TLDR More than 183 million email passwords were exposed through infostealer malware, including millions of Gmail accounts The 3.5 terabyte data dump was detected by Have I Been Pwned founder Troy Hunt and security firm Synthient Google confirmed Gmail servers were not breached; credentials were stolen from infected devices through malware About 16.4 million email [...] The post Is Your Gmail Password Leaked? 183 Million Accounts Exposed in Massive Breach appeared first on CoinCentral.TLDR More than 183 million email passwords were exposed through infostealer malware, including millions of Gmail accounts The 3.5 terabyte data dump was detected by Have I Been Pwned founder Troy Hunt and security firm Synthient Google confirmed Gmail servers were not breached; credentials were stolen from infected devices through malware About 16.4 million email [...] The post Is Your Gmail Password Leaked? 183 Million Accounts Exposed in Massive Breach appeared first on CoinCentral.

Is Your Gmail Password Leaked? 183 Million Accounts Exposed in Massive Breach

TLDR

  • More than 183 million email passwords were exposed through infostealer malware, including millions of Gmail accounts
  • The 3.5 terabyte data dump was detected by Have I Been Pwned founder Troy Hunt and security firm Synthient
  • Google confirmed Gmail servers were not breached; credentials were stolen from infected devices through malware
  • About 16.4 million email addresses were newly exposed, while 91% of leaked data came from previous breaches
  • Users can check if their email was compromised at HaveIBeenPwned.com and should enable two-factor authentication

A data leak containing more than 183 million email passwords surfaced online this month. The breach includes millions of Gmail accounts along with credentials from Outlook, Yahoo, and other web services.

Troy Hunt, who runs the breach-notification site Have I Been Pwned, reported the discovery. The Australian security researcher said the 3.5 terabyte dataset contains information from 23 billion records.

The stolen credentials came from infostealer malware rather than a direct server breach. These programs secretly collect usernames and passwords from infected devices as users browse the internet.

Security firm Synthient gathered the data from criminal marketplaces and underground Telegram channels. The firm tracked the stolen information over a yearlong investigation.

About 16.4 million email addresses appeared in the database for the first time. The remaining 91% of leaked data had been exposed in earlier breaches.

How the Breach Happened

The malware infections typically spread through fake software downloads and phishing attachments. Browser extensions also serve as a common entry point for these credential-stealing programs.

Benjamin Brundage of Synthient said the findings demonstrate the widespread reach of infostealer malware. The firm reported that stolen credentials jumped more than 800% in the first half of 2025.

In some cases, Synthient recorded up to 600 million stolen passwords in a single day. The scale shows how quickly these programs can harvest login information.

Users often have no idea their devices were infected. The malware operates in the background while capturing credentials for multiple websites and services.

Impact Beyond Email

The breach extends beyond email accounts because many people reuse passwords across different platforms. Attackers can use credential stuffing to test stolen username-password pairs on banking sites, social media, and cloud storage.

This automated process allows criminals to access victims’ entire digital lives. The stolen credentials often reappear across forums for years.

Google issued a statement clarifying that Gmail’s servers were not compromised. A company spokesperson said the reports stem from ongoing updates to credential theft databases.

Security Recommendations

Google urged users to enable two-step verification or switch to passkeys. The company also recommended visiting Have I Been Pwned to check if an email address was included in the breach.

Users can enter their email address on the site to see if their credentials were compromised. The site provides the date and nature of any detected breaches.

Security experts recommend changing passwords immediately if affected. Users should also avoid storing credentials in web browsers, which malware can easily access.

Password managers with encryption offer better protection than browser-based storage. Google’s Password Manager Checkup tool scans saved logins in Chrome and warns about weak or reused passwords.


GOOGL Stock Card
Alphabet Inc., GOOGL

The leak first appeared in April and became public last week. Alphabet shares rose 3.60% on Monday despite the news, closing at $269.27 ahead of the company’s Q3 earnings report on October 29.

The post Is Your Gmail Password Leaked? 183 Million Accounts Exposed in Massive Breach appeared first on CoinCentral.

Market Opportunity
Moonveil Logo
Moonveil Price(MORE)
$0,001998
$0,001998$0,001998
-0,05%
USD
Moonveil (MORE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
What Is Zero Knowledge Proof (ZKP)? Inside The Blockchain Network Built for Private Computation & Secure Data Sharing

What Is Zero Knowledge Proof (ZKP)? Inside The Blockchain Network Built for Private Computation & Secure Data Sharing

Dive into Zero Knowledge Proof’s privacy-first blockchain, infrastructure, and presale auction system. Plus, see why analysts are calling it the best crypto to
Share
CoinLive2026/01/28 01:00
UNI Technical Analysis Jan 27

UNI Technical Analysis Jan 27

The post UNI Technical Analysis Jan 27 appeared on BitcoinEthereumNews.com. UNI is stabilizing around 4.69$ amid intraday fluctuations, with a short-term downtrend
Share
BitcoinEthereumNews2026/01/28 01:26