Table of Contents

Free Active Directory Auditing Tool

Try it now
Keyboard image with security icons

ALIEN TXTBASE Data Leak: How Data Recycling Impacts Risk

Table of Contents

ALIEN TXTBASE has emerged as one of the most active distributors of infostealer data on the dark web. Specops analysts have been monitoring this actor’s activity for months, reviewing each new batch of stolen credentials as it is released.

With the continued appearance of ALIEN TXTBASE data leaks, our latest analysis focuses on the quality and freshness of these datasets. The results point to a consistent pattern of data recycling, where older infostealer logs are mixed with newer material. This trend affects how organizations should interpret both the scale and severity of these leaks.

Below, we break down what Specops has newly uncovered, what it means for defenders, and how our tools help mitigate the risks from infostealer-driven credential exposure.

ALIEN TXTBASE Data Leak Latest: Specops adds 27 million new passwords to breached password database

ALIEN TXTBASE data leak

Specops researchers analyzed consecutive ALIEN TXTBASE releases and found that many daily dumps include substantial amounts of recycled data. While the total daily file sizes appear massive, a significant percentage of the entries had already been released by ALIEN TXTBASE in previous dumps.

This pattern indicates that ALIEN TXTBASE is combining both new and old infostealer logs, which inflates the size of each release and makes it difficult to determine the true volume of newly exposed credentials at a glance.

However, despite the recycling, genuinely new data continues to appear in these dumps. In particular, one of the most recent ALIEN TXTBASE archives claimed more than 611 million records. After filtering and validation, this dataset still contributed more than 27 million new passwords to Specops monitoring systems.

It’s worth noting that depending on the day, anywhere from approximately 7% to more than 30% of the dataset had already appeared in the previous day’s release.

Even within the compressed window of a week, the recycling of old data was easily visible. When extended across several months, the pattern becomes even more pronounced, as shown in the tables below:

Day of ReleaseTotal CountUnique CountDelta with Previous Day% Change% Overlap
May 309416186591223444811793620.889895825511.01041745
May 28126574419123304665       1095316330.888300803511.16991965
May 27122357445115334806790402400.685311249431.46887506
May 26107905615101389879838310400.826818621617.31813784
May 251137949731111904581032955530.92899656017.100343988
May 24120059586117047371878025440.750145374924.98546251
May 232393129442243293571833205380.817193703318.28062967

The above table shows overlapping data from a single week. When we extrapolate that out across a three-month period, the trend looks like this:

What organizations need to consider when assessing risk

Large credential collections regularly make the news and often create pressure for IT teams to respond immediately. However, our analysis shows that organizations need a more nuanced understanding of these infostealer dumps. We recommend the following things to keep in mind when accessing the risk posed by a data-dump:

  • Not all large dumps represent new breaches. A dataset containing hundreds of millions of lines may include only a fraction of newly harvested credentials. Much of the content may be months old.
  • Recycling inflates risk perception. Threat actors often combine old and new data to increase the size of dumps and draw attention from buyers or researchers. It is in the interest of attackers to inflate their figures to increase the perceived value of the data and clout.
  • The real threat is in the new data, not the total size. Even a small number of newly exposed passwords is enough to enable credential stuffing attacks, leading to account takeover and lateral movement. Understanding which credentials are new and whether they belong to active accounts determines whether an incident response is warranted.
  • Credential exposure is not a one-time event. Continuous monitoring is vital so that you can address new threats as they arise rather than reacting only when a major leak is publicized.
  • Infostealer attacks will continue to rise in popularity. It’s likely that we haven’t heard the last of the ALIEN TXTBASE leaks and more will follow from other threat actors. Therefore, it is important that organizations take proactive steps to implement controls that minimize risk.

How Specops can help your organization defend against infostealers

The best defense against infostealers is a combination of strong password controls, compromised password monitoring, and continuous scanning. Specops products are purpose-built to help organizations defend against exactly this type of threat.

Protect your organization from password attacks

Specops Password Policy is the best defense against attacks that rely on these datasets. Specops Password Policy ensures users follow modern password requirements that reduce the likelihood of successful brute force or credential stuffing attempts.

In addition, it also continuously scans your Active Directory for breached and compromised passwords. If a user is found to be using a compromised password, they are notified immediately and required to change it. This ensures that stolen credentials cannot be reused during authentication and is one of the most effective defenses against infostealer-derived attacks.

You can try Specops Password Auditor for free and see the results for yourself. This tool gives you immediate visibility into access security risks by generating a comprehensive audit of your Active Directory. With clear, easy-to-read reporting, you can quickly identify password weaknesses and misconfigurations that attackers commonly exploit.

To learn more about how Specops can help protect your passwords and organization’s data, or to speak directly with an expert, please contact us here. For more insights and access to our research, please visit the Specops blog.

Last updated on December 3, 2025

David Ketler

Written by

David Ketler

David Ketler is a cybersecurity consultant based in Toronto, Canada with 10+ years of experience in software development and cybersecurity. He writes about password cracking, dark web activity, and password management.

Back to Blog

Free Active Directory Auditing Tool!