A record 16 billion passwords have been exposed in a massive data breach uncovered by cybersecurity researchers working with Cybernews, according to Vilius Petkauskas.
These credentials weren’t recycled from old hacks or reposted from public breaches. They’re new, undocumented, and highly dangerous.
Petkauskas and his team confirmed they’ve spent months digging through the mess, identifying 30 different datasets, each containing tens of millions to 3.5 billion records.
Researchers link data breach to global platforms and fresh hacks
Every one of those files contains real user login credentials—email addresses, usernames, and passwords—ready to be exploited. The scale is beyond anything seen before. Petkauskas called it the largest ever confirmed dump of stolen access data.
Most of the leaked material had never been seen publicly. Only one exception exists: a 184 million-password database that had already made its rounds online. Everything else? Completely new. And not random garbage either.
The data is structured—clean rows showing the platform’s URL, followed by usernames and passwords. It’s a hacker’s dream because it can be plugged into automated attack tools without any tweaking. That’s why researchers warned that this isn’t just another leak. This is what mass account takeovers are built on.
The exposed credentials give access to major platforms like Apple, Google, Facebook, GitHub, Telegram, and even some government portals. The danger here isn’t just scale—it’s quality. These aren’t expired, irrelevant logins. The data points to live accounts, many still in use. Petkauskas and his team said the leak could lead to large-scale phishing campaigns, credential stuffing attacks, and direct account hijacks across every major tech ecosystem.
The researcher saw how the credentials were structured, stored, and bundled. The uniform formatting and lack of prior exposure suggest these weren’t collected passively. They were scraped or exfiltrated using active tools—most likely infostealer malware—and gathered into datasets optimized for sale or deployment.
Some datasets included developer portal logins, VPN accounts, and enterprise credentials, giving attackers the keys to both personal and corporate systems.
Darren Guccione, co-founder and CEO of Keeper Security, said this “GOAT passwords leak” shows how often companies unintentionally leave sensitive data out in the open. Guccione said misconfigured cloud setups are still a massive vulnerability. In some cases, credentials are dumped into cloud buckets without any access controls. “This could be just the tip of the biggest security iceberg waiting to crash into the online world,” Darren said.
Massive organizations with decentralized teams keep making the same mistakes: pushing data to shared drives, leaving logs unprotected, and using basic passwords across systems. That’s how you end up with billions of records floating around. Darren said, “The fact that the credentials in question are of high value for widely used services carries with it far-reaching implications.”
Cryptopolitan Academy: Want to grow your money in 2025? Learn how to do it with DeFi in our upcoming webclass. Save Your Spot
This articles is written by : Nermeen Nabil Khear Abdelmalak
All rights reserved to : USAGOLDMIES . www.usagoldmines.com
You can Enjoy surfing our website categories and read more content in many fields you may like .
Why USAGoldMines ?
USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.