Massive 149 Million Credential Leak Exposes Gmail, Facebook, and Financial Service Users

Unprotected Database Exposes 149 Million Unique Login Credentials from Infostealer Malware Logs

HIGH
January 25, 2026
5m read
Data BreachMalwareThreat Intelligence

Impact Scope

People Affected

149.4 million accounts

Industries Affected

TechnologyFinanceMedia and EntertainmentGovernment

Related Entities

Organizations

Products & Tech

Gmail InstagramTikTokHBO MaxDisney+

Other

Facebook XNetflixRobloxOnlyFansInfostealer malware

Full Report

Executive Summary

A security researcher has uncovered a massive, unprotected database containing 149,404,754 unique login credentials. The 96 GB dataset was publicly exposed without any encryption or password protection. The data is not from a single new breach but appears to be a large compilation from various sources, primarily infostealer malware logs and previously breached data. The leak affects a vast range of services, including an estimated 48 million Gmail accounts, social media platforms like Facebook, financial institutions, and even government portals. The prolonged exposure of this data presents a severe and immediate threat to affected users, who are at high risk of account takeover, financial theft, and identity fraud. Organizations are urged to enforce multi-factor authentication and advise users to update their credentials immediately.


Threat Overview

The incident involves the discovery of a publicly accessible cloud-based repository containing 96 GB of sensitive data. Discovered on January 21, 2026, by researcher Jeremiah Fowler, the database held 149.4 million unique records. Each record typically contained a username/email, a password in plaintext, and the URL of the service's login page.

The data's structure strongly suggests it was aggregated from multiple sources over time. The primary vector is believed to be infostealer malware, which captures saved credentials from browsers and applications on infected user devices. This is corroborated by the wide variety of services represented in the leak, from personal email and social media to highly sensitive financial and cryptocurrency accounts. The prolonged exposure, lasting nearly a month before being taken down, provided ample opportunity for malicious actors to access and exfiltrate the data for use in credential stuffing attacks, phishing campaigns, and targeted fraud.

Technical Analysis

The attack is not a breach of any single provider like Google or Facebook, but a failure to secure a data aggregation point. The threat actors responsible for compiling the data are likely operators of infostealer malware campaigns.

Attack Chain (Inferred)

  1. Infection: Users are infected with infostealer malware through phishing, malicious downloads, or other common vectors.
  2. Data Collection: The malware scrapes credentials, cookies, and other sensitive data from web browsers and applications on the victim's machine.
  3. Exfiltration: The stolen data is sent back to the malware operator's command-and-control (C2) server.
  4. Aggregation: Data from thousands or millions of infected devices is collected, processed, and aggregated into a large database.
  5. Exposure: The operators stored this aggregated database in a misconfigured cloud repository, leaving it publicly accessible without authentication.

MITRE ATT&CK Techniques

Impact Assessment

The impact of this leak is substantial and widespread. With 48 million Gmail accounts and millions more from other services, the potential for harm is enormous.

  • For Individuals: High risk of financial loss from compromised banking and crypto accounts, identity theft, reputational damage from hijacked social media profiles, and follow-on phishing attacks targeting personal and professional contacts.
  • For Organizations: Increased risk of corporate account compromise if employees reused passwords. The presence of .gov credentials poses a national security risk, potentially enabling access to sensitive government systems. The sheer volume of credentials fuels the credential stuffing ecosystem, making all online services more vulnerable.

Cyber Observables for Detection

Since this is a data leak, detection focuses on identifying compromised accounts rather than an active intrusion.

Type Value Description
log_source Identity Provider Logs Monitor for high volumes of failed login attempts from disparate geolocations for single users.
log_source Application Logs Look for successful logins immediately following a password reset request from an unfamiliar IP address.
network_traffic_pattern Unusual User-Agent Strings Infostealer C2 traffic may use non-standard or suspicious User-Agent strings.
process_name lsass.exe Monitor for unexpected processes attempting to access credentials stored in lsass.exe.

Detection & Response

Organizations should assume that employee credentials are part of this and similar leaks.

  • Detection: Implement User and Entity Behavior Analytics (UEBA) to detect anomalous login patterns, such as impossible travel, logins from known malicious IPs, or unusual session durations. Use services like Have I Been Pwned to proactively check corporate email domains against known breaches. Monitor for a sudden spike in password reset requests. D3FEND techniques like D3-DAM: Domain Account Monitoring are critical.
  • Response: If a compromised account is identified, immediately initiate a password reset, revoke all active sessions, and review account activity for unauthorized actions. If financial accounts are involved, notify the financial institution to monitor for fraud. Trigger an internal communication campaign urging all employees to change passwords, especially if they reuse them across services.

Mitigation

Mitigation focuses on reducing the impact of compromised credentials.

  1. Enforce Multi-Factor Authentication (MFA): This is the single most effective control against credential stuffing attacks. Prioritize phishing-resistant MFA like FIDO2/WebAuthn. D3FEND countermeasure D3-MFA: Multi-factor Authentication is essential.
  2. User Training: Educate users on the dangers of password reuse and how to spot phishing attacks that deliver infostealer malware. D3FEND technique D3-UT: User Training can help prevent the initial infection.
  3. Password Policies: Enforce strong, unique passwords for all corporate accounts. Consider using a corporate password manager to help users manage unique credentials. D3FEND technique D3-SPP: Strong Password Policy should be implemented.
  4. Endpoint Protection: Deploy and maintain a modern Endpoint Detection and Response (EDR) solution capable of detecting and blocking infostealer malware behavior.

Timeline of Events

1
January 21, 2026
Security researcher Jeremiah Fowler discovers the exposed 96 GB database.
2
January 25, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective defense against the use of stolen credentials.

Educate users to recognize and avoid phishing attempts that lead to infostealer infections.

Enforce strong, unique passwords to limit the impact of a single credential being compromised.

Deploy endpoint security to detect and block infostealer malware.

D3FEND Defensive Countermeasures

Immediately enforce phishing-resistant Multi-Factor Authentication (MFA) across all critical applications, especially for email, financial, and administrative accounts. Prioritize hardware tokens (FIDO2/WebAuthn) over SMS or push-based methods, as the latter are more susceptible to social engineering. For legacy systems that do not support modern MFA, implement compensating controls such as network segmentation and heightened monitoring. This directly mitigates the primary threat of this leak: attackers using stolen credentials to gain unauthorized access. By requiring a second factor, the compromised password alone becomes insufficient for account takeover.

Implement and enforce a strong password policy that prohibits password reuse across different services. Mandate the use of a corporate-approved password manager to help employees generate and store unique, complex passwords for every service. Augment this policy with credential screening services that check user passwords against known breach corpuses, like the one in this incident, and force a password change if a match is found. This reduces the blast radius of a credential leak, ensuring that the compromise of a password for a low-sensitivity site does not grant access to critical corporate resources.

Proactively monitor for signs of credential stuffing and account takeover. Configure SIEM and identity provider logs to alert on anomalous login behavior, such as 'impossible travel' (logins from multiple distant locations in a short period), multiple failed logins followed by a success from a new IP/device, or logins from IP addresses associated with TOR or malicious proxies. This allows security teams to detect and respond to account compromise attempts in near real-time, locking accounts and revoking sessions before significant damage can occur.

Sources & References

Nearly 150 Million Online Accounts Exposed In Massive Data Leak
Evrim Ağacı (evrimagaci.org) January 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

credential leakinfostealerdata exposurepassword securityaccount takeover

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading