Change your Google password now, 16B login records were recently exposed

4 months ago 3

Data breaches aren't all the uncommon. We've already reported on three within the year, including Coinbase in May, Grubhub in February, and DeepSeek in late January.

Although those leaks, or rather, all leaks, are serious in nature, none compare to what security researchers have just uncovered.

A smartphone with a padlock in front of it

Related

Take back control: A quick guide to data breach prevention

It's always a good idea to be aware of the latest data breaches

According to a new report from CyberNews, it has discovered a staggering collection of 30 exposed databases containing anywhere between tens of millions to over 3.5 billion records each. These were left exposed on the internet.

In total, those 30 exposed databases contain roughly "16 billion records," reads the report. Said records include accounts from major platforms like Google, Apple, Telegram, and more.

The report adds that only one of the exposed sets had been reported publicly in the past, and that included 184 million records. That, however, "barely scratches" the top 20 of what CyberNews uncovered.

For what it's worth, as of February 2025, there were over 5.56 billion internet users worldwide. Considering the compiled leak contains 16 billion records, it's safe to say that many internet users likely have multiple exposed accounts. That is also precisely why the actual scope and count of potentially impacted accounts remains unclear.

A graphic highlighting the top 20 leaked datasets and the number of records they contain.

Source: CyberNews

This is not just a leak – it’s a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing.

Most of the exposed datasets are a compilation of information from stealer malware, credential-stuffing sets, and repackaged leaks — this isn't a singular leak from one compromised source.

Additionally, most of the datasets list the exposed data in a clear format: a URL, login details, and a password. This is precisely how modern 'infostealers' collect data. Access to such data serves as prime fuel for not just phishing campaigns, but also account takeovers, ransomware intrusions, and business email compromise (BEC) attacks.

The report adds that ownership of the leaked data remains unclear. Some of it may belong to security researchers compiling data for monitoring, while some might be owned by threat actors and cybercriminals.

For users, the most suitable action in such situations is to ensure that they immediately change their password. Additionally, it is prudent to use 2FA authentication wherever possible to add an additional layer of security, or employ newer measures like passkeys in favor of traditional passwords.

A whimsical illustration of a phone with asterisks in a hilly area.

Related

World Password Week 2025: AP's expert tips to stay safe online

The words we trust — and the risks we forget — in our online lives

Read Entire Article