Back Country Bulletin
Back Country Bulletin
News from the Back Country
Get it on the Apple StoreGet it on the Google Play Store
Visit HayVisit BalranaldVisit Outback NSWYour local MemberEat, Drink, StayEmergency Contacts
Back Country Bulletin

Passwords leaked - Billions of logins for Apple, Google, Facebook, Telegram, and more found exposed online

Back Country Bulletin

Krista Schade

20 June 2025, 5:44 AM

Passwords leaked - Billions of logins for Apple, Google, Facebook, Telegram, and more found exposed online

New research has revealed a staggering 16 billion passwords have been hacked.


Researchers at Cybernews have uncovered a colossal cache of exposed datasets, each containing millions to billions of records, painting a grim picture of the pervasive threat of information-stealing malware.

The likely culprits behind this digital deluge are infostealers, insidious software designed to silently siphon sensitive data from infected devices.

These malware variants are adept at extracting credentials from web browsers, email clients, messaging apps, and even cryptocurrency wallets, feeding this stolen information directly to cybercriminals.


"This isn't just old breach data being recycled," warn the researchers.

"This is fresh, weaponisable intelligence at scale."



The sheer volume of this "fresh" data underscores the alarming effectiveness and widespread reach of infostealers, turning personal and business login details into potent tools for illicit activities.

While there's a small silver lining – the datasets were only briefly exposed, preventing researchers from identifying who was controlling such vast amounts of data – the reality remains chilling: these 16 billion credentials are now in the hands of cybercriminals.


The implications are dire and far-reaching:

Account Takeovers: Cybercriminals can effortlessly hijack social media, banking, or corporate accounts, leading to significant financial and reputational damage.

Identity Theft: Stolen personal details can be weaponized for fraudulent loan applications, impersonation, and other forms of identity-based crime.

Targeted Phishing: With access to leaked data, attackers can craft highly convincing and personalized phishing scams, making them incredibly difficult to detect.

Ransomware/Business Email Compromise (BEC) Attacks: Compromised business credentials pave the way for network intrusions and fraudulent wire transfers, crippling organisations.



The exposed credentials span virtually every major online service imaginable, including Apple, Google, Facebook, Telegram, developer platforms, and VPNs. To put the scale into perspective, if each of these 16 billion usernames and passwords were printed on a single line of standard paper, the stack would tower beyond the edge of the stratosphere, reaching approximately 35 miles high!

Protecting Yourself: Essential Defenses Against Infostealers


Given the omnipresent threat, safeguarding your digital life is paramount. Here are critical steps to limit your exposure to infostealers:

  • Deploy Robust Anti-Malware: Ensure you have an up-to-date and actively running anti-malware solution capable of detecting and eradicating infostealers.
  • Embrace Unique Passwords: Never reuse passwords across different websites and services. A password manager is an invaluable tool for generating strong, unique passwords and securely storing them.
  • Enable Two-Factor Authentication (2FA): Activate 2FA on every account that offers it. This adds a crucial layer of security, making it significantly harder for an attacker to access your account even if they have your login credentials.



Back Country Bulletin
Back Country Bulletin
News from the Back Country

Get it on the Apple StoreGet it on the Google Play Store