Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets

Posted on November 3, 2025November 3, 2025 By CWS

Proton has launched a brand new initiative referred to as the Information Breach Observatory. This program reveals severe issues that exist on the web.

The cybersecurity firm revealed that over 300 million stolen credentials are at present circulating on darkish internet cybercrime markets, placing companies and people at unprecedented danger.

This huge publicity highlights the rising underground financial system constructed on stolen private and company knowledge. The info paints a disturbing image for small companies, which have develop into prime targets for cybercriminals.

In response to Proton’s analysis, 4 out of 5 small companies have skilled a knowledge breach lately. The monetary influence is devastating, with a single incident doubtlessly costing a small agency over a million {dollars}.

Regardless of these alarming statistics, most breaches go unreported, leaving firms unaware of their vulnerabilities till it’s too late. Conventional breach notification programs typically fail to alert affected organizations promptly.

Small Companies Face Million-Greenback Threats

Many companies solely uncover they’ve been compromised months and even years after the preliminary assault. This delayed consciousness provides cybercriminals ample time to take advantage of stolen credentials, resulting in additional safety incidents, monetary fraud, and identification theft.

Proton is taking a proactive method by instantly monitoring darkish internet marketplaces. The Information Breach Observatory repeatedly scours underground boards and prison marketplaces the place stolen knowledge is purchased and offered.

By capturing and analyzing these leaks in actual time, Proton supplies companies with speedy alerts when their info seems on these platforms. The observatory’s newest findings reveal ten main knowledge breaches from 2025 alone, affecting organizations throughout a number of industries and nations.

Among the many most important incidents is the Qantas Airways breach, which uncovered info from 11.8 million data, together with names, beginning dates, addresses, cellphone numbers, and e mail addresses.

The telecommunications sector was significantly arduous hit, with Free in France struggling a large breach affecting over 19 million prospects, together with delicate banking info equivalent to IBANs.

The breaches documented by Proton span a number of continents and industries, from transportation and telecommunications to monetary providers and expertise firms.  

Allianz Life in Germany noticed a million data compromised, together with extremely delicate social safety numbers. In the meantime, SkilloVilla in India skilled one of many largest exposures, with over 33 million data containing private contact info leaked to darkish internet markets.

CompanyCountryRecords ExposedCompromised DataQantas AirwaysAustralia11.8 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail addressAllianz LifeGermany1 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail handle, social safety numberTraceloUnited States1.4 million+Identify, bodily handle, cellphone quantity, e mail handle, passwordINTERSPORT FranceFrance105,782Name, bodily handle, cellphone quantity, e mail addressFreeFrance19 million+Identify, date of beginning, cellphone quantity, e mail handle, IBANOrange RomaniaRomania3.4 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail handle, username, ID numberZacks Funding ResearchUnited States5.4 million+Identify, bodily handle, cellphone quantity, e mail handle, username, passwordSkilloVillaIndia33 million+Identify, bodily handle, cellphone quantity, e mail addressamaiSingapore10 million+Identify, bodily handle, cellphone quantity, e mail handle, passwordPhoneMondoGermany10 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail handle, username, password, IBAN

The number of compromised knowledge varieties is equally regarding. Past primary contact info, cybercriminals have obtained passwords, social safety numbers, banking particulars, and identification numbers. This complete knowledge permits subtle identification theft operations and account takeover assaults.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Credentials, Cybercrime, Dark, Exposes, Markets, Million, Proton, Sale, Stolen, Web

Post navigation

Previous Post: Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure
Next Post: How Continuous Exposure Management Transforms Security Operations

Related Posts

Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation Cyber Security News
Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News
Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure Cyber Security News
Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials Cyber Security News
Snake Keyloggers Abuse Java Utilities to Evade Security Tools Cyber Security News
Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News