Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

149M Credentials Exposed — FaceBook, Instagram, Government and More Included

By Jordyn Alger, Managing Editor
Man holding digital padlock
Sasun Bughdaryan via Unsplash
January 23, 2026

Findings from Cybersecurity Researcher Jeremiah Fowler reveal a concerning data leak: more than 149 million unique logins and passwords were exposed, amounting to 96 GB of pure credential data.

In a sampling of the exposed records, Fowler discovered thousands of files containing emails, usernames, and passwords, as well as URL links to the login site for the corresponding data. 

“This is not the first dataset of this kind I have discovered and it only highlights the global threat posed by credential-stealing malware,” Fowler wrote in a blog post. “When data is collected, stolen, or harvested it must be stored somewhere and a cloud based repository is usually the best solution. This discovery also shows that even cybercriminals are not immune to data breaches. The database was publicly accessible, allowing anyone who discovered it to potentially access the credentials of millions of individuals.”

The exposed documents contained credential information collected from individuals around the world, ranging from a variety of online services and accounts. These include social media, financial services platforms, dating sites, entertainment accounts and more. In some instances, particularly with financial service platforms, trading accounts, or cryptocurrency wallets, credit card and banking logins were also accessible. 

Alarmingly, Fowler discovered credentials associated with .gov domains linked to several countries. 

“While not every government-linked account grants access to sensitive systems, even limited access could have serious implications depending on the role and permissions of the compromised user,” Fowler warns. 

Leaked government credentials could be exploited for impersonation, spear-phishing, or as an initial access to government networks, posing risks to public safety and even national security. 

The big question now: who was collecting this data in the first place? 

At this time, it is unclear. Fowler states that the database had no ownership information, and so he reported the issue to the hosting provider. 

“I received a reply several days later stating that they do not host the IP and it is a subsidiary that operates independently while still using the parent organization’s name,” recounts Fowler. “It took nearly a month and multiple attempts before action was finally taken and the hosting was suspended and millions of stolen login credentials were no longer accessible.”  

The hosting provider refused to disclose information on who was managing the database. While the owner of the database is unknown, it is suspected to be associated with criminal activity. 

Between the time of Fowler’s initial discovery and the database being removed, the number of records within it increased. 

The Threat of Infostealing Malware

While the manager of the database is currently unknown, the sensitive and varied nature of the credentials collected suggests it is connected to cybercriminal activity. This highlights the global risk that infostealing malware presents.  

Morey Haber, Chief Security Advisor at BeyondTrust, explains that “infostealing malware can come from a variety of sources like sideloading applications, jailbreaking, vulnerabilities/exploits” and more. 

The threat of infostealers is not contained to the singular moment of credential theft, nor are they limited to a one-time exploit. Boris Cipot, Senior Security Engineer at Black Duck, warns, “Infostealer breaches like this do not just expose isolated accounts, they create a long-term attack surface that gives cybercriminals opportunities across every aspect of our digital lives. Organisations and individuals alike must assume that usernames and passwords are constantly at risk and adopt layered defences accordingly.”  

Estimated Breakdown of Exposed Accounts 

  • Gmail: 48 million 
  • Yahoo: 4 million
  • Outlook: 1.5 million
  • iCloud: 900,000
  • .edu: 1.4 million
  • FaceBook: 17 million
  • Instagram: 6.5 million
  • TikTok: 780,000
  • Netflix: 3.4million
  • OnlyFans: 100,000

What Are Implications of This Leaked Dataset? 

While the sheer size of this data exposure is alarming, experts are more concerned by what it represents. 

“This reported dataset matters less because of its size and more because of what it represents operationally,”  insists Shane Barney, Chief Information Security Officer at Keeper Security. “This is not a breach in the traditional sense, and it is not evidence of a single failure. It is the byproduct of an ecosystem that continuously harvests credentials from endpoints and quietly accumulates access over time.”  

The leaked data underscores the continually evolving, continually working nature of the modern threat landscape. Consistently, malicious actors search the digital space for exploitable vulnerabilities. 

“For security teams, the takeaway is not simply ‘change passwords,’” says Barney. “It’s recognizing that credential compromise is now a background condition of the internet. Controls need to assume that passwords will leak, that endpoints will be infected and that attackers will arrive authenticated. The question is no longer how to prevent every theft, but how effectively access is constrained once it inevitably occurs.”  

KEYWORDS: credentials data breach data privacy data storage

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person using ATM

    Breach exposed information of more than 500,000 credit union members

    See More
  • Social Media for Business

    200 million Facebook, Instagram and Linkedin users' scraped data exposed

    See More
  • Monitor with coding

    Recent version of Neptune RAT is spreading, stealing credentials

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing