In partnership with

The Big Sip

Image: BleepingComputer

The take: The 183 million Gmail password leak stems from malware infections on individual devices, not a Google server breach.

Users who reused passwords across multiple websites and had malware-infected devices are exposed.

What happened: On 21 October 2025, cybersecurity researcher Troy Hunt added 183 million unique email addresses and passwords to Have I Been Pwned.

Compiled from a year of monitoring infostealer malware by college student Benjamin Brundage at Synthient LLC, who tracked credentials stolen from infected devices across Telegram channels, dark web forums, and social media.

Why it matters: Google's servers weren't compromised.

16.4 million people had their credentials added to a breach database for the first time, exposing them to credential-stuffing attacks.

These credentials were stolen from devices infected with malware, often through saved browser passwords and malicious email attachments.

What to watch: Infostealer malware infections surged 800% in the first half of 2025 according to Flashpoint's midyear report, with Synthient's system recording 600 million stolen credentials in a single day at peak activity.

More leaks are likely until users adopt stronger password practices and security measures.

[Report] BleepingComputer confirms Google's response, published 27 October 2025.

Google posted on X that "reports of a Gmail security breach impacting millions of users are false" and explained the compromised accounts stem from "a compilation of credentials stolen by information-stealing malware and other attacks over the years," not from any breach of Gmail's infrastructure.

The problem isn't that Gmail's vulnerable. It's that millions of us treat our passwords like house keys we hide under the doormat.

Before we jump into today’s brew, here are some words from today’s sponsor…

Introducing the first AI-native CRM

Connect your email, and you’ll instantly get a CRM with enriched customer insights and a platform that grows with your business.

With AI at the core, Attio lets you:

  • Prospect and route leads with research agents

  • Get real-time insights during customer calls

  • Build powerful automations for your complex workflows

Join industry leaders like Granola, Taskrabbit, Flatfile and more.

Here’s Your Brew

Google clarified the technical details while facing public relations challenges.

The company stated that Gmail "did not suffer a breach" and that the leaked credentials originated from malware-infected user devices.

The statement is technically accurate. The leaked credentials result from password reuse combined with malware infections on user devices.

When Synthient tracked 600 million stolen credentials in a single day, they monitored Telegram channels where malware automatically uploaded credentials from infected devices —not from server breaches.

Google's servers remained secure. Users face credential stuffing attack risks because 91% of people don't check Have I Been Pwned.

Gmail's infrastructure security is separate from user credential protection.

The 183 million passwords came from compromised devices rather than Google's systems.

Both the security claim and the user risk are accurate and exist simultaneously.

Two Sides, One Mug

Image: Synthient

Pro: Google is technically correct that this isn't a Gmail infrastructure breach. Their servers remained secure.

The leak resulted from malware on user devices. The company's two-factor authentication successfully blocks 99.9% of unauthorized access attempts, even when passwords are stolen.

Con: 16.4 million people had their credentials appear for the first time in this leak.

Password reuse means a single compromised login can unlock dozens of accounts.
Google's reassurances don't address the user behaviors that enable these attacks.

Our read: Google accurately explained what happened.

Users need actionable guidance on password managers and device security, rather than explanations of technical distinctions, while their credentials circulate in breach databases.

Receipt of the Day

[Primary] Benjamin Brundage's technical breakdown at Synthient published 21 October 2025

The college student who compiled the dataset explains how his monitoring system indexed 30 billion Telegram messages and processed up to 600 million stolen credentials daily, revealing the industrial scale of the infostealer ecosystem that nobody outside cybersecurity circles knew existed.

Spit Take

16.4M first-time emails exposed. — Bleeping Computer

  • Hackread on how the Synthient system works — Best explanation of how a college student built a monitoring system that tracked 30 billion Telegram messages and indexed the underground credential marketplace, including which malware families are most active. [Analysis]

  • IBTimes UK on what infostealer malware actually does — a clear breakdown of how malware silently captures your keystrokes when you log in to any website, then automatically uploads the data to criminal marketplaces before you even notice your device is infected. [Report]

  • Flashpoint on new infostealer variants emerging in 2025 — Why credential theft exploded 800% this year, which new malware strains are gaining market share, and how Malware-as-a-Service platforms now cost as little as $100 per month for criminals to rent. [Analysis]

Join your team of caffeinated skeptics. ☕

Opinionated world news that respects your time.

One bold take, the best counter, and the receipt(s) that prove it (all in six minutes).

Mugshot Poll 📊

Before we wrap up today…

Does crypto/Web3 intrigue you?

Is worrying about losing money or getting scammed stopping you from investing?

This course is for you!

Click to share (2 referrals get you free access to your very own crypto mastery email course).

Everything you need to unlock crypto in 5 days (for beginners).

You can read yesterday’s newsletter on the Louvre arrests here.

For the love of coffee, see you tomorrow!

Enjoy your Tuesday, keep it caffeinated.

Thanks for reading!

Are you subscribing?

Be sure to get your daily curse and coffee fix by hitting that subscribe button.

Reply

Avatar

or to participate

Keep Reading