Close Menu
Tech Savvyed
  • Home
  • News
  • Artificial Intelligence
  • Gadgets
  • Apps
  • Mobile
  • Gaming
  • Accessories
  • More
    • Web Stories
    • Spotlight
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Oppo Reno 14FS 5G Price, Design and Specifications Leaked Ahead of Anticipated Debut

26 July 2025

Samsung Galaxy A07 Listed on Google Play Console With Design, Key Specifications: Report

26 July 2025

Samsung Reportedly in Talks With OpenAI, Perplexity to Offer Gemini AI Alternatives on Galaxy S26 Series

26 July 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Tech Savvyed
SUBSCRIBE
  • Home
  • News
  • Artificial Intelligence
  • Gadgets
  • Apps
  • Mobile
  • Gaming
  • Accessories
  • More
    • Web Stories
    • Spotlight
    • Press Release
Tech Savvyed
Home » Your information was probably stolen again: Researcher discovers 184 million stolen logins
News

Your information was probably stolen again: Researcher discovers 184 million stolen logins

News RoomBy News Room22 May 20253 Mins Read
Share
Facebook Twitter Reddit Telegram Pinterest Email

In another stark reminder of the constant threats online, cybersecurity researcher Jeremiah Fowler recently uncovered a massive, unsecured database containing over 184 million login credentials from Microsoft, Apple, Facebook, Discord, Google, PayPal and others. The trove amounted to approximately 47.42 GB of data, was discovered on a misconfigured cloud server and is believed to have been amassed using infostealer malware – malicious software designed to extract sensitive information from compromised devices.

A global breach with far-Reaching implications

According to Jeremiah, the database also contained over 220 email addresses associated with government domains from at least 29 countries, such as the United Stated, United Kingdom, Australia, and Canada. The breadth underscores the potential national security risks posed by such breaches.

Fowlers analysis of a 10,000-record sample revealed that the data included plaintext usernames and passwords, with some entries linked to financial terms like “bank” and “wallet,” indicating a heightened risk of financial fraud. The presence of such sensitive information in an unprotected database amplifies concerns about identity theft, unauthorized access and other malicious activities. Hackread.com has some images from the database provided by Jeremiah.

The role of infostealer malware

Infostealer malware operates by infiltrating devices through phishing emails, malicious websites, or comes bundled with pirated software. Once installed, it can harvest a variety of data, including login credentials, cookies, autofill information and even cryptocurrency wallet details. The data is then transmitted to command-and-control servers operated by cybercriminals.

The discovery of this database suggests a coordinated effort to collect and potentially exploit vast amounts of personal and institutional data. The lack of identifiable ownership or metadata within the database further complicates efforts to trace its origins or intended use. Hosting companies likely do not know that they are fostering these databases to begin with.

Immediate actions and recommendations

Upon discovering the database, Fowler promptly notified the hosting provider, World Host Group, which subsequently took the server offline. However, the duration for which the data remained exposed and wither it was accessed by unauthorized parties before its removal remains uncertain.

I would advise users to:

  • Change your passwords, yet again: Immediately update your passwords for all online accounts, especially if the same passwords are being re-used across multiple platforms
  • Enable two-factor authentication (2FA): This generally requires a text verification code to your phone, or a secondary email address
  • Monitor your accounts: Regularly check your financial accounts and other sensitive accounts for suspicious activity
  • Use reputable security software: Anti-virus and malware software from reputable companies usually help, make sure they are updated. You can check out our antivirus and malware reviews
  • Be cautious with emails and downloads: Avoid clicking on suspicious links or downloading attachments from unknown sources











Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleMario Kart World Features Over 200 Songs, And They’re All ‘Brand-New Arrangements’
Next Article Marvel Rivals Season 2.5 Adds Ultron, A New Map, And A Sharknado

Related Articles

Nouvelle Vague, one of the big hits of Cannes, just sold to Netflix

27 May 2025

These 3 free web apps helped me stop procrastinating

27 May 2025

Samsung Galaxy S25 Edge Review: A trendsetter you won’t want to put down

27 May 2025

Sony WH-1000XM6 review: The best wireless headphones for almost everyone

26 May 2025

NYT Crossword: answers for Monday, May 26

26 May 2025

NYT Connections: hints and answers for Monday, May 26

26 May 2025
Demo
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss

Samsung Galaxy A07 Listed on Google Play Console With Design, Key Specifications: Report

By News Room26 July 2025

Samsung Galaxy A07 is expected to launch soon as an affordable smartphone from the South…

Samsung Reportedly in Talks With OpenAI, Perplexity to Offer Gemini AI Alternatives on Galaxy S26 Series

26 July 2025

Redmi 15 Design Renders Leaked; Tipped to Arrive in Three Colourways

26 July 2025

Google Pixel 10 Pro, Pixel 10 Pro XL Spotted in Moonstone Colourway Alongside Pixel Buds 2a and Pixel Watch 4

26 July 2025
Tech Savvyed
Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact
© 2025 Tech Savvyed. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.