Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Save $800 on this Samsung 49-inch gaming monitor and get a second monitor free

22 May 2025

DOGE Used a Meta AI Model to Review Emails From Federal Workers

22 May 2025

3 underrated Amazon Prime Video movies you should watch this weekend (May 23-25)

22 May 2025

Monster Train 2 Review – Engine Ingenuity

22 May 2025

The 63 Best Movies on Disney+ Right Now

22 May 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » Your information was probably stolen again: Researcher discovers 184 million stolen logins
Tech News

Your information was probably stolen again: Researcher discovers 184 million stolen logins

By technologistmag.com22 May 20253 Mins Read
Share
Facebook Twitter Reddit Telegram Pinterest Email

In another stark reminder of the constant threats online, cybersecurity researcher Jeremiah Fowler recently uncovered a massive, unsecured database containing over 184 million login credentials from Microsoft, Apple, Facebook, Discord, Google, PayPal and others. The trove amounted to approximately 47.42 GB of data, was discovered on a misconfigured cloud server and is believed to have been amassed using infostealer malware – malicious software designed to extract sensitive information from compromised devices.

A global breach with far-Reaching implications

According to Jeremiah, the database also contained over 220 email addresses associated with government domains from at least 29 countries, such as the United Stated, United Kingdom, Australia, and Canada. The breadth underscores the potential national security risks posed by such breaches.

Fowlers analysis of a 10,000-record sample revealed that the data included plaintext usernames and passwords, with some entries linked to financial terms like “bank” and “wallet,” indicating a heightened risk of financial fraud. The presence of such sensitive information in an unprotected database amplifies concerns about identity theft, unauthorized access and other malicious activities. Hackread.com has some images from the database provided by Jeremiah.

The role of infostealer malware

Infostealer malware operates by infiltrating devices through phishing emails, malicious websites, or comes bundled with pirated software. Once installed, it can harvest a variety of data, including login credentials, cookies, autofill information and even cryptocurrency wallet details. The data is then transmitted to command-and-control servers operated by cybercriminals.

The discovery of this database suggests a coordinated effort to collect and potentially exploit vast amounts of personal and institutional data. The lack of identifiable ownership or metadata within the database further complicates efforts to trace its origins or intended use. Hosting companies likely do not know that they are fostering these databases to begin with.

Immediate actions and recommendations

Upon discovering the database, Fowler promptly notified the hosting provider, World Host Group, which subsequently took the server offline. However, the duration for which the data remained exposed and wither it was accessed by unauthorized parties before its removal remains uncertain.

I would advise users to:

  • Change your passwords, yet again: Immediately update your passwords for all online accounts, especially if the same passwords are being re-used across multiple platforms
  • Enable two-factor authentication (2FA): This generally requires a text verification code to your phone, or a secondary email address
  • Monitor your accounts: Regularly check your financial accounts and other sensitive accounts for suspicious activity
  • Use reputable security software: Anti-virus and malware software from reputable companies usually help, make sure they are updated. You can check out our antivirus and malware reviews
  • Be cautious with emails and downloads: Avoid clicking on suspicious links or downloading attachments from unknown sources











Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleMario Kart World Features Over 200 Songs, And They’re All ‘Brand-New Arrangements’
Next Article Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

Related Articles

Save $800 on this Samsung 49-inch gaming monitor and get a second monitor free

22 May 2025

DOGE Used a Meta AI Model to Review Emails From Federal Workers

22 May 2025

3 underrated Amazon Prime Video movies you should watch this weekend (May 23-25)

22 May 2025

The 63 Best Movies on Disney+ Right Now

22 May 2025

Why NotebookLM needs to be the next app you download on your phone

22 May 2025

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

22 May 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss

DOGE Used a Meta AI Model to Review Emails From Federal Workers

By technologistmag.com22 May 2025

Elon Musk’s so-called Department of Government Efficiency (DOGE) used artificial intelligence from Meta’s Llama model…

3 underrated Amazon Prime Video movies you should watch this weekend (May 23-25)

22 May 2025

Monster Train 2 Review – Engine Ingenuity

22 May 2025

The 63 Best Movies on Disney+ Right Now

22 May 2025

Why NotebookLM needs to be the next app you download on your phone

22 May 2025
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2025 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.