No, this wasn’t a data breach and hackers weren’t involved, at least not in the way that you might think. They didn’t break into Google or Meta’s systems or steal your data from the inside. Instead, this new data leak involved a massive collection of stolen passwords accumulated by info-stealing malware.

According to a new report from ExpressVPN, cybersecurity researcher Jeremiah Fowler recently discovered an exposed database online that contained approximately 149,404,754 unique logins and passwords across 96GB of raw data. These stolen credentials also came with links that point back to which service or platform they’re used to access.

With all of this stolen data in hand, other cybercriminals could try and use it to access victims’ accounts. Worse still, if a victim reused the same password across multiple accounts, the fallout from this leak could be even worse since hackers will likely try those login details across multiple sites and services, likely through automation.

You may like

Here’s everything you need to know about this major data leak including which services had the most stolen credentials along with some tips and tricks to help you stay safe in the aftermath.

info-stealing malware is designed to do exactly what its name implies: steal info. Whether that be by recording your keystrokes or stealing your passwords and personal data outright, all of this information is then repackaged and sent back to the hackers that deployed this malicious software in the first place.

As Fowler points out in his report, all of that stolen data has to be stored somewhere and just like businesses do with their documents, hackers have also turned to the cloud to store massive amounts of data. The problem though is that when a company leaves a database open online, they can be held accountable by the government and regulators. When a hacker does so, other cybercriminals will be quick to swoop in and use that stolen data to launch their own phishing attacks and other campaigns.

When Fowler discovered the exposed database filled with stolen credentials, he tried to figure out who owned it but there was no info available. As such, he did the next best thing by directly contacting the hosting provider through an online form to report abuse. After almost a month and multiple attempts to contact them, the database was finally taken offline after its hosting was suspended.

You may like

Likewise, it’s unclear as to how long the database was left exposed online without a password before Fowler discovered it. Surprisingly though, the number of stolen records contained within the database did increase during the period he had access to it before it was taken down.

strong, complex passwords on your own, I recommend using one of the best password managers instead. Not only can they generate better passwords than you’d be able to come up with on your own but they also securely store and let you easily access them later.

And if you want to say goodbye to passwords for good, you might want to consider switching to passkeys instead (when possible) as they provide a more secure way to log into and access your accounts.

The best antivirus software can help stop info-stealing malware from infecting your devices but you also need to be careful where you click and avoid opening any attachments in emails, text messages and on social media.

Since some attacks can slip through the cracks, investing in one of the best identity theft protection services is a worthwhile investment too. These services often come with an antivirus built-in and they can help you get your identity back if it’s ever stolen. At the same time, their experts and the included identity theft insurance can be used to recover funds lost to fraud or scams.

One last thing I always recommend — just like with the apps on your phone — is to close any online accounts you haven’t used in a while. The fewer accounts you have, the less likely they can be hacked and this means that any sensitive data they contain can’t be exposed in a data breach.

We might learn more about this database filled with stolen credentials and if so, I’ll update this article with any new information. Even if we don’t though, a major security incident like this one should be a wake up call for all of us when it comes to our passwords and making sure we use a unique one for each of our online accounts.

Google News

Follow Tom’s Guide on Google News and add us as a preferred source to get our up-to-date news, analysis, and reviews in your feeds.