We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Researchers Discover 16 Billion Login Details Exposed Online

Researchers Discover 16 Billion Login Details Exposed Online
Hendrik Human Published on July 10, 2025 Cybersecurity Researcher

Cybersecurity researchers have discovered what’s believed to be the largest-ever data breach, consisting of up to 16 billion login credentials. The data consists of usernames, passwords, session cookies, and authentication tokens from almost every major website and online service, including Facebook, TikTok, Google, Apple, Telegram, GitHub, and even some VPN services and government portals.

Between January and June 2025, the Cybernews team discovered 30+ separate datasets that were temporarily left exposed via “unsecured Elasticsearch or object storage instances.” The sizes of individual datasets ranged from roughly 16 million to 3.5 billion, with an average size of 550 million.

Unfortunately, they were unable to ascertain the owners of the data in most instances. So, it’s not clear whether it’s in the hands of “legitimate” entities or whether it has been stolen. Regardless, the fact that such massive quantities of sensitive data are frequently being exposed, often through misconfigured cloud systems, is troubling in itself.

However, many of the examined datasets did show some tell-tale signs of being collected using infostealer malware. The leaked data was typically organized by URLs matched with username and password pairings, a common theme in modern infostealers, like RedLine, Raccoon, and Vidar.

One of the datasets included in the study was an unprotected cloud system with 184 million login credentials, mostly from social media platforms, like Facebook and Snapchat.

Infostealers are a class of malware that infects a victim’s device and silently extracts info such as login credentials, browser cookies, session tokens, saved passwords, and autofill data. Cybercriminals typically collect this data into large databases, which they then sell on underground markets, potentially on the dark web. The leaked datasets seemingly consisted of very similar information.

While some of the datasets have been identified in past data breaches, much of it seems to be new or unheard of. Regardless of the source, the great concern is that if researchers are able to access this data, then so are cybercriminals. This could lead to targeted attacks on individuals or large-scale extortion attempts, like what recently happened in a PowerSchool data breach.

The research once again highlights the importance of practicing good cybersecurity hygiene. All online users should limit password reuse, use 2FA/MFA, and change their passwords frequently (on top of using strong ones to begin with). Plus, regularly check if their credentials have been implicated in data breaches using sites like Have I Been Pwned.

About the Author

Hendrik is a writer at vpnMentor, specializing in VPN comparisons and user guides. With 5+ years of experience as a tech and cybersecurity writer, plus a background in corporate IT, he brings a variety of perspectives to test VPN services and analyze how they address the needs of different users.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address