149 Million Passwords Exposed as Infostealer Malware Turns Logins Into Black Market Inventory

Cybersecurity researcher finds 96-gigabyte database with Gmail, Facebook and Netflix logins sold for $200-300 monthly

Al Landes Avatar
Al Landes Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image: ACS Financial

Key Takeaways

Key Takeaways

  • Researchers discovered 149 million stolen passwords from Gmail, Netflix, Facebook stored unprotected.
  • Infostealer malware silently harvests credentials while users browse, creating 96-gigabyte criminal database.
  • Cybercriminals rent password-stealing tools for $200-300 monthly, making credential theft highly accessible.

Your Gmail, Netflix, and banking passwords were just sitting in an unsecured database for cybercriminals to browse like a digital shopping mall. Cybersecurity researcher Jeremiah Fowler discovered 149 million stolen usernames and passwords—including 48 million Gmail accounts, 17 million Facebook logins, and 3.4 million Netflix credentials—stored without encryption or protection. If you’ve used any major online service in recent years, your login details were likely up for grabs.

Infostealer Malware Harvests Everything

This invisible threat operates while you browse, capturing every password you enter.

Infostealer malware—software that silently records keystrokes and harvests saved passwords from infected computers—compiled this massive collection. The 96-gigabyte database grew continuously while Fowler spent approximately one month trying to get the unnamed hosting provider to remove it. Think of it like digital pickpocketing that happens in the background while you browse, shop, or stream, capturing every password you type.

Criminal Marketplace Thrives on Easy Access

Password theft has become as accessible as subscribing to streaming services.

This is like a dream wish list for criminals,” Fowler explained, describing how the database was indexed for easy searching. Allan Liska from Recorded Future notes that “Infostealers create a very low barrier of entry for new criminals… for less than a car payment.” At just $200-300 per month, cybercriminals can rent these tools and start harvesting credentials immediately—making password theft as accessible as a Netflix subscription.

Your Digital Life Under Threat

One compromised account becomes a skeleton key to your entire digital existence.

The exposed credentials span far beyond social media. Banking logins, crypto wallets, government email accounts, and streaming services were all compromised, enabling credential-stuffing attacks where criminals test your leaked passwords across multiple platforms. Since most people reuse passwords (you know you do), one compromised account becomes a skeleton key to your entire digital existence. These security mistakes leave you vulnerable to attacks that can quickly spread across all your accounts.

Companies Stay Silent While Data Circulates

The stolen credentials likely spread through dark web marketplaces before the takedown.

Google, Meta, Apple, Netflix, and other affected companies haven’t publicly addressed the breach according to available reports. While the database has been removed from its original location, the stolen credentials likely spread through dark web marketplaces before the takedown. This incident reveals how easily our digital identities become commodities in an underground economy that operates with corporate-level efficiency.

The breach underscores a brutal reality: your passwords aren’t just data—they’re currency in a thriving criminal marketplace that treats your digital life like inventory.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →