149 Million Credential Mega-Exposure — January 2026
Security researchers discovered a publicly exposed 96 GB database with 149 million unique logins covering Gmail, Facebook, Instagram, Netflix, Binance, and government domains. The database had no password protection.
- Email addresses
- Plaintext passwords
- Service domains (Gmail, Facebook, Instagram, Netflix, Binance)
- Government domain credentials
Security researchers discovered a publicly exposed 96 GB database containing 149 million unique logins, accessible without any authentication. The dataset spans personal services (Gmail, Facebook, Instagram, Netflix), financial platforms (Binance), and even government domain credentials. Infostealer malware likely fed this dump — the format and structure match known stealer-log compilations.
Gamers reusing credentials across Steam, Discord, Riot, Battle.net, and Epic are at immediate account-takeover risk. If any of those services share a password with one of the leaked entries, the attacker gets every account at once. This is the classic "combolist" fuel for doxxing chains — email + password = full persona mapping.
Want the rest of this breakdown?
Sign up free to keep reading. Members get extended access, the weekly breach digest, and a complimentary DoxxScan™ to see if their identity is exposed in the breaches we cover.
Were you affected by this breach?
See exactly what an attacker can piece together from your email, username, or handle. Free first scan, no credit card.
Try DoxxScan — 72hr free trial →