Massive 16 Billion Credential Leak Exposes Major Services and Government Sites

Massive Data Leak Exposes 16 Billion Login Credentials

A staggering 16 billion login credentials—possibly the largest cache of stolen personal data ever uncovered—have been exposed in a previously unreported breach. The haul includes usernames and passwords from major platforms like Facebook, Google, Telegram, and GitHub, as well as corporate and government logins. Researchers at *Cybernews*, who first spotted the leak, say it’s a mix of old and new data, scraped from malware logs, recycled breaches, and credential-stuffing databases.

“This isn’t just a leak—it’s a roadmap for attacks,” one researcher noted. With this many records floating around, hackers could easily hijack accounts, steal identities, or craft convincing phishing scams. Meta, Google, and GitHub haven’t commented yet, but the damage might already be done.

How Did This Happen?

The data likely came from *infostealers*, a type of malware that doesn’t just record keystrokes but vacuums up saved passwords, autofill details, even browser cookies. Cybernews found 30 separate datasets, some with over 3.5 billion entries each. Most were briefly left exposed in unsecured cloud storage before being pulled down—but not before someone grabbed them.

Who’s behind it? No one knows. And that’s the problem. These leaks keep happening, and the fallout lands on regular people. Smaller websites and users with weak security habits will probably feel it the worst.

Why This Keeps Repeating

Remember the Coinbase breach last December? Hackers stole data from 69,000 users, then demanded $20 million in Bitcoin to keep quiet. Coinbase refused, offering a bounty instead. But not every company reacts that way—or even knows they’ve been hit.

“A lot of sites don’t force password resets after a breach,” a security expert told *Decrypt* anonymously. “And let’s be honest—people reuse passwords. Maybe with slight changes, but hackers know the tricks.”

What Actually Helps?

The good news? If you use two-factor authentication (2FA), you’re probably safe. Apps like Google Authenticator or Microsoft Authenticator add that extra step—a code, a fingerprint—that stops most attacks cold.

Then there’s *passkeys*, the newer, passwordless login method. Instead of remembering credentials, your device uses a cryptographic key tied only to the site you’re accessing. Big names like Apple and Amazon are pushing it because it’s harder to phish.

But here’s the thing: most people still rely on passwords. And until that changes, leaks like this will keep causing chaos. Maybe it’s time to make the switch—before the next breach hits.

Hot Topics

Related Articles