SELECT LANGUAGE BELOW

183 million email passwords revealed in data breach, including many Gmail accounts – find out how to check if yours is secure.

183 million email passwords revealed in data breach, including many Gmail accounts – find out how to check if yours is secure.

Massive Breach Exposes Millions of Email Passwords

Recently, a significant security breach has led to the exposure of over 183 million email passwords, with a substantial number linked to Gmail accounts. Cybersecurity analysts are describing it as one of the most extensive credential dumps ever found.

Troy Hunt, an Australian security researcher and owner of the breach notification website Have I Been Pwned, revealed that this massive cache—amounting to about 3.5 terabytes—was released online earlier this month.

According to Hunt, the leaked information originated from a year-long examination of “infostealer” platforms, which are networks of malware designed to covertly gather usernames, passwords, and site URLs from compromised devices.

The dataset contains both “stealer logs and credential stuffing lists,” as Hunt mentioned in a recent blog entry.

When someone signs into Gmail, their email address and password get captured by gmail.com. This isn’t just a technical detail; it reflects how invasive these breaches can be.

The new data includes 183 million distinct accounts. Notably, around 16.4 million of these email addresses had never appeared in previous breaches, according to Hunt.

If you’re concerned that your credentials might be part of this breach, you can check by visiting HaveIBeenPwned.com. Simply enter your email address, and if it’s been affected, the site will inform you of the breach’s details.

The security firm Synthient, responsible for gathering these logs, reported that the data was sourced from underground markets and Telegram channels where hackers routinely share stolen credentials.

Benjamin Brundage, an analyst at Synthient, emphasized the widespread impact of the infostealer malware revealed by their findings.

While most entries consist of passwords reused from earlier breaches, researchers identified millions of newly compromised Gmail accounts that still matched active credentials.

The breach was first unearthed in April but only came to light in the past week. It affects not just Gmail, but also login information for Outlook, Yahoo, and numerous other online services.

Hunt pointed out that these stolen credentials have often recycled through various forums over years, creating ample opportunities for criminals to exploit reused passwords.

Importantly, Hunt clarified that this incident did not arise from a direct hack into Gmail itself. Instead, it involved malware planted on users’ devices, which then captured their login credentials.

Experts have highlighted how the fallout from this breach extends beyond just email concerns. Many users tend to reuse passwords for different accounts—think cloud storage, banking, social media—making them vulnerable. This practice opens the door for attackers to execute “credential stuffing,” an automatic method for testing stolen username-password pairs across various platforms.

A Google spokesperson responded to the situation, noting that reports of a Gmail security breach affecting millions are inaccurate. The spokesperson explained that the issue stems from misinterpretations of ongoing updates to databases tracking credential theft, rather than a specific attack targeting Gmail itself.

They encouraged users to adopt best practices for safeguarding their credentials. This includes enabling two-step verification, using passkeys instead of traditional passwords, and changing passwords if they have been compromised in mass breaches like this one.

Cybersecurity professionals worldwide are urging Gmail users to take immediate action. If you think you may be one of the 183 million affected, it’s crucial to update your email password and activate two-factor authentication without delay.

Michael Tigges, a British security analyst, reiterated that even though Gmail as a platform wasn’t directly compromised, this incident serves as a crucial reminder for those who rely on browsers to store their credentials.

Tiggs pointed out that the data involved is an aggregation from millions of stolen logs, underscoring the risk of sharing passwords across different services.

Graham Cluley, another security blogger, advised that everyone should use unique passwords for every online account and recommend storing them in a secure, encrypted password manager instead of relying on browsers, which can easily be accessed by malware.

Google’s own Password Manager Checkup tool scans saved login information in Chrome, alerting users to weak or compromised passwords. If a large credential dump is detected, the tool will automatically prompt password resets.

Most of the stolen credentials likely came from fake software downloads, phishing attachments, or dubious browser extensions, often without the victims’ knowledge.

A Google representative confirmed that the company is aware of the breach and is implementing measures to protect users.

Prevention is critical, according to Tigges. Keeping your antivirus updated and downloading software only from trusted sources is vital.

While the sheer size of this breach is alarming, Hunt cautioned that complacency poses the greatest risk. Password reuse is particularly dangerous, he noted.

Experts warned that attackers might leverage this database over time, selling verified Gmail logins to various fraud networks.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News