TLDR A 3.5 terabyte data leak exposed 183 million email passwords through infostealer malware 16.4 million Gmail accounts were newly compromised in the breach Google confirms its servers were not hacked; malware infected user devices Stolen credentials came from phishing emails, fake downloads, and browser extensions Users should check HaveIBeenPwned.com and enable two-factor authentication immediately [...] The post Gmail Users Hit by Massive Malware Attack: 183 Million Passwords Leaked appeared first on Blockonomi.TLDR A 3.5 terabyte data leak exposed 183 million email passwords through infostealer malware 16.4 million Gmail accounts were newly compromised in the breach Google confirms its servers were not hacked; malware infected user devices Stolen credentials came from phishing emails, fake downloads, and browser extensions Users should check HaveIBeenPwned.com and enable two-factor authentication immediately [...] The post Gmail Users Hit by Massive Malware Attack: 183 Million Passwords Leaked appeared first on Blockonomi.

Gmail Users Hit by Massive Malware Attack: 183 Million Passwords Leaked

TLDR

  • A 3.5 terabyte data leak exposed 183 million email passwords through infostealer malware
  • 16.4 million Gmail accounts were newly compromised in the breach
  • Google confirms its servers were not hacked; malware infected user devices
  • Stolen credentials came from phishing emails, fake downloads, and browser extensions
  • Users should check HaveIBeenPwned.com and enable two-factor authentication immediately

A massive data breach has exposed 183 million email passwords, including millions of Gmail accounts. The leak represents one of the largest credential dumps discovered in 2025.

Troy Hunt, founder of Have I Been Pwned, announced the discovery this month. The 3.5 terabyte dataset contains information from 23 billion records collected over a year.

Security firm Synthient tracked the stolen data across dark web marketplaces and Telegram channels. The firm found that 16.4 million email addresses were exposed for the first time.

The remaining 91% of leaked passwords had appeared in previous breaches. However, many of these older credentials still matched users’ active passwords.

How Attackers Stole Credentials

The breach did not involve a direct hack of Gmail’s servers. Instead, infostealer malware on infected devices captured login information as users browsed the internet.

These malicious programs spread through phishing emails and fake software downloads. Browser extensions also serve as common infection points.

Benjamin Brundage of Synthient said stolen credentials jumped more than 800% in the first half of 2025. The firm recorded up to 600 million stolen passwords in a single day.

Users often don’t realize their devices are infected. The malware operates silently while harvesting credentials from multiple websites and services.

Risks Beyond Email Accounts

The breach affects more than just email access. Many users reuse passwords across banking sites, social media platforms, and cloud storage services.

Attackers use credential stuffing to test stolen username-password combinations on multiple platforms. This automated process can give criminals access to victims’ entire digital lives.

Stolen credentials circulate on criminal forums for years. This gives hackers ongoing opportunities to exploit reused passwords.

Google issued a statement clarifying that Gmail’s infrastructure was not compromised. The company said reports of a Gmail breach are inaccurate and stem from misreading credential theft database updates.

What Users Should Do Now

Users can check if their email was compromised by visiting HaveIBeenPwned.com. The site allows people to enter their email address and see if it appears in the breach.

Google recommends enabling two-step verification or switching to passkeys. The company also suggests changing passwords immediately if affected.

Security experts advise against storing passwords in web browsers. Malware can easily scrape credentials from browser storage.

Encrypted password managers provide better protection. Google’s Password Manager Checkup tool also scans Chrome logins and warns about weak or reused passwords.

Users should use different passwords for different online accounts. This prevents a single breach from compromising multiple services.

Recent Developments

The leak first surfaced in April but became public last week. Alphabet shares rose 3.60% on Monday, closing at $269.27 ahead of the company’s Q3 earnings report scheduled for October 29.


GOOGL Stock Card
Alphabet Inc., GOOGL

The breach highlights the growing threat of infostealer malware. Synthient’s data shows credential theft has reached unprecedented levels in 2025.

Users should remove unused browser extensions and avoid clicking suspicious links. Regular password updates and two-factor authentication remain the best defenses against credential theft.

The post Gmail Users Hit by Massive Malware Attack: 183 Million Passwords Leaked appeared first on Blockonomi.

Market Opportunity
4 Logo
4 Price(4)
$0.01699
$0.01699$0.01699
-4.22%
USD
4 (4) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
Husky Inu (HINU) Completes Move To $0.00020688

Husky Inu (HINU) Completes Move To $0.00020688

Husky Inu (HINU) has completed its latest price jump, rising from $0.00020628 to $0.00020688. The price jump is part of the project’s pre-launch phase, which began on April 1, 2025.
Share
Cryptodaily2025/09/18 01:10
Haier Shines at Australian Open 2026: Official Partner Elevates the Game with Smart Innovation and Purpose

Haier Shines at Australian Open 2026: Official Partner Elevates the Game with Smart Innovation and Purpose

MELBOURNE, Australia, Jan. 25, 2026 /PRNewswire/ — Haier, the world’s No.1 major home appliance brand, continues its strategic partnership with the Australian Open
Share
AI Journal2026/01/26 11:30