In an era where personal information is more vulnerable than ever, major data breaches highlight the ongoing challenges in cybersecurity. From credential stuffing attacks to exposed databases, the statistics remain staggering and concerning to users worldwide.
"In January 2019, a large collection of credential stuffing lists was discovered and distributed on a popular hacking forum," said cybersecurity analyst who reviewed the incident. This collection, known as Collection #1, included an alarming 2.7 billion records that encompassed 773 million unique email addresses.
"In January 2019, a large collection of credential stuffing lists was discovered and distributed on a popular hacking forum,"

By the Numbers
The earlier part of 2019 saw another significant breach with the email validation service Verifications.io. "Discovered by researchers Bob Diachenko and Vinny Troia, the breach exposed 763 million unique email addresses," noted Diachenko. He further explained that the sensitive information stemmed from a MongoDB instance, which had been left publicly accessible, resulting in additional personal data like names, phone numbers, and even dates of birth being compromised.
"Discovered by researchers Bob Diachenko and Vinny Troia, the breach exposed 763 million unique email addresses,"
The trend of exposing vast email collections continued with the Onliner Spambot incident in August 2017, identified by researcher Benkow moʞuƎq. "There were 711 million unique email addresses, along with many corresponding passwords that were stored,” said Benkow. The research highlighted how such spambots can serve as conduits for mass personal data theft.

By the Numbers
By the Numbers
By the Numbers
In another case, a critical exposure occurred in October 2019, involving a misconfigured Elasticsearch server, believed to be from a customer of data enrichment company People Data Labs. "This database held 1.2 billion records and included 622 million unique email addresses, with the information left unprotected," explained Troia, who was part of the investigation.
Security issues were further compounded in late 2016 when the Exploit.In list emerged, containing about 593 million unique email addresses. "Credential stuffing occurred as attackers attempted to find reused passwords across multiple online platforms using this list," stated an analyst reviewing the circulation of these lists within hacking communities.
"Credential stuffing occurred as attackers attempted to find reused passwords across multiple online platforms using this list,"
By the Numbers
In a more recent breach highlighting the value of social media data, April 2021 brought forth over 500 million Facebook user profiles available for free download. "This dataset represented about 20% of Facebook users and was allegedly tied to vulnerabilities fixed as of August 2019," detailed a cybersecurity expert. "While many records contained phone numbers and names, just 2.5 million included email addresses."
"This dataset represented about 20% of Facebook users and was allegedly tied to vulnerabilities fixed as of August 2019,"
The Anti Public Combo List surfaced in December 2016, prominently featuring 458 million unique email addresses again subjected to credential stuffing. "Lists like these are a goldmine for attackers seeking to exploit users’ reused passwords across different platforms," explained a data security specialist, emphasizing the importance of unique password usage.
"Lists like these are a goldmine for attackers seeking to exploit users’ reused passwords across different platforms,"
These high-profile data breaches serve as a stark reminder of the necessity for robust cybersecurity measures. As Troia succinctly put it, "The responsibility falls on both organizations to secure user data and on users to practice caution with their credentials." The increasing amount of leaked personal data underscores a growing need for comprehensive cybersecurity strategies to protect against such vulnerabilities.
Looking Ahead
Looking ahead, the trend of data leaks shows no signs of abating. As organizations continue to face significant challenges in securing sensitive data, users must remain vigilant about their online presence and practice safe habits to mitigate risks of identity theft and privacy breaches.


