
WEST PALM BEACH, FL – A significant data breach has compromised over 184 million login credentials, affecting users of major platforms including Google, Apple, Meta (Facebook, Instagram), Microsoft, Snapchat, and others. The exposed information includes email addresses, usernames, plaintext passwords, and login URLs, posing a substantial risk of identity theft and unauthorized account access.
Cybersecurity researcher Jeremiah Fowler discovered the unprotected database, which was publicly accessible and lacked encryption or password protection. The 47GB trove also contained credentials for services like PayPal, Netflix, Spotify, and Roblox, as well as sensitive data from banks, healthcare providers, and government portals across at least 29 countries .
Fowler suspects that the data was collected through infostealer malware—malicious software designed to harvest sensitive information from infected systems, including data stored in web browsers, email clients, and messaging apps . The hosting provider, World Host Group, has since taken the database offline and is cooperating with law enforcement authorities.
List of Affected Services
Major Tech Companies:
- Apple
- Microsoft
- Meta (Facebook, Instagram)
Social Media and Communication:
- Snapchat
- Discord
- Yahoo
Streaming and Entertainment:
- Netflix
- Spotify
- Amazon
- Nintendo
Online Gaming:
- Roblox
Financial Services:
- PayPal
Web and Content Platforms:
- WordPress
What You Should Do
If you use any of the affected services, it’s crucial to take immediate action:
- Change your passwords: Especially if you reuse passwords across multiple accounts.
- Enable two-factor authentication (2FA): This adds an extra layer of security to your accounts.
- Review your email accounts: Delete old messages containing sensitive information like tax documents or medical records.
- Use encrypted cloud storage: For sharing sensitive files, opt for secure cloud services instead of email.
Note: While researchers who discovered the breach, including Fowler, analyzed the exposed database they did not provide a full breakdown of healthcare or government portals involved as it could potentially escalate risks, cause public panic, and open the door to targeted exploitation before affected organizations can respond. Publicly identifying specific organizations as victims without their confirmation also might expose researchers or media outlets to legal challenges. Until these entities confirm their involvement, it remains speculative. Without verification from the companies themselves, researchers are limited in what they can confirm publicly. Law enforcement agencies, cybersecurity firms, and the affected companies are likely still investigating the full scope of the breach. Confirming victims—especially critical infrastructure like healthcare and government—requires careful, thorough forensic analysis before releasing names.
This breach underscores the importance of maintaining strong, unique passwords and practicing vigilant digital hygiene to protect your personal information.

About The Author: John Colascione is Chief Executive Officer of Internet Marketing Services Inc. He specializes in Website Monetization, is a Google AdWords Certified Professional, authored a ‘how to’ book called ”Mastering Your Website‘, and is a key player in several Internet related businesses through his search engine strategy brand Searchen Networks®
Leave a Reply