Proton Warns of 300 Million Stolen Credentials Fueling Global Data Breach Crisis

Proton’s Data Breach Observatory uncovered 300 million stolen credentials circulating on the dark web, exposing corporations and individuals worldwide to identity theft and financial fraud risks.
Proton Warns of 300 Million Stolen Credentials Fueling Global Data Breach Crisis
Table of Contents
    Add a header to begin generating the table of contents

    Privacy-focused technology firm Proton has warned of a growing data breach crisis, revealing that more than 300 million stolen credentials are actively circulating on dark web marketplaces. The discovery underscores the expanding scope of credential-based cyberattacks targeting organizations and individuals across multiple sectors.

    Growing Threat from Stolen Credentials and Identity Fraud

    According to Proton’s Data Breach Observatory, attackers are weaponizing compromised login details to infiltrate networks, commit financial fraud, and facilitate large-scale identity theft. The company’s ongoing surveillance of underground cybercriminal markets shows that sensitive corporate and personal data is being sold to the highest bidder—often long before victims become aware of the compromise.

    Proton said its monitoring initiative was established to detect breaches in real time and notify affected organizations before incidents escalate into full-scale intrusions. The findings show that cybercriminals have increasingly focused on credential harvesting as a primary attack vector, with millions of records containing names, birth dates, physical addresses, phone numbers, and passwords now for sale.

    “It’s not just major corporations being hit—small businesses are suffering breaches that cost them millions,” Proton researchers warned.

    Major Companies Impacted Across Continents

    The Data Breach Observatory identified recent exposures affecting several high-profile organizations spanning aviation, telecommunications, finance, retail, and education. In several cases, the stolen data included financial identifiers such as IBAN numbers and social security information, raising concerns about potential large-scale fraud.

    Risk Factor Table

    CompanyCountryRecords ExposedCompromised Data
    Qantas AirwaysAustralia11.8 million+Name, date of birth, physical address, phone number, email address
    Allianz LifeGermany1 million+Name, date of birth, physical address, phone number, email address, social security number
    TraceloUnited States1.4 million+Name, physical address, phone number, email address, password
    INTERSPORT FranceFrance105,782Name, physical address, phone number, email address
    FreeFrance19 million+Name, date of birth, phone number, email address, IBAN
    Orange RomaniaRomania3.4 million+Name, date of birth, physical address, phone number, email address, username, ID number
    Zacks Investment ResearchUnited States5.4 million+Name, physical address, phone number, email address, username, password
    SkilloVillaIndia33 million+Name, physical address, phone number, email address
    amaiSingapore10 million+Name, physical address, phone number, email address, password
    PhoneMondoGermany10 million+Name, date of birth, physical address, phone number, email address, username, password, IBAN

    Impact on Businesses and Consumers

    The widespread exposure of login credentials has intensified risks for businesses that rely on cloud and SaaS environments. Attackers often use previously stolen passwords in credential-stuffing and brute-force attacks to gain access to sensitive accounts.

    Proton emphasized that four out of five small and midsized enterprises have suffered a breach in the past year, with each incident potentially costing over one million dollars in recovery and operational downtime. The company warned that many of these breaches go undetected for weeks or even months, allowing attackers to pivot laterally within victim environments.

    Recommended Security Measures

    Security experts recommend that organizations strengthen identity management controls, deploy multi-factor authentication, and adopt continuous monitoring for leaked credentials. Proton’s observatory platform allows companies to check whether their data has been compromised and initiate password resets or remediation before malicious actors can exploit the information.

    Proton researchers concluded that credential-based attacks will continue to rise as long as stolen data remains easily accessible on illicit forums. The company urged businesses to treat credential security as a foundational defense measure rather than a reactive response to data breaches.

    Related Posts