CyberMindr Featured on Gartner Report - Read More

The Largest Password Leak in History: 16 Billion Credentials Exposed

malware Image

On June 19, 2025, cybersecurity researchers confirmed what is now considered the largest credential leak on record. Approximately 16 billion unique login credentials, including usernames and passwords associated with major platforms such as Google, Microsoft, GitHub, Facebook, and Telegram were discovered in 30 aggregated datasets circulating on underground forums and dark web marketplaces.

Key Findings:

  • Total Records Leaked - ~16 billion unique login credentials
  • Data Format - URLs, usernames, and passwords, stored in plaintext or hashed formats
  • Source of Compromise - Believed to have been harvested via infostealer malware, with additional exposure potentially caused by misconfigured cloud storage
  • Targeted Services - Consumer platforms, developer tools, VPN providers, and government portals
  • Novelty - The majority of these credential sets have not previously been reported, indicating that most of the data uncovered is newly exposed, rather than being recycled from older breaches

The breach was uncovered by researchers at Cybernews, who began analyzing the data earlier this year. Each dataset contained anywhere from tens of millions to over 3.5 billion records. The exposed credentials span a wide range of services, including consumer platforms, developer tools ( like GitHub and DevOps systems), enterprise VPNs, and government portals.

Unlike a typical breach from a single source, this data is believed to have been harvested through infostealer malware and misconfigured cloud environments, making it a broad and decentralized compromise.

This disclosure follows a separate report from May that identified 184 million compromised credentials. The scale and scope of the latest findings represent a seismic escalation in global cybersecurity risk, with widespread implications across virtually every major online service and user group.

Researchers have warned that the scale and specificity of the data make it highly actionable for malicious actors. In their words, this is not merely a leak, but a “blueprint for mass exploitation.”

Also read: The Race Against Exploitation: Average Time-to-Exploit in 2025

Risk Implications

1. Widespread Credential Reuse - Users often reuse passwords across multiple services. Even a small percentage of valid credentials from this dataset can result in access to email, internal business systems, or financial platforms.

2. Credential Stuffing at Scale - The datasets are structured in a format easily usable by automated tools. 16 billion records can be fed into automated tools to attempt logins across banking portals, enterprise tools, and cloud services, putting individuals and organizations at immediate risk.

3. Dark Web Monetization - These datasets are already being sold or traded online. With credential prices often under $10, this lowers the barrier for even low-skilled threat actors. Given the inclusion of credentials tied to developer tools and cloud service accounts, the leak may facilitate unauthorized access to infrastructure, code repositories, and CI/CD systems.

4. Exploitation Without Breach - Unlike traditional breaches that require access to systems, credential leaks eliminate the need for complex intrusion tactics. With working login information, an attacker can bypass several layers of traditional perimeter security. No need to hack, just log in.

According to Darren Guccione, CEO of Keeper Security, “The credentials in question are tied to widely used services, which introduces long-term risk. This incident reinforces the need for organizations to implement structured access control, proactive monitoring, and employee cybersecurity training.”

Recommended Actions

Organizations and users are advised to take immediate steps to mitigate the risk of unauthorized access resulting from this exposure.

For Individuals:

  • Reset passwords for all critical services, especially those reused across accounts
  • Use a password manager to generate and store strong, unique credentials
  • Enable Multi-Factor Authentication (MFA) on all supported services
  • Monitor personal accounts with dark web breach monitoring tools

For Organizations:

  • Conduct internal audits to identify reused credentials or weak password practices
  • Implement or enforce MFA policies across all business-critical applications
  • Use privileged access management (PAM) to secure high-risk accounts
  • Adopt a Zero Trust security model to limit lateral movement in the event of compromise
  • Use a CTEM platform like CyberMindr to see exactly where you are exposed.
  • Monitor employee credentials for exposure using enterprise-grade dark web monitoring services

Stay Informed. Stay Secure.

This leak is a strong reminder that basic security measures are not enough. Everyone needs to step up their protection against cyber risks. Staying safe online means being alert, using extra layers of security like multi-factor authentication, and having a recovery plan in case something goes wrong.

CyberMindr is not just another vulnerability scanning tool. It is your digital risk radar, showing you exactly which of your assets are being discussed on dark web forums. Find out whether your credentials and assets are exposed and the steps to fix them, before it’s too late.

Follow CyberMindr for real-time security updates, in-depth vulnerability analysis, and actionable insights on staying protected in an increasingly hostile digital landscape.