A staggering 16 billion login credentials have been exposed online in what is shaping up to be one of the largest and most concerning data leaks to date. The discovery was made by a cybersecurity research team that has been tracking suspicious activity and open databases across the web since early 2025. The exposed datasets contain usernames, passwords, session tokens, cookies, and other sensitive authentication information gathered through infostealer malware, credential stuffing, and reprocessed leaks from previous breaches.
These datasets, discovered across unsecured Elasticsearch and cloud storage instances, were briefly visible online. Although the exposure windows were short, they were long enough for researchers to access and document them, though identifying who controlled or uploaded the data proved impossible. The volume of records is unprecedented—30 separate datasets were found, each containing millions to billions of entries, with the largest holding over 3.5 billion records. Even the smallest dataset exceeded 16 million records, showcasing the immense scale of this information breach.
While some attention was given earlier this year to a database containing 184 million records, that number now appears modest in comparison to the dozens of other uncovered datasets. Researchers warn that new collections of this magnitude are appearing regularly, a trend that reflects the escalating deployment of infostealer malware. These tools silently extract login information and browsing data from infected devices, which can then be bundled and sold or dumped on underground forums.
The danger of this leak lies not only in its volume but in the nature of the data itself. Many of the credentials are linked to widely used platforms such as Apple, Google, Facebook, Telegram, GitHub, Zoom, and various government services. The inclusion of recent credentials with session tokens and cookies makes these datasets a potent weapon in the hands of cybercriminals. They can bypass two-factor authentication, launch phishing campaigns, take over user accounts, and compromise entire organizations.
Notably, the leaked information followed a typical format, usually consisting of a URL followed by a username and password. This consistency suggests the data was gathered using advanced infostealers capable of extracting structured login details from users' browsers and applications. Although some services may not have directly suffered a breach, their login portals were included in the logs, indicating credentials were stolen from end-user devices and not from the platforms themselves.
The average dataset contained around 550 million records. Some were vaguely titled with names like “logins” or “credentials,” offering little insight into their source, while others suggested geographical links or targeted services. One 455-million-record dataset was labeled to suggest Russian Federation origins, while another 60-million-record leak was connected to the messaging app Telegram. The largest dataset appeared to be focused on Portuguese-speaking regions, indicating global spread and targeting.
The exposure of such vast volumes of credentials is a goldmine for cybercriminals, especially in large-scale phishing schemes, business email compromise attacks, and identity theft. A success rate of even a fraction of a percent could lead to the compromise of millions of accounts. Many of these attacks are automated, requiring little human interaction beyond launching scripts and tools designed to exploit login vulnerabilities.
Adding to the concern is the difficulty users face in defending themselves. Since the ownership and origin of these datasets remain unclear, individuals have limited options to take direct action. However, cybersecurity experts strongly recommend practicing basic digital hygiene. Users should regularly change their passwords, use password managers to create strong, unique credentials, enable two-factor authentication wherever possible, and scan their systems for malware.
Some of the records include cookies and session tokens, making it possible for attackers to bypass security protections and gain direct access to accounts without knowing the password. This increases the urgency for organizations to implement stricter credential hygiene policies and review their authentication systems for vulnerabilities.
This 16-billion-record leak also indicates a shift in the way cybercriminals are operating. Experts believe that centralized dumps of data may now be replacing older models of selling stolen information via messaging groups and forums. The datasets' structure and naming conventions suggest that attackers are aggregating multiple sources and storing them in organized repositories for future exploitation.
As cyber threats continue to evolve, this latest breach serves as a critical reminder of the scale and sophistication of modern data theft. While not every individual listed in the datasets may face immediate risk, the overall impact on global digital security is profound. The leak highlights the urgent need for individuals, businesses, and governments to bolster cybersecurity defenses and adapt to the growing threat of data exploitation at scale.









