Credential Theft, Cyber Attack, Cybersecurity, Data Breach, Infostealer Malware, Password Security
Infostealer Database Breach

149 Million Login Credentials Exposed in Massive Infostealer Database Breach

A massive unsecured database containing 149,404,754 stolen login credentials was recently discovered exposed online without any password protection or encryption. This data breach represents one of the most dangerous credential leaks in recent history, posing serious risks to users of platforms such as Gmail, Instagram, Facebook, Netflix, and thousands of other digital services worldwide.

According to reports sourced from ExpressVPN, the publicly accessible database was created using infostealer malware and keylogging software, harvesting sensitive user information directly from infected devices.

Each exposed record contained:

  • Email addresses
  • Usernames
  • Passwords
  • Direct authorization URLs
  • Platform-specific login endpoints

 

This level of detail provides cybercriminals with everything required to launch automated credential‑stuffing attacks, identity theft operations, account takeovers, and large‑scale fraud campaigns — often without victims realizing their data has been compromised.

Scale of the Exposure

The exposed infostealer repository totaled 96 GB in size and contained 149+ million unique records, indexed and searchable using only a standard web browser (Source: ExpressVPN).

Structured metadata such as “host_reversed path” formatting (e.g., com.example.user.machine) was used to organize stolen credentials by victim and source. Unique line hashes acted as document IDs, preventing duplicate entries and enabling efficient indexing.

This highly structured design indicates that the database was not accidental — it was built for systematic exploitation and resale.

Breakdown of Exposed Accounts

A limited sampling of the dataset revealed alarming compromise levels across major platforms:

Email Providers
  • 48 million Gmail accounts
  • 4 million Yahoo accounts
  • 1.5 million Outlook accounts
  • 900,000 iCloud accounts
  • 1.4 million .edu email accounts (educational institutions)
Social Media Platforms
  • 17 million Facebook credentials
  • 6.5 million Instagram logins
  • 780,000 TikTok accounts
Entertainment & Financial Platforms
  • 3.4 million Netflix accounts
  • 420,000 Binance cryptocurrency accounts
  • 100,000 OnlyFans credentials
Government & Critical Infrastructure

Particularly alarming was the presence of .gov domain credentials from multiple countries. While not all government accounts provide access to classified systems, even limited access can enable:

  • Targeted spear‑phishing
  • Impersonation attacks
  • Insider‑style threat campaigns
  • Network reconnaissance

These serve as potential entry points into government networks, posing serious national security and public safety risks.

The database also contained:

  • Banking logins
  • Credit card credentials
  • Crypto wallet access
  • Trading account information

 

Delayed Response and Growing Threat

Cybersecurity researcher Jeremiah Fowler discovered the exposed repository and reported it to ExpressVPN as part of ongoing investigations into global data exposure risks.

The 96 GB database was reported to the hosting provider via their abuse channel. However:

  • The provider initially denied hosting responsibility
  • Claimed that a subsidiary controlled the IP address
  • Failed to take immediate action

 

It took nearly one month and multiple follow‑ups before the database was finally removed from public access.Disturbingly, the number of records increased during the exposure period, indicating that new stolen data was actively being added, confirming live data harvesting operations.

The hosting provider refused to disclose the database owner, leaving critical questions unanswered:

  • Who collected the data?
  • How long was it exposed?
  • Who accessed it?
  • Whether copies exist elsewhere
Why This Breach Is Extremely Dangerous

This is not just a data leak — it is a cybercrime infrastructure.

Criminals can use this data for:

  • Credential‑stuffing attacks
  • Account takeovers
  • Financial fraud
  • Crypto theft
  • Identity theft
  • Corporate espionage
  • Corporate system infiltration
  • Government network probing
  • Large‑scale phishing automation

Because many users reuse passwords across platforms, one stolen password can compromise multiple services.

What Users Must Do Immediately

Security experts recommend urgent action:

  1. Install reputable antivirus and anti‑malware software
  2. Enable two‑factor authentication (2FA) on all accounts
  3. Use password managers with unique passwords for every platform
  4. Monitor login histories and security activity
  5. Update operating systems and applications
  6. Scan devices for malware
  7. Review browser extensions and app permissions
  8. Remove suspicious software

 

How TechFacto Global Services Protects You

At TechFacto Global Services, we help businesses and individuals defend against modern cyber threats through enterprise‑grade cybersecurity solutions and proactive digital protection strategies.

Our Cybersecurity Capabilities

Advanced Threat Detection Systems
Real‑time monitoring to identify malware, infostealers, keyloggers, and abnormal system behavior

Endpoint Security Solutions
Device‑level protection across desktops, mobiles, servers, and cloud environments

Cyber Risk Audits & Vulnerability Assessments
Identify system weaknesses before attackers exploit them

Secure Cloud Architecture
Protected cloud infrastructure with identity access management

Data Protection & Encryption Systems
Enterprise‑level encryption for sensitive data

AI‑Driven Security Monitoring
Automated anomaly detection and predictive threat intelligence

Incident Response & Recovery
Fast containment, remediation, and system restoration

Security Awareness Training
Employee education to prevent phishing, credential theft, and social engineering

Final Thoughts

The exposure of 149 million credentials is not an isolated incident — it is a clear sign that cybercrime is now fully industrialized. Automated malware, data harvesting, underground markets, and AI‑powered attacks have transformed hacking into a scalable business model.

Digital security is no longer optional. It is a core business necessity and personal safety requirement.

With TechFacto Global Services, you gain more than cybersecurity tools — you gain a strategic digital defense partner dedicated to protecting your data, systems, customers, and reputation in an increasingly hostile cyber environment.

Secure today. Protect tomorrow. Build digitally — safely.

Contact Info

All Rights Reserved | TechFacto Global Services Pvt. Ltd