Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

A cache containing roughly 16 billion username-password pairs was briefly discovered across 30 misconfigured cloud databases. The trove is not a single corporate hack but a compilation of infostealer logs and earlier leaks dating from 2023-2025. Although many credentials are duplicated or stale, the presence of fresh data makes the collection a potent tool for large-scale credential-stuffing and phishing campaigns. Cybersecurity experts warn users to treat all existing passwords as potentially compromised and to migrate quickly toward stronger, MFA-protected or password-less logins
| Item | Details |
| Date publicly disclosed | 18–20 June 2025 |
| Discovering party | Cybernews research team |
| Size & structure | 30 separate datasets; each 16 million – 3.5 billion records; combined ≈ 16 billion credential rows |
| Data content | URL → username → plaintext or hashed password; often includes cookies & tokens |
| Likely origins | Logs from multiple infostealer malware families; prior breach compilations; credential-stuffing sets |
| Hosting method | Unsecured Elasticsearch clusters / object-storage buckets temporarily exposed |
| Major services appearing | Apple, Google, Facebook, GitHub, Telegram, government portals |
| Novelty of data | Significant overlap with earlier dumps; some newly harvested credentials present |
| Industry reaction | Mixed: some label it the largest leak ever; others call it “recycled, inflated” and lacking evidence of a single breach |
Self-hosting a password manager can significantly reduce the risk of large-scale data breaches and enhance user privacy. By keeping your password database on your own server or private cloud—rather than relying on third-party services—you maintain full control over your sensitive credentials and remove a major centralized target for hackers. This minimizes exposure to mass hacks like the recent credential leaks tied to misconfigured or compromised provider infrastructure. Additionally, self-hosted solutions let you implement your own security measures, such as stringent access controls, encryption standards, and regular audits, thereby ensuring that your data remains private and accessible only to you or trusted users.