Close Menu
Crypto Breaking News
    Crypto Breaking News
    • News
      • Press Release
      • Events
      • Exchanges
      • Crypto Wallets
      • Featured
      • Blockchain Life
      • Bitcoin Conference
      • Bitcoin
      • Ethereum
      • Solana
      • Cardano
      • Ripple
    • Crypto
      • Companies
      • Events
      • Partners
      • Buy Crypto
      • Timers
    • Advertise
      • Submit a Press Release
      • Logos
      • About
      • Services
    • Offers
      • Marketing Services
      • Wallets & Tools
    • Account
    • Video
    • Contact
    Submit PR
    0Shopping Cart
    Login
    Crypto Breaking News
    0Shopping Cart
    Crypto News Cryptocurrency Exchanges

    149M Infostealer Data Dump Reveals Crypto Users

    19 minutes ago
    FacebookTwitterLinkedInCopy Link
    News Feed
    Google NewsRSS
    149m Infostealer Data Dump Reveals Crypto Users
    149m Infostealer Data Dump Reveals Crypto Users

    A cybersecurity researcher has uncovered a vast, publicly accessible repository of stolen login credentials harvested from malware-infected personal devices. Jeremiah Fowler, a noted security researcher, highlighted a dataset containing around 149 million usernames and passwords collected from smartphones and computers. The records span a range of services, including social platforms like Facebook and Instagram, streaming services such as Netflix, and crypto-related accounts linked to the Binance exchange—of which at least 420,000 credentials were tied to Binance users. The discovery underscores how credential-st stealing malware continues to infiltrate everyday devices, exposing users to phishing, account takeover and cross-platform abuse.

    Key takeaways

    • The dataset, reported by ExpressVPN, represents a credential dump from infostealer malware rather than a breach of a single company’s systems.
    • Record counts by service are substantial: 48 million Gmail accounts, 4 million Yahoo accounts, 17 million Facebook accounts, 6.5 million Instagram accounts, 3.4 million Netflix accounts and 780,000 TikTok accounts, among others.
    • Binance is named specifically in the dump, with at least 420,000 credentials associated with its users, highlighting risk to crypto-exchange accounts processed through compromised devices.
    • Security experts stress that this is an endpoint‑level exposure—credentials were harvested from end-user devices, not from Binance’s internal infrastructure.
    • Researchers warn that government-related accounts and .gov domains appear in the dataset, raising concerns about phishing and impersonation alongside financial risks.

    Tickers mentioned:

    Market context: The incident adds to a growing awareness that credential theft remains a primary vector for unauthorized access, especially for crypto users who often reuse passwords across services or rely on devices that may lack robust security controls.

    Sentiment: Neutral

    Price impact: Neutral. The report centers on credential exposure rather than immediate market moves or asset transfers, though it underscores broader security risks for exchanges and wallets.

    Trading idea (Not Financial Advice): Hold. The event reinforces the need for stronger authentication practices and user hygiene, rather than ad hoc trading responses to credential leaks.

    Market context: End-user device security and credential hygiene continue to shape risk in the crypto ecosystem, with exchanges and wallets emphasizing phishing defense, multi-factor authentication and user education as core defense lines.

    Why it matters

    The disclosure of a 94-gigabyte infostealer data set—containing hundreds of millions of credentials—serves as a stark reminder that the security perimeter for crypto users begins at the device level. The dataset’s breadth is notable: tens of millions of Gmail accounts, millions of social media logins and hundreds of thousands of crypto-related credentials linked to Binance. While security researchers stress this is not a Binance systems breach, the exposure underscores how attackers operate in the wild: by compiling vast troves of credentials from compromised devices and then attempting cross‑site login reuse or phishing campaigns to monetize them.

    Fowler emphasizes the systemic risk: credential-stealing malware thrives where devices run outdated software or weak security hygiene persists. “This is not the first dataset of this kind I have discovered and it only highlights the global threat posed by credential-stealing malware,” he wrote in the ExpressVPN post. “Financial services accounts, crypto wallets or trading accounts, banking and credit card logins also appeared in the limited sample of records I reviewed.” The breadth of services represented indicates attackers are not just chasing social accounts or streaming access; they are seeking any gateway that can unlock financial assets or sensitive personal data.

    The dataset’s composition includes a mix of consumer accounts (Gmail, Yahoo, Facebook, Instagram, Netflix, TikTok) alongside financial and crypto-relevant services. For crypto users, the risk is twofold: direct account compromise and the potential for phishing campaigns that masquerade as legitimate communications from trusted platforms. In practice, a single compromised Gmail or social media account can be leveraged to reset passwords on crypto exchanges, wallets or related services, enabling unauthorized transfers or credential harvesting at scale. The exposure highlights a persistent theme in crypto security: attackers favor low-friction access paths that bypass user friction, especially when devices remain vulnerable to malware infections.

    In addition to the immediate risk to individual accounts, the report notes a concerning number of credentials tied to government domains and .gov addresses. While these entries may be less directly monetizable than financial accounts, they amplify the phishing and impersonation threat landscape. Attackers can impersonate government agencies in social-engineering campaigns, increasing trust and likelihood of user compliance with fraudulent requests. The broader takeaway is clear: security must be comprehensive—covering devices, authentication, user education and rapid response to credential exposures.

    The broader crypto-security community has been sounding alarm bells for years about infostealer families—malware that quietly extracts saved logins from infected devices. A recent Kaspersky report on a newer infostealer family—often described as Stealka—illustrates how attackers pivot between delivering wallet-targeted trojans, browser extensions and crypto-mining modules, all while masquerading as legitimate game mods or cracks. The malware’s reach spans more than 100 browsers and targets dozens of exchanges, including Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, and others. Such developments underscore a central theme: as the attack surface expands, so does the imperative for robust endpoint defenses and safer password practices.

    A fake website pretending to offer Roblox scripts, Source: Kaspersky

    Given the scale of the data and its diverse target set, security teams are stressing prevention-first approaches. The Binance response, outlined in a March 2025 blog post, illustrates how exchanges are increasingly proactive: monitoring dark-web chatter for compromised credentials, alerting affected users, forcing password resets, and revoking compromised sessions. While Binance asserts that this incident stems from end-user device compromise rather than a breach of its internal systems, the episode reinforces a key cybersecurity premise: even the strongest exchange defenses are only as strong as the weakest link—often the user’s device and habits.

    To reduce risk, Fowler and fellow researchers advocate layered security that combines robust antivirus and anti-malware tools with regular system updates, hardware-based multi-factor authentication and diligent password hygiene. The aim is to detect suspicious activity early, block unauthorized access and disrupt attacker workflows before funds can be moved or accounts exfiltrated. As the crypto ecosystem continues to evolve, the focus on endpoint security will likely intensify, driving demand for improved user education, stronger authentication standards and more resilient wallet and exchange architectures.

    What to watch next

    • Follow any updates from ExpressVPN on the 149 million infostealer dataset and any new analyses of the data’s composition.
    • Watch for additional confirmations from Binance regarding user advisories, password-reset campaigns and session revocations in response to credential leaks.
    • Monitor security researchers’ deeper dives into the infographic details, including the potential cross-service implications and relationships among compromised accounts.
    • Assess the impact of newer infostealer families like Stealka on crypto wallets and browser extensions, and any resulting shifts in defensive tooling or marketplace security standards.

    Sources & verification

    • ExpressVPN blog: Jeremiah Fowler’s analysis of the 149 million infostealer data set and the services affected.
    • Binance security blog (March 2025): statements on credential monitoring, user alerts, password resets and session revocation in response to the incident.
    • Kaspersky research: analysis of Stealka and its targeting of wallets, browser extensions and exchanges, including a wide browser and platform reach.
    • Cointelegraph coverage: discussion of related incidents, including the SwapNet breach and other crypto‑security events referenced in the coverage.

    Credential exposure and the evolving threat landscape

    The exposed dataset underscores a persisting vulnerability surface: consumer devices running unpatched software and weak security practices remain fertile ground for credential theft. The breadth of services represented means attackers can attempt cross-service exploits, phishing campaigns and social-engineering tactics that reach users across the crypto and mainstream internet ecosystems. While Binance and other platforms emphasize that the core systems remain secure, incidents of this kind illuminate the constant risk attached to end-user endpoints and the imperative for defense-in-depth strategies that integrate device security, authentication hardening and user awareness.

    What it means for users and builders

    For individual users, the takeaway is simple but impactful: re‑emphasize the importance of unique, strong passwords for each service, enable hardware-based multi-factor authentication where possible, and maintain current security software on all devices. For developers and operators in the crypto space, the message is twofold: build authentication workflows that resist credential stuffing and password re-use, and invest in user‑education campaigns that stress the importance of credential hygiene beyond the login screen. In a landscape where attackers increasingly use legitimate services as stepping stones, robust identity protection becomes a foundational element of trust and resilience in crypto ecosystems.

    Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

    Crypto Breaking News
    • Website
    • Facebook
    • X (Twitter)
    • Pinterest
    • Instagram
    • Tumblr
    • LinkedIn

    The Crypto Breaking News editorial team curates the latest news, updates, and insights from the global cryptocurrency and blockchain industry.

    Related Posts

    Kaspersky reveals how digitalization is influencing family life in the UAE

    Kaspersky reveals how digitalization is influencing family life in the UAE

    Trump Policy Shift Puts XRP Among Top Crypto Return Opportunities

    Trump Policy Shift Puts XRP Among Top Crypto Return Opportunities

    Search Crypto News

    Join 17,000+ Crypto Followers

    • Facebook2.3K
    • Twitter4.3K
    • Instagram5.6K
    • LinkedIn4K
    • Telegram52
    • Threads800

    Newsletter

    10% off on first order!

    Privacy Policy

    Check your inbox or spam folder to confirm your subscription.

    Uphold
    Kraken Pro 300x250

    About Crypto Breaking News

    About Crypto Breaking News

    Crypto Breaking News is a fast-growing digital media platform focused on the latest developments in cryptocurrency, blockchain, and Web3 technologies. Our goal is to provide fast, reliable, and insightful content that helps our readers stay ahead in the ever-evolving digital asset space.

    Web3 Digital L.L.C-FZ
    License Number: 2527596
    📞 +971 50 449 2025
    ✉️ info@cryptobreaking.com
    📍Meydan Grandstand, 6th floor, Meydan Road, Nad Al Sheba, Dubai, United Arab Emirates

    FacebookX (Twitter)InstagramPinterestYouTubeTumblrBlueskyLinkedInRedditTikTokTelegramThreadsRSS

    Links

    • Crypto News
    • Submit a Press Release
    • Advertise
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions

    advertising

    eToro Crypto 300x300
    © 2026 CryptoBreaking.com | All rights reserved | Powered by Web3 Digital & Osom One

    Type above and press Enter to search. Press Esc to cancel.

    Change Location
    Find awesome listings near you!

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.