In one of the largest credential leaks in recent memory, a publicly accessible database containing 149 million usernames and passwords was discovered online, prompting urgent warnings from cybersecurity experts and renewed calls for stronger data protection standards.
The database, which included login credentials for major platforms such as Gmail, Facebook, Binance, Netflix, TikTok, and OnlyFans, was found by cybersecurity researcher Jeremiah Fowler, who alerted the hosting provider. The database was subsequently taken offline, but not before its contents had been exposed to anyone with a web browser.
Scope of the Breach
According to Fowler’s analysis, the database contained:
- 48 million Gmail accounts
- 17 million Facebook logins
- 420,000 Binance credentials
- 3.4 million Netflix accounts
- 780,000 TikTok accounts
- 100,000 OnlyFans accounts
- 1.5 million Microsoft Outlook accounts
- 900,000 Apple iCloud accounts
- 1.4 million .edu domain accounts
In addition to consumer platforms, the database also included login details for government systems across multiple countries, as well as banking credentials and device identifiers. The total size of the exposed dataset was approximately 96GB, structured in a way that enabled large-scale account takeovers.
How It Happened
The database was hosted on a cloud server that lacked basic security protections. It was accessible without a password or encryption, allowing anyone to view or download its contents. Fowler believes the data may have been collected by infostealer malware, which harvests credentials from infected devices.
“The sheer volume and diversity of the data suggest it was aggregated from multiple sources,” Fowler said. “It’s likely the result of years of credential harvesting through malware campaigns.”
Who Is Affected?
The breach affects users worldwide, with no clear indication of who originally compiled the database. Because the data includes credentials from multiple platforms and regions, millions of individuals and organizations may be at risk.
Security experts warn that the leaked credentials could be used for:
- Credential stuffing attacks, where hackers use stolen usernames and passwords to access other accounts.
- Phishing campaigns, targeting users with personalized messages.
- Identity theft, especially for accounts linked to financial or government services.
Response from Platforms
Major platforms named in the breach, including Google, Meta, and Binance, have issued statements urging users to change their passwords immediately and enable two-factor authentication (2FA).
A spokesperson for Google said, “We continuously monitor for compromised credentials and notify users when we detect suspicious activity. We encourage all users to use strong, unique passwords and enable 2FA.”
Binance, the cryptocurrency exchange, said it had not detected unauthorized access linked to the exposed credentials but was conducting a full review.
Government Reaction
Cybersecurity agencies in the United States, Australia, and the European Union have launched investigations into the breach. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert recommending that organizations review their security protocols and monitor for signs of compromise.
“This incident underscores the importance of securing cloud infrastructure and monitoring for unauthorized data exposure,” CISA said.
What Users Should Do
Experts recommend the following steps for individuals who may be affected:
- Change passwords immediately for all accounts, especially those listed in the breach.
- Use a password manager to generate and store strong, unique passwords.
- Enable two-factor authentication wherever possible.
- Monitor bank and credit card statements for suspicious activity.
- Be cautious of phishing emails or messages that may use leaked data.
Broader Implications
The breach has reignited debate over data privacy and cloud security, with critics arguing that tech companies and hosting providers must do more to prevent such exposures.
“This is not just a technical failure—it’s a systemic issue,” said cybersecurity analyst Eva Chen. “We need stronger regulations and accountability for how sensitive data is stored and protected.”
The incident also highlights the growing threat of infostealer malware, which has become increasingly sophisticated and widespread. These programs often operate silently, collecting credentials from browsers, email clients, and messaging apps.
Conclusion
The exposure of 149 million usernames and passwords from an unsecured database is a stark reminder of the vulnerabilities in today’s digital infrastructure. While the database has been taken offline, the damage may already be done, with millions of users potentially at risk.
As investigations continue, cybersecurity experts urge vigilance and proactive measures to protect personal and organizational data. In an era of increasing digital threats, the cost of complacency is simply too high.










