Anatomy of a Breach

Anatomy of a Breach: 16 Billion Credentials Leaked — The Infostealer Aggregation That Dwarfed Collection #1

> series: anatomy_of_a_breach —— part: 203 —— event: 16_billion_credentials —— sources: infostealers + breach_compilations —— scale: 20x_collection_1<span class="cursor-blink">_</span>_

Hedgehog Security 30 November 2025 13 min read

16 billion credentials. Google. Apple. Facebook. GitHub. A credential buffet for every attacker on earth.

In mid-2025, researchers at Cybernews uncovered 30 exposed datasets containing more than 16 billion login credentials — including usernames and passwords for Google, Apple, Facebook, Telegram, GitHub, and government services worldwide. The datasets were not from a single breach but from a massive aggregation: credentials harvested by infostealer malware (Vidar, RedLine, Raccoon, and others) combined with data from earlier breaches, compiled and hosted openly online.

The 16 billion credential compilation dwarfed Collection #1 (773 million unique email/password combinations, 2019) by a factor of twenty. It also eclipsed the 3.2 billion compilation that circulated in 2021. The sheer volume — 16 billion credentials — effectively meant that a significant proportion of every internet user's passwords were available to attackers, enabling credential stuffing at industrial scale. The compilation was the culmination of years of infostealer malware activity — the same threat vector that powered the Snowflake campaign (2024) and now represented an existential challenge to password-based authentication.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

16 billion stolen credentials. Password-only authentication is finished.

MFA Is No Longer Optional — It Is Existential
With 16 billion credentials available, every password must be assumed compromised. <a href="/cyber-essentials">Cyber Essentials Danzell's</a> auto-fail criterion for absent MFA is validated by 16 billion data points. MFA is the only control that protects when passwords are known.
Infostealers: The Credential Supply Chain
The majority of the 16 billion credentials were harvested by infostealer malware installed on personal devices — creating a parallel supply chain of stolen authentication data that feeds credential stuffing, account takeover, and initial access for ransomware. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for infostealer indicators and credential exposure.
Aggregation as Weapon
No single platform was breached to create the 16 billion credential dataset — it was aggregated from thousands of sources over years. The aggregation itself is the weapon: enabling attackers to test stolen credentials against any platform at scale. <a href="https://www.socinabox.co.uk/blog/what-is-the-dark-web-business-guide">Dark web monitoring</a> through <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects when your organisation's credentials appear in these compilations.
Passkeys and FIDO2: The Path Forward
The 16 billion credential leak reinforced the case for passwordless authentication — passkeys, FIDO2 hardware tokens, and other phishing-resistant methods that cannot be harvested by infostealers. <a href="/cyber-essentials">Cyber Essentials Danzell</a> addresses phishing-resistant MFA implementation. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> evaluates authentication architecture.

Assume every password is compromised. Enforce MFA. Adopt passkeys. Now.

The 16 billion credential compilation is the definitive evidence that password-only authentication has failed. Cyber Essentials Danzell mandates MFA. Our penetration testing validates MFA enforcement and tests for credential-stuffing resilience. SOC in a Box monitors for credential compromise and infostealer activity. And UK Cyber Defence provides incident response when credential compromise leads to account takeover.


16 billion credentials. Your passwords are compromised. MFA and passkeys are the only answer.

<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA. <a href="/penetration-testing">Penetration testing</a> validates enforcement. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for credential compromise.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles