Categories: Tech and Auto

What Is An Infostealer? The Malware Behind The Biggest Login Data Breach Ever

A record-breaking data breach has exposed over 16 billion login credentials, with researchers calling it the "mother of all data leaks." The breach, driven by infostealer malware, targeted accounts on platforms like Google, Apple, and Telegram, raising global fears of mass identity theft.

Add NewsX As A Trusted Source
Add as a preferred
source on Google
Published by Zubair Amin
Published: June 20, 2025 02:58:19 IST

A new report by Cybernews and Forbes has found a historic data breach that stole more than 16 billion login credentials. Analysts are calling it the biggest data leak ever reported. Some even go to the level of calling it the mother of all data breaches. 

The report claims that accounts were hacked and data was extracted using infostealer malware. Forbes reports that researchers involved in a months-long investigation found several infostealers were used for the password leak of this scale.

After hacking billions of login credentials from Google, Apple, VPNs and Telegram, cybersecurity researchers found that the hackers put up the data for sale online. Reports quoting experts believe that in the coming days, this breach can lead to possible identity theft, phishing attacks, and account takeovers all over the world.

What is an Infostealer?

Infostealer is a type of malware employed to gather sensitive information stored on a device. The malware  enables an attacker to perform further cybercriminal activity on the hacked device. After the device is attacked, the hacker can perform activities like identity theft, financial fraud or extortion, account takeover, and ransomware attacks.

Also Read: Samsung Charts Second-Half Strategy To Navigate Global Uncertainty Amid Trade Tensions And Chip Setbacks

After the hacker gets access, the Infostealer uses various techniques to acquire data after the hacker gets access to the device, like a computer or phone. The hacker can steal data in various forms. Hackers can take control of your credentials, browser data, messaging and email chat logs, documents, and machine-specific properties.

Once the infostealer is installed, it starts to collect data from the infected system. The malware does not take much time to infect and take control of the system. It usually takes as little as one minute to collect the targeted data and gather the data.

How To Protect Yourself From an Infostealer Attack?

Once the data is collected, infostealers often sell or trade it in centralized ad hoc marketplaces or platforms, such as Telegram.

Infostealer malware attacks pose a significant threat to common people and organizations alike. This malware silently steals sensitive data, including login credentials, financial information, and personal details.  The best practice to secure yourself from such malware attacks is by implementing strong password hygiene. You can also enable multi-factor authentication and update software in a timely manner.

Also Read: Mother Of All Data Breaches: 16 Billion Records Leaked In Massive Hack Hitting Google, Apple, VPNs And More

Published by Zubair Amin
Published: June 20, 2025 02:58:19 IST

Recent Posts

Google Workspace AI Studio: How To Build Your Own Assistant Without Coding, Learn In Easy Steps

Google has launched its new feature in Google Workspace through which users can create custom…

December 5, 2025

Putin Commits To Peak Performance At Kudankulam Nuclear Facility, Says ‘Russia Will Be A Reliable Supplier’

Vladimir Putin during his visit to India, announced that the capacity of the Kudankulam Nuclear…

December 5, 2025

Top Opposition Leaders Including Rahul Gandhi, Kharge Not Invited To Presidential Banquet For Putin, But You Might See THIS Congress MP In Attendance

The Congress alleged that Mallikarjun Kharge and Rahul Gandhi were not invited to the Presidential…

December 5, 2025