Security protection

In early 2024, National Public Data (NPD), a prominent online background check and fraud-prevention service, suffered a significant data breach that exposed approximately 2.9 billion records containing highly sensitive personal information.
The breach affected up to 170 million individuals across the U.S., U.K., and Canada, compromising data such as Social Security numbers, names, addresses, email addresses, and phone numbers.
The exposed data was discovered on the dark web around April 8, 2024, but many victims remain unaware due to NPD’s lack of notification.
This incident is considered one of the largest data breaches in history, highlighting the critical need for robust cybersecurity measures and prompt breach notifications to affected individuals.
A class-action lawsuit alleges that hackers accessed over 2.7 billion records, including unencrypted Social Security numbers, posing significant risks for identity theft and financial crimes.
On October 2, 2024, NPD filed for Chapter 11 bankruptcy, citing the fallout from the cyberattack and subsequent legal claims from dozens of states.

BadBox 2.0 is a large-scale malware campaign that has infected millions of consumer Android-based devices, especially low-cost or “off-brand” devices: cheap tablets, Android TV boxes, projectors, digital picture frames, and similar. The Hacker News
Infected devices become part of a botnet used for ad fraud, click fraud, and as “residential proxy” nodes threat actors route traffic through these home devices for other malicious activities. The Hacker News
Researchers from HUMAN Security (Satori team) detected the malware in early 2025. The Hacker News
The FBI publicly issued a warning, noting that many of these devices are pre-infected or become infected during app installation. Internet Crime Complaint Center
Malwarebytes reported that sink holing of command-and-control (C2) servers disrupted a large portion of the botnet. Malwarebytes
For more detailed information, refer to the Wikipedia article on the 2024 National Public Data breach: NPD Breach (Wikipedia)
Google filed a lawsuit against the alleged operators of BadBox 2.0, arguing they orchestrated a global fraud scheme via infected devices. HackMag
The U.S. legal action underscores the seriousness: Google claims over 10 million devices globally have been compromised. HackMag
Google removed dozens of malicious apps (around 24) from third-party and some Play Store sources to disrupt the malware distribution. The Hacker News
Google also strengthened Play Protect to better detect and block apps associated with BadBox behaviors, especially on uncertified Android OS devices. Malwarebytes

6 Billion Credentials Leak — Massive Credential Dump (2025)

A staggering 16 billion stolen credentials including logins for Apple, Facebook, Google, and countless other platforms are circulating on the dark web. This number continues to grow as cybercriminals collect usernames and passwords from data breaches, phishing attacks, and malware infections.
In mid-2025, cybersecurity researchers (led by Cybernews) discovered 30 separate unsecured datasets containing 16 billion login credentials (usernames + passwords). forbes.com+2forbes.com
These credentials cover a wide range of services: Apple, Google, Facebook, GitHub, Telegram, VPNs, government portals, and more. forbes.com+2www.ndtv.com
Importantly, this was not a direct breach of Apple, Google, or Facebook systems, but rather a massive aggregation of credentials harvested from infostealer malware running on users’ devices. clearphish.ai+2forbes.com
Because of its enormous scale and the fact the data was well-structured (URL + username + password), researchers warn it’s a “blueprint for mass exploitation”. Making account takeover, phishing, and identity theft significantly more feasible. forbes.com
The leak was reported by Cybernews. Researchers found the 30 datasets publicly accessible for a brief time before they were secured. forbes.com
The credentials came from infostealer logs (malware that silently steals passwords, session cookies, and more from infected machines) rather than a major corporate data breach. Mozilla
CERT-MU (Mauritius) released a security alert confirming the exposure and warning that these records may be reused for credential stuffing and other attacks. cert-mu.govmu.org
There’s no public report of a single threat actor being prosecuted for a “hack” of Apple/Google/Facebook since this is largely harvested data, not a centralized breach.
However, the incident has sparked renewed calls from security experts and CERTs for stronger user-level protections, like replacing passwords with passkeys and encouraging more widespread adoption of multi-factor authentication (MFA). ABC
Security organizations are also ramping up education: advising users to stop reusing passwords, use password managers, and enable phishing-resistant authentication.
Major platforms (Google, Apple, Meta) reiterated that they were not directly breached, clarifying that the data came from compromised end-user devices. forbes.com
Mozilla Monitor issued a public advisory explaining what infostealers do, how data is organized, and what individuals can do to protect themselves (such as enabling two-factor authentication or passkeys and changing reused passwords). Mozilla
  • Change critical or reused passwords immediately
  • Use a password manager to generate and store strong, unique passwords
  • Enable MFA (or passkeys) wherever possible
  • Monitor your accounts via breach-checking services (e.g., Have I Been Pwned) for signs of compromise, Tom’s Guide

Unusual Performance:

Battery & Data Usage:

Unfamiliar Changes:

Security Warnings:

AV Protection

Email Compromise

Account Access & Login Issues:

Suspicious Email Behavior:

Unrecognized Account Changes:


Social Media Account Compromise (Instagram, YouTube, X, Facebook, etc.)

Unauthorized Transactions:

Account Access & Login Issues:

Unfamiliar Posts & Messages:

Changes to Profile Info:


Suspicious Behavior with Online Accounts (Banking, Shopping, and Third-Party Accounts)

Unauthorized Transactions:

Account Access & Notifications:

Changes to Account Information:

Multi-Factor Authentication (MFA) Issues:


  1. Have you recently clicked on any suspicious links, pop-ups, or email attachments?
  2. Have you shared your password, PIN, or other sensitive information with anyone recently (even unknowingly)?
  3. Have you installed any new apps, browser extensions, or software from untrusted sources?