
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.
September 13, 2024 - Blog

In a recent leak dubbed the “Mother of All Breaches (MOAB)", more than 16 billion email and password combinations have been posted to a prominent underground forum, raising alarms across governments, enterprises, and individual users alike. The breach includes newly discovered credential pairs, re-aggregated data from older leaks, and potentially unreleased breach dumps from the last 18 months.
According to initial reports, the breach appears to be the work of multiple actors collaborating to assemble and republish credential data from countless sources. Analysts say that, while this data might be "recycled," the scale, scope, and real-world applicability are unprecedented.
As a comparison, the infamous 2021 Compilation of Many Breaches (COMB) leak totaled 3.2 billion records. This new MOAB dataset includes over five times that volume, with over 2.2 billion of the credentials appearing to be previously unseen in any prior dumps. Cybersecurity professionals are calling it “a fully weaponized dataset,” due to its fresh credentials, categorized metadata, and ready-to-deploy formats for credential stuffing and phishing toolkits.
The exposed records span industries and platforms: from banking, streaming, and healthcare, to government portals, SaaS platforms, and encrypted messaging services. A review of early samples reveals credentials for everything from university accounts to administrative access to enterprise applications.
The leak’s danger isn’t just in volume—it's in context and usability. Many of the exposed usernames and passwords are bundled with IP addresses, device fingerprints, account recovery emails, and even session cookies. This level of detail enables attackers to bypass multifactor authentication, impersonate users across multiple platforms, and execute targeted social engineering attacks.
Credential stuffing—where attackers use leaked credentials to try logging into various services—has already spiked according to multiple SOC monitoring feeds and dark web telemetry. Security researchers believe the next wave of phishing and fraud campaigns will piggyback off the leaked data, with customized payloads targeting reused logins and inactive user accounts.
While no single company has claimed responsibility or suffered a direct breach due to the MOAB dump, virtually every organization with a digital presence is indirectly exposed. Many of the compromised credentials trace back to:
Major consumer platforms (email, e-commerce, streaming, gaming)
Business software accounts (CRMs, document tools, DevOps pipelines)
Financial services (banking portals, crypto exchanges)
Government and university portals
VPN and password manager logins
Healthcare and insurance apps
This widespread impact makes the MOAB breach a global security issue, rather than an isolated incident.
This massive leak comes at a time when cyberattacks are already on the rise:
95% of breaches in 2025 have involved human error, according to the latest Egress and IBM Security report.
The average cost of a breach has surged to $4.88 million, a 10% increase year-over-year.
The average time to identify and contain a breach is now 277 days.
82% of breaches involve cloud-stored data.
86% involve stolen credentials.
Third-party services were involved in 30% of breaches, double that of last year.
Organizations using AI and automation cut breach containment time by over 100 days, saving $1.76M on average.
In the wake of the 16 billion passwords leaked, security professionals, CISOs, and IT managers must act quickly to reduce exposure and prepare for incoming attack waves.
For individuals:
Reset passwords on critical accounts (email, banking, cloud storage).
Use a password manager to generate and store unique passwords.
Enable multi-factor authentication (MFA) for all applicable platforms.
Be alert for phishing emails, SMS scams, and fake support calls.
For organizations:
Force password resets for high-risk users and inactive accounts.
Monitor for credential stuffing activity and failed login anomalies.
Implement adaptive MFA and session fingerprinting.
Conduct continuous penetration testing and security awareness training.
Subscribe to breach alert and threat intelligence services.
As AI-generated attacks, phishing-as-a-service, and dark web automation become mainstream, defenders must invest in intelligent detection, behavioral analytics, and user-centric threat models.
More than ever, passwords alone are not enough. Identity verification needs to evolve, especially in light of growing threats to biometric data, OTP hijacking, and MFA fatigue.
The MOAB breach is a wake-up call not just for enterprises, but for users and policymakers as well. Security isn’t just about firewalls and encryption—it’s about fostering a culture of cyber education and vigilance.
Speak with an Account Executive