GRUNGECAKE

More than 183 million Gmail-linked passwords exposed

[media-credit name=”The Sun” link=”https://www.the-sun.com/tech/15402094/183million-gmail-passwords-stolen-in-massive-data-breach” width=2048 align=”center”][/media-credit]

Security researchers have warned that approximately 183 million email login credentials, including a significant number tied to Gmail accounts, were exposed in a massive credential-dump.

The leak appears to have resulted not from a direct breach of Gmail or Google LLC’s systems, but rather from malware-infected devices. These devices collected usernames and passwords via “infostealer” logs, which in turn ended up in a large dataset now publicly accessible. This dataset is part of a trove reportedly about 3.5 terabytes in size and drawn from multiple sources rather than one single hack.

For Gmail users (and users of other email providers) the risk is real. Whilst Google says it is not aware of a breach of its own login systems, it emphasises that passwords appearing in external dumps still pose a threat because of reused passwords, credential-stuffing attacks and phishing schemes.

What you can do:

  • Use the site Have ‘I Been Pwned’ to check whether your email address or password shows up in known leaks.
  • Change your password to a strong, unique one (for example, not used for other sites) if there’s any suspicion of exposure.
  • Enable multi-factor authentication (MFA) or passkeys where available.
  • Review account access logs for unfamiliar devices or apps.
  • The incident underscores a broader shift in cyber-risk: The point of compromise is increasingly the user’s device or environment rather than a central corporate database. And so the protection partly depends on users staying proactive. While there’s no indication this leak was caused by a Gmail-specific vulnerability, Gmail users should still treat their account credentials—and the recovery methods tied to them—as potential targets.


    Comments

    Leave a Reply

    Your email address will not be published. Required fields are marked *