
Tech Brewed
Welcome to Tech Brewed, your go-to podcast for the latest in technology products, training, and tips. Whether you're a tech enthusiast or a business professional, our show offers valuable insights into the ever-evolving world of technology.
What We Cover
Home and Business Technology Products
We delve into the latest gadgets and tools that can enhance your home and business environments. From smart home devices to enterprise-level solutions, we keep you updated on the best products for your needs.
Technology Training and Tips
Our episodes are packed with practical advice and training tips to help you maximize your tech investments. Whether you want to improve your cybersecurity or optimize your workflow, we've got you covered.
Creative Technology Software and AI
In today's digital age, creative technology software and artificial intelligence are game-changers. We explore how these innovations transform various industries and offer insights into their practical applications.
Featured Segments
AI and Its Impact
Discover how AI is changing the workplace and driving innovation. Our discussions range from improving audio quality with AI to extending life through advanced technologies.
Practical AI
Our goal is to make artificial intelligence accessible and practical for everyone. We break down complex topics into easy-to-understand segments, ensuring you stay ahead of the curve.
Join us on Tech Brewed for a deep dive into the tech world, where we blend expert knowledge with practical advice to help you navigate the digital landscape. Subscribe now and stay informed on the latest trends and innovations!
Tech Brewed
Your Login May Be at Risk: Breaking Down the Massive Credential Exposure
Welcome to a new episode of Tech Brewed! This week, we’re diving into one of the year’s biggest—and most alarming—security breaches. Host Greg Doig breaks down the jaw-dropping discovery of a massive database containing 184 million real usernames and passwords, left completely unprotected on the open internet. We’ll explore how your data could have ended up in this trove, the rapid rise of info-stealer malware targeting everyday internet users, and why you need to take action—now—to protect your digital life. From how these credentials were collected to practical steps you can follow today, this episode is your essential guide to staying a step ahead of cybercriminals. Grab your coffee and tune in—your online security could depend on it!
Subscribe to the weekly tech newsletter at https://gregdoig.com
Welcome to the tech tip podcast with Greg Doig, where we filter out the noise and serve up the week's essential tech news, tips, and guides. Today, we're pouring a perfect blend of tech topics and digital innovations that matter to you. Welcome back, everyone. I'm Greg Doigan. If you're listening to this, there's a real chance that your Apple ID, Google account, or dozens of other login credentials are sitting in the database that was recently exposed to the entire Internet. I'm not talking about a theoretical hack or some distant threat. I'm talking about a 84,000,000 real usernames and passwords that were just sitting there unprotected for anyone to download. No encryption. No password protection just out there. This is one of the biggest credential exposures we've seen this year, and somehow it's flying under the radar while everyone's distracted by AI drama and tech layoffs. So today, we're gonna break down exactly what happened, how your data probably got stolen in the first place, and most importantly, what you need to do right now to protect yourself. Because here's the thing. This wasn't a sophisticated nation state attack on Apple or Google servers. This was something much more insidious, and it's happening to millions of people every single day without them even knowing it. So let's start with how this massive exposure was discovered. In May 2025, cybersecurity researcher, Jeremiah Fowler, and if you follow data breach news, you've probably heard his name before, was doing what he does best, hunting for exposed databases on the Internet. And boy, did he find one. Picture this, a 47 gigabyte database just sitting there on the Internet completely unprotected. No password required. No encryption. You could literally just navigate to it in your web browser and start downloading. And inside, a 84,162,718 unique usernames and passwords. To put that in perspective, that's roughly half the population of The United States, and these weren't fake accounts or test data. These were real working credentials for some of the biggest platforms on the Internet. We're talking Apple IDs, Google accounts, Microsoft logins, Facebook, Instagram, Snapchat, Discord, Netflix, PayPal, the works. But it gets worse. This database also contained credentials for banking platforms, health care portals, and even government websites from 29 different countries. When followers spot checks some of the data by reaching out to people whose emails were in the database, they confirmed, yes, these were real passwords. Now here's where this story gets really interesting because this wasn't a traditional data breach. Apple didn't get hacked. Google's servers weren't compromised. Facebook security wasn't breached. Instead, this appears to be the work of something called info stealer malware. And if you're not familiar with this term, you need to be because it's becoming one of the biggest threats facing regular Internet users today. Infostealer malware is exactly what it sounds like, malicious software designed to steal information from your computer. But these aren't the clunky, obvious viruses of the past. These are sophisticated, silent programs that can run on your machine for months without you ever knowing they're there. Here's how they work. You get infected usually through a phishing email, a malicious website, or by downloading cracked software. The malware quietly installs itself and then gets to work. It's looking through your web browsers for saved passwords. It's grabbing your autofill data. It's taking screenshots when you log in to sensitive sites. Some variants even steal cryptocurrency wallet files. And the real scary part, according to IBM's latest threat intelligence report, phishing emails delivering info stealers surged by 84% in 2024. Checkpoint Security found a 58% increase in info stealer attacks overall. And get this, there are currently over 10,000,000 stolen steeler logs being traded on underground markets right now. That's 10,000,000 collections of stolen data from infected computers just being bought and sold like commodities. So what we're looking at here isn't one massive data breach, but the accumulation of potentially millions of individual infections. Every time someone gets hit by info stealer malware, their credentials get added to these massive databases that criminals use to fuel further attacks. And the scope of this particular database was staggering. In just a small sample of 10,000 records, researchers found credentials for over 850 Google and Facebook accounts, hundreds of Roblox, Discord, Microsoft, Netflix, and PayPal accounts, and 220 government email addresses with .gov domains. But here's what really keeps me up at night. We have no idea how long this database was exposed before Fowler found it. Could have been days, could have been months, and we don't know if other malicious actors downloaded it before it was taken offline. The hosting provider, World Host Group, did take it down immediately after being notified, but the damage may already be done. This data is probably already being sold on dark web marketplaces and used for credential stuffing attacks as we speak. Alright. So let's talk about what this actually means for you, the listener. If you use the Internet, and I'm gonna assume that you do since you're listening to a tech podcast, there's a real possibility your credentials were in this database. The big concern here isn't just that someone might log into your Instagram account and post embarrassing photos, it's what security experts call credential stuffing. See, most people reuse passwords across multiple sites. So if a cybercriminal gets your Netflix password, the first thing they're gonna try is that same email and password combination on your bank's website. Your Amazon account, your work email, everywhere. This is why security experts have been screaming about password reuse for years. It's not just that one account gets compromised, it's that criminals can potentially access your entire digital life. And if your credentials were used for more sensitive accounts, say a work email that gives access to corporate systems or a government portal or a health care platform with your medical records, the implications get really serious really fast. There's also the identity theft angle. With access to your email account, criminals can often reset passwords for other services, intercept two factor authentication codes, and basically take over your digital identity. So let me get a bit technical for a moment. Because understanding how Infostealer malware works can help you protect yourself, these programs typically use multiple collection methods. They're doing key logging, which is recording every keystroke you make. They're dumping saved credentials from your browser's password manager. They're grabbing data from web forms before it even gets encrypted. And some of them monitor your clipboard, which is particularly dangerous if you're copying and pasting passwords or cryptocurrency addresses. The more advanced ones even do what's called man in the browser attacks, where they inject malicious code directly into your web browser to manipulate transactions in real time. Once they've collected all this data, it gets compiled into what criminals call stealer logs and transmitted to command and control servers. From there, it either gets sold on underground markets or used directly by criminals who deployed the malware. The really insidious part is how they're distributed. We're not talking about, obviously, malicious files anymore. These things are often bundled with legitimate looking software hidden in email attachments that look like invoices or shipping notifications or embedded in websites that have been compromised. And once you're infected, the malware is designed to be as stealthy as possible. No pop ups, no obvious signs of infection. It just quietly does its work in the background. Okay. Enough doom and gloom. Let's talk about what you can actually do to protect yourself starting right now. First, assume you're affected. I know that sounds paranoid, but with a 84,000,000 credentials in just this one database and millions more in other breaches that happen constantly, the odds are not in your favor. So here's some steps you can follow. Step one. Change your passwords, all of them. Start with the most critical accounts, your email, banking, work accounts, anything with payment information. And here's the key, make each password unique. Use a password manager if you have to, but stop reusing passwords. Step two, enable two factor authentication everywhere you can, and I mean everywhere. Your email, social media, banking, shopping accounts, work systems, everything. If criminals have your password, two factor authentication makes it exponentially harder for them to actually access your account. Step three, clean up your email account. Seriously, when was the last time you went through your old emails and deleted sensitive information? Financial documents, password reset emails, and anything with personal information, get rid of it. As one security expert put it, too many people treat their email like free cloud storage and keep years worth of sensitive documents without thinking about how dangerous that is. And step four, get serious about antivirus and anti malware protection. I know some of you think you're too smart to get infected, but info stealer malware is getting increasingly sophisticated, and it only takes one moment of inattention. And here's what really concerns me about this story. It represents a fundamental shift in how cyber criminals operate. Instead of trying to break into Apple or Google's heavily fortified servers, they're going after individual users with targeted malware campaigns. It's often easier, less risky, and incredibly scalable. And the infrastructure for this kind of crime has become increasingly professionalized. There are malware as a service platforms where criminals can rent access to info stealer malware. There are underground marketplaces where stolen credentials are bought and sold like stocks. There are entire criminal ecosystems built around harvesting and monetizing your personal data. And the scary part, this is just what we know about. For every exposed database like this one that gets discovered and taken down, how many others are there out there that we haven't found yet? This ties into another problem with how we think about cybersecurity. We focus so much on the big headline grabbing breaches, the Equifax hack, the Target breach, the Facebook Cambridge Analytica scandal. But the reality is that most people are probably losing their data through these smaller, more targeted attacks that happen every single day. So where does this leave us? Well, the good news is that companies are starting to take this threat more seriously. Microsoft, for example, recently announced they're switching to passkeys by default and working to eliminate passwords entirely from their ecosystem. Apple and Google are both investing heavily in more secure authentication methods. But until we get to that password less future, we're stuck with the current system. And that means the responsibility falls on us, the users, to protect ourselves. The other thing that gives me hope is that researchers like Jeremiah Fowler are out there doing this work, finding these exposed databases and getting them taken down before even more damage could be done. It's a cat and mouse game, but at least there are people fighting the good fight. But we can't just rely on security researchers to save us. We need to take personal responsibility for our digital security because the alternative is becoming a statistic in the next next massive credential database that gets discovered. Look, I know this has been a heavy episode. Nobody wants to think about the possibility that their personal data is being sold on dark web marketplaces. But the reality is that this is the world we live in now, and ignoring the problem doesn't make it go away. The silver lining, if you take action now, change those passwords, enable two factor authentication, clean up your digital footprint, you're already ahead of 90% of Internet users who are still using password one two three for everything. This stuff matters. Your digital security isn't just about protecting your social media accounts anymore. It's about protecting your financial information, your work data, your personal communications, your entire digital life. So do me a favor. Go and change all your passwords, please. And it's gonna wrap up today's episode. If this story freaked you out as much as it did me, share it with someone who needs to hear it. The more people who understand these threats, the harder it becomes for criminals to exploit them. Until next time, stay secure out there. Thank you for tuning in to today's episode of tech tips with Greg Doig. If you found this information helpful, be sure to subscribe so you never miss future episodes where we'll continue breaking down complex technology into simple, actionable advice. You can also follow us at gregdoig.com for more tech insights and quick solutions to common tech problems. This has been Tech Tips with Greg Doig proudly brought to you by WBBI, the voice of Beaver Island. Until next time, stay curious and keep your technology working for you, not against you.