/dq/media/media_files/2025/07/09/password-leak-2-2025-07-09-17-14-37.png)
In what is being considered one of the largest and most concerning cybersecurity exposures in recent memory, researchers found a staggering 16 billion login credentials circulating on online.
This included username, passwords, and or authenticated /session data from organizations ranging from tech titans Google and Facebook to governmental, enterprise, and even VPN services.
Initial public responses suggested no small degree of panic; however, the cyber security community worked quickly to clarify the situation: this is not a breach in the classic sense; but more of collection of stolen data from over a long stretch of time that was all placed together in one spot.
What exactly happened?
Researchers at Cybernews uncovered that these 16 billion credentials were taken from a large "Compilation of Many Breaches" (COMB)—the practice of combining personal data from multiple past breaches, and infostealer malware logs. These logs must come from infected devices, where the users have had their saved passwords, cookies, autofill data, and even authentication tokens taken.
The leak is not about being vulnerable to Google or Apple. This is more like digging up old scars, allowing them to be sewn together, and then exploited at scale.
“A breach involving 16 billion passwords is staggering, but the real takeaway isn’t just the volume,” says Srinivas Shekar, CEO & Co-founder of Pantherun Technologies. “What’s more alarming is how these credentials—many from past incidents—are still circulating and being reused. It shows how persistent and adaptive cybercriminals have become.”
“Their tactics have evolved from opportunistic hacks to systematic, long-game approaches that exploit the weakest links in our digital infrastructure,” he notes.
Why this leak is still a big deal
Even though many of the passwords in this dataset may be outdated, that doesn’t diminish its danger. According to various studies, over 65-80% of users reuse passwords across multiple services. This makes such databases highly effective for credential stuffing—a brute-force technique where attackers attempt to log into different services using the leaked credentials.
Moreover, the presence of session tokens and login URLs in these logs means attackers can sometimes bypass traditional authentication methods altogether, hijacking sessions directly if users haven’t logged out or if security configurations are weak.
/filters:format(webp)/dq/media/media_files/2025/07/09/bernard-2025-07-09-17-12-05.jpg)
"Firstly, this is not a new data breach. It’s the result of threat actors’ use of infostealer malware that has silently scraped usernames and passwords during breaches. This data has been bundled, traded, and resurfaced across underground forums. That said, it’s no less concerning.” -Bernard Montel, Technical Director and Security Strategist at Tenable.
This is especially dangerous for corporate networks and cloud platforms, where a single compromised admin login could lead to widespread intrusion.
The role of infostealers in this leak
Behind this mega-dump an almost silent threat lurks beneath: infostealer malware. Unlike ransomware, which announces its presence in no uncertain terms, infostealers work quietly in the background, recording keystrokes, scraping passwords, and phoning home to servers with a few stolen tones.
The most common way that infostealers are delivered is through phishing emails, fake browser updates, malicious ads, and cracked software. At the moment, the infostealers that distributed the connected leaked data through forums, and sold them on dark web forums and Telegram groups, were likely RedLine, Raccoon, Vidar and Lumma, likely in the week before the exposure.
/filters:format(webp)/dq/media/media_files/2025/07/09/srinivas-shekar-2025-07-09-17-13-32.jpg)
Before we wrap up, it’s worth mentioning that the problem with malware infections extends beyond the initial impacts to an infected system, as there is the longer-term impact of leaking out data which may apostate reappear years later in a new breach.
“Firstly, this is not a new data breach,” clarifies Bernard Montel, Technical Director and Security Strategist at Tenable. “It’s the result of threat actors’ use of infostealer malware that has silently scraped usernames and passwords during breaches. This data has been bundled, traded, and resurfaced across underground forums. That said, it’s no less concerning.”
Who is affected?
Though no single organisation was breached this time, the leak spans across a wide array of services, suggesting the breadth of user habits and poor hygiene. Services and platforms found in the dataset include:
- Google, Apple, Facebook (Meta)
- GitHub, LinkedIn, Instagram, X (Twitter)
- Government sites and e-filing portals
- Remote work tools (Zoom, Microsoft Teams)
- Corporate VPNs, DevOps tools, and CRM platforms
This indicates that both consumers and enterprises are at risk—especially small-to-mid-sized businesses (SMBs) that lack dedicated SOC teams and real-time breach detection systems.
“This breach is a wake-up call that legacy security models are fundamentally broken,” says Shekar. “Security infrastructure must now be lightweight, resilient in constrained environments like IoT or mobile, and ready to adapt dynamically.”
Passwords are broken—now what?
The password has long been considered the weakest link in cybersecurity. With leaks like this becoming increasingly common, the industry’s move toward passwordless authentication seems more urgent than ever.
- Passkeys—a cryptographic alternative introduced by Apple, Google, and Microsoft—are resistant to phishing and infostealing.
- Multi-Factor Authentication (MFA), especially using time-based apps (not SMS), can block over 90% of account takeovers.
- Biometrics and behavioral analytics are becoming important second layers in identity assurance.
However, adoption remains slow. A survey by Okta earlier this year found that only 27% of enterprises globally have made significant moves toward passwordless logins.
“Periodically, we see this type of database surface, demonstrating that hackers have access to our online identities,” says Montel. “Using scripts—a small program written in a language like Python or Bash—threat actors can trawl this treasure trove of information looking for patterns in passwords, but also credential reuse across multiple accounts. The latter is akin to a master key as it suggests the same combination will open multiple doors.”
“As attackers grow more sophisticated and infrastructures become more distributed, the surface area for attacks multiplies,” adds Shekar.
Implications for enterprises in india
Despite the risks being very real for India's digital economy, especially in industries including BFSI, healthcare, and e-governance, there are also substantial safety and convenience risks for employees, customers, and businesses right now. Most employees are still using single-layer authentication, and the customer portals they work with often do not enforce MFA.
Infostealer activities in India are rampant, according to CERT-In advisories, and this malware is often proliferated because of pirated merchants, fake tax-filing solution downloads, and phishing campaigns written in regional languages.
Indian enterprises must start seeing credentials no longer as end-user data, but as security assets that need lifecycle management, 24/7 monitoring, and periodic rotation.
What should organisations do now?
This incident should trigger a fundamental shift in organisational security strategies. Some immediate steps include:
- Audit employee credentials against breach databases and mandate resets where applicable.
- Deploy password managers and enforce strong, unique passwords with randomisation.
- Enable MFA across all systems, ideally via TOTP-based or hardware tokens, not SMS.
- Invest in EDR/XDR tools that can detect and isolate infostealer malware early.
- Adopt passkey authentication for all high-value internal and customer-facing services.
- Educate users on phishing, rogue browser extensions, and malicious software risks.
The scale of this leak demands more than awareness—it demands architectural overhaul.
“First, both users and organizations must accept that breaches at this scale are no longer rare—they’re the new norm,” says Shekar. “For users, the basics still matter: enable multi-factor authentication, use a password manager, and never reuse passwords across platforms.”
“But for organizations, this is the moment to re-architect. We need to move away from conventional encryption models and adopt real-time, zero-trust security frameworks that don’t rely on key exchange. Quantum-resistant encryption and decentralized models will be essential to reducing attack surfaces. Simply patching vulnerabilities isn’t enough—we need to rebuild trust into the very fabric of our systems.”
Montel adds that the breach should be a turning point in how enterprises treat identity:
“For organisations, it’s about understanding that this is a potential risk if these records correlate with over-privileged identities. Identities are the new perimeter, given that compromised identities are at the centre of nearly every successful cyberattack.” he suggests. “Organisations must adopt an identity-first approach that continuously validates permissions and access to prevent identity-based attacks before they occur.”
Final thoughts
The 16 billion password leak isn’t just a headline—it’s a warning shot. A warning against reliance on credentials, fragmented security infrastructure, and reactive models of defence.
In a world where identity is the new attack surface, proactive, dynamic, and decentralised security frameworks are no longer optional—they’re critical to survival.