Massive Credential Leak Reveals 149 Million Accounts

Summary: A public‑cloud database containing over 149 million unique username‑password pairs was found exposed without any password protection or encryption. The dump includes credentials for major consumer services, educational institutions, and government domains, turning the storage into a searchable repository for cybercriminals. Immediate action is required to protect affected accounts.

Scope of the Breach

  • Gmail: 48 million accounts
  • Facebook: 17 million accounts
  • Instagram: 6.5 million accounts
  • Yahoo: 4 million accounts
  • Netflix: 3.4 million accounts
  • Outlook: 1.5 million accounts
  • Educational (.edu) domains: 1.4 million accounts
  • iCloud: 900 thousand accounts
  • TikTok: 780 thousand accounts
  • Binance (crypto exchange): 420 thousand accounts
  • OnlyFans: 100 thousand accounts
  • Various .gov domains: thousands of government accounts

Likely Source of the Data

Infostealer Malware

The architecture of the exposed database—indexed, searchable via a standard web browser, and continuously growing—matches the back‑end typically used by operators of infostealer malware. These malicious programs log keystrokes, capture screenshots, and exfiltrate saved passwords to command‑and‑control servers, feeding large‑scale credential dumps.

Response from Google

“We are aware of reports regarding a dataset containing a wide range of credentials, including some from Gmail. This data represents a compilation of ‘infostealer’ logs—credentials harvested from personal devices by third-party malware—that have been aggregated over time. We continuously monitor for this type of external activity and have automated protections in place that lock accounts and force password resets when we identify exposed credentials.” — a Google spokesperson

Recommended Response

Immediate Actions for Users

  • Change passwords on all affected services immediately.
  • Enable two‑factor authentication (2FA) wherever possible.
  • Use a password manager to generate and store unique, complex passwords.
  • Monitor account activity for suspicious logins and report any anomalies.
  • If the same password was reused across multiple sites, assume it is compromised and rotate it everywhere.

Industry Implications

Cloud Security Lessons

The incident underscores the risk of misconfigured cloud storage buckets that remain publicly accessible. Regular audits of cloud assets and strict access controls are essential to prevent accidental exposure of sensitive data.

Future Prevention Strategies

Enterprises should implement continuous monitoring for unauthorized data exposure and adopt automated tools that detect compromised credentials. Expanding “have‑I‑been‑pwned” style alerts can help users become aware of leaks sooner, reducing the impact of large‑scale credential dumps.