Compromise Breakdown
Email
48 million Gmail, 4 million Yahoo, 1.5 million Outlook, and 900,000 iCloud accounts.
Social Media
17 million Facebook, 6.5 million Instagram, and 780,000 TikTok accounts.
High Value/Sensitive
420,000 Binance accounts, 100,000 OnlyFans credentials, and various .gov and .edu domain logins.
Exposure Timeline
The database was reported to the hosting provider but remained accessible for nearly one month before suspension, during which time the record count continued to increase, indicating ongoing malware exfiltration.
Recommendation / Remediation
Based on
NIST SP 800-63B and
SANS Institute remediation standards, users should take the following actions.
Immediate Credential Rotation
Change passwords for all major accounts, prioritizing email, financial, and social media platforms. Use a unique, complex passphrase for every service.
Enforce Multi-Factor Authentication (MFA)
Enable non-SMS based MFA (e.g., TOTP apps like Google Authenticator or hardware keys like Yubikey) to mitigate the risk of credential-stuffing.
Malware Remediation
Since the data originated from infostealers, simply changing passwords may be ineffective if the device remains infected.
Perform a full system scan using reputable EDR/AV software.
Review and remove suspicious browser extensions, as these are common vectors for modern infostealers.
Monitor Login Activity
Review "Active Sessions" or login history on platforms like Gmail and Facebook to identify unauthorized access.
References
NIST SP 800-63B
Guidelines for Digital Identity and Authentication.
MITRE ATT&CK T1539
Steal Web Session Cookie.
MITRE ATT&CK T1056.001
Input Capture: Keylogging.