Most people use dozens of daily online services for personal chats or even work, all without thinking twice about where their data goes or who else might see it.
But 2025 showed how exposed those habits really are. Recipe forums, telecom providers, even AI tools - platforms people use every day - ended up leaking personal data. Information you barely remembered sharing is now part of breaches you probably never heard about. And unless you’ve checked Have I Been Pwned lately, you might not even know your data is already out there.
Some of these breaches were caused by malware logs. Others were discovered through law enforcement investigations. Some involved credit card fragments, and some full names and addresses - but all of them had one thing in common: personal data, that for millions of people is no longer private.
Here’s a closer look at 10 breaches from 2025 that proved just how fragile our digital privacy really is - all now searchable on Have I Been Pwned:
1. ALIEN TXTBASE (February 2025):
In February 2025, a Telegram channel called ALIEN TXTBASE shared an archive containing 23 billion rows of data sourced from stealer logs. These logs included information such as credentials, cookies, and autofill data — all originally extracted from devices infected by malware.
This wasn’t a breach of one specific company, but rather the mass exposure of data stolen from countless individuals through malware infections. The full dataset was made publicly accessible, and over two billion unique email addresses were included.
The exposed data is now searchable on Have I Been Pwned, where users can check if their email was among the stolen records.2. Public Stealer Logs (January 2025):
In January 2025, a large set of stealer logs was added to Have I Been Pwned, containing 71 million unique email addresses. These logs were originally generated by malware installed on individuals’ devices, which silently collected login credentials and the websites where they were used.
This wasn’t a company-specific breach. It resulted from widespread malware infections that impacted people across different platforms and services. These included popular platforms like Amazon, Netflix, Facebook, PayPal, and even corporate tools such as Salesforce, Microsoft Azure, and Udemy — all listed as sites users had logged into while infected. The data also contributed 106 million passwords to the Pwned Passwords database.3. Cocospy (February 2025):
In February 2025, the spyware service Cocospy suffered a data breach that exposed 1.8 million customer email addresses. The data was submitted to Have I Been Pwned by a source who requested attribution to zathienaephi@proton.me.
The breach reportedly also enabled unauthorized access to sensitive information collected through the service - including messages, photos, and call logs.
The exposed email addresses are now searchable on Have I Been Pwned, allowing users to check if they were affected.4. Spyic (February 2025):
Also in February 2025, the spyware service Spyic - a sibling platform to Cocospy - suffered a data breach. This incident exposed 876,000 customer email addresses. The dataset was submitted by an anonymous source using the alias zathienaephi@proton.me, who requested to be credited that way — a reminder of how much sensitive breach data circulates from unnamed actors in the privacy underground.
Like Cocospy, Spyic reportedly enabled unauthorized access to sensitive user-collected content, though only email addresses were shared with HIBP. The exposed data is now searchable on Have I Been Pwned, where users can check if their email address was part of the breach.5. Lexipol (February 2025):
In February 2025, the public safety policy management company Lexipol suffered a data breach. The incident exposed over 672,000 unique email addresses, along with names, phone numbers, system-generated usernames, and passwords stored as MD5 or SHA-256 hashes.
The breached data was later published publicly and attributed to the self-proclaimed “Puppygirl Hacker Polycule.”
All exposed email addresses are now searchable on Have I Been Pwned. Upon discovering their information in this breach, individuals are advised to change affected passwords immediately and enable two-factor authentication where possible. The exposure of hashed passwords - some stored using outdated algorithms like MD5—poses a risk of credential cracking and reuse across other platforms. Combined with names and phone numbers, the data also increases the potential for phishing, identity-based fraud, and unauthorized account access.
6 Tips To Stay EXTRA SAFE from Data Breaches
Whether you run a company, manage a remote team, or just use your favorite apps daily, data breaches can hit closer than you think. Most don’t start with “hacks” but with small habits: a reused password, a trusted link, or a tool you didn’t question. Here’s how to lower your data breach risks without needing to be a cybersecurity expert:

6 tips to stay EXTRA SAFE from data breaches
Use Unique Passwords for Every Account: Reusing the same password across services means a single breach can open all your digital doors. Use a password manager to keep things secure without needing to memorize them.
Don’t Store Passwords in Browsers: Many stolen logs leaked in 2025 came from saved browser passwords. Disable this feature and use a dedicated password manager instead.
Avoid Downloading Cracked Software: Keygens, pirated apps, and modified installers are common sources of spyware and stealer logs. Stick to verified sources only.
Think Before You Click: Malicious links, fake websites, and phishing emails are still top breach triggers. Always verify URLs - and use tools like ScamAdviser when in doubt.
Check If You’ve Been Compromised: Use haveibeenpwned.com to see if your data has appeared in past breaches — and take action if it has.
Use Alternative Secure Conferencing Apps: Consider using safer online communication apps like extrasafe.chat, which is no-registration, peer-to-peer video conferencing tool designed for sensitive online conversations. All meeting data is transmitted directly between you and your colleague, encryption keys are generated on your device and never leave it (unlike most popular video conferencing apps) and all meeting data is destroyed immediately after the meeting ends, leaving no digital footprint.

6 tips to stay EXTRA SAFE from data breaches - part 2
What To Do If Your Email Was Found in a Data Breach
Discovering that your email address was part of a data breach can feel alarming — but the right steps can minimize the risk and stop the damage from spreading. Here’s what to do immediately:
Change Your Passwords — Fast: Start with the affected platform, then any other account where you used the same or similar password. Reused passwords are the top way attackers jump from one breached site to others.
Enable Two-Factor Authentication (2FA): If the breached service offers it, turn on 2FA immediately. Even if your password was exposed, a second verification step can block unauthorized logins.
Review Account Activity: Check for any suspicious logins, unauthorized changes, or unexpected messages. If anything looks wrong, report it and secure the account.
Watch for Phishing Attempts: Breached emails are often targeted in follow-up scams. Be especially cautious of messages asking for sensitive info, password resets, or financial actions.
Remove Saved Passwords from Your Browser: If your credentials were harvested from malware or stealer logs, your browser-stored passwords may be vulnerable. Disable this feature and use a secure password manager instead.
Stay Alert for Identity Fraud:
If the breach included names, phone numbers, or addresses, monitor for signs of fraud or misuse. Consider freezing your credit if financial data was involved.Delete Unused Accounts: Old accounts you forgot about can still pose a risk. If you're not using a platform anymore, delete your account and remove associated data.
After you’ve secured your accounts, it’s just as important to rethink the communication tools you use. Choose platforms like extrasafe.chat that don’t store or track your data, so your conversations stay truly private. Try it now at: extrasafe.chat

extrasafe.chat advantages
This article is brought to you by the extrasafe.chat team as part of our effort to make privacy threats and everyday data compromise more visible and digital habits more conscious. We believe that showing how breaches unfold through malware, reused passwords or silent tracking can help more people recognize patterns, question habits and take simple steps toward safer communication. In a world where most platforms still store data, track activity or retain access logs, awareness is a powerful first step toward staying EXTRA SAFE.