Skip to content

Threat Actor Claims to Sell 5 Billion Unique Email:Password Credential Compilation

Dark Web Informer - Cyber Threat Intelligence

Threat Actor Claims to Sell 5 Billion Unique Email:Password Credential Compilation

Unknown
Unknown

🧩 Standalone API Access Now Available

Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.

View API Access

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)
Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)
Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat Feed
Live tracking with JSON export.
🔍
Leak and Breach Coverage
Direct access to claims and posts.
📡
Snippets and Quick Facts
Concise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet Resources
Verified index of dark web sites and services.
📊
Real Time Uptime Dashboard
Live status of 500+ sites.
🤖
WhiteIntel.io API
Integrated checks inside breach posts.
🖼️
High Resolution Images
Uncompressed, watermark free evidence.
🔑
Keyword Notifications
Browser alerts for tracked terms.

Quick Facts

Date and Time of Alert
2026-01-15 01:52:07 UTC
Threat Actor
RatBridge
Victim Country
Unknown (Global Compilation)
Industry
Unknown (Multi-Sector)
Victim Org.
Unknown (Multiple Sources)
Victim Site
Unknown
Category
Data Leak (Credential Compilation)
Severity
Medium
Network
Clear Web

Incident Overview

A threat actor operating under the handle "RatBridge" claims to be selling a credential compilation containing 5 billion unique email:password pairs. According to the post, the dataset is distributed as a 180GB file and has been cleaned to remove duplicates. The threat actor states that trash domains, short passwords, user:pass formats, and phone:pass formats have been removed from the collection.

The actor claims the dataset "would be good for any targets," suggesting it is intended for credential stuffing attacks. Pricing is listed at $2,000 for a single copy, with an option to purchase exclusive rights for $10,000 (negotiable). Contact is offered through Telegram, with a note stating "Real buyers only! No time wasters and sample collectors!"

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest