16 billion
Stolen credentials compiled across 30 separate dark web databases, the largest credential compilation ever documented — covering Google, Apple, Facebook, GitHub, VPNs, and government portals
184 million
Enterprise and government-focused records in the compilation, targeting corporate VPN credentials, internal portals, developer platform keys, and SaaS platform logins
48 hours
Typical window from infostealer malware infection on a corporate device to the appearance of stolen credentials for sale on dark web markets
1 in 3
Login attempts across F5-monitored enterprise environments in 2026 that use credentials sourced from known leaked compilations, confirming the compilation is actively weaponized

Security researchers confirmed 16 billion stolen login credentials circulating across 30 dark web databases in June 2025, and active trading of this data has continued into May 2026 with new infostealer logs feeding fresh records into the compilation weekly.

The 16 billion credentials leak comprises data compiled by Cybernews researchers from 30 separate underground datasets, collectively covering credentials for Google, Apple, Facebook, GitHub, enterprise VPNs, developer portals, and government platforms. The leak did not originate from a single breach. Infostealer malware families RedLine and Raccoon, along with dozens of smaller variants, harvested these credentials from infected personal and corporate devices over several years, then sold the logs on underground markets where operators aggregated them into searchable compilations.

The technical content of the datasets amplifies the risk beyond plain password lists. Beyond email and password pairs, the datasets include active session tokens and authentication cookies captured directly from infected browsers. These tokens bypass multi-factor authentication entirely because they represent an already-authenticated session. An attacker with a valid session token does not need your password or your MFA code — the session is already open. Security researchers at F5 confirmed that nearly one in three login attempts across monitored enterprise environments in 2026 use credentials sourced from dumps like this one.

Organizations that have not checked their domain exposure against this compilation face a measurable account takeover risk today. Check every corporate email address against Have I Been Pwned. If any match returns, treat the associated account as compromised until the password is rotated and all active sessions are revoked.

What Is the 16 Billion Credentials Leak?

The 16 billion credentials leak is a compilation of 30 separate underground datasets totaling approximately 16 billion stolen login records, first identified by Cybernews researchers in June 2025. Each dataset averaged over 500 million records, with the largest single database containing 3.5 billion credentials.

This is not a single breach of one company's database. Cybernews researchers found that the data originates from three sources: infostealer malware logs collected over multiple years, credential stuffing compilations previously circulated on hacking forums, and repackaged credentials from historical breaches. The aggregation of all three sources into one searchable compilation represents a qualitative upgrade in attacker capability. Instead of running separate campaigns against fragmented data, adversaries can query one source for any combination of target email, platform, and password.

The 30 databases cover virtually every major online platform: Apple, Google, Facebook, Microsoft, GitHub, and government portals are all confirmed as represented in the dataset. An enterprise and government subset of 184 million records focuses specifically on corporate systems, internal portals, VPN credentials, and developer platform accounts, making this directly actionable against business targets.

Through May 2026, portions of the compilation continue to circulate on underground markets. Infostealer operators feed new logs into the ecosystem daily, meaning the overall pool of available credentials expands continuously rather than representing a fixed historical dataset.

How Infostealer Malware Feeds Dark Web Credential Markets

Infostealer malware is software designed to silently extract credentials, session cookies, and authentication tokens from infected devices without triggering visible symptoms. Two of the most prevalent families documented in this compilation are RedLine and Raccoon, both commercially available malware-as-a-service tools that any threat actor can license for several hundred dollars per month on underground forums.

A typical infostealer infection begins with a drive-by download, a malicious email attachment, or a trojanized software installer. Once executed, the malware queries the browser credential store, extracting saved usernames and passwords from Chrome, Firefox, and Edge in plain text. The malware also captures session cookies and authentication tokens currently stored in the browser, representing active authenticated sessions on platforms where the user has MFA enabled.

Security Boulevard documented the critical exploitation window: infostealer logs reach dark web markets within 48 hours of device infection. A corporate employee whose laptop is infected at 9:00 AM Monday may find their VPN credentials, Salesforce session token, and GitHub API key on a criminal marketplace by 9:00 AM Wednesday. Most organizations lack the detection capability to identify an infostealer infection within that window.

The 16 billion credentials leak represents years of accumulated infostealer output, aggregated into a resource that eliminates the operational overhead of running an infostealer campaign. An attacker purchases access to the compiled output and begins credential stuffing or session hijacking immediately.

For context on how similarly aggregated identity data circulates on dark web markets, see the 676 million SSN exposure via Infutor and Verisk, where records compiled without authorization became an immediately actionable attack resource.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Scope: Which Platforms and Organizations Face the Highest Exposure?

The 16 billion credentials compilation covers every major platform category: consumer accounts (Google, Apple, Facebook), professional platforms (GitHub, LinkedIn, Microsoft 365), security infrastructure (VPN credentials, firewall management portals), developer tooling (npm, Docker Hub, AWS access keys), and government portals.

The 184 million enterprise and government-focused records represent the highest-risk subset for corporate security teams. This subset specifically targets credentials for internal business systems — credentials that are far less likely to have been reset after historical breaches because organizations often do not know which specific credentials appear in aggregated compilations.

Any organization whose employees use corporate email addresses for personal accounts on major platforms faces elevated exposure. Credential stuffing tools automatically test every email-password combination across hundreds of target sites simultaneously. A reused password that appears in the 16 billion compilation will be tested against the target organization's VPN login, cloud console, and email portal within hours of the credentials being purchased.

GitHub and cloud platform credentials carry the highest downstream impact. A single valid API key or developer token in the dataset provides access to source code repositories and production infrastructure without triggering standard authentication monitoring. Security teams reviewing Microsoft Entra ID or Google Admin sign-in logs for anomalous authentications will surface credential stuffing hits if monitoring is configured to flag logins from residential proxy IP ranges.

Are the 16 Billion Credentials Still Active? Understanding Data Freshness

The central question organizations need to answer is whether these credentials are still valid.

Plain-text username and password pairs are dangerous only if the password has not been changed since the original infostealer infection. Organizations with regular password rotation policies will have neutralized a portion of their exposure. Organizations that have never forced a password reset following a known breach remain fully exposed.

Session tokens and authentication cookies represent a separate and more immediate risk category. Session tokens do not expire with a password change. They expire only when the session is explicitly revoked or the token's natural expiration time is reached. An active session token captured by an infostealer in 2025 may still be valid today if the underlying session has not been terminated. Google Workspace, Apple, Facebook, and enterprise SaaS platforms all issue session tokens that persist for weeks or months without explicit revocation.

The compilation is not a static historical artifact. Infostealer operators continued adding fresh logs to the dark web ecosystem throughout 2025 and into 2026, meaning a subset of the 16 billion records reflects infections from within the past six months. Security researchers at InfoStealers.com confirmed that "many of these credentials are likely years old, already circulating on the dark web, and no longer valid," while also noting that the active session tokens and recent infostealer logs represent immediately usable attack material.

The practical response: treat every credential match as active until proven otherwise, revoke all sessions, and rotate passwords regardless of assumed data age.

How Attackers Use Stolen Credentials: Credential Stuffing, Session Hijacking, and MFA Fatigue

Three attack techniques dominate the exploitation of large credential compilations like the 16 billion credentials leak.

Credential stuffing is the highest-volume technique. Automated tools test every email-password combination from the compilation against target login portals, using residential proxy networks to distribute requests across millions of IP addresses. This evades rate limiting and IP-based blocking. F5 researchers documented that nearly one in three login attempts across monitored enterprise environments in 2026 use credentials sourced from known leaked compilations. The attack is fully automated: once credentials are purchased, a threat actor configures the stuffing tool, loads the target list, and waits for confirmed hits.

Session hijacking targets the session tokens and authentication cookies captured by infostealer malware alongside passwords. The attacker imports the session token into a browser, bypassing any authentication flow including MFA challenges. This technique is specifically effective against Google Workspace, Microsoft 365, Salesforce, GitHub, and cloud management consoles. Session hijacking requires no brute force because the session is already authenticated.

MFA fatigue attacks target accounts where plain-text credentials are available and MFA is configured as push notification or SMS. The attacker enters the valid username and password, triggering an MFA push notification to the account holder's device. The attacker sends repeated authentication requests until the account holder approves one out of frustration or confusion. Organizations using SMS-based or push-notification MFA remain fully vulnerable for any account whose password appears in the compilation.

For context on how credential exposure escalates into large-scale data extortion, see the ShinyHunters breach of 45 million McGraw-Hill records, where exposed PII immediately became the basis for follow-on credential and ransom attacks.

Nearly one-third of all logins across our monitored customer environments were attempted using credentials from known breach compilations in 2026.

F5 Threat Intelligence, May 2026

Dark Web Indicators: What to Search for Right Now

Before assigning remediation work, security teams should verify whether corporate credentials appear in the accessible portions of the compilation and confirm whether active credential stuffing campaigns are already targeting organizational infrastructure.

The four indicators below cover the exposure verification chain from device infection through to active attack confirmation.

Subscribe to unlock Indicators of Compromise

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

How to Verify Your Exposure and Protect Your Organization Now

Execute these steps in priority order. Prioritize session revocation and MFA hardening over password resets alone, because session tokens remain valid after a password change.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

Why the 16 Billion Credentials Leak Matters for Your Organization

The 16 billion credentials leak confirms that the dark web now holds a searchable compilation of credentials for virtually every major platform your employees have ever used on a device that has been infected with infostealer malware. The risk is not hypothetical: F5 measured that nearly one in three enterprise login attempts in 2026 draw from this and similar compilations.

The defining risk is not just password exposure. It is session token exposure. Every employee who accessed Google Workspace, Salesforce, Microsoft 365, GitHub, or a corporate VPN from a device that was subsequently infected with an infostealer has potentially contributed active session tokens to this compilation. Those tokens bypass every authentication control except explicit session revocation.

Three key takeaways for immediate action: infostealer malware is the upstream source of the 16 billion credentials compilation, and endpoint detection configured to catch RedLine and Raccoon artifacts is the only control that breaks the infection-to-sale pipeline at the source. Session tokens in the compilation bypass MFA — forced session revocation across all SaaS platforms is non-negotiable for any account returning a breach match. Running Have I Been Pwned domain search on your organization's email domain is the highest-priority five-minute action available to every security team today, before any attacker using credentials from this compilation attempts their next login.

The bottom line

The 16 billion credentials mega leak represents the single largest dark web credential compilation ever documented, covering every major platform with a confirmed 184 million enterprise and government records. Three key takeaways: infostealer malware is the upstream pipeline, and endpoint detection for RedLine and Raccoon breaks the cycle at the source. Session tokens in the compilation bypass MFA entirely, making forced SaaS session revocation mandatory for any exposed account. One concrete action to take before end of business today: run Have I Been Pwned domain search on every corporate email domain your organization owns, revoke sessions for every match, and enforce FIDO2 hardware keys on all privileged accounts.

Frequently asked questions

What is the 16 billion credentials leak?

The 16 billion credentials leak is a compilation of 30 separate underground datasets totaling approximately 16 billion stolen login records, first identified by Cybernews researchers in June 2025. The datasets did not originate from a single company breach. They combine years of infostealer malware logs harvested from infected personal and corporate devices, credential stuffing compilations previously circulated on hacking forums, and repackaged credentials from historical data breaches. The compilation covers credentials for Google, Apple, Facebook, GitHub, Microsoft, enterprise VPNs, developer portals, and government platforms.

How do I know if my credentials are in the 16 billion credential leak?

Run your corporate email domain through the Have I Been Pwned domain search at haveibeenpwned.com/domain-search. This checks your entire email domain against known breach compilations and returns a count of exposed addresses. For coverage of infostealer logs not indexed by HIBP, enterprise tools including BreachSense and SOCRadar Labs perform deep dark web scans that include stealer log marketplaces. Hudson Rock's Cavalier platform searches infostealer logs specifically and can surface active session tokens exfiltrated from employee devices.

Is the 16 billion credential leak a new data breach?

No. Security researchers including BleepingComputer and Proofpoint confirmed that the 16 billion credential compilation is not a single new breach of any one company. It is an aggregation of data collected over multiple years from infostealer malware infections, previous credential stuffing datasets, and recycled historical breaches. However, the compilation does include fresh data: infostealer operators continue adding new logs daily, meaning a subset of the 16 billion records reflects infections from 2025 and 2026. The risk is real even though there is no single responsible organization to notify.

What types of data were stolen in the 16 billion credentials mega leak?

The 30 databases contain email addresses paired with plain-text passwords captured from infected devices, service-specific credentials indicating where each login was valid, active session tokens captured from browser sessions at the time of infection, and authentication cookies for platforms including Google, Facebook, Microsoft 365, GitHub, and enterprise SaaS tools. The session tokens and authentication cookies are the most immediately dangerous data type because they represent already-authenticated sessions that bypass both password checks and multi-factor authentication.

Can stolen session tokens be used even if I have MFA enabled?

Yes. Session tokens and authentication cookies captured by infostealer malware represent an already-authenticated session. An attacker who imports a valid session token into a browser is authenticated as the account holder without entering a password or completing an MFA challenge. The session was already approved before the token was stolen. This is why forced session revocation across all platforms is a required response step when a credential match is found — changing the password alone does not invalidate existing sessions.

How quickly do stolen credentials reach dark web markets after an infostealer infection?

Security researchers at Security Boulevard documented a 48-hour window from infostealer infection to dark web credential sale as the current average. Some operators sell logs within 24 hours of collection. The fastest infostealer-as-a-service operations offer near-real-time log delivery to buyers. This 48-hour window means that an employee whose device is infected Monday morning may have their corporate credentials actively sold and tested against VPN portals by Wednesday morning, before most organizations complete their standard patch or incident detection cycle.

What should organizations do after the 16 billion credentials leak?

Execute these actions in priority order: run Have I Been Pwned domain search on all corporate email addresses and force-revoke all active sessions on any platform returning a match; deploy FIDO2 hardware security keys or passkeys on all administrator and privileged accounts to eliminate MFA fatigue and session hijacking as viable attack paths; run endpoint detection scans for RedLine and Raccoon infostealer artifacts on all employee devices; review authentication logs for credential stuffing patterns from residential proxy IP ranges; and move software downloads to IT-managed repositories to block infostealer delivery via malicious installers.

Which platforms are most affected by the 16 billion credential dump?

Cybernews researchers confirmed that the compilation includes credentials for Google, Apple, Facebook, Microsoft, GitHub, enterprise VPNs, developer portals, and government platforms. The enterprise-focused subset of 184 million records specifically targets corporate infrastructure: VPN credentials, internal portal logins, Salesforce, Microsoft 365, Google Workspace, and developer platform access tokens. GitHub and cloud platform credentials are particularly high-risk because a single valid API key or developer token can provide access to source code repositories and production infrastructure without triggering standard authentication monitoring.

Sources & references

  1. Cybernews — 16 billion passwords exposed in record-breaking data breach
  2. BlackFog — The World's Largest Credential Leak Hits 16 Billion Records
  3. F5 — 16 Billion Credentials Exposed: Why This Infostealer Leak Demands a Rethink of Bot Defense
  4. InfoStealers.com — 16 Billion Credentials Leak: A Closer Look at the Hype and Reality
  5. Security Boulevard — 48 Hours: The Window Between Infostealer Infection and Dark Web Sale

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.