{"id":17580,"date":"2025-11-14T16:13:53","date_gmt":"2025-11-14T16:13:53","guid":{"rendered":"https:\/\/lite14.net\/blog\/?p=17580"},"modified":"2025-11-14T16:13:53","modified_gmt":"2025-11-14T16:13:53","slug":"2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches","status":"publish","type":"post","link":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/","title":{"rendered":"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches"},"content":{"rendered":"<p>&nbsp;<\/p>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#What_Happened_Key_Facts_Context\" >What Happened: Key Facts &amp; Context<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#Reactions_Commentary_Implications\" >Reactions, Commentary &amp; Implications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#What_You_Should_Do_If_Youre_Concerned\" >What You Should Do (If You\u2019re Concerned)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#My_Assessment_Commentary\" >My Assessment &amp; Commentary<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#Case_Studies_Key_Observations\" >Case Studies &amp; Key Observations<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#Case_Study_1_The_Credential%E2%80%91Stuffing_Corpus\" >Case Study 1: The Credential\u2011Stuffing Corpus<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#Case_Study_2_Infostealer%E2%80%91Derived_Credentials_Stealer_Logs\" >Case Study 2: Infostealer\u2011Derived Credentials (Stealer Logs)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#Commentary_Strategic_Implications\" >Commentary &amp; Strategic Implications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#Take%E2%80%91Home_Lessons_Recommendations_for_Individuals_Organizations\" >Take\u2011Home Lessons &amp; Recommendations (for Individuals &amp; Organizations)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#My_Assessment\" >My Assessment<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_Happened_Key_Facts_Context\"><\/span>What Happened: Key Facts &amp; Context<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>How Big Is the Exposure<\/strong>\n<ul>\n<li>A <strong>cybersecurity company called Synthient<\/strong> compiled a massive dataset of stolen credentials (emails + passwords) from various sources on the dark web. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<li>After deduplication, <strong>1,957,476,021 unique email addresses<\/strong> (\u2248\u202f2\u202fbillion) and <strong>1.3\u202fbillion unique passwords<\/strong> were identified. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html\/amp?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<li>Among those 1.3\u202fbillion passwords, about <strong>625 million<\/strong> had never previously appeared in the <em>Have I Been Pwned<\/em> (HIBP) database. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Not a Single Breach \u2014 It\u2019s Aggregated Data<\/strong>\n<ul>\n<li>Importantly, this is <strong>not one single new breach<\/strong>. Rather, it\u2019s a large aggregation of credentials from many past breaches, stolen via infostealer malware and credential-stuffing lists. (<a title=\"2B email addresses and 1.3B passwords compromised in data breaches\" href=\"https:\/\/9to5mac.com\/2025\/11\/13\/2b-email-addresses-and-1-3b-passwords-compromised-in-multiple-data-breaches\/?utm_source=chatgpt.com\">9to5Mac<\/a>)<\/li>\n<li>These lists are what attackers use for <strong>credential-stuffing attacks<\/strong>: they try email + password combinations on many websites, hoping users reuse passwords. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html\/amp?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Have I Been Pwned (HIBP) Involvement<\/strong>\n<ul>\n<li>Troy\u202fHunt (founder of HIBP) announced that this massive data corpus was processed and incorporated into the HIBP infrastructure. (<a title=\"Have I Been Pwned adds 2 billion email addresses database\" href=\"https:\/\/www.paubox.com\/blog\/have-i-been-pwned-adds-2-billion-email-addresses-database?utm_source=chatgpt.com\">paubox.com<\/a>)<\/li>\n<li>This means individuals can now check whether their <strong>email addresses<\/strong> appear in this new data set via HIBP. (<a title=\"Have I Been Pwned adds 2 billion email addresses database\" href=\"https:\/\/www.paubox.com\/blog\/have-i-been-pwned-adds-2-billion-email-addresses-database?utm_source=chatgpt.com\">paubox.com<\/a>)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Risk Level &amp; Why It\u2019s Dangerous<\/strong>\n<ul>\n<li>Because many people reuse passwords, this aggregated list is a <strong>goldmine for attackers<\/strong> trying to gain access to other accounts. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html\/amp?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<li>Some of these credentials come from <em>infostealer malware<\/em> \u2014 which means they didn\u2019t always originate from a breach of a major company, but from malware stealing passwords directly from users&#8217; devices. (<a title=\"1.3 Billion Passwords Exposed: Urgent Warning for Your Accounts - Eye World\" href=\"https:\/\/eye.world\/1-3-billion-passwords-exposed-urgent-warning-for-your-accounts\/?utm_source=chatgpt.com\">Eye World<\/a>)<\/li>\n<li>The scale of the data emphasizes how deeply credential reuse and poor password hygiene continue to undermine security. (<a title=\"Massive Breach Alert: 2 Billion Emails, 1.3 Billion Passwords, and You Probably Didn\u2019t Hear About It | DS Tech\" href=\"https:\/\/dstech.net\/blog\/massive-breach-alert-2-billion-emails-1-3-billion-passwords-and-you-probably-didnt-hear-about-it\/?utm_source=chatgpt.com\">DS Tech<\/a>)<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Reactions_Commentary_Implications\"><\/span>Reactions, Commentary &amp; Implications<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Troy Hunt \/ HIBP<\/strong>\n<ul>\n<li>Hunt himself said that while headlines can be hyperbolic, in this case the \u201c2 billion email addresses\u201d figure is <strong>not overstated<\/strong> \u2014 it&#8217;s based on real deduplicated data. (<a title=\"2B email addresses and 1.3B passwords compromised in data breaches\" href=\"https:\/\/9to5mac.com\/2025\/11\/13\/2b-email-addresses-and-1-3b-passwords-compromised-in-multiple-data-breaches\/?utm_source=chatgpt.com\">9to5Mac<\/a>)<\/li>\n<li>By indexing this data, HIBP provides a <strong>valuable early warning<\/strong> for users: if your email shows up, it&#8217;s a signal to take action. (<a title=\"Have I Been Pwned adds 2 billion email addresses database\" href=\"https:\/\/www.paubox.com\/blog\/have-i-been-pwned-adds-2-billion-email-addresses-database?utm_source=chatgpt.com\">paubox.com<\/a>)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Cybersecurity Experts<\/strong>\n<ul>\n<li>Experts are stressing that credential-stuffing is one of the biggest ongoing risks: even old breaches or data from malware can be re-used in new attacks. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<li>Some warning voices point out that a <em>significant portion<\/em> of the exposed passwords are \u201cnew\u201d in the sense that they were not previously part of public data sets \u2014 which raises the risk for people who thought they were \u201csafe\u201d because they didn\u2019t appear in known breaches. (<a title=\"Have I Been Pwned adds 2 billion email addresses database\" href=\"https:\/\/www.paubox.com\/blog\/have-i-been-pwned-adds-2-billion-email-addresses-database?utm_source=chatgpt.com\">paubox.com<\/a>)<\/li>\n<li>Infostealer-based credential theft is especially concerning because it often bypasses traditional breach detection: malware on a device can quietly steal logins. (<a title=\"1.3 Billion Passwords Exposed: Urgent Warning for Your Accounts - Eye World\" href=\"https:\/\/eye.world\/1-3-billion-passwords-exposed-urgent-warning-for-your-accounts\/?utm_source=chatgpt.com\">Eye World<\/a>)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Broader Cybersecurity Landscape<\/strong>\n<ul>\n<li>This event highlights the <strong>persistent threat of credential reuse<\/strong>. Academic and industry research has long shown that many users reuse passwords across multiple sites, making them vulnerable when <em>any<\/em> one of their accounts is compromised. (<a title=\"Empirical Analysis of Password Reuse and Modification across Online Service\" href=\"https:\/\/arxiv.org\/abs\/1706.01939?utm_source=chatgpt.com\">arXiv<\/a>)<\/li>\n<li>Identity-exposure firms (like SpyCloud) have also warned for years that infostealer logs and breach data are being continuously harvested, recombined, and reused by threat actors. (<a title=\"2025\" href=\"https:\/\/engage.spycloud.com\/rs\/713-WIP-737\/images\/spycloud-2025-identity-exposure-report.pdf?utm_source=chatgpt.com\">SpyCloud<\/a>)<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"What_You_Should_Do_If_Youre_Concerned\"><\/span>What You Should Do (If You\u2019re Concerned)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Check Your Email on Have I Been Pwned<\/strong>\n<ul>\n<li>Go to <a href=\"https:\/\/haveibeenpwned.com\/\">HIBP<\/a> and check whether your email address appears in any of the newly indexed data.<\/li>\n<li>If it does, treat it as a serious warning: your credentials might already be circulating in attacker-controlled lists.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Change Reused Passwords<\/strong>\n<ul>\n<li>Immediately change your password for any site where you used the same email + password combination.<\/li>\n<li>Prioritize sensitive accounts (banking, email, work, cloud services).<\/li>\n<\/ul>\n<\/li>\n<li><strong>Use a Password Manager<\/strong>\n<ul>\n<li>Use a trusted password manager to generate and store <strong>unique, strong passwords<\/strong> for every site.<\/li>\n<li>This makes it much harder for attackers to exploit credential reuse.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Enable Multi-Factor Authentication (MFA)<\/strong>\n<ul>\n<li>Wherever possible, activate MFA (2FA) on your online accounts. Even if someone has your password, MFA adds a second barrier.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Monitor Your Accounts<\/strong>\n<ul>\n<li>Keep an eye on your login activity, especially on financial or high-risk accounts.<\/li>\n<li>Consider setting up alerts for suspicious logins, or forcing a logout of all sessions if your credentials are compromised.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Stay Informed<\/strong>\n<ul>\n<li>Security is evolving: follow trusted cybersecurity news sources or blogs (like Troy Hunt\u2019s) for updates on major data leaks.<\/li>\n<li>Regularly audit your digital footprint: close unused accounts, delete old logins, and maintain good digital hygiene.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"My_Assessment_Commentary\"><\/span>My Assessment &amp; Commentary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Scale &amp; Severity<\/strong>: This is <em>very significant<\/em>. While it&#8217;s not a breach of a single company, the <strong>sheer volume<\/strong> of unique credentials makes it a serious risk for credential-stuffing attacks.<\/li>\n<li><strong>Persistent Risk<\/strong>: Because the data is aggregated from many past breaches and infostealer logs, it underscores that the threat of \u201cold data\u201d never really goes away \u2014 stolen credentials can remain valuable for attackers for years.<\/li>\n<li><strong>Opportunity for Users<\/strong>: The integration into HIBP is a positive \u2014 it gives individuals and orgs a way to <strong>proactively check<\/strong> exposure and mitigate risk.<\/li>\n<li><strong>Call to Action<\/strong>: This is a strong reminder that <strong>password hygiene matters<\/strong> more than ever: reusing passwords, weak passwords, or not using MFA is now increasingly untenable if you care about your security.<\/li>\n<\/ul>\n<hr \/>\n<p>Good call. Here are <strong>case\u2011studies<\/strong> and commentary on the recent revelation that <strong>~2\u202fbillion email addresses and ~1.3\u202fbillion passwords<\/strong> have been exposed \u2014 plus strategic reflections on what this means and what to do.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Case_Studies_Key_Observations\"><\/span>Case Studies &amp; Key Observations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_1_The_Credential%E2%80%91Stuffing_Corpus\"><\/span>Case Study 1: The Credential\u2011Stuffing Corpus<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What happened \/ what was discovered<\/strong><\/p>\n<ul>\n<li>Synthient, a threat\u2011intelligence firm, aggregated a massive data set composed of <em>credential-stuffing lists<\/em>. These are essentially collections of \u201cemail:password\u201d pairs drawn from a variety of past breaches and underground sources. (<a title=\"Synthient, HIBP, and the Biggest Exposure Index Yet: What Really Happened | by Sabri Chaabi | Nov, 2025 | Medium\" href=\"https:\/\/medium.com\/%40chaabisabri\/synthient-hibp-and-the-biggest-exposure-index-yet-what-really-happened-2aa969b0e9ea?utm_source=chatgpt.com\">Medium<\/a>)<\/li>\n<li>After deduplication, this resulted in <strong>1,957,476,021 unique email addresses<\/strong> (\u22482 billion) and <strong>1.3\u202fbillion unique passwords<\/strong>. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<li>Of those 1.3 billion passwords, around <strong>625 million<\/strong> had never appeared before in the Have\u202fI\u202fBeen\u202fPwned (HIBP) database. (<a title=\"Over 2 billion email addresses and 1.3 billion passwords exposed in massive data breach\" href=\"https:\/\/www.moneycontrol.com\/technology\/over-2-billion-email-addresses-and-1-3-billion-passwords-exposed-in-massive-data-breach-article-13674676.html?utm_source=chatgpt.com\">Moneycontrol<\/a>)<\/li>\n<li>HIBP has now made this corpus searchable: the \u201cSynthient Credential Stuffing Threat Data\u201d is publicly listed on its site. (<a title=\"Have I Been Pwned: Synthient Credential Stuffing Threat Data Data Breach\" href=\"https:\/\/haveibeenpwned.com\/Breach\/SynthientCredentialStuffingThreatData?utm_source=chatgpt.com\">Have I Been Pwned<\/a>)<\/li>\n<\/ul>\n<p><strong>Why this matters<\/strong><\/p>\n<ul>\n<li><strong>Credential reuse risk<\/strong>: Many users reuse the same password across multiple sites. Attackers can use such compiled lists (credential-stuffing lists) to try to log in to other services (banks, email, social, etc.). (<a title=\"2B email addresses and 1.3B passwords compromised in data breaches\" href=\"https:\/\/9to5mac.com\/2025\/11\/13\/2b-email-addresses-and-1-3b-passwords-compromised-in-multiple-data-breaches\/?utm_source=chatgpt.com\">9to5Mac<\/a>)<\/li>\n<li><strong>Scale is enormous<\/strong>: This is one of the largest datasets HIBP has ever processed. (<a title=\"2B email addresses and 1.3B passwords compromised in data breaches\" href=\"https:\/\/9to5mac.com\/2025\/11\/13\/2b-email-addresses-and-1-3b-passwords-compromised-in-multiple-data-breaches\/?utm_source=chatgpt.com\">9to5Mac<\/a>)<\/li>\n<li><strong>Domain diversity<\/strong>: The data isn\u2019t just a few big domains; it covers tens of millions of domains. (<a title=\"2 Billion Email Addresses Exposed \u2014 All Indexed in \u2018Have I Been Pwned\u2019 Database - Lite14 Tools &amp; Blog\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/2-billion-email-addresses-exposed-all-indexed-in-have-i-been-pwned-database\/?utm_source=chatgpt.com\">lite14.net<\/a>)<\/li>\n<li><strong>Actionability<\/strong>: Because these are relatively clean, deduplicated credentials, they\u2019re highly usable for attackers \u2014 not just random bits of data.<\/li>\n<\/ul>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_2_Infostealer%E2%80%91Derived_Credentials_Stealer_Logs\"><\/span>Case Study 2: Infostealer\u2011Derived Credentials (Stealer Logs)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What happened \/ what was discovered<\/strong><\/p>\n<ul>\n<li>In addition to the stuffing\u2011list data, Synthient also collected <em>stealer-log data<\/em>. These come from infostealer malware installed on compromised devices, which capture credentials entered by users (email, password, site) and exfiltrate them. (<a title=\"Synthient, HIBP, and the Biggest Exposure Index Yet: What Really Happened | by Sabri Chaabi | Nov, 2025 | Medium\" href=\"https:\/\/medium.com\/%40chaabisabri\/synthient-hibp-and-the-biggest-exposure-index-yet-what-really-happened-2aa969b0e9ea?utm_source=chatgpt.com\">Medium<\/a>)<\/li>\n<li>HIBP has already ingested <strong>183\u202fmillion unique email addresses<\/strong> from this \u201cSynthient Stealer Log\u201d data set. (<a title=\"Synthient, HIBP, and the Biggest Exposure Index Yet: What Really Happened | by Sabri Chaabi | Nov, 2025 | Medium\" href=\"https:\/\/medium.com\/%40chaabisabri\/synthient-hibp-and-the-biggest-exposure-index-yet-what-really-happened-2aa969b0e9ea?utm_source=chatgpt.com\">Medium<\/a>)<\/li>\n<li>According to reporting, 91% of those credentials had appeared before, but around <strong>17 million<\/strong> email-password combos were entirely new or not previously documented. (<a title=\"The Password Reuse Crisis Hits a New High: 183 Million Credentials Dumped from Malware Stealer Logs\" href=\"https:\/\/www.cyware.com\/news-and-press\/the-password-reuse-crisis-hits-a-new-high-183-million-credentials-dumped?utm_source=chatgpt.com\">cyware.com<\/a>)<\/li>\n<li>This data was added to HIBP on <strong>October 21, 2025<\/strong>. (<a title=\"Synthient, HIBP, and the Biggest Exposure Index Yet: What Really Happened | by Sabri Chaabi | Nov, 2025 | Medium\" href=\"https:\/\/medium.com\/%40chaabisabri\/synthient-hibp-and-the-biggest-exposure-index-yet-what-really-happened-2aa969b0e9ea?utm_source=chatgpt.com\">Medium<\/a>)<\/li>\n<\/ul>\n<p><strong>Why this matters<\/strong><\/p>\n<ul>\n<li><strong>Live, in\u2011use credentials<\/strong>: Stealer logs are particularly dangerous because they often represent <strong>active, real user logins<\/strong> \u2014 not just static \u201cold breach\u201d data. (<a title=\"Synthient, HIBP, and the Biggest Exposure Index Yet: What Really Happened | by Sabri Chaabi | Nov, 2025 | Medium\" href=\"https:\/\/medium.com\/%40chaabisabri\/synthient-hibp-and-the-biggest-exposure-index-yet-what-really-happened-2aa969b0e9ea?utm_source=chatgpt.com\">Medium<\/a>)<\/li>\n<li><strong>Malware-driven risk<\/strong>: These credentials were harvested from infected end-user devices, meaning the threat is not just from compromised services but from compromised endpoints. (<a title=\"The Password Reuse Crisis Hits a New High: 183 Million Credentials Dumped from Malware Stealer Logs\" href=\"https:\/\/www.cyware.com\/news-and-press\/the-password-reuse-crisis-hits-a-new-high-183-million-credentials-dumped?utm_source=chatgpt.com\">cyware.com<\/a>)<\/li>\n<li><strong>Long exposure window<\/strong>: Because the logs cover many services, attackers can pivot to try those same credentials on other sites, especially if the user reuses the same password.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Commentary_Strategic_Implications\"><\/span>Commentary &amp; Strategic Implications<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Re\u2011Use Risk Is Still the Core Problem<\/strong>\n<ul>\n<li>These data sets reinforce a long-standing problem: <strong>password reuse<\/strong>. When people use the same or similar passwords across different accounts, a leak from one source can compromise many others.<\/li>\n<li>The availability of such huge credential-stuffing lists makes it easier for attackers to scale credential-stuffing attacks: they don\u2019t need to guess \u2014 they just try previously exposed combinations.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Infostealer Malware Is a Major Threat Vector<\/strong>\n<ul>\n<li>Traditional \u201cbreach\u201d risk is no longer the only or even primary concern. Device-level risk \u2014 via infostealers \u2014 provides a constant stream of fresh credentials to attackers.<\/li>\n<li>These logs are especially valuable because they capture where the user <em>actually used<\/em> the credentials (which sites), giving attackers more precise ways to reuse them.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Transparency + Defensive Shift<\/strong>\n<ul>\n<li>By giving this data to HIBP, Synthient is effectively \u201cflipping the advantage\u201d: what criminals use for attacks is now partly visible to defenders (and individual users). (<a title=\"Synthient, HIBP, and the Biggest Exposure Index Yet: What Really Happened | by Sabri Chaabi | Nov, 2025 | Medium\" href=\"https:\/\/medium.com\/%40chaabisabri\/synthient-hibp-and-the-biggest-exposure-index-yet-what-really-happened-2aa969b0e9ea?utm_source=chatgpt.com\">Medium<\/a>)<\/li>\n<li>Users and organizations can now proactively check exposure, rotate credentials, and implement stronger protection (e.g., MFA, passkeys).<\/li>\n<\/ul>\n<\/li>\n<li><strong>Importance of Credential Hygiene<\/strong>\n<ul>\n<li>The scale of exposure underscores that <strong>password hygiene is non-negotiable<\/strong>. Unique passwords + a good password manager + two-factor authentication (2FA) are more important than ever.<\/li>\n<li>Organizations should also monitor for \u201cpwned\u201d credentials in their systems. If they detect that user accounts are reusing exposed credentials, they should force a password reset or mandate stronger authentication.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Long-term Risk Management<\/strong>\n<ul>\n<li>Even if a password appears to be \u201cold,\u201d it may still be in circulation in these large lists. So, waiting until \u201cjust after a breach\u201d to change passwords is insufficient.<\/li>\n<li>There\u2019s a reputational risk too: users who think their data is safe because they believe they were \u201cnever breached\u201d may be wrong \u2014 their credentials <em>may still be out there<\/em> via other vectors.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Take%E2%80%91Home_Lessons_Recommendations_for_Individuals_Organizations\"><\/span>Take\u2011Home Lessons &amp; Recommendations (for Individuals &amp; Organizations)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Check Your Exposure<\/strong>: Use Have\u202fI\u202fBeen\u202fPwned to check whether your email or password appears in the newly indexed data.<\/li>\n<li><strong>Change Reused Passwords<\/strong>: If you used the same password across multiple services, change them \u2014 immediately.<\/li>\n<li><strong>Use a Password Manager<\/strong>: A password manager helps you generate and store strong, unique passwords for every site.<\/li>\n<li><strong>Enable Multi-Factor Authentication (MFA)<\/strong>: This adds an extra security layer even if your password is exposed.<\/li>\n<li><strong>Clean Your Devices<\/strong>: Because some of this data comes from infostealer malware, run strong anti-malware tools, and make sure your devices are secure.<\/li>\n<li><strong>Educate &amp; Monitor<\/strong>: For organizations, educate users on the risks of reuse, and set up systems to detect \u201cpwned\u201d credentials in your user base.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"My_Assessment\"><\/span>My Assessment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Severity<\/strong>: Very high. This is one of the largest credential corpora ever processed, and its scale makes it a potent tool for attackers.<\/li>\n<li><strong>Risk Type<\/strong>: It\u2019s not just \u201chistorical breach\u201d risk \u2014 there\u2019s real, active risk from credential reuse and malware.<\/li>\n<li><strong>Opportunity<\/strong>: Good for defenders: making it visible helps users take action before attackers exploit the data.<\/li>\n<li><strong>Urgency<\/strong>: High. People should treat this as a serious wakeup call, not just as \u201cold data resurfacing.\u201d<\/li>\n<\/ul>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; What Happened: Key Facts &amp; Context How Big Is the Exposure A cybersecurity company called Synthient compiled a massive dataset of stolen credentials (emails&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,90],"tags":[],"class_list":["post-17580","post","type-post","status-publish","format-standard","hentry","category-digital-marketing","category-news-update"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches - Lite14 Tools &amp; Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches - Lite14 Tools &amp; Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; What Happened: Key Facts &amp; Context How Big Is the Exposure A cybersecurity company called Synthient compiled a massive dataset of stolen credentials (emails...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Lite14 Tools &amp; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-14T16:13:53+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\"},\"headline\":\"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches\",\"datePublished\":\"2025-11-14T16:13:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/\"},\"wordCount\":1726,\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"articleSection\":[\"Digital Marketing\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/\",\"url\":\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/\",\"name\":\"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches - Lite14 Tools &amp; Blog\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/#website\"},\"datePublished\":\"2025-11-14T16:13:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lite14.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lite14.net\/blog\/#website\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"name\":\"Lite14 Tools &amp; Blog\",\"description\":\"Email Marketing Tools &amp; Digital Marketing Updates\",\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lite14.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lite14.net\/blog\/#organization\",\"name\":\"Lite14 Tools &amp; Blog\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"contentUrl\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"width\":191,\"height\":178,\"caption\":\"Lite14 Tools &amp; Blog\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/lite14.net\/blog\"],\"url\":\"https:\/\/lite14.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches - Lite14 Tools &amp; Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches - Lite14 Tools &amp; Blog","og_description":"&nbsp; What Happened: Key Facts &amp; Context How Big Is the Exposure A cybersecurity company called Synthient compiled a massive dataset of stolen credentials (emails...","og_url":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/","og_site_name":"Lite14 Tools &amp; Blog","article_published_time":"2025-11-14T16:13:53+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#article","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/"},"author":{"name":"admin","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2"},"headline":"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches","datePublished":"2025-11-14T16:13:53+00:00","mainEntityOfPage":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/"},"wordCount":1726,"publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"articleSection":["Digital Marketing","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/","url":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/","name":"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches - Lite14 Tools &amp; Blog","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/#website"},"datePublished":"2025-11-14T16:13:53+00:00","breadcrumb":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lite14.net\/blog\/2025\/11\/14\/2b-email-addresses-and-1-3b-passwords-exposed-across-multiple-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lite14.net\/blog\/"},{"@type":"ListItem","position":2,"name":"2B Email Addresses and 1.3B Passwords Exposed Across Multiple Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/lite14.net\/blog\/#website","url":"https:\/\/lite14.net\/blog\/","name":"Lite14 Tools &amp; Blog","description":"Email Marketing Tools &amp; Digital Marketing Updates","publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lite14.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lite14.net\/blog\/#organization","name":"Lite14 Tools &amp; Blog","url":"https:\/\/lite14.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","contentUrl":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","width":191,"height":178,"caption":"Lite14 Tools &amp; Blog"},"image":{"@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/lite14.net\/blog"],"url":"https:\/\/lite14.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/comments?post=17580"}],"version-history":[{"count":1,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17580\/revisions"}],"predecessor-version":[{"id":17581,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17580\/revisions\/17581"}],"wp:attachment":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/media?parent=17580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/categories?post=17580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/tags?post=17580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}