
Users' familiar accounts such as Apple, Google and Facebook may be in danger (Photo: ST).
Cybersecurity research group Cybernews spent the first six months of this year analyzing a shocking data breach. Their conclusion was clear: We’ve reached a whole new level of digital insecurity. The incident dwarfs any breach ever recorded, and it may just be the beginning.
Malware
The leaked database contains more than 16 billion login credentials, including user passwords across most of the world's leading digital platforms.
The culprit behind the leak was identified as malware called "infostealers", which are designed to silently steal login credentials as users browse the web.
They operate quietly for months, collecting every typed password and every automated login without being detected.
Vilius Petkauskas, the lead researcher on the investigation, said he had discovered 30 separate databases, each containing between 50 million and 3.5 billion records, an unprecedented scale. Unlike typical breaches, which are simply reusing old data, this one was completely new and much more dangerous.
What makes the incident particularly serious is the structure of the leaked data. Each entry has the website URL, username, password, and associated email address… ready for hackers to exploit without any guesswork or trial and error.
“Cybercriminals now have GPS hacks, they know exactly where to go and what information to use to break in,” Cybernews warns.
The leak was more than just a technical glitch. It was more like a widely distributed cyberattack manual.
The list of affected platforms spans the entire Internet: Apple, Google, Facebook, GitHub, Telegram… and even government services are not excluded.
Emergency account protection steps
Experts recommend that users take the following measures immediately:
- Change your passwords immediately, starting with sensitive accounts like your bank, primary email, and social media.
- Never share passwords between platforms. Each account needs a unique, complex password.
- Use a password manager – a tool that helps create and store strong, hard-to-hack passwords. Choose just one tool for easy management.
- Enable two-factor authentication (2FA). Even if your password is leaked, this layer of security can still prevent unauthorized access. Authentication can be via SMS, app, or physical security key.
- Switch to Passkey – a new security solution that replaces passwords with biometric authentication or hardware keys. Apple, Google and Microsoft are actively implementing this technology, and users should adopt it as soon as possible.
Source: https://dantri.com.vn/cong-nghe/hon-16-ty-mat-khau-apple-facebook-bi-danh-cap-nguoi-dung-can-lam-gi-20250620084942569.htm
Comment (0)