Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
McKinsey partner says up to 50% of work hours could be transformed within the next 5 years

McKinsey partner says up to 50% of work hours could be transformed within the next 5 years

21 May 2026
Securing The Internet’s Humanity

Securing The Internet’s Humanity

21 May 2026
Allbirds’ 600% stock surge says a lot about how ‘AI washing’ became the new ‘greenwashing’

Allbirds’ 600% stock surge says a lot about how ‘AI washing’ became the new ‘greenwashing’

21 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » Warning — 19 Billion Compromised Passwords Have Been Published Online
Innovation

Warning — 19 Billion Compromised Passwords Have Been Published Online

Press RoomBy Press Room6 May 20258 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
Warning — 19 Billion Compromised Passwords Have Been Published Online

Update, May 6, 2025: This story, originally published May 3, has been updated with details of the SMS phishing threat posed by the Chinese Panda Shop cybercrime group, and an open letter to the cybersecurity industry asking why the phishing threat behind the stolen passwords epidemic has yet to be fixed.

In just the last few months, I have reported on confirmed lists of stolen passwords being made available on the dark web and in criminal forums that have risen from 800 million to 1.7 billion and even as high as 2.1 billion, mainly thanks to the rise and rise of infostealer malware attacks. But a new report has just blown even those shockingly large statistics out of the water with an analysis of 19 billion such passwords that are available online right now to any hackers who want to seek them out. The takeaway being that you need to take action now to prevent becoming a victim of the automatic password hacking machine epidemic.

The 19 Billion Exposed Passwords Hacking Problem

Imagine having access to 19,030,305,929 passwords that were compromised by leaks and breaches over the course of 12 months from April 2024 and involving 200 security incidents. Imagine that only sources where email addresses were available for consumption alongside the stolen password were included in this massive database. Oh, and forget about including any of those word-list compilations, such as RockYou, that regularly do the rounds but are about as useful to a criminal hacker as a chocolate router. Finally, get to grips with the fact that this dataset only includes passwords that have become publicly available in criminal forums online. Once you digest all of this, you can appreciate how huge, in all senses of the word, this really is, especially to any hacker with criminal intent.

The analysis, published May 2 by the Cybernews research team, makes for truly eye-opening reading. It’s so wide-ranging and security-scary in equal measure that it’s hard to know where to start, so the beginning seems as good a place as any: password laziness and reuse. Of the 19,030,305,929 passwords that ended up exposed online, only 6% of them, or 1,143,815,266 if you like to be precise, were unique. Switch that around to 94% of them being reused across accounts and services, whether by the same or different people is moot, and you can see why the average cybercriminal gets very excited about the hacking potential such lists provide.

Now throw in that 42% of the passwords were short, way too short, being only 8-10 characters in length. That now opens up the hacking potential to brute force attacks as well as credential stuffing. Ah, yes, and it just keeps getting worse; 27% consisted of only lowercase letters and digits, no special characters or mixed case. Sigh.

Act Now To Mitigate The Stolen Passwords Threat

According to Neringa Macijauskaitė, an information security researcher at Cybernews, “the default password problem remains one of the most persistent and dangerous patterns in leaked credential datasets.” The analysis revealed that there were 53 million uses of admin and 56 million of password, for example. Changing these is one quick way to help mitigate against hackers, as Macijauskaitė said, “attackers, too, prioritize them, making these passwords among the least secure.”

Not reusing your passwords, ever, not at all, is another prime mitigation recommendation. “If you reuse passwords across multiple platforms, a breach in one system can compromise the security of other accounts, creating a domino effect,” Macijauskaitė warned. Meaning that even without any existing system compromise, attackers are able to exploit common password patterns in their hacking exploits. “Attackers constantly harvest the latest credential dumps from exposed info-stealers and recently cracked hashes available publicly,” Macijauskaitė concluded. “These fresh datasets enable waves of highly effective credential-stuffing attacks, often bypassing traditional security defenses.”

An Open Letter To The Cybersecurity industry — Stopping The Stolen Passwords Problem

Paul Walsh, CEO of MetaCert and co-founder of the W3C Mobile Web Initiative in 2004, knows a thing or two about the problem of malicious messaging and has been involved in the creation of internet standards to protect against it. In conversation, Walsh told me that the latest national SMS phishing test carried out in March by MetaCert and including carriers such as AT&T, Verizon, T-Mobile and Boost Mobile, was as disappointing as it was expected. “Every phishing message was still delivered,” Walsh told me, “none were blocked, flagged, or rewritten.” This is, to say the least, given that the vast majority of phishing platforms are now developed to target mobile devices, overtaking email in this regard in 2024 according to ProofPoint. When you consider that phishing attacks, on whatever platform, are the starting point for most cyber attacks, it’s no great leap to realize that the compromised passwords problem could be drastically reduced, if not stopped dead, by addressing the social engineering issue. Walsh has now written an open letter to the cybersecurity industry asking why the SMS phishing problem hasn’t been solved ages ago?

“The cybersecurity industry has no shortage of experts in email security, endpoint protection, or network defense,” Walsh said, “but when it comes to SMS infrastructure and security, there is a distinct lack of deep expertise.” His letter, therefore, is a call to action by security vendors who have “built multi-billion-dollar businesses on stopping phishing in email and corporate networks,” Walsh said, “yet the most trusted communication channel on the planet — SMS — remains an open, unprotected target.” Walsh demands that the same effort that has been made to address email security must now be made for the SMS vector because, he concluded, “criminals have already moved in full force, and the industry is failing to respond.” Unless this happens, and happens with the full might of the cybersecurity industry behind it, I fear that I will be reporting about the compromise of user passwords for some time to come yet.

From Passwords To Pandas

A new report by the security researcher team at Rescurity has confirmed just how dangerous the SMS phishing threat is. Having already established that the “Smishing Triad” criminal gang has been operating since at least 2023, the Rescurity researchers have been keeping a close eye on the group of Chinese cybercriminals with very global ambitions. Using the by now de rigueur crime-as-a-service model, the Smishing Triad comprises multiple associates and leverages that scale to target victims all over the world.

Rescurity has reported how, according to the latest threat intelligence it has received, a single Chinese threat actor can distribute as many as 2 million phishing SMS text messages in a single day. The Smishing Triad, Rescurity said, “could easily target up to 60,000,000 victims per month, or 720,000,000 per year,” or, to put it another way, every person in the U.S. — twice each year. The concern of Paul Walsh is brought sharply into focus when you realize that Smishing triad also uses network operator SMS gateways, alongside Google RCS and Apple’s iMessage, to distribute their phishing attacks.

So, where does this story turn from passwords to pandas? In March, Rescurity identified yet another smishing kit that appeared to be using the same principles as the Smishing Triad service, and went by the name of Panda Shop. The Panda Shop kit has “multiple Telegram channels and interactive bots to automate service delivery,” the Rescurity report said, providing distribution services primarily by way of Apple’s iMessage and Android’s RCS platforms. Furthermore, it would appear that the threat actors are purchasing, and purchasing in significant numbers, compromised Gmail accounts, as well as compromised Apple accounts, to help with the distribution efforts.

“Like the Smishing Triad,” the Resecurity report confirmed, “Panda Shop offers a customized smishing kit that can be deployed on any server.” The research team investigation concluded that it is highly likely that the Panda Shop group itself consists of some former Smishing Triad members who “transitioned their operations under the new brand after being publicly shamed.” This theory is reinforced by the fact that the Panda Shop phishing kit structure, along with various scripting scenarios that have been analyzed by Resecurity, “mimic the same product but include specific improvements and new supported templates.”

The scale of the smishing activity from Chinese threats actors, including Smishing Triad and now Panda Shop is, Resucurity warned, impressive. “The spectrum of the crimes conducted due to smishing ranges from traditional carding and NFC-enabled fraud to money laundering chains, enabling fraudsters to process stolen funds,” Rescurity researchers said. There’s more than just your passwords at stake from smishing or any phishing attacks; there’s all the data that sits beyond it and the implications that the compromise of that and access to other services can have. “Based on Resecurity’s engagements with financial institutions globally,” the report concluded, “this activity generates millions in losses annually.”

Automatic Password Hacking Machine brute force Credential Stuffing Cybernews Research Hacking tools Password Password compromise password hacking Password Hacking Help password theft
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

Securing The Internet’s Humanity

Securing The Internet’s Humanity

21 May 2026
Microsoft Is Scrapping SMS 2FA Codes—What You Need To Do

Microsoft Is Scrapping SMS 2FA Codes—What You Need To Do

21 May 2026
Why Complexity Is The Insider Threat Hiding In Plain Sight

Why Complexity Is The Insider Threat Hiding In Plain Sight

21 May 2026
2 Tell-Tale Signs Of ‘Fake Love’ In A Relationship, By A Psychologist

2 Tell-Tale Signs Of ‘Fake Love’ In A Relationship, By A Psychologist

21 May 2026
​How AI Is Changing The Economics Of Integration

​How AI Is Changing The Economics Of Integration

21 May 2026
Airbnb CEO Brian Chesky Called Chinese AI Fast And Cheap. Now, Congress Wants Answers

Airbnb CEO Brian Chesky Called Chinese AI Fast And Cheap. Now, Congress Wants Answers

21 May 2026
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Exclusive: DeFi platform Azura launches after raising .9 million from Initialized

Exclusive: DeFi platform Azura launches after raising $6.9 million from Initialized

22 October 2024
Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
MacKenzie Scott snubbed from top donors list despite  billion philanthropy

MacKenzie Scott snubbed from top donors list despite $7 billion philanthropy

21 May 20262 Views
Why Complexity Is The Insider Threat Hiding In Plain Sight

Why Complexity Is The Insider Threat Hiding In Plain Sight

21 May 20261 Views
‘We do not want humans to have the same fate as dinosaurs’: SpaceX IPO reads like Hollywood fantasy version of the future

‘We do not want humans to have the same fate as dinosaurs’: SpaceX IPO reads like Hollywood fantasy version of the future

21 May 20260 Views
2 Tell-Tale Signs Of ‘Fake Love’ In A Relationship, By A Psychologist

2 Tell-Tale Signs Of ‘Fake Love’ In A Relationship, By A Psychologist

21 May 20262 Views

Recent Posts

  • McKinsey partner says up to 50% of work hours could be transformed within the next 5 years
  • Securing The Internet’s Humanity
  • Allbirds’ 600% stock surge says a lot about how ‘AI washing’ became the new ‘greenwashing’
  • Microsoft Is Scrapping SMS 2FA Codes—What You Need To Do
  • MacKenzie Scott snubbed from top donors list despite $7 billion philanthropy

Recent Comments

No comments to show.
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
McKinsey partner says up to 50% of work hours could be transformed within the next 5 years

McKinsey partner says up to 50% of work hours could be transformed within the next 5 years

21 May 2026
Securing The Internet’s Humanity

Securing The Internet’s Humanity

21 May 2026
Allbirds’ 600% stock surge says a lot about how ‘AI washing’ became the new ‘greenwashing’

Allbirds’ 600% stock surge says a lot about how ‘AI washing’ became the new ‘greenwashing’

21 May 2026
Most Popular
Microsoft Is Scrapping SMS 2FA Codes—What You Need To Do

Microsoft Is Scrapping SMS 2FA Codes—What You Need To Do

21 May 20261 Views
MacKenzie Scott snubbed from top donors list despite  billion philanthropy

MacKenzie Scott snubbed from top donors list despite $7 billion philanthropy

21 May 20262 Views
Why Complexity Is The Insider Threat Hiding In Plain Sight

Why Complexity Is The Insider Threat Hiding In Plain Sight

21 May 20261 Views

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • March 2022
  • January 2021
  • March 2020
  • January 2020

Categories

  • Blog
  • Business
  • Entrepreneurs
  • Global
  • Innovation
  • Leadership
  • Living
  • Money & Finance
  • News
  • Press Release
© 2026 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.