Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database

Posted on January 26, 2026January 26, 2026 By CWS

An enormous database containing 149 million stolen login credentials was found uncovered on-line with out password safety or encryption.

Posing severe safety dangers to customers of Gmail, Instagram, Fb, Netflix, and hundreds of different platforms worldwide.

The publicly accessible database contained 149,404,754 distinctive logins and passwords harvested by means of infostealer malware and keylogging software program.

Every file included e mail addresses, usernames, passwords, and the precise URL hyperlinks for account authorization.

 Whole rely of data and dimension of the uncovered infostealer database(supply: ExpressVPN)

This offers cybercriminals with the whole lot they should execute automated credential-stuffing assaults in opposition to thousands and thousands of victims who might not notice their info has been compromised.

Breakdown of Uncovered Accounts

A restricted sampling of the uncovered knowledge revealed alarming statistics throughout main e mail suppliers and standard platforms.

Roughly 48 million Gmail accounts had been compromised, alongside 4 million Yahoo accounts, 1.5 million Outlook accounts, 900,000 iCloud accounts, and 1.4 million .edu e mail addresses from academic establishments.

Social media platforms sustained substantial publicity, with 17 million Fb credentials, 6.5 million Instagram logins, and 780,000 TikTok accounts showing within the dataset.

Leisure streaming providers had been closely affected, together with 3.4 million Netflix accounts, whereas monetary platforms confirmed 420,000 Binance cryptocurrency accounts uncovered.

The database even contained 100,000 OnlyFans credentials, affecting each content material creators and subscribers.

Significantly regarding was the presence of credentials related to .gov domains from quite a few nations.

Whereas not each authorities account grants entry to labeled techniques, even restricted entry may allow focused spear-phishing campaigns and impersonation assaults.

Function entry factors into authorities networks, posing nationwide safety and public security dangers.

The database additionally included banking logins, bank card credentials, crypto pockets entry, and buying and selling account info.

The data contained structured metadata together with “host_reversed path” formatting (com.instance.consumer.machine) to arrange stolen knowledge by sufferer and supply, with distinctive line hashes serving as doc IDs to stop duplicates.

The index may very well be searched utilizing solely an online browser(supply: ExpressVPN)

Delayed Response and Rising Risk

Cybersecurity researcher Jeremiah Fowler uncovered the 96 GB repository and reported his findings to ExpressVPN as a part of ongoing efforts to spotlight vital knowledge publicity threats.

After discovering the publicity, Fowler reported it on to the internet hosting supplier by means of their abuse kind.

The response was delayed, with the supplier initially claiming they didn’t host the IP tackle and {that a} subsidiary operated independently.

It took practically one month and a number of makes an attempt earlier than the database was lastly suspended and faraway from public entry.

Disturbingly, the variety of data elevated between preliminary discovery and last restriction, indicating ongoing knowledge assortment throughout the publicity interval.

The internet hosting supplier refused to disclose who owned the database, leaving uncertainty over its objective, publicity period, and potential entry by others.

Safety consultants suggest putting in antivirus software program instantly, with a 2025 report exhibiting that solely 66 p.c of U.S. adults use such safety.

Customers ought to allow two-factor authentication throughout all accounts, make the most of password managers with distinctive credentials for every service, and monitor login histories for unauthorized entry makes an attempt.

Anybody who suspects gadget an infection ought to instantly replace working techniques, scan for malware, and evaluate app permissions and browser extensions.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:48M, 6.5M, Database, Exposed, Gmail, Instagram, Online, Unprotected

Post navigation

Previous Post: Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request
Next Post: Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

Related Posts

Elephant APT Group Attacking Defense Industry Leveraging VLC Player, and Encrypted Shellcode Cyber Security News
Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Cyber Security News
PoC Exploit Released for ImageMagick RCE Vulnerability Cyber Security News
New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines Cyber Security News
UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware Cyber Security News
Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apache Hadoop Vulnerability Exposes Systems Potential Crashes or Data Corruption
  • Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid
  • Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
  • 48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database
  • Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apache Hadoop Vulnerability Exposes Systems Potential Crashes or Data Corruption
  • Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid
  • Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
  • 48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database
  • Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark