The numbers are staggering: credential theft has surged 160% in 2025 compared to last year. According to Check Point External Risk Management and Flashpoint's Global Threat Intelligence Index, 1.8 billion credentials were stolen in just the first half of 2025 from 5.8 million infected devices.
This isn't a gradual increase. This is an explosion.
The scope of the problem
Let's put this in perspective:
| Metric | Value |
|---|---|
| Credential theft increase | 160% vs 2024 |
| Logins stolen (H1 2025) | 1.8 billion |
| Infected hosts | 5.8 million |
| Breaches initiated by leaked credentials | 22% (Verizon 2025 DBIR) |
| Average remediation time | 94 days |
The most dramatic incident? In June 2025, researchers discovered what's been dubbed the "G.O.A.T. of all data breaches"—a massive cache containing 16 billion login records exposed online, including credentials for Facebook, Apple, and Google accounts.
December 2025: The breaches keep coming
Just this week, more high-profile breaches have surfaced:
CodeRED emergency alert system breach
The nationwide emergency notification system used by millions of Americans was compromised in early December 2025. The INC Ransom group posted screenshots showing stolen customer data including email addresses and—disturbingly—clear-text passwords.
That's right: a service handling emergency communications was storing passwords without proper hashing. If you have a CodeRED account, change that password immediately—and any other account where you reused it.
Harvard University breach
On November 22, 2025, Harvard confirmed that its Alumni Affairs and Development Office was compromised through a phone-based phishing attack. An attacker used social engineering to obtain credentials, then accessed donor records, event attendance data, and personal contact information.
Mixpanel analytics breach
Analytics giant Mixpanel disclosed a security incident affecting customers including OpenAI. The full scope remains unclear, but user names, email addresses, and device identifiers may have been exposed.
Why is this happening now?
Three factors are converging to create perfect conditions for credential theft:
1. AI-powered phishing at scale
Attackers are using AI to generate highly convincing phishing emails that are nearly indistinguishable from legitimate communications. What used to require skilled social engineers can now be automated and scaled to millions of targets.
The sophistication is increasing while the barrier to entry is dropping. Even low-skilled attackers can now harvest credentials effectively using off-the-shelf tools.
2. Malware-as-a-Service explosion
The underground economy for stealing credentials has professionalized. "Stealer" malware families are now available as subscription services on the dark web, complete with dashboards, customer support, and regular updates.
According to Check Point's research, the growing availability of Malware-as-a-Service offerings means more threat actors entering the playing field than ever before.
3. The remediation gap
Here's a number that should worry every security professional: organizations take an average of 94 days to remediate compromised credentials originating from GitHub repositories.
That's over three months of exposure. Three months where attackers can:
- Access sensitive systems
- Move laterally through networks
- Exfiltrate data
- Set up persistence mechanisms
By the time most organizations act, the damage is done.
Which platforms are most targeted?
The research reveals which services see the most credential theft:
- Discord - Popular with gamers and increasingly with businesses
- Microsoft (live.com) - Gateway to Office 365, Azure, and enterprise systems
- Facebook - Social engineering goldmine and identity verification for other services
- Gmail - The recovery email for countless other accounts
- Roblox - Massive user base of younger, less security-aware users
Notice the pattern? Attackers target accounts that either have direct value (Microsoft, Gmail) or serve as stepping stones to other accounts (Facebook, Gmail as recovery).
The cascade effect: Why one breach matters
Stolen credentials don't just affect the compromised service. They cascade:
Compromised Gmail account
→ Password reset access to: Banking, shopping, healthcare
→ Email contents reveal: Other services used, personal info
→ Two-factor bypass: Many sites text/email 2FA codes
→ Full account takeover across dozens of services
This is why credential stuffing is so effective. Attackers take credentials from one breach and automatically test them against hundreds of other services. With 1.8 billion credentials stolen in six months, the odds of finding working password reuse are excellent.
Geographic hotspots
Credential theft rates are highest in:
- Brazil - Large population, growing digital adoption
- India - Massive internet user base, varying security awareness
- Vietnam, Pakistan, Turkey - Despite smaller populations, elevated targeting
Interestingly, the U.S. saw a decline in credential leaks compared to 2024—possibly reflecting better security practices or attackers shifting focus to easier targets.
What attackers do with stolen credentials
Once credentials are harvested, they enter an underground economy:
Immediate exploitation
- Account takeover (ATO): Direct access to accounts for fraud
- Spam and bot networks: Compromised accounts distribute malware and disinformation
- Credential stuffing: Testing passwords against other services
Longer-term monetization
- Combo lists: Credentials compiled and sold in underground forums
- Corporate access: Business credentials sold for premium prices
- Extortion: Threatening to expose or use stolen data
Cascade attacks
Attackers increasingly use personal credentials to access corporate systems:
- Compromise personal Gmail account
- Find emails from employer
- Access corporate password reset functionality
- Gain internal system access
This personal-to-corporate pivot is why work/life password separation matters—and why it's so rarely practiced.
The 94-day problem
Check Point's research highlights a critical metric: 94 days is the average time to remediate credentials exposed in GitHub repositories.
Why does this gap exist?
- Detection delay: Organizations often don't know credentials are compromised until it's too late
- Verification burden: Confirming which credentials are valid vs. expired takes time
- Rotation logistics: Changing passwords across hundreds of systems is operationally complex
- Competing priorities: Security teams are stretched thin with other incidents
This 94-day window is an attacker's dream. It's enough time to establish persistence, exfiltrate data, and cover tracks—all before the victim even realizes there's a problem.
How to protect yourself
The research is clear about what works:
Essential defenses
- Multi-factor authentication (MFA): Even if passwords leak, MFA blocks unauthorized access
- Password managers: Unique passwords for every account eliminates credential stuffing risk
- Single sign-on (SSO): Reduces password surface area for organizations
- Regular credential rotation: Limits the window of exposure
Advanced measures
- Dark web monitoring: Proactively discover leaked credentials before attackers use them
- Network intrusion detection: Catch attackers who do gain access
- Least privilege access: Limit damage from any single compromised account
- Employee security training: Humans remain the weakest link
The rotation problem
Here's the uncomfortable truth: knowing you should change passwords and actually doing it are very different things.
If you have 100+ accounts and a breach exposes 30 of them, that's potentially hours of:
- Navigating to each site
- Finding the password change form (never in the same place)
- Generating a secure new password
- Updating your password manager
- Hoping you don't get locked out
Most people don't do it. The 94-day remediation gap exists for individuals too—it's just never measured.
Why we built Dosel
This 160% surge in credential theft isn't slowing down. AI is making attacks more sophisticated. Malware-as-a-Service is lowering barriers. The 94-day gap shows that even organizations with security teams struggle to keep up.
Individual users have no chance with manual password rotation.
That's why we built Dosel: AI that handles the tedious clicking so you actually rotate your passwords. Import from your existing password manager, select which passwords to change, and let the automation do the work.
No passwords leave your machine. The AI sees your screen, not your credentials. Zero-knowledge architecture means we can't access your data even if we wanted to.
Because the only thing worse than having your credentials stolen is doing nothing about it for 94 days.
Take action today
The 160% surge isn't an abstraction. It's 1.8 billion real credentials—potentially including yours—circulating in underground markets right now.
You can't control whether a service you use gets breached. You can control:
- Password uniqueness: Stop reusing passwords across accounts
- Response time: Change compromised passwords immediately, not in 94 days
- MFA everywhere: Add a second factor to your most important accounts
Download Dosel and start addressing your credential debt. The free tier lets you change 5 passwords per month—enough to tackle your most critical accounts right away.
The attackers have automated their offense. It's time to automate your defense.
Sources
- Check Point: The Alarming Surge in Compromised Credentials in 2025
- IT Pro: Credential theft has surged 160% in 2025
- The Hacker News: Leaked Credentials Up 160%
- Daily Security Review: 1.8 Billion Logins Stolen
- IT Europa: Record-Breaking Data Breach
- Verizon 2025 Data Breach Investigations Report
- Malwarebytes: CodeRED Emergency Alert System Breach
- Harvard Crimson: Alumni Affairs Data Breach
- TechCrunch: Mixpanel Data Breach
Have questions about credential security or password hygiene? Reach out at hello@dosel.app.