Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Data Breach

A cybersecurity researcher just discovered a treasure trove of leaked accounts: More than 184 million logins were readily available online, with Google, Meta, and Apple users affected

Cyberinchief by Cyberinchief
November 19, 2025
Reading Time: 3 mins read
0
A cybersecurity researcher just discovered a treasure trove of leaked accounts: More than 184 million logins were readily available online, with Google, Meta, and Apple users affected



A cybersecurity researcher has uncovered a mysterious, publicly accessible database containing millions of login credentials from services including Facebook, Apple, and Microsoft.

The publicly exposed database was not password-protected or encrypted, and contained more than 184 million unique logins and passwords, adding up to 47.42GB of raw credential data.

The data included emails, usernames, passwords, and the URL links to the login or authorization for the accounts.

RELATED POSTS

UK Hospital Asks Court to Stymie Ransomware Data Leak

These five countries recorded the most third-party data breaches last year

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

“The database contained login and password credentials for a wide range of services, applications, and accounts, including email providers, Microsoft products, Facebook, Instagram, Snapchat, Roblox, and many more,” said cybersecurity researcher Jeremiah Fowler.

“I also saw credentials for bank and financial accounts, health platforms, and government portals from numerous countries that could put exposed individuals at significant risk.”

The origin of the database is something of a mystery. The IP address linked the database to two domain names. One was parked and unavailable while the other was apparently unregistered and available to purchase.

Fowler contacted the hosting provider, which took the database down, but didn’t reveal the customer’s identity. One hint may be the fact that, while most text was in English, the files were listed as ‘senha’ – Portuguese for password.

Sign up today and you will receive a free copy of our Future Focus 2025 report – the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives

He also messaged multiple email addresses listed in the database and was able to validate several records, with the victims confirming that they contained their accurate and valid passwords.

Buy JNews
ADVERTISEMENT

It’s not known how long the database was exposed. However, Fowler said there are clear signs that the exposed data has been harvested by some type of infostealer malware.

“It is not known exactly how this specific data was collected, but cybercriminals use a range of methods to deploy infostealers,” said Fowler.

“For instance, they often conceal malware within phishing emails, malicious websites, or cracked software. Once the infostealer is active, the stolen data is often either circulated on dark web marketplaces and Telegram channels or used directly to commit fraud, attempt identity theft, or launch further cyber attacks.”

Fowler advises users to change passwords and to delete sensitive documents, such as tax forms, medical records, contracts, and passwords from their emails. They should only share data like this through encrypted cloud storage systems, rather than email, he said.

“Databases like this are regularly bought, sold, and repackaged on dark web forums like BreachForums. Massive credential dumps are part of an ongoing black market where breached data is commoditized and often aggregated from multiple incidents over time,” commented Cory Michal, chief security officer at AppOmni.

“What’s new isn’t the existence of the data, but the scale, the recency of some credentials, and the targeting of identity providers that are widely used to access SaaS and cloud services — making this breach especially potent for enabling downstream account takeovers.”

MORE FROM ITPRO



Source link

Tags: accountsaffectedApplecybersecuritydiscoveredGoogleleakedLoginsMETAmillionOnlinereadilyresearchertreasuretroveUsers
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

UK Hospital Asks Court to Stymie Ransomware Data Leak
Data Breach

UK Hospital Asks Court to Stymie Ransomware Data Leak

December 8, 2025
These five countries recorded the most third-party data breaches last year
Data Breach

These five countries recorded the most third-party data breaches last year

December 8, 2025
LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net
Data Breach

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

December 7, 2025
Rethinking the CIO-CISO Dynamic in the Age of AI
Data Breach

Rethinking the CIO-CISO Dynamic in the Age of AI

December 6, 2025
NHS supplier hit with £3m fine for security failings that led to attack
Data Breach

NHS supplier hit with £3m fine for security failings that led to attack

December 6, 2025
HHS Outlines AI Road Map Amid Major Department Overhaul
Data Breach

HHS Outlines AI Road Map Amid Major Department Overhaul

December 5, 2025
Next Post
Telegram Scam Cyber Crime Process Tamil | Telegram Scam Online Money Recovery

Telegram Scam Cyber Crime Process Tamil | Telegram Scam Online Money Recovery

تعلم الامن السيبراني من الصفر – أفضل كورسات وشهادات مجانية 2025

تعلم الامن السيبراني من الصفر - أفضل كورسات وشهادات مجانية 2025

Recommended Stories

Hack halts Dutch broadcaster, forcing radio hosts back to LPs

Hack halts Dutch broadcaster, forcing radio hosts back to LPs

November 10, 2025
New Android malware mimics human typing to evade detection, steal money

New Android malware mimics human typing to evade detection, steal money

October 28, 2025
How Jamf Pro + Parallels Desktop Solve Enterprise Windows App Delivery on Mac

How Jamf Pro + Parallels Desktop Solve Enterprise Windows App Delivery on Mac

November 26, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested