TLDR
- More than 183 million email passwords were exposed through infostealer malware, including millions of Gmail accounts
- The 3.5 terabyte data dump was detected by Have I Been Pwned founder Troy Hunt and security firm Synthient
- Google confirmed Gmail servers were not breached; credentials were stolen from infected devices through malware
- About 16.4 million email addresses were newly exposed, while 91% of leaked data came from previous breaches
- Users can check if their email was compromised at HaveIBeenPwned.com and should enable two-factor authentication
A data leak containing more than 183 million email passwords surfaced online this month. The breach includes millions of Gmail accounts along with credentials from Outlook, Yahoo, and other web services.
Troy Hunt, who runs the breach-notification site Have I Been Pwned, reported the discovery. The Australian security researcher said the 3.5 terabyte dataset contains information from 23 billion records.
183M email passwords exposed in data leak — including millions of Gmail accounts — here’s how to check if yours is safe https://t.co/tA6o9EoUiQ pic.twitter.com/h3IIbQVbRx
— New York Post (@nypost) October 27, 2025
The stolen credentials came from infostealer malware rather than a direct server breach. These programs secretly collect usernames and passwords from infected devices as users browse the internet.
Security firm Synthient gathered the data from criminal marketplaces and underground Telegram channels. The firm tracked the stolen information over a yearlong investigation.
About 16.4 million email addresses appeared in the database for the first time. The remaining 91% of leaked data had been exposed in earlier breaches.
How the Breach Happened
The malware infections typically spread through fake software downloads and phishing attachments. Browser extensions also serve as a common entry point for these credential-stealing programs.
Benjamin Brundage of Synthient said the findings demonstrate the widespread reach of infostealer malware. The firm reported that stolen credentials jumped more than 800% in the first half of 2025.
In some cases, Synthient recorded up to 600 million stolen passwords in a single day. The scale shows how quickly these programs can harvest login information.
Users often have no idea their devices were infected. The malware operates in the background while capturing credentials for multiple websites and services.
Impact Beyond Email
The breach extends beyond email accounts because many people reuse passwords across different platforms. Attackers can use credential stuffing to test stolen username-password pairs on banking sites, social media, and cloud storage.
This automated process allows criminals to access victims’ entire digital lives. The stolen credentials often reappear across forums for years.
Google issued a statement clarifying that Gmail’s servers were not compromised. A company spokesperson said the reports stem from ongoing updates to credential theft databases.
Security Recommendations
Google urged users to enable two-step verification or switch to passkeys. The company also recommended visiting Have I Been Pwned to check if an email address was included in the breach.
Users can enter their email address on the site to see if their credentials were compromised. The site provides the date and nature of any detected breaches.
Security experts recommend changing passwords immediately if affected. Users should also avoid storing credentials in web browsers, which malware can easily access.
Password managers with encryption offer better protection than browser-based storage. Google’s Password Manager Checkup tool scans saved logins in Chrome and warns about weak or reused passwords.
The leak first appeared in April and became public last week. Alphabet shares rose 3.60% on Monday despite the news, closing at $269.27 ahead of the company’s Q3 earnings report on October 29.





