CRITICAL SEVERITYBreach Compilation

Anti Public Data Breach

Anti Public Combo List: 1.1 Billion Stolen Email & Password Pairs Used for Credential Stuffing

Verified by ObscureIQ Intelligence

8.0Severity
1.1BRecords
2Fields
2016Year

ObscureIQ Breach Intelligence Scores
1.0
Breach Risk Index
4
Data Value
25
Market Recency
512
days
Since Breach

Risk Interpretation

Extremely high risk of account takeover across multiple services due to password reuse. Enables large-scale automated attacks and identity compromise.

🎯 Impact & Downstream Threats

The breach impact was severe because Anti Public turned previously scattered compromised credentials into an immediately operational attack dataset. Have I Been Pwned says the list contained about 458 million unique email addresses, many paired with multiple passwords from different incidents, and that it was broadly circulated for credential stuffing. That made it highly effective for automated account takeover, password reuse exploitation, spam targeting, and follow-on compromise across unrela

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Credential stuffing & account takeover

📋 Breach Intelligence

EntityAnti Public (Anti Public Compilation)
Organization • Global
Breach Date2016-12-16
HIBP Added2017-05-04
DBC Added2024-12-01
Added Date2024-12-01
Records~1.1B (1,108,012,019 records)
Attack VectorCredential Stuffing
Data SubjectsUser
Breach PathwaySupply_Chain:Aggregator
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityStandard
Breach ID107;108
StatusConfirmed

📝 Executive Summary

The Anti Public Combo List was not a breach of a single company but a massive aggregation of stolen credentials compiled from dozens of prior incidents, including breaches at Adobe, Dropbox, LinkedIn, and Yahoo. Assembled and circulated by unknown actors in late 2016, the list contained approximately 458 million unique email addresses, many paired with multiple passwords harvested from different sources. It spread rapidly across hacker forums and dark web marketplaces, making it freely accessible to virtually anyone with malicious intent. The data exposed consisted of email addresses and their associated passwords. Because many people reuse the same password across multiple accounts, a single leaked credential pair can unlock banking portals, email inboxes, social media accounts, and workplace systems simultaneously. The Anti Public list was purpose-built for credential stuffing, an attack method where automated tools test stolen email-password combinations against login pages at scale, often processing millions of attempts per hour. No single organization faced regulatory action tied specifically to this compilation, since it drew from many separate incidents rather than one identifiable source. Have I Been Pwned, the widely used breach notification service, indexed the dataset so individuals could check their own exposure. For affected users, the practical risk remains active today: any account where a listed password is still in use is vulnerable to automated takeover. Changing reused passwords and enabling two-factor authentication are the most effective steps to reduce that risk.

🏢 About Anti Public

Anti Public is the name attached to a massive credential compilation and combo-list ecosystem built around aggregating email and password pairs from many prior breaches into a single reusable corpus for validation, resale, and automated abuse.

Breach Compilation | Aggregated stolen credentials and password pairs | Combo list used for credential stuffing | Global
Global* compilation

🗂 Why They Hold Your Data

Credential compilations aggregate login pairs from numerous breaches, creating centralized datasets optimized for automated abuse.

📰 Recent Developments

Anti Public is best understood as an early landmark in the industrialization of combo lists rather than as an ongoing organization with a normal corporate lifecycle. Public reporting and later coverage of credential-stuffing markets show how the model it represented evolved into a broader combolist economy, where massive reused credential sets became a routine input for automated account testing and takeover campaigns.

🔍 Data Points Exposed

2 verified field types:
Password
Email

Canonical Fields

email_address, password

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Anti Public
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

Credential StuffingAggregationEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom