In what cybersecurity specialists are calling the most extensive breach of its kind, around 16 billion login credentials have been exposed online, affecting user accounts across major tech platforms like Apple, Facebook, Google, GitHub, Telegram, and several government services.
The breach, first identified by researchers at Cybernews earlier this year, has now been confirmed to contain a massive compilation of previously unreleased data. Lead investigator Vilius Petkauskas revealed that the leak includes at least 30 different data sets, each containing tens of millions to over 3.5 billion records — totaling an unprecedented 16 billion stolen credentials.
Read more: Massive Global Data Breach Puts Millions at Risk, Pakistan on High Alert
Researchers warned that the breach goes beyond being just a leak, describing it as a “blueprint for mass exploitation.” Unlike older, recycled data breaches, this trove reportedly includes new, actionable data that cybercriminals can exploit at scale.
The compromised information consists of email addresses, usernames, and passwords, formatted in a way that makes it easy for malicious actors to conduct phishing attacks, steal identities, and seize control of accounts. Alarmingly, many of the credentials are still linked to active accounts on social media platforms, VPNs, development tools, and official government websites.
Rising Alarm Across the Industry
Password security firm Keeper Security responded to the breach by emphasizing the urgent need for individuals and organizations to adopt more secure login systems. “This scale of exposure poses a significant risk to global cybersecurity,” the company stated, highlighting the risk to users’ digital lives.
The FBI has also previously cautioned the public against clicking suspicious links in messages and advised shifting to more secure login methods like passkeys. Google has echoed similar sentiments, encouraging users to move away from relying solely on passwords.
Unmatched in Scope
This breach significantly overshadows previous incidents, such as the 184 million passwords leak reported just weeks earlier. Experts believe the vast data dump is the result of coordinated efforts using various types of infostealers — malicious programs that extract login details from infected devices.
Unlike older data dumps, this one is said to be structured in a highly usable format, listing each credential set with its origin website, followed by the associated username and password — ideal for use in automated cyberattacks.
Protective Measures for Users
Cybersecurity professionals are urging users to act immediately by:
- Changing passwords for all online accounts, especially if reused across platforms.
- Enabling two-factor authentication (2FA) for added protection.
- Using password managers to generate and store complex, unique passwords.
- Monitoring accounts for unusual activities like unauthorized logins or password reset requests.
Both individuals and businesses are also advised to verify whether their data has been leaked using trusted resources such as Have I Been Pwned or Cybernews’ Leaked Credential Checker.
As cyber threats grow increasingly sophisticated, experts stress that a proactive and informed approach is essential.
“This isn’t only about protecting personal privacy — it’s about defending entire digital systems,” concluded Petkauskas. “The risk is real, the information is active, and immediate action is critical.”