{"id":203096,"date":"2025-06-30T19:37:01","date_gmt":"2025-06-30T19:37:01","guid":{"rendered":"https:\/\/yogaesoteric.net\/?p=203096"},"modified":"2025-06-30T19:37:01","modified_gmt":"2025-06-30T19:37:01","slug":"after-16-billion-passwords-leaked-experts-warn-they-have-access-to-your-entire-online-life","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/after-16-billion-passwords-leaked-experts-warn-they-have-access-to-your-entire-online-life\/","title":{"rendered":"After 16 billion passwords leaked, experts warn: \u201cThey have access to your entire online life\u201d"},"content":{"rendered":"<p>The largest data breach in history was revealed on June 19 by the specialized website <em>Cybernews<\/em>: almost 16 billion combinations of usernames and passwords were stolen and could be used to access bank accounts, virtual communication platforms, government services and even cryptocurrency wallets. Cybersecurity experts warn that this is an attack of unprecedented scale, which exposes billions of users around the world. In an interview with <em>Le Figaro<\/em>, S\u00e9bastien Martin, president of the Web3 Security League, explains the risks and offers crucial advice for protecting personal data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-202955 size-full\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/06\/202953_1.jpg\" alt=\"\" width=\"560\" height=\"383\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/06\/202953_1.jpg 560w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/06\/202953_1-300x205.jpg 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>On June 19, a news site revealed a data leak that could be the largest of its kind. S\u00e9bastien Martin, president of the Web3 Security League and CEO of RAID Square, answers five questions to shed some light on the subject.<\/p>\n<p>The news came as a shock. On June 19, cybersecurity website <em>Cybernews<\/em> revealed the largest data breach in history, with nearly 16 billion login credentials stolen. \u201c<em>This is not a simple leak, but a massive exploitation plan<\/em>,\u201d the publication claims. Malware was allegedly used to steal user data \u2013 especially Portuguese speakers \u2013 from Apple, Facebook, Google, Telegram, but also from VPN services and government institutions. Although \u201c<em>the information remains to be confirmed<\/em>,\u201d S\u00e9bastien Martin offers his first analysis and advice for users.<\/p>\n<p>\u201c<em>Malware was allegedly used by criminal networks to extract data, like a vacuum cleaner. We are talking about a phenomenal amount of information \u2013 if it is true, it is completely astonishing<\/em>\u201d, says the specialist. One aspect particularly alarms him: the mention of \u201c<em>government websites, which will need to be defined more clearly<\/em>\u201d. \u201c<em>It seems a bit strange to me that hackers had access to data from all countries<\/em>\u201d, notes S\u00e9bastien Martin.<\/p>\n<p>He also wonders about the targeting of Portuguese-speaking users: \u201c<em>There could be several explanations \u2012 a stronger presence of these criminal networks in these regions, a common vulnerability, or perhaps behaviour of these users that was considered more interesting?<\/em>\u201d<\/p>\n<p><strong>What information was stolen and how?<\/strong><\/p>\n<p>\u201c<em>We are talking about usernames and passwords that can be used to access, for example, users\u2019 bank accounts<\/em>,\u201d explains the expert. If billions of people could be affected by this data leak, \u201c<em>many use the same credentials on multiple platforms<\/em>.\u201d \u201c<em>Once you have access to a Gmail address, you can identify all the associated accounts, with the enormous risks that arise from this<\/em>,\u201d warns S\u00e9bastien Martin. This data can then be sold, \u201c<em>at different price ranges<\/em>.\u201d \u201c<em>It\u2019s a bit like a classic market, with supply and demand depending on the sensitivity of the data<\/em>,\u201d he explains.<\/p>\n<p>To steal this data, cybercriminals have several methods at their disposal, starting with \u201c<em>cookies that infiltrate the user\u2019s computer space<\/em>.\u201d Through this means, cybercriminals can observe the user\u2019s online activities. Another method is to infiltrate \u201c<em>the computer\u2019s cache<\/em>,\u201d where passwords and logins are stored.<\/p>\n<p><strong>What do cybercriminals use this data for?<\/strong><\/p>\n<p>\u201c<em>The problem is that these criminals can map out the people whose credentials have been compromised, based on their online habits<\/em>,\u201d the president of the Web3 Security League points out. According to him, \u201c<em>the depth of the data involved is phenomenal, with accounts that can be identified as holding cryptocurrencies<\/em>\u201d \u2013 a type of account that has been increasingly targeted by physical attacks in recent weeks. Cybercriminals can also use this information for \u201c<em>identity theft<\/em>\u201d or \u201c<em>fraudulently using bank cards<\/em>.\u201d \u201c<em>It is necessary to clearly understand that it is not just a password and a username, but access to your entire digital life<\/em>,\u201d the specialist insists.<\/p>\n<p><strong>How can we protect ourselves from these cyber attacks?<\/strong><\/p>\n<p>\u201c<em>When in doubt, the first step is to enable two-step authentication for all accounts, change your passwords and, why not, use a physical authentication device<\/em>,\u201d recommends S\u00e9bastien Martin. Apps like Gmail, WhatsApp or Telegram require, for example, scanning a QR code with your phone or validating the authentication via another device to verify the user\u2019s identity. \u201c<em>It is also necessary to pay attention to your account history and activate notifications for logins from unknown locations or devices<\/em>,\u201d adds the expert.<\/p>\n<p><strong>Will cyber attacks become more common?<\/strong><\/p>\n<p>\u201c<em>This attack raises serious questions about the responsibility of platforms in preserving user data<\/em>,\u201d warns the director of RAID Square. In his opinion, \u201c<em>the stakes now are that platforms not only implement the best cybersecurity tools, but also demand the same from their partners and subcontractors<\/em>.\u201d Thus, \u201c<em>the entire value chain needs to be protected<\/em>,\u201d otherwise we risk living \u201c<em>in a digital world full of vulnerabilities<\/em>.\u201d<\/p>\n<p>For now, the information published by <em>Cybernews<\/em> has neither been confirmed nor denied by the platforms concerned. However, the specialized website <em>Bleeping Computer<\/em> claims that it is \u201c<em>a compilation of previously leaked and stolen login data by hackers, already exposed following previous security breaches<\/em>\u201d. Therefore, virtual communication networks, VPN services and government websites would not have been \u201c<em>recently compromised<\/em>\u201d. According to the cited source, this \u201c<em>login data has already been circulating for some time and has been collected and repackaged in a new database published on the internet<\/em>\u201d. Therefore, we will have to wait a little longer to understand the exact extent of the incident and to find out if, in fact, new information has been leaked on the internet.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>yogaesoteric<br \/>\nJune 30, 2025<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The largest data breach in history was revealed on June 19 by the specialized website Cybernews: almost 16 billion combinations of usernames and passwords were stolen and could be used to access bank accounts, virtual communication platforms, government services and even cryptocurrency wallets. Cybersecurity experts warn that this is an attack of unprecedented scale, which [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1093],"tags":[],"class_list":["post-203096","post","type-post","status-publish","format-standard","hentry","category-censored-news-social-5127-en-censored-sensational-news-3480-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/203096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=203096"}],"version-history":[{"count":1,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/203096\/revisions"}],"predecessor-version":[{"id":203097,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/203096\/revisions\/203097"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=203096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=203096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=203096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}