16 Billion Password Leak Puts Apple, Facebook, and Google Accounts in Immediate Danger—Experts Urge a Shift to Passkeys
Share

A record-shattering 16 billion fresh usernames and passwords leak—enough to unlock Apple IDs, Facebook profiles, Google accounts, GitHub repos, Telegram chats, and even government portals—were recently found sitting in 30 unsecured cloud databases, the largest of which holds 3.5 billion credentials. Cybernews researchers call the cache “a blueprint for mass exploitation,” warning that its clean CSV-style format lets criminals automate credential-stuffing, phishing, and full account takeovers within minutes. Google and the FBI have both issued urgent alerts: change every reused password right now and move to phishing-proof login methods like passkeys.
How the Leak Happened
- Infostealer malware siphoned browser-saved logins, cookies, and MFA tokens from infected devices, then dumped them into misconfigured Elasticsearch and object-storage buckets.
- Automated scanners indexed the buckets; researchers grabbed copies before the files quietly vanished again.
- Each dump follows the same structure—URL, username, password—so bots can plug the data straight into login forms.
Why This Breach Is Different
Factor |
Typical Breach |
This Leak |
Data age |
Months or years old |
Days to weeks old |
Sources |
One hacked site |
30 separate datasets |
Largest file |
Tens of millions |
3.5 billion records |
Extras |
Emails alone |
Cookies & MFA-bypass tokens |
Fresh, well-structured credentials raise attackers’ success rates and shorten intrusion time.
Expert Voices on the Risk
- Cybernews research team: “This isn’t just another leak; it’s fresh, weaponizable intelligence at scale.”(cybernews.com)
- Darren Guccione, CEO, Keeper Security: “The sheer value of these credentials for widely used services carries far-reaching implications; businesses without strong MFA are wide open.”(ndtv.com)
- Google Security Team: “It’s important to use tools that automatically secure your account and protect you from scams—passkeys are phishing-resistant by design.”(ndtv.com)
- FBI advisory: Expect a surge in SMS and email lures; avoid clicking links and enable multi-factor authentication everywhere.(forbes.com)
Who’s Most at Risk
- Anyone reusing the same password across multiple sites.
- Organizations that still rely on password-only VPN or SaaS logins.
- Developers with GitHub tokens or API keys stored in browser sessions.
- Government staff using single-sign-on portals without MFA.
Five Immediate Steps for Individuals
- Change every reused password now, starting with email, banking, and cloud storage.
- Enable MFA or passkeys on every service that offers them.
- Check Have I Been Pwned for breach alerts on all email addresses.
- Delete browser-saved passwords; store new ones in a reputable manager.
- Stay alert for realistic phishing emails and texts referencing services you use.
Five Immediate Steps for Businesses
- Force company-wide credential resets and ban password reuse.
- Mandate MFA by default on email, VPN, and cloud consoles.
- Monitor endpoints for infostealers and rogue browser extensions.
- Audit and revoke stale SaaS tokens and session cookies.
- Adopt zero-trust access, validating every session—not just every user.
Final Thought—Why Passkeys Matter Now
Passwords have had a long run, but this 16-billion-record leak shows they’re no defense against modern crimeware. Passkeys, built on the FIDO2 standard, replace static strings with cryptographic keys stored on your phone or hardware token. They block credential-stuffing, neutralize look-alike phishing sites, and end the hassle of memorizing complex phrases. Every account you convert to passkeys is one less line in the next breach. Start the switch today, and help your team and family do the same.