” containing all stored credentials from browsers and applications. A single infected device with thousands of saved passwords can yield massive amounts of data for criminals.
This compilation of 16 billion leaked passwords surpasses previous major credential exposures:
The current discovery represents the largest pure credential compilation documented to date.
Cybersecurity experts recommend immediate action:
Immediate Steps:
Ongoing Protection:
Major technology companies have renewed calls for users to adopt stronger security practices. Google has been urging users to replace passwords with more secure passkey technology, while security firms emphasise the importance of multi-factor authentication.
“The fact that the credentials in question are of high value for widely used services carries with it far-reaching implications,” said Darren Guccione, CEO of Keeper Security. “It is more important than ever for consumers to invest in password management solutions and dark web monitoring tools.”
The discovery underscores a troubling trend in cybercrime: the commoditisation of stolen credentials. As infostealers become more sophisticated and widely available, massive credential compilations are becoming increasingly common.
Cyber security researchers noted that new large datasets emerge every few weeks, suggesting the problem is accelerating rather than diminishing.
For organisations, the incident highlights the critical importance of implementing zero-trust security models, privileged access controls, and comprehensive employee training on credential hygiene.
As the investigation continues, cybersecurity researchers warn that this compilation likely represents just a fraction of stolen credentials circulating in criminal networks. The structured nature and recent timestamps on much of the data make it particularly dangerous for both individuals and organisations lacking robust security measures.
The incident serves as a stark reminder that in today’s digital landscape, credential compromise is not a matter of if, but when. The most effective defence lies in assuming credentials may already be compromised and implementing security measures that remain effective even under such circumstances.
For the latest cybersecurity updates and breach notifications, users are encouraged to monitor reputable security websites and enable breach notification services.