Leaked Credentials Up 160%: What Attackers Are Doing With Them
Briefly

Leaked credentials represent a significant cybersecurity risk, accounting for 22% of breaches in 2024. This trend is escalating, with a 160% increase in leaked credentials reported in 2025. Credential theft is now easier due to automation and accessible tools such as infostealer malware. These tools allow even lower-skilled attackers to harvest login data effectively. Major delays in remediation processes are evident, with an average of 94 days required to address leaks from GitHub. This underscores the urgency for organizations to implement stronger risk reduction strategies.
According to Verizon's 2025 Data Breach Investigations Report, leaked credentials accounted for 22% of breaches in 2024, outpacing phishing and software exploitation.
New data compiled by Cyberint shows a 160% increase in leaked credentials in 2025 compared to the previous year, emphasizing the growing prevalence of this issue.
Infostealer malware, often sold as a service, allows even low-skilled attackers to harvest login data from browsers and memory with alarming efficiency.
The average time to remediate credentials leaked through GitHub repositories is 94 days, highlighting the significant delays organizations face in addressing these leaks.
Read at The Hacker News
[
|
]