{"id":53670,"date":"2025-06-20T07:31:26","date_gmt":"2025-06-20T11:31:26","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53670"},"modified":"2025-06-20T07:31:26","modified_gmt":"2025-06-20T11:31:26","slug":"16-billion-passwords-leak-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/16-billion-passwords-leak-2\/53670\/","title":{"rendered":"16 billion passwords leaked: what should I do?"},"content":{"rendered":"<p>You\u2019ve probably already seen the headlines <em>\u201cThe biggest leak in human history\u201d<\/em>. The whole world is in uproar after <a href=\"https:\/\/cybernews.com\/security\/billions-credentials-exposed-infostealers-data-leak\/\" target=\"_blank\" rel=\"nofollow noopener\">Cybernews<\/a> journalists found the logins and passwords to 16 billion accounts in the public domain \u2014 two for each inhabitant of the planet! What is this leak, and what do you need to do right now?<\/p>\n<h2>What\u2019s the leak, and are my credentials there?<\/h2>\n<p>The original study says that the Cybernews team has been working on the topic since the beginning of the year, and in six months they\u2019ve managed to collect 30 unsecured datasets that add up to 16 billion exposed login credentials. The largest chunk of data \u2014 3.5 billion records \u2014 is related to the world\u2019s Portuguese-speaking population; another 455 million records are related to Russia, and 60 million are \u201cmost likely\u201d related to Telegram.<\/p>\n<p>The database is built on the following principle: URL, followed by login and password. That\u2019s it, nothing else. At the same time, it\u2019s said that the data of users of all the giant services was leaked: Apple, Google, Facebook, Telegram, GitHub, etc. Surprisingly, it was passwords and not <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hash_function\" target=\"_blank\" rel=\"nofollow noopener\">hashes<\/a> that ended up in the hands of the journalists. In our study <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>How hackers can crack your password in an hour<\/strong><\/a>, we detailed <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/#:~:text=The%20usual%20way%20to%20crack%20passwords\" target=\"_blank\" rel=\"noopener nofollow\">exactly how companies store passwords<\/a> (spoiler: almost always in closed form using hashing algorithms).<\/p>\n<p>The story pays special attention to the freshness of the data: journalists claim that the 16 billion doesn\u2019t include the <a href=\"https:\/\/www.kaspersky.com\/blog\/top-five-data-breaches-in-history\/52040\/\" target=\"_blank\" rel=\"noopener nofollow\">biggest leaks, which we wrote about on the Kaspersky Daily blog<\/a>. The important question remains behind the scenes: <em>\u201cWhere did the 16 billion freshly leaked passwords come from, and why has no one seen them except Cybernews?\u201d. <\/em>Unfortunately, the journalists haven\u2019t provided any evidence of existence of this database. Therefore, neither Kaspersky\u2019s experts nor anyone else has managed to analyze it. Therefore, we cannot say whether yours \u2013 or anyone else\u2019s \u2013 data is in there.<\/p>\n<p>According to Cybernews, the accessing the entire database was possible through the use of <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/stealers\" target=\"_blank\" rel=\"noopener nofollow\">stealers<\/a>. This seems reasonable, since this is a threat that\u2019s gaining momentum. According to our data, the number of detected password-theft attacks worldwide increased by 21% from 2023 to 2024. Attackers are targeting both private and corporate users.<\/p>\n<h2>What you need to do right now<\/h2>\n<p>First, let\u2019s set skepticism aside. Yes, we don\u2019t reliably know what exactly this leak is, or whose data is in it. But that doesn\u2019t mean you should do nothing.<\/p>\n<p>The first and best recommendation is to <strong>change your passwords<\/strong>. There are many options for creating a new password that\u2019s difficult for hackers to crack but easy to remember. We covered this in detail in our post <a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Creating an unforgettable password<\/strong><\/a> \u2013 have a read and choose any method you prefer.<\/p>\n<blockquote><p>Think of a favorite line from a song or a memorable quote from a movie, and then replace, say, every second or third letter with special characters that aren\u2019t in sequential order on the keyboard.<\/p>\n<p>For example, if you\u2019re a fan of the\u00a0Harry Potter saga, you may try to use the\u00a0Wingardium Leviosa\u00a0charm for a good cause. Let\u2019s try transforming this levitation charm according to the rule above while peppering it generously with special characters: Wi4ga\/di0mL&amp;vi@sa<\/p>\n<p>Easy, right?<\/p><\/blockquote>\n<p><strong>Store your passwords securely. <\/strong>The best solution is to use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">special password manager<\/a>. It will generate, securely store, and automatically fill in complex, hack-proof passwords on all your devices for you. You\u2019ll only need to create and remember one main password, which will become a secure key to all other passwords, bank details, photos, and everything else that can be stored in <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>.<\/p>\n<p><strong>Set up <\/strong><a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>two-factor authentication<\/strong><\/a><strong>. <\/strong>Almost all popular services support 2FA in one form or another, and the presence of a second factor makes it much more difficult, if not impossible, to hack your account. <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a> makes it easy to store and sync 2FA tokens, as well as generate one-time codes on either your smartphone or computer.<\/p>\n<p><strong>Remove saved passwords from browsers.<\/strong> Browsers are most often the culprit behind data breaches. Doubt it? Read our arguments in the article <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-store-passwords-securely\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>How to store passwords securely<\/strong><\/a> \u2013 there you\u2019ll clearly see how hackers can swipe all the saved passwords from your browser in just a few seconds.<\/p>\n<p><strong>Protect your messenger accounts. <\/strong>For Telegram and WhatsApp we have a <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-prevent-whatsapp-telegram-account-hijacking-and-quishing\/53012\/#:~:text=How%20to%20protect%20yourself%20from%20WhatsApp%20and%20Telegram%20account%20hijacking\" target=\"_blank\" rel=\"noopener nofollow\">list of specific steps <\/a>to take right now, before your account is hijacked.<\/p>\n<p><strong>Use passkeys wherever possible. <\/strong>This is the modern passwordless method of logging into accounts, which is already supported by Google, iCloud, Microsoft, Meta and others. Haven\u2019t heard of this technology yet? <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-set-up-passkeys-in-google-account\/49515\/\" target=\"_blank\" rel=\"noopener nofollow\">Read the detailed description<\/a> on our blog and follow the updates <a href=\"https:\/\/t.me\/+hfDEDRUTiLJlOGE8\" target=\"_blank\" rel=\"noopener nofollow\">in our Telegram channel<\/a> \u2013 next week we\u2019ll tell you everything you wanted to know about passkeys: what kind of technology it is, how secure it is, who supports it, what are its advantages and disadvantages. And most importantly \u2013 we\u2019ll give detailed step-by-step instructions on how to switch from insecure passwords to secure passkeys. And yes, you can also store, manage and sync passkeys using <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>.<\/p>\n<blockquote><p>What else do you need to know about passwords to avoid being hacked:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-international-password-day-2024\/51095\/\" target=\"_blank\" rel=\"noopener nofollow\">How to create strong passwords and where to store them<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\">How to create an unforgettable password<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\">How hackers can crack your password in an hour<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/safe-email-login-tips\/52857\/\" target=\"_blank\" rel=\"noopener nofollow\">Passwords 101: don\u2019t enter your passwords just anywhere they\u2019re asked for<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/messengers-101-safety-and-privacy-advice\/53300\/\" target=\"_blank\" rel=\"noopener nofollow\">Messengers 101: safety and privacy advice<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>First, don&#8217;t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.<\/p>\n","protected":false},"author":2706,"featured_media":53671,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,2683,9],"tags":[1287,4664,82,1147,961,187,363,3244],"class_list":{"0":"post-53670","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"category-tips","10":"tag-breaches","11":"tag-database","12":"tag-hacking","13":"tag-kaspersky-password-manager","14":"tag-leaks","15":"tag-passwords","16":"tag-personal-data","17":"tag-stealers"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/16-billion-passwords-leak-2\/53670\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/16-billion-passwords-leak-2\/28969\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/16-billion-passwords-leak-2\/24199\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/16-billion-passwords-leak-2\/29080\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/16-billion-passwords-leak\/39926\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/16-billion-passwords-leak-2\/22900\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/16-billion-passwords-leak\/29298\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/16-billion-passwords-leak-2\/35008\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/16-billion-passwords-leak-2\/34645\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/leaks\/","name":"leaks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53670"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53670\/revisions"}],"predecessor-version":[{"id":53673,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53670\/revisions\/53673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53671"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}