Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNews149 Million Usernames and Passwords Exposed by Unsecured Database
149 Million Usernames and Passwords Exposed by Unsecured Database
Cybersecurity

149 Million Usernames and Passwords Exposed by Unsecured Database

•January 23, 2026
0
WIRED (Security)
WIRED (Security)•Jan 23, 2026

Companies Mentioned

Recorded Future

Recorded Future

TikTok

TikTok

Microsoft

Microsoft

MSFT

Yahoo Inc

Yahoo Inc

YHOO

Netflix

Netflix

NFLX

Binance

Binance

OnlyFans

OnlyFans

Apple

Apple

AAPL

Meta

Meta

META

Why It Matters

The exposure puts billions of user accounts at risk of fraud and highlights systemic weaknesses in cloud‑storage security. It pressures regulators and enterprises to enforce stricter data‑hosting controls and faster breach detection.

Key Takeaways

  • •149 M credentials exposed, including Gmail, Facebook, Binance accounts.
  • •Database likely built by infostealing malware harvesting keystrokes.
  • •Hosting provider removed data after researcher’s report.
  • •Criminals can rent infostealer infrastructure for $200‑$300 monthly.
  • •Unsecured databases remain pervasive threat to global digital security.

Pulse Analysis

The scale of the recent 149 million credential dump underscores a growing crisis in data hygiene. While cloud platforms promise scalability, misconfigured storage buckets can turn into treasure troves for attackers, exposing personal, corporate, and governmental accounts alike. This incident mirrors earlier high‑profile leaks, reinforcing that the sheer volume of compromised logins now rivals the total user base of many major services. For businesses, the lesson is clear: continuous inventory of cloud assets and automated compliance checks are no longer optional safeguards.

Infostealer malware has become the workhorse of credential harvesting, offering a low‑cost, plug‑and‑play solution for both seasoned hackers and novices. Rental fees as modest as $200 to $300 per month grant access to sophisticated keyloggers and screen‑capture tools that siphon passwords from infected devices worldwide. The modular nature of these services enables cyber‑criminals to package specific subsets of data—such as financial or educational accounts—and sell them on underground markets. As the barrier to entry drops, the frequency of large‑scale leaks is likely to rise, pressuring law‑enforcement and threat‑intel firms to adapt their detection and attribution capabilities.

Mitigating this threat requires a multi‑layered approach. Organizations should enforce strict least‑privilege access, encrypt stored credentials, and adopt password‑less authentication where feasible. Regular penetration testing and third‑party audits can uncover hidden exposures before malicious actors exploit them. Meanwhile, cloud providers must improve default security postures, offering built‑in anomaly detection and rapid takedown mechanisms. By combining robust internal policies with proactive vendor collaboration, the industry can curb the proliferation of insecure databases and reduce the lucrative payoff that fuels the infostealer economy.

149 Million Usernames and Passwords Exposed by Unsecured Database

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...