Apple, Facebook, Google and much more: 16 billion passwords unveiled in a single leak

The story is written under tension, but against the tide. While the bombs shake the Middle East, another front is bait: Internet. A digital earthquake has just exhibited 16 billion identification dataaccording to Cybernews. Among them, access to AppleGoogle, Facebook … Nothing discreet. Passwords, cookies, complete sessions, delivered to pasture. It is no longer a flaw, it is a collapse. The time of the furtive gaps is over. Here is the age of mass digital looting.

Hacker assistant to a digital tsunami from which the logos of Google, Apple and Facebook are sketched

In short

  • A massive leak exposes 16 billion identifiers stolen via malicious software called infostealers.
  • These data include access to Apple, Google, Facebook and many other sensitive digital services.
  • The files were found on unsecured cloud servers, temporarily accessible to researchers.
  • This data flight technology also threatens crypto, emails and professional networks.

Immersed in the largest digital carnage ever orchestrated

There are hacks that have shaken fintech, like that of Bybit and its $ 1.4 billion evaporated. But what simmers in the shadow of the last revelations could well pass this hemorrhage for a simple scratch. According to Cybernews,, 30 data sets have been identified, each containing up to 3.5 billion identifiers. As a comparison, this represents two identifiers per human being on earth. Researchers evoke Dhe leaks from malicious software, especially infostealerscapable of sucking everything you type, click or save.

Each line of these bases contains A URL, an identifier, a password. This opens the door to Apple, Facebook, Google, Github, government portals. Hackers have not been introduced directly with these giants. But the identifiers harvested allow you to enter it, without a crash, by bypassing the walls by the most commonplace access: your sessions already open.

As Mario Nawfal explains:

It is not a simple leak. It is a roadmap for mass exploitation.

And the damage is not over. New bases emerge every week. The threat is active. Alive. And she learns.

The technology at the service of theft: when ingenuity becomes a poison

What makes this flight particularly dangerous is the technology used to assemble data. Cybernews researchers found the Bases hosted temporarily on unsecured storagelike Elasticsearch or cloud objects. No sophisticated hack here: just negligence, a flaw in the organization.

Infographic relacing the first 20 data sets. Infographic relacing the first 20 data sets.
The first 20 data sets. Source: Cybernews

One of the datasets had a name linked to Telegram, another to Russia. One of them contained 455 million identifiers. Cookies and authentication tokens were also present. Clear, Some hackers can access your accounts even if you change your password. And all services do not automatically reset cookies.

Technology is a double -cutting weapon. It facilitates communication, exchange, innovation. But in bad hands, it becomes a disaster accelerator. Experts speak of a change of era in the world of cyber attacks: we leave Telegram groups for centralized bases, ready to be exploited on a large scale.

One of the most striking quotes of the survey is this, signed Cybernews:

It is not just a leak – it is a fresh and usable intelligence on a large scale.

A cold, clinical sentence. That sums upthe logic of cybercrime that has become industrial.

Crypto, emails and networks (Facebook, Apple, etc.): no one is immune to technology

If the web giants are shaking, the crypto community too. Developers, traders, DAPPs all rest on secure access. And most go through the same logins as everyone: Google, Facebook, Github. Suffice to say that the keys to the web3 have just been dropped in the street.

Even security initiatives in blockchain, such as decentralized authentication, struggle to compete in the face of this massive attack. Grok's response to Satoshi Club's tweet clearly evokes the scope of this leak: this breach concerns Apple, Google and Github. And therefore the crypto universe by ricochet.

Here is what you should remember:

  • 30 exposed datasets, some of which had never been seen before;
  • An average of 550 million identifiers per game;
  • Information present: login, password, cookie, url;
  • Presence of tokens of session bypassing 2FA authentication;
  • The bases point to cloud, VPN, forums, e-mails, github services.

The consequences are systemic. The technology used to secure access itself becomes a vector of vulnerability. It is A brutal questioning For the whole ecosystem.

Your 1st Cryptos with Coinbase
This link uses an affiliation program

With 16 billion stolen data, the Coinbase affair, which concerned nearly 70,000 victims last May, seems almost anecdotal. However, it was enough to trigger a ransom request and a leak of confidence. So imagine what 16 billion digital entry doors can cause in the hands of bad players. Technology evolves quickly. Cybercriminals too. This time, the battle is played in silence … and in the open air.

Maximize your Cointribne experience with our 'Read to Earn' program! For each article you read, earn points and access exclusive rewards. Sign up now and start accumulating advantages.

Similar Posts