Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Medieval preacher invoked chivalric hero as a meme in sermon

    Large study squashes anti-vaccine talking points about aluminum

    Congress moves to reject bulk of White House’s proposed NASA cuts

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Another Chinese AI model is turning heads

      July 15, 2025

      AI chatbot Grok issues apology for antisemitic posts

      July 13, 2025

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      Bitcoin (BTC) Slides From $123,000 High Ahead of US CPI Print

      July 15, 2025

      Shadowy Entity Behind Trump’s DeFi Project Revealed as Disgraced Web3 Firm

      July 15, 2025

      Satoshi-Era 80,000 BTC Whale Move Coins to CEXs as Bitcoin Hits All-Time Highs

      July 15, 2025

      XRP in Focus as Fed’s ISO 20022 Goes Live – What Traders Should Know

      July 15, 2025

      Bitcoin Skeptic Vanguard Quietly Becomes MicroStrategy’s No. 1 Shareholder

      July 15, 2025
    • Technology

      Medieval preacher invoked chivalric hero as a meme in sermon

      July 16, 2025

      Large study squashes anti-vaccine talking points about aluminum

      July 16, 2025

      Congress moves to reject bulk of White House’s proposed NASA cuts

      July 16, 2025

      Seagate’s massive, 30TB, $600 hard drives are now available for anyone to buy

      July 16, 2025

      Chinese firms rush for Nvidia chips as US prepares to lift ban

      July 16, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»No, the 16 billion credentials leak is not a new data breach
    Technology

    No, the 16 billion credentials leak is not a new data breach

    TechAiVerseBy TechAiVerseJune 20, 2025No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    No, the 16 billion credentials leak is not a new data breach
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    No, the 16 billion credentials leak is not a new data breach

    News broke today about “one of the largest data breaches in history,” sparking wide media coverage filled with warnings and fear-mongering. However, it appears to just be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential stuffing attacks.

    To be clear, this is not a new data breach, or a breach at all, and the websites involved were not recently compromised to steal these credentials.

    Instead, these stolen credentials were likely circulating for some time, if not for years. It was then collected by a cybersecurity firm, researchers, or threat actors and repackaged into a database that was exposed on the Internet.

    Cybernews, which discovered the briefly exposed datasets of compiled credentials, stated it was stored in a format commonly associated with infostealer malware, though they did not share samples

    An infostealer is malware that attempts to steal credentials, cryptocurrency wallets, and other data from an infected device. Over the years, infostealers have become a massive problem, leading to breaches worldwide.

    These types of malware impact both Windows and Macs, and when executed, will gather all the credentials it can find stored on a device and save them in what is called a “log.”

    An infostealer log is generally an archive containing numerous text files and other stolen data. The text files contain lists of credentials stolen from browsers, files, and other applications.

    Example infostealer log
    Source: BleepingComputer

    Stolen credentials are usually saved one per line in the following format:

    URL:username:password

    Sometimes, the delimiter between each component is changed to a comma, semicolon, or dash.

    For example, the following is how an infostealer will save credentials stolen from a device to a log:

    https://www.facebook.com/:jsmith@example.com:Databr3achFUd!
    https://www.bank.com/login.php:jsmith:SkyIsFa11ing#
    https://x.com/i/flow/login:jsmith@example.com:StayCalmCarryOn
    

    If someone is infected with an infostealer and has a thousand credentials saved in their browser, the infostealer will steal them all and store them in the log. These logs are then uploaded to the threat actor, where the credentials can be used for further attacks or sold on cybercrime marketplaces.

    The infostealer problem has gotten so bad and pervasive that compromised credentials have become one of the most common ways for threat actors to breach networks.

    We have a webinar next month titled “Stolen credentials: The New Front Door to Your Network” that focuses on infostealers, compromised credentials, and how organizations can protect themselves.

    This problem has also led law enforcement worldwide to actively crack down on these cybercrime operations in recent actions, such as “Operation Secure” and the disruption of LummaStealer.

    As infostealers have become so abundant and commonly used, threat actors release massive compilations for free on Telegram, Pastebin, and Discord to gain reputation among the cybercrime community or as teasers to paid offerings.

    Threat actors offering infostealer logs for free on Telegram
    Source: BleepingComputer

    To see how many passwords are given away for free, the single 1,261.4 MB file in the image above contained over 64,000 credential pairs.

    There are thousands, if not hundreds of thousands, of similarly leaked archives being shared online, resulting in billions of credentials records released for free.

    Many of these free archives were likely compiled into the massive database that was briefly exposed and seen by Cybernews.

    Similar credential collections were released in the past, such as the RockYou2024 leak, with over 9 billion records, and “Colection #1,” which contained over 22 million unique passwords.

    Despite the buzz, there’s no evidence this compilation contains new or previously unseen data

    What should you do?

    So, now that you know there was a massive leak of credentials likely stolen through infostealers, data breaches, and credential-stuffing attacks, you may be wondering what you should do.

    The most important step is to adopt and maintain good cybersecurity habits you should already be following.

    If you’re concerned that an infostealer might be present on your computer, scan your device with a trusted antivirus program before changing any passwords. Otherwise, newly entered credentials could be stolen as well.

    Once you’re confident your system is clean, focus on improving your password hygiene.

    That means using a unique, strong password for every site you use, and relying on a password manager to keep them organized and secure.

    However, even unique passwords won’t help you stay protected if you are hacked, fall for a phishing attack, or install malware.

    Therefore, it is crucial that you also use two-factor authentication (2FA) along with an authentication app, like Microsoft Authenticator, Google Authenticator, or Authy, to manage your 2FA codes. Some password managers, like Bitwarden and 1Password, also include authentication functionality, allowing you to use one application for both.

    With 2FA enabled, even if a password at a site is compromised, threat actors cannot access the account without your 2FA code.

    As a general rule, you should avoid using SMS texts to receive 2FA codes, as threat actors can conduct SIM-swapping attacks to hijack your phone number and obtain them.

    As for this leak, with this many credentials leaked, there is a chance one of the readers of this article will be listed in the compilation.

    However, don’t panic and stress about it, running around changing all your passwords. Instead, take this opportunity to improve your cybersecurity habits.

    To check if your credentials have appeared in known breaches, consider using services like Have I Been Pwned.

    And if you use the same password across multiple sites, now is the time to switch to unique ones.

    That way, leaks like this become far less dangerous to you.

    Update 6/20/25 10:08 PM EST: Article updated to clarify that this was multiple datasets found rather than a single database and to remove “mother of all breaches,” as that was to describe the other compilation discovered in 2024.


    Why IT teams are ditching manual patch management

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous Article3 Best Thermal Brush, Tested and Reviewed by WIRED (2025)
    Next Article Microsoft to remove legacy drivers from Windows Update for security boost
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Medieval preacher invoked chivalric hero as a meme in sermon

    July 16, 2025

    Large study squashes anti-vaccine talking points about aluminum

    July 16, 2025

    Congress moves to reject bulk of White House’s proposed NASA cuts

    July 16, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202528 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202522 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202520 Views
    Don't Miss
    Technology July 16, 2025

    Medieval preacher invoked chivalric hero as a meme in sermon

    Medieval preacher invoked chivalric hero as a meme in sermon Skip to content “Some are…

    Large study squashes anti-vaccine talking points about aluminum

    Congress moves to reject bulk of White House’s proposed NASA cuts

    Seagate’s massive, 30TB, $600 hard drives are now available for anyone to buy

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Medieval preacher invoked chivalric hero as a meme in sermon

    July 16, 20252 Views

    Large study squashes anti-vaccine talking points about aluminum

    July 16, 20252 Views

    Congress moves to reject bulk of White House’s proposed NASA cuts

    July 16, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.