Massive 47GB Data Breach Exposes Millions Of Passwords For Google, Netflix And More

It might surprise you to learn this, but cybercriminals are usually fairly protective of the data they steal, because things like credentials and login details have value, and can be sold to the right buyer. That's why it's so unusual that this latest discovery was apparently found completely unencrypted and visible to the open web; a massive database, containing over 184 million individual records spanning over 47GB of raw credential data, just plain for the world to see.

The database was purportedly spotted by independent cybersecurity researcher Jeremiah Fowler, who says (in a post on site builder service WebsitePlanet, for some reason) that he located the database in early May. After confirming the validity of the information by contacting multiple people from the data to verify the veracity of the details, Fowler explains that he contacted the (unnamed) hosting provider, who has since removed it from public access. Of course, there's still the matter of 184 million stolen credentials floating around out there.

redacted screenshot 1
Some very small and highly redacted screenshots are all we have for 'proof'.

Fowler says that the database held "login and password credentials for a wide range of services, applications, and accounts, including email providers, Microsoft products, Facebook, Instagram, Snapchat, Roblox, and many more." Perhaps more concerning is that he also claims to have seen login details for "bank and financial accounts, health platforms, and government portals from numerous countries," which means that this data likely wasn't collected through phishing or similar means.

Instead, Fowler posits that this database, while potentially legitimate and accidentally exposed, was more likely built using a type of malware known as an infostealer for reasons that are likely obvious from the name alone. Infostealers, like RedLine or Raccoon Stealer, most commonly target browser profile information such as autofill information, which is often poorly encrypted and quite valuable. Session cookies are another common target, as they're even easier to exploit.

It goes without saying that we recommend cybersecurity best practices. This includes, most critically, not re-using passwords across services and also changing your passwords regularly. Stick to long passwords that are memorable due to being phrases; a 20-character password of just letters is harder to break than a 10 character password with a bunch of symbols and gibberish in it.

redacted screenshot 2
Regardless of the leak's legitimacy, it's a good reminder for security hygiene.

The best option would be to use a password manager. Services like 1Password, Bitwarden, and NordPass can allow you to use a strong, memorable passphrase with multi-factor authentication (including physical security keys like YubiKey, or biometrics) to consolidate many accounts into one service that offers strong encryption and a zero-knowledge model, so that even if the password manager is hacked, attackers still can't get at your master password.

Fowler unfortunately didn't retain a copy of the database due to personal legal liability concerns, so we don't know exactly who may have been affected. However, it's a good idea to bookmark the website "Have I Been Pwned" which lets you put in your e-mail address and see what breaches included it. If your account has been pwned recently, better change that password.