Huge data leak of 149 million credentials exposed without any protection – 98GB of unique usernames and passwords from financial services, social media accounts and dating apps

  • Enormous trove of 149 million credentials exposed online
  • Included usernames and passwords for banking, social media, and .gov accounts
  • It isn’t known how long the database was exposed for, but it has now been taken down

Cybersecurity researcher Jeremiah Fowler (via ExpressVPN) has once again uncovered a huge publicly accessible trove of data.

The massive container of unique usernames and passwords was exposed on the web without any password or encryption protection.

The data contained over 149 million combinations of usernames and passwords totalling around 98 gigabytes of credentials spanning online accounts of almost every kind.

149,000,000 credentials exposed

The credentials found within the container covered financial services including cryptocurrency wallets, trading accounts, and banking account details. Social media and dating app credentials were also included in the database.

Outside of personal accounts, a number of email accounts using the .gov domain were found within the container.

Very little is known about the origin of the exposed cloud storage container, but Fowler notes that traces of infostealer and keylogging malware was present in the database. Upon discovery, Fowler attempted to trace the owners of the account, but was unable to find any associated information.

Instead, Fowler attempted to contact the hosting provider who said that the container was being hosted by a subsidiary operating independently. It took almost one month to have the container taken down, Fowler notes.

The total count and overall size of the exposed cloud storage container discovered by Fowler.

The total count and overall size of the exposed cloud storage container discovered by Fowler. (Image credit: Jeremiah Fowler)

Interestingly, the credentials stored within the database were indexed in such a way as to make them easily searchable using the “host_reversed path”, meaning that the database could have been the work of an organized hacker, or may have been a research database.

A database of this size and scope could be used for highly nefarious purposes, such as spear-phishing, banking and credit fraud, and even identity theft. It is not currently known how long the database was left exposed.

The best password managers are one of the top ways to keep your credentials safe from being stolen. Many password managers store your usernames and passwords in an encrypted vault using two-factor authentication, and will scour the dark web to check if any of your credentials have been exposed.

Read more @ TechRadar

Latest posts

Valve’s Steam Deck OLED will be ‘intermittently’ out of stock because of the RAM crisis

Valve has updated the Steam Deck website to say that the Steam Deck OLED may be out of stock "intermittently in some regions due...

Apple starts testing end-to-end encrypted RCS messages on iPhone

iPhone 17 Pro Apple is starting to test end-to-end encrypted (E2EE) RCS messages with the developer beta of iOS 26.4 released Monday. Apple announced plans...

Call of Duty: Warzone Mobile will go offline on April 17

Call of Duty: Warzone Mobile will be no more this spring. According to Activision, servers will be taken offline for this mobile battle royale...

More Rode mics can now connect directly to iPhones and iPads

Rode is rolling out a firmware update for its Wireless Pro and Wireless Go (third-gen) microphones to add a feature called Direct Connect, which...

There’s a dedicated channel for Formula 1 in the Apple TV app now

Apple continues to double down on its Formula 1 programming, following up on the box office success of its blockbuster movie by adding a...