Overview
- The exposed Elastic database contained 184 million plaintext login credentials across a wide range of platforms, including Apple, Google, Facebook, and government portals.
- Jeremiah Fowler, the security researcher who discovered the database, suspects it was compiled using infostealer malware targeting credentials stored in browsers and apps.
- The database included sensitive information such as usernames, passwords, and URLs, with a sample revealing 220 government email addresses spanning 29 countries.
- World Host Group, the hosting provider, has shut down the server and is cooperating with law enforcement to investigate the fraudulent user responsible for uploading the data.
- The incident highlights urgent cybersecurity risks, with experts emphasizing the importance of strong passwords, multi-factor authentication, and regular credential audits.