The huge 'Collection #1' data breach is only a small part of much larger hacker dataset

The entire dataset is close to 1TB in size.
 By 
Jack Morse
 on 
Original image replaced with Mashable logo
Original image has been replaced. Credit: Mashable

I guess they wouldn't have numbered it if it was the only one.

On Jan. 16, security research Troy Hunt uploaded a massive cache of leaked emails and passwords to his invaluable website have i been pwned. The 87GB dataset, dubbed "Collection #1," was admittedly years old, and had been passed around by hackers for some time now. Still, the sheer scale of it — containing over 772 million email addresses — turned heads. Hold onto your digital butts, because as Krebs on Security reports, you ain't seen nothing yet.

According to Krebs, the Collection #1 data breach is, unsurprisingly, part of a much larger collection of stolen online credentials being sold online. And, taken as a whole, it dwarfs Collection #1's size.

Just how big are we talking? According to the hacker allegedly selling access to the data who communicated with Krebs over Telegram, the entire data set of email addresses and passwords comes close to 1TB. Brian Krebs, the infosec journalist behind Krebs on Security, tweeted a screenshot purportedly depicting a page listing the data for sale.

In addition to the 87GB Collection #1, there's a 526GB Collection #2, a 37GB Collection #3, a 178GB Collection #4, a 42GB Collection #5, and two other folders totaling an additional 126GB worth of credentials.

The seller told Krebs that, in total, they had close to 4TB of so-called password packages. Yeah, that's a lot. According to the image above, the "Price for access lifetime" is only a cool $45.

So your email, along with one or more passwords to various throwaway online accounts you've used and discarded over the years, is likely being traded on the dark web. What does this mean for you?

Well, if you're smart about your online security, probably not too much immediately. Assuming you use unique passwords for each account online — and you definitely should — any of your passwords contained in the dataset would only gain a hacker access to one specific online service. Like, say, your old Tumblr account. And, if you use two-factor authentication, you're likely in the clear.

However, all this goes out the window if a hacker gets access to your main email account and can initiate password resets. And if the email account in question just so happens to share a password with your now-defunct Neopets account or whatever? You might legit be in trouble. Consider getting a password manager, and make sure your email has a unique password and 2FA.

And then go about your normal online business, comfortable in the knowledge that your personal data is being sold to hackers for the low, low price of $45.

Topics Cybersecurity

Mashable Image
Jack Morse

Professionally paranoid. Covering privacy, security, and all things cryptocurrency and blockchain from San Francisco.

Mashable Potato

Recommended For You

Panera Bread breach: ShinyHunters claims hack of 14 million customers' data
Panera Bread logo on storefront

Instagram denies data breach: So what's up with those sketchy change password emails?
instagram logo against a black background

Get the Pokémon TCG: Mega Lucario ex Figure Collection for $9 off at Amazon
The Pokémon TCG: Mega Lucario ex Figure Collection on a green and pink background


Trending on Mashable
NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 3, 2026
Wordle game on a smartphone


What's new to streaming this week? (April 3, 2026)
A composite of images from film and TV streaming this week.

NYT Strands hints, answers for April 3, 2026
A game being played on a smartphone.
The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!