183 million unique email accounts
On October 28, 2025, a massive collection of 183 million unique email credentials, aggregated from infostealer malware logs, was made public and indexed by the Have I Been Pwned breach notification service. This incident, dubbed the "Synthient Stealer Log Threat Data," is not the result of a singular breach against a provider like Google, but rather the culmination of long-term data harvesting from individual user devices infected with malware such as RedLine and Vidar. The primary threat stems from password reuse, as attackers will leverage this data for widespread credential stuffing attacks against various online services, including corporate networks. Organizations and individuals are strongly advised to enforce password changes and enable multi-factor authentication (MFA) immediately.
The 3.5-terabyte dataset represents a significant aggregation of credentials stolen over an extended period. The data was harvested using prevalent infostealer malware families, including RedLine and Vidar, which are designed to steal sensitive information stored in web browsers, FTP clients, and other applications on compromised machines. These malware variants are often distributed through phishing campaigns, malicious downloads, or cracked software.
Once a device is infected, the infostealer exfiltrates stored usernames, passwords, cookies, and autofill data to attacker-controlled servers. This stolen data is then compiled and often sold or shared in underground forums. The "Synthient" dump is a large-scale collection of such logs. A notable aspect of this leak is that 16.4 million of the credentials were new to breach-tracking databases, indicating a fresh and ongoing wave of compromises affecting a broad user base globally. Initial reports incorrectly suggested a direct breach of Gmail, but Google has since clarified that its own systems were not compromised.
The attack chain relies on the successful deployment of infostealer malware on end-user devices. The primary TTPs involved are:
T1566 - Phishing or T1204.002 - User Execution: Malicious File. Users are tricked into opening malicious attachments or downloading and running executables disguised as legitimate software.T1555 - Credentials from Password Stores. It targets locally stored credentials in browsers like Chrome, Firefox, and Edge, as well as other applications.T1041 - Exfiltration Over C2 Channel.The subsequent threat is large-scale T1110.003 - Brute Force: Credential Stuffing, where attackers use automated tools to test the leaked email/password pairs against thousands of websites, hoping to find accounts where the password has been reused.
The business impact of this credential dump is substantial. Compromised employee credentials can lead to:
Security teams should hunt for signs of infostealer activity. These are not explicit IOCs from the articles but generated observables based on common infostealer behavior.
| Type | Value | Description |
|---|---|---|
| Process Name | *\AppData\Local\Temp\*.exe |
Infostealers often execute from temporary directories. |
| Network Traffic Pattern | Outbound connections to unknown IPs on ports 80, 443, or custom high ports from non-browser processes. | Malware exfiltrating data to C2 servers. |
| File Path | %APPDATA%\..\Local\Google\Chrome\User Data\Default\Login Data |
Target file for Chrome credential theft. Monitor for unusual process access. |
| API Call Monitoring | CryptUnprotectData |
Windows API function used by many stealers to decrypt stored credentials. Hooking this function can reveal malicious processes. |
| Log Source | EDR, Sysmon, Proxy Logs | Monitor for suspicious process creation (Event ID 1), file access, and network connections. |
D3FEND Technique: Detection should focus on
D3-PA - Process AnalysisandD3-NTA - Network Traffic Analysis.
powershell.exe or mshta.exe spawning from office applications and downloading files.D3FEND Countermeasure: Key mitigations fall under Hardening, such as
D3-SPP - Strong Password PolicyandD3-MFA - Multi-factor Authentication.
The most effective defense against credential stuffing attacks, as a compromised password alone is not enough to grant access.
Mapped D3FEND Techniques:
Educate users to recognize and avoid phishing attempts, which are the primary delivery mechanism for infostealer malware.
Enforce strong, unique passwords and discourage password reuse to limit the impact of a credential leak from one service affecting others.
Mapped D3FEND Techniques:
Use endpoint protection to detect and block known infostealer malware like RedLine and Vidar before they can execute and steal data.
Use web filters and outbound traffic filtering to block connections to known malicious domains and C2 servers, preventing data exfiltration.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats