Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets

Posted on November 3, 2025November 3, 2025 By CWS

Proton has launched a brand new initiative referred to as the Information Breach Observatory. This program reveals severe issues that exist on the web.

The cybersecurity firm revealed that over 300 million stolen credentials are at present circulating on darkish internet cybercrime markets, placing companies and people at unprecedented danger.

This huge publicity highlights the rising underground financial system constructed on stolen private and company knowledge. The info paints a disturbing image for small companies, which have develop into prime targets for cybercriminals.

In response to Proton’s analysis, 4 out of 5 small companies have skilled a knowledge breach lately. The monetary influence is devastating, with a single incident doubtlessly costing a small agency over a million {dollars}.

Regardless of these alarming statistics, most breaches go unreported, leaving firms unaware of their vulnerabilities till it’s too late. Conventional breach notification programs typically fail to alert affected organizations promptly.

Small Companies Face Million-Greenback Threats

Many companies solely uncover they’ve been compromised months and even years after the preliminary assault. This delayed consciousness provides cybercriminals ample time to take advantage of stolen credentials, resulting in additional safety incidents, monetary fraud, and identification theft.

Proton is taking a proactive method by instantly monitoring darkish internet marketplaces. The Information Breach Observatory repeatedly scours underground boards and prison marketplaces the place stolen knowledge is purchased and offered.

By capturing and analyzing these leaks in actual time, Proton supplies companies with speedy alerts when their info seems on these platforms. The observatory’s newest findings reveal ten main knowledge breaches from 2025 alone, affecting organizations throughout a number of industries and nations.

Among the many most important incidents is the Qantas Airways breach, which uncovered info from 11.8 million data, together with names, beginning dates, addresses, cellphone numbers, and e mail addresses.

The telecommunications sector was significantly arduous hit, with Free in France struggling a large breach affecting over 19 million prospects, together with delicate banking info equivalent to IBANs.

The breaches documented by Proton span a number of continents and industries, from transportation and telecommunications to monetary providers and expertise firms.  

Allianz Life in Germany noticed a million data compromised, together with extremely delicate social safety numbers. In the meantime, SkilloVilla in India skilled one of many largest exposures, with over 33 million data containing private contact info leaked to darkish internet markets.

CompanyCountryRecords ExposedCompromised DataQantas AirwaysAustralia11.8 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail addressAllianz LifeGermany1 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail handle, social safety numberTraceloUnited States1.4 million+Identify, bodily handle, cellphone quantity, e mail handle, passwordINTERSPORT FranceFrance105,782Name, bodily handle, cellphone quantity, e mail addressFreeFrance19 million+Identify, date of beginning, cellphone quantity, e mail handle, IBANOrange RomaniaRomania3.4 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail handle, username, ID numberZacks Funding ResearchUnited States5.4 million+Identify, bodily handle, cellphone quantity, e mail handle, username, passwordSkilloVillaIndia33 million+Identify, bodily handle, cellphone quantity, e mail addressamaiSingapore10 million+Identify, bodily handle, cellphone quantity, e mail handle, passwordPhoneMondoGermany10 million+Identify, date of beginning, bodily handle, cellphone quantity, e mail handle, username, password, IBAN

The number of compromised knowledge varieties is equally regarding. Past primary contact info, cybercriminals have obtained passwords, social safety numbers, banking particulars, and identification numbers. This complete knowledge permits subtle identification theft operations and account takeover assaults.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Credentials, Cybercrime, Dark, Exposes, Markets, Million, Proton, Sale, Stolen, Web

Post navigation

Previous Post: Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure
Next Post: How Continuous Exposure Management Transforms Security Operations

Related Posts

Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News
QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code Cyber Security News
CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks Cyber Security News
71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks Cyber Security News
Building a Scalable Cybersecurity Training Program Cyber Security News
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools
  • CISO Burnout – Epidemic, Endemic, or Simply Inevitable?
  • Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases
  • New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools
  • CISO Burnout – Epidemic, Endemic, or Simply Inevitable?
  • Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases
  • New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News