News spread early Fridaythat a record-breaking data breach exposed 16 billion passwords to the world995 Archives including user credentials for the likes of Facebook, Google, Apple, and tons of other places. Some commentators were quick to call it the largest password leak in history, and in terms of raw records exposed, that’s mostly, technically true. However, these records did notcome from a single breach — or even a new breach. Instead, they came from many smaller ones.
Data breaches are an unfortunate reality in the digital age, and some of the breaches can be quite large. However, not every release of stolen data is the direct result of a recent cybersecurity breach. As Mashable recently reported in our countdown of the top cybersecurity breaches of 2025, hackers will often compile information from multiple prior hacks and combine them into one massive file. This is becoming a trend in the darker corners of the internet. The end result is more of a “greatest hits” rather than a new, noteworthy hack.
Such is the case here. Per Bleeping Computer, the information contained in the 16 billion records was most likely compiled from a host of prior hacks, compiled, and then released as a single set of data. It was likely circulating for some time before being compiled, and likely came from a combination of breaches, hacks, phishing scams, and malware.
This is backed up by a tweetfrom vx-underground, an educational website that specializes in malware and cybersecurity. “Someone took a bunch of existing leaks, threw it all together, and slapped a NEW stick [sic] on it.”
This Tweet is currently unavailable. It might be loading or has been removed.
However, the existence of all this data in one spot is still rather damaging, as cybercriminals now have access to all of this data in a single spot, potentially making it much easier to concoct more effective phishing scams or engage in identity theft.
The largest single-point data breach in history is still Yahoo’s 2016 breach, when hackers stole data about all three billion of the website’s users.
Mashable is live at VidCon 2025:Check out our VidCon coveragewith your favorite content creators now.
With so many records in one spot — even if some of them are legacy data that is no longer relevant — it’s still probably a good idea to take an audit of your online services to make sure you’re protected. A good place to start is Have I Been Pwned, a website dedicated to showing data breaches. Simply go there, enter your email address(es), and the site will show you which credentials have been exposed to the public.
We recommend changing those credentials immediately if you haven’t already, and using a strong password when you do so, as they are more difficult to crack. After that, you’ll want to enable multi-factor authenticationon every account you possibly can, as the added layer helps keep criminals from stealing your life if they obtain your password. That should be the bare minimum, but there are plenty of other steps you can taketo keep yourself safe online as well.
Have a story to share about a scam or security breach that impacted you? Tell us about it. Email [email protected]with the subject line "Safety Net" or use this form.Someone from Mashable will get in touch.
Topics Cybersecurity
Google Pixel 9 is rumored to steal this iPhone 14 and iPhone 15 featureBest Sony headphones deals: Save on Sony gaming headphonesBest Sony headphones deals: Save on Sony gaming headphonesHundreds of 'sea potatoes' have washed up on a beach in CornwallWatch as SpaceX launches, then lands another Falcon 9 rocketOrca mother ends 'tour of grief' for her newborn after 17 days and 1,000 miles'Bluey' special episode 'The Sign' had a ton of Easter eggs for fansNYT's The Mini crossword answers for April 13Tesla addresses security concerns over Sentry Mode in China · TechNodeLi Auto aims to surpass BMW, Mercedes, and Audi in sales in China by 2024 · TechNodeXiaomi launches its third generation foldable phone Mix Fold 3 · TechNodeTencent’s unfair competition action against Douyin and Duoshan to be reTesla China lowers Model Y prices amid rising market competition · TechNodeWhy the bears of Alaska's bear cam are still sticking around the riverHere are the glorious proposed logos for Donald Trump's Space ForceHow does recycling work in the United States?Why the bears of Alaska's bear cam are still sticking around the riverNo, your breakfast cereal probably won't poison you with pesticidesGoogle Pixel 9 is rumored to steal this iPhone 14 and iPhone 15 featureTrump admin kills rule making companies pay for public land damages Ice dragons on 'Game of Thrones': Could Dany wake dragons from stone? 'Stranger Things' pop Canada's forests are on fire, and the smoke is seeping into the Arctic August is the Sunday of the year Instagram's new update adds a fun new way to reply to direct messages Women of color who left Google share stories of racism and discrimination Here's what that 'Defenders' ending means for Marvel's other Netflix shows 'Game of Thrones' Tormund and Brienne remains the largest 'ship on the internet Facebook is finally purging annoying fake videos from your News Feed Moonhack breaks a world record for kids coding, again Preview Skype's controversial millennial Hackers just sent us practically all of HBO's social media passwords Does Microsoft’s new patent mean you’re finally getting a Surface Phone? The Defenders: Misty Knight's injury teases 'Daughters of the Dragon' Mark Zuckerberg is taking two months off to spend time with his second daughter 'Game of Thrones': 6 ways to transport White Walkers south of the wall Lasers and giant speakers: How airports chase birds off the runway Gasping for air (and good business sense) at the summit of Mount Everest The definitive ranking of 'Game of Thrones' characters most likely to die in episode 6 Stunning new view of Jupiter flips Great Red Spot on its side
3.5415s , 8230.328125 kb
Copyright © 2025 Powered by 【1995 Archives】,Exquisite Information Network