Ecosystem
Wallet

420,000 Binance Credentials Exposed In 149M Password Database Leak

420,000 Binance Credentials Exposed In 149M Password Database Leak

Credentials for 420,000 Binance accounts appeared in an unprotected database containing 149 million login combinations from cryptocurrency exchanges, financial services and government systems discovered last week.

Cybersecurity researcher Jeremiah Fowler identified the 96-gigabyte repository accessible without encryption or password protection.

The database remained online for over one month while records continued accumulating, according to Fowler's report.

Gmail accounts represented the largest portion with 48 million credentials, followed by 17 million Facebook logins. Cryptocurrency platforms accounted for smaller but significant exposure, with Binance's 420,000 accounts representing the primary exchange affected.

What Happened

Infostealer malware harvested the credentials from infected personal devices rather than direct exchange breaches. The malicious software operates silently on compromised systems, recording keystrokes and browser-stored passwords before transmitting data to attacker-controlled servers.

Fowler reported the database to its hosting provider, but removal required nearly a month of communications.

The database indexed stolen credentials using reversed host paths, enabling efficient searches by domain and user, suggesting organized criminal infrastructure.

Google confirmed the dataset compiled credentials stolen over time by third-party malware rather than new platform breaches. The company maintains automated protections that lock accounts and force password resets when exposed credentials appear.

Read also: BitMine Acquires 40,000 ETH In Largest 2026 Purchase After Share Expansion

Crypto Industry Impact

The exposure affects cryptocurrency users disproportionately compared to the breach's overall scale. While Binance accounts represented 0.28% of total leaked credentials, cryptocurrency holdings face permanent loss risks absent from traditional financial services with fraud protections and reversible transactions.

Binance Chief Security Officer Jimmy Su previously addressed infostealer threats in March 2025, noting increased detection of compromised user credentials from malware infections rather than exchange system breaches. The exchange monitors dark web sources and initiates password resets for affected accounts.

Security researchers estimate infostealer malware infrastructure costs $200-$300 monthly to rent, creating low barriers for credential theft operations. Recorded Future analyst Allan Liska noted criminals can access hundreds of thousands of new credentials monthly at subscription prices below typical car payments.

The database also contained credentials for crypto wallets, trading accounts and banking services alongside social media and streaming platforms. Government email domains from multiple countries appeared in samples, raising concerns about targeted phishing and system infiltration attempts.

Read next: UK Banks Block 40% of Crypto Exchange Payments, Industry Survey Finds

Disclaimer and Risk Warning: The information provided in this article is for educational and informational purposes only and is based on the author's opinion. It does not constitute financial, investment, legal, or tax advice. Cryptocurrency assets are highly volatile and subject to high risk, including the risk of losing all or a substantial amount of your investment. Trading or holding crypto assets may not be suitable for all investors. The views expressed in this article are solely those of the author(s) and do not represent the official policy or position of Yellow, its founders, or its executives. Always conduct your own thorough research (D.Y.O.R.) and consult a licensed financial professional before making any investment decision.
Latest News
Show All News