AJC’s SWIFT CSP 2025 Season: A...
As another SWIFT Customer Security Programme (CSP) season draws to a close, AJC reflects on a dynamic and successful year...
Read MoreA cybersecurity researcher has uncovered an openly exposed database containing login credentials for approximately 149 million users, with Gmail users facing the highest level of exposure. If these details fall into the wrong hands, users could be at risk of fraudulent activity, identity theft, phishing campaigns and financial crime.
The exposed database was discovered by security researcher Jeremiah Fowler and contained a vast collection of login credentials gathered over time. The dataset was not linked to a single breach of one organisation. Instead, it appears to be a compilation of data collected by infostealer malware, malicious software that captures credentials from infected devices and stores them for later use.
The database included email addresses, usernames, passwords and direct login URLs for accounts across a wide range of platforms. At the time of discovery, the data was accessible online without authentication before being taken offline.
The dataset included credentials associated with services used globally. The largest volumes related to major email and social platforms, including:
Other services referenced in the dataset included TikTok, Binance, OnlyFans, DisneyPlus, Roblox and a wide range of additional platforms, including some accounts linked to .edu domains.
Google responded by confirming that this was not a new breach of Gmail systems. The exposed data represents a compilation of infostealer logs accumulated over time, rather than credentials obtained through a direct attack on Google infrastructure.
While this clarification is important, the exposure still presents a significant risk to users whose credentials may have been captured and reused elsewhere.
Even when a platform itself has not been breached, exposed credentials can be exploited in several ways:
The scale of this exposure highlights how malware and poor password hygiene can create widespread risk long after credentials are initially compromised.
If you suspect your device may have been infected with malware, act quickly by updating software, installing reputable security tools and running regular scans.
Users should also review application permissions, avoid downloading software or extensions from unofficial sources and remain cautious when receiving unexpected password reset emails. Where possible, check directly within the relevant platform rather than clicking links.
Additional protective steps include enabling multi factor authentication, using an authenticator app, and ensuring passwords are unique and complex, combining upper and lower case letters, numbers and special characters.
With widely used email platforms such as Gmail and Outlook included in the dataset, organisations should remain vigilant. Compromised credentials can enable unauthorised access to systems, support phishing and social engineering attacks, and create wider operational and reputational risk.
Having clear processes in place to detect suspicious activity and respond quickly is essential to limiting damage when incidents occur.
AJC’s cyber specialists support organisations in strengthening cyber resilience and business continuity. We help clients assess risk, improve security awareness and prepare teams to respond effectively to cyber incidents.
This includes building robust continuity plans, running practical exercises to help staff recognise technical issues or potential attacks, and reducing the likelihood of human error through targeted training and preparedness activities.
Contact us on 020 7101 4861 or email us at info@ajollyconsulting.co.uk if you think we can help.
https://www.techrepublic.com/article/news-149-million-passwords-exposed-infostealer-database
https://www.expressvpn.com/blog/149m-infostealer-data-exposed/
https://www.welivesecurity.com/en/cybersecurity/credential-stuffing-what-it-is-how-protect-yourself/
Image accreditation: Katka Pavlickova (2018) from Unpslash.com. Last accessed on 26th January 2026. Available at: https://unsplash.com/photos/post-2016-iphone–1MWTZamkwI
As another SWIFT Customer Security Programme (CSP) season draws to a close, AJC reflects on a dynamic and successful year...
Read MoreOperational resilience has become a central theme in UK risk and regulatory conversations. Boards, regulators and risk teams speak of...
Read MoreIn January 2026, Instagram users worldwide reported receiving unexpected password reset emails from what appeared to be Instagram’s official security...
Read More