{"id":28994,"date":"2019-10-21T04:22:34","date_gmt":"2019-10-21T08:22:34","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=28994"},"modified":"2021-07-26T06:58:04","modified_gmt":"2021-07-26T10:58:04","slug":"decade-data-breaches","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/decade-data-breaches\/28994\/","title":{"rendered":"Life&#8217;s a breach: 10 of the last decade&#8217;s biggest global cyberattacks"},"content":{"rendered":"<p>This past decade has arguably been the biggest for digital advancements of all kinds, particularly cybersecurity. So why is it that we saw some of the biggest cybersecurity fails and data breaches? Let\u2019s go to the source.<\/p>\n<h2>Data is the new oil<\/h2>\n<p>Data\u2019s value is rocketing. So much so that in 2017 some experts believed it <a href=\"https:\/\/www.economist.com\/leaders\/2017\/05\/06\/the-worlds-most-valuable-resource-is-no-longer-oil-but-data\" target=\"_blank\" rel=\"noopener nofollow\">surpassed oil as one of the most valuable commodities across the world<\/a>. It\u2019s no surprise then to know that in the first half of 2019, according to a survey by Kaspersky, <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2019_kaspersky-finds-rise-in-users-hit-by-password-stealers\" target=\"_blank\" rel=\"noopener\">nearly one million users\u2019 devices were attacked by malware designed to harvest data<\/a>, in comparison to just under 600,000 users over the same time period the year before.<\/p>\n<p>But why is data so valuable? Because it can be sold in almost every form. For example, passport details can be sold to make <a href=\"https:\/\/www.wired.com\/story\/marriott-hack-protect-yourself\/\" target=\"_blank\" rel=\"noopener nofollow\">fake passports<\/a>, <a href=\"https:\/\/www.creditcards.com\/credit-card-news\/4-ways-crooks-cash_in-financial-data-1264.php\" target=\"_blank\" rel=\"noopener nofollow\">credit card numbers fetch upwards of $100<\/a>, and if a hacker wants to make more from stolen information, they can sell full data sets. Referred to as \u2018fullz\u2019 (slang for full information), they typically contain an individual\u2019s name, birthdate, credit card number and social security number. The rounder, more plump the fullz, the more it\u2019s worth.<\/p>\n<p>You\u2019d think that businesses would go over and above to protect their customers\u2019 data. Well yes, in the most part. But, there were times when professionals took their eye of the ball and things went a bit wrong. Let\u2019s take a look at 10 of the biggest data breaches this decade and what situation led up to this epic #FAIL in data security. Some resulted from lazy practices by the business, others from more sinister outside forces. (Disclaimer: they\u2019re in no particular order.)<\/p>\n<h2>1. Tesco Bank \u2013 many mistakes in store<\/h2>\n<p><strong>Date:<\/strong> 2016<br>\n<strong>Fail level:<\/strong> <a href=\"https:\/\/www.theguardian.com\/business\/2016\/nov\/08\/tesco-bank-cyber-thieves-25m\" target=\"_blank\" rel=\"noopener nofollow\">$3 million stolen from 9,000 Tesco Bank customer accounts<\/a><br>\n<strong>Country<\/strong>: UK<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>According to the UK\u2019s Financial Conduct Authority, Brazilian cyberattackers generated their own Tesco Bank debit card numbers and, using those virtual cards, made thousands of unauthorized transactions from current customers. But when the bank\u2019s systems identified the threat, the team responsible sent an email to the wrong address instead of picking up the phone and explaining. So they only responded a cool <em>24 hours <\/em>after the breach. But, instead of blocking the transactions in Brazilian real currency, they blocked the euro. As a result, the number of attacks rose even further.<\/p>\n<h3>What were the consequences?<\/h3>\n<p>Customers lost hard-earned cash and Tesco got fined nearly $20 million.<\/p>\n<h2>2. Yahoo! \u2013 the largest data breach of personal data. Ever.<\/h2>\n<p><strong>Date: <\/strong>2013<strong><br>\nBreach level:<\/strong> Personal data of <a href=\"https:\/\/money.cnn.com\/2017\/10\/03\/technology\/business\/yahoo-breach-3-billion-accounts\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">three billion accounts breached<\/a><br>\n<strong>Country:<\/strong> USA<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>After digital thieves hacked Yahoo!\u2019s servers, they cleaned up with a big bounty of personal data. Originally Yahoo! reported that the breach had affected one billion users, but after further investigations it later revised the estimate to say all three billion users were probably affected.<strong>\u00a0<\/strong><\/p>\n<h3>What were the consequences?<\/h3>\n<p>At the time, Verizon were locked in for the acquisition of Yahoo! for nearly $5 billion\u2026 this \u2018little\u2019 data breach knocked $350 million of its sale price.<\/p>\n<h2>3. Marriot Group and Starwood \u2013 housing hackers for years<\/h2>\n<p><strong>Date: <\/strong>2014-8<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.ft.com\/content\/243cabcc-a253-11e9-a282-2df48f366f7d\" target=\"_blank\" rel=\"noopener nofollow\">Personal data of 500 million guests leaked<\/a><br>\n<strong>Country:<\/strong> USA<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>The cause of this one isn\u2019t so clear, although the <a href=\"https:\/\/www.nytimes.com\/2018\/12\/11\/us\/politics\/trump-china-trade.html\" target=\"_blank\" rel=\"noopener nofollow\">New York Times have mused that it may have been a Chinese state cyberattack<\/a> designed to gather intelligence. The fail is a little clearer: the breach actually occurred in 2014\u2026but was only detected in 2018. Scary, really, considering their systems had alerted them to a potential breach when it first happened. Maybe their acquisition of Starwood around that time consumed most of their attention? What we do know is that leaving hackers to play in your system for four years is more than a little unfortunate.<\/p>\n<h3>What were the consequences?<\/h3>\n<p>Marriot Group was fined over $120 million.<\/p>\n<h2>4. Ashley Maddison \u2013 the wrong kind of indiscretion<\/h2>\n<p><strong>Date: <\/strong>2016<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/08\/23\/ashley-madison-is-back-with-30-million-cheating-spouses-signed-since-the-hack\/#55978e253878\" target=\"_blank\" rel=\"noopener nofollow\">Personal data of 32 million cheating spouses leaked<\/a><br>\n<strong>Country:<\/strong> USA<\/p>\n<h3>What was the cyber fail?<\/h3>\n<p>Some say that wherever there\u2019s sex, there\u2019s technology innovation. These next two examples show innovation \u2013 in cybercrime. For those not familiar, Ashley Maddison \u2013 owned by Avid Life Media (ALM) \u2013 was a dating website for married men and women looking to play away. That was until hackers, who go by the name of <a href=\"https:\/\/www.kaspersky.com\/blog\/ashley-madison-data-finally-leaked\/9620\/\" target=\"_blank\" rel=\"noopener nofollow\">The Impact Team,<\/a> gave them an ultimatum: take down the website or we\u2019ll expose every one of your users \u2013 personal details, log-ins and more. This wasn\u2019t an empty threat, as a statement of intent The Impact Team published a teaser: employee salaries and confidential internal business documents. Fair warning. Unfortunately, ALM ignored the threats and assured millions of users that their identities were secure. They were, in fact, not. Shortly afterwards, the inevitable happened.<\/p>\n<h3>What were the consequences?<\/h3>\n<p>Account details, log-ins and seven years\u2019 worth of credit card and other payment details <a href=\"https:\/\/www.wired.com\/2015\/08\/happened-hackers-posted-stolen-ashley-madison-data\/\" target=\"_blank\" rel=\"noopener nofollow\">leaked<\/a>. <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/08\/23\/ashley-madison-is-back-with-30-million-cheating-spouses-signed-since-the-hack\/#55978e253878\" target=\"_blank\" rel=\"noopener nofollow\">Reported suicides<\/a> from around the world as cheating spouses were exposed. As for Ashley Maddison, they agreed to pay a <a href=\"https:\/\/www.ft.com\/content\/db7a5c42-c21a-11e6-9bca-2b93a6856354\" target=\"_blank\" rel=\"noopener nofollow\">$1.6m fine for \u201clax security.\u201d <\/a><\/p>\n<h2>5. Adult Friend Finder Networks \u2013 a not-so-sexy data breach<\/h2>\n<p><strong>Date: <\/strong>2016<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/nov\/14\/adult-friend-finder-and-penthouse-hacked-in-largest-personal-data-breach-on-record\" target=\"_blank\" rel=\"noopener nofollow\">Personal data of 412 million accounts leaked<\/a><br>\n<strong>Country:<\/strong> USA<\/p>\n<h3>What was the cyber fail?<\/h3>\n<p>The notoriously vulnerable SHA-1 hashing algorithm\u2026 not the most secure on the block. Adult Friend Finder (a sex and swingers website that also owned other sex cam websites) were, unwisely, using it to protect their entire user base until hackers broke through. According to LeakedSource, hackers were able to crack <a href=\"https:\/\/www.zdnet.com\/article\/adultfriendfinder-network-hack-exposes-secrets-of-412-million-users\/\" target=\"_blank\" rel=\"noopener nofollow\">99 percent of all passwords<\/a>. Apart from their out-dated security measures, Adult Friend Finder assured users that if they deleted their account, their personal information would be deleted. That wasn\u2019t the case, which led to an additional 15 million \u2018deleted\u2019 accounts being purged.<\/p>\n<h3>What were the consequences?<\/h3>\n<p>With such a sensitive subject, if malicious hackers got their hands on the data it could\u2019ve been used for blackmail or spam campaigns.<\/p>\n<h2><strong>6.<\/strong>eBay \u2013 shopped for a cyber-fail<\/h2>\n<p><strong>Date: <\/strong>2014<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-27539799\" target=\"_blank\" rel=\"noopener nofollow\">Personal data of 145 million users leaked<\/a><br>\n<strong>Country:<\/strong> USA<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>It doesn\u2019t get much better than this: according to eBay, hackers jumped into their system using the credentials of three employees. The best bit? They had access for 229 days, as well as unprecedented access to complete data sets of eBay customers\u2026 ouch.<\/p>\n<h3>What were the consequences?<\/h3>\n<p>A decline in user activity and a somewhat <a href=\"https:\/\/www.scmagazineuk.com\/ebay-counts-cost-challenging-data-breach\/article\/1480618\" target=\"_blank\" rel=\"noopener nofollow\">miniscule drop in profits<\/a>. Not a fine in sight.<br>\n<img decoding=\"async\" class=\"aligncenter size-large wp-image-29010\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/21033541\/Cyber_gaffes_inline-1024x768.jpg\" alt=\" Cyber gaffes flash\" width=\"1024\" height=\"768\"><\/p>\n<h2>7. Sony PlayStation \u2013 a (big) glitch in the mainframe<\/h2>\n<p><strong>Date: <\/strong>2011<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.reuters.com\/article\/us-sony-stoldendata\/sony-playstation-suffers-massive-data-breach-idUSTRE73P6WB20110427\" target=\"_blank\" rel=\"noopener nofollow\">Personal data of 77 million users leaked<\/a><br>\n<strong>Country: <\/strong>UK<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>It\u2019s not rocket science or the last level of Donkey Kong: well-known network vulnerabilities can wreak havoc. When Sony PlayStation had one in their ranks, hackers exploited it and made sure they paid the price.<\/p>\n<h3>What were the consequences?<\/h3>\n<p><a href=\"https:\/\/outpost24.com\/blog\/top-10-of-the-world-biggest-cyberattacks\" target=\"_blank\" rel=\"noopener nofollow\">Sony paid out $15 million in compensation<\/a> \u2013 plus a few million dollars of legal fees.<\/p>\n<h2>8. Facebook \u2013 rigging all over the world<\/h2>\n<p><strong>Date: <\/strong>2018<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.nytimes.com\/2018\/09\/28\/technology\/facebook-hack-data-breach.html\" target=\"_blank\" rel=\"noopener nofollow\">Personal data of 50 million users leaked<\/a><br>\n<strong>Country:<\/strong> USA<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>Chances are you\u2019re already familiar with this one. Facebook changed their third-party rules in 2014, limiting developers to user data only. But Cambridge Analytica took it a bit further. They used quizzes to \u2018scrape\u2019 (or harvest, to you and me) data from users\u2019 entire friends lists. They managed to get 50 million complete data sets, which they allegedly used to influence the Clinton v Trump USA election and the Leave or Remain EU \u2018Brexit\u2019 vote in the UK. Evidence shows it could\u2019ve started are early as 2015 but was only detected in 2018. Facebook\u2019s role? Well, they didn\u2019t ever ask Cambridge Analytica where they got the data from\u2026 so who knows how deep the mismanagement went.<\/p>\n<h3>What were the consequences?<\/h3>\n<p>Facebook shares plummeted <a href=\"https:\/\/www.cnbc.com\/2018\/11\/20\/facebooks-scandals-in-2018-effect-on-stock.html\" target=\"_blank\" rel=\"noopener nofollow\">40 percent in three months<\/a> after the event, but it gets worse \u2013 they\u2019re now staring down the barrel of a $5 billion fine. As for Cambridge Analytica, they\u2019re understandably not trading anymore.<\/p>\n<h2>9. British Airways \u2013 flying the flag for outdated cybersecurity<\/h2>\n<p><strong>Date: <\/strong>2018<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.bbc.co.uk\/news\/business-48905907\" target=\"_blank\" rel=\"noopener nofollow\">Personal data of 500,000 thousand users leaked<\/a><br>\n<strong>Country:<\/strong> UK<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>This one, allegedly, lands on the Magecart cybercrime syndicate \u2013 specialists in planting malicious scripts onto websites to steal financial data and sell it on. In this instance, they made light work of British Airways\u2019 outdated cybersecurity defences, setting up a fake site and diverting the airline\u2019s website visitors into their trap.<\/p>\n<h3>What were the consequences?<\/h3>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/british-airways-fined\/27580\/\" target=\"_blank\" rel=\"noopener nofollow\">BA were fined a record-breaking $221m (\u00a3183m)<\/a> for not having the right data security measures in place.<\/p>\n<h2>10. ExPetr (AKA NotPetya) \u2013 the cyberattack that\u2019s bad for business<\/h2>\n<p><strong>Date: <\/strong>2017<strong><br>\nBreach level:<\/strong> <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener nofollow\">Estimated $10 billion<\/a> in damages.<br>\n<strong>Country:<\/strong> Global<\/p>\n<h3>What was the cyber-fail?<\/h3>\n<p>Although the previous examples are all about data breaches that affected businesses and their customers, this cyberattack affected the businesses themselves. And it\u2019s arguably the costliest in history.<\/p>\n<p>ExPetr took its name from the resemblance to ransomware Petya, a piece of criminal code that encrypted files and extorted victims to pay for a key to unlock them. Unlike its predecessor, ExPetr irreversibly encrypted computers\u2019 master boot record, which essentially controls the operating system. The twist? Victims couldn\u2019t make payments to free themselves. There wasn\u2019t even a key to unscramble their computers. This attack had one goal: devastation.<\/p>\n<p>After being released into the wild, ExPetr originally targeted Linkos Group (a Ukranian software company) then quickly spread. From hospitals in Pennsylvania to a chocolate factory in Tasmania, the devastating effects were felt globally.<\/p>\n<h3>What were the consequences?<\/h3>\n<p>More than $10b in total damages (estimated by the <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener nofollow\">White House<\/a>.) But, aside from the financial blow, <a href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-b2b\/17343\/\" target=\"_blank\" rel=\"noopener nofollow\">a few other things raised eyebrows<\/a>. <a href=\"https:\/\/edition.cnn.com\/2017\/06\/27\/europe\/chernobyl-cyber-attack\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">Reportedly<\/a>, the Chernobyl nuclear plant\u2019s radiation-monitoring system went down temporarily.<\/p>\n<h2>Protect your innovations from cyber-breaches<\/h2>\n<p>In a nutshell: cyber-breaches are costly to businesses. How costly, you ask? Kaspersky have found that the average enterprise cyber-attack <a href=\"https:\/\/www.kaspersky.com\/blog\/security-economics-2019\/28838\/\" target=\"_blank\" rel=\"noopener nofollow\">costs around $1.41m<\/a>. The good news: some attacks are preventable.<\/p>\n<p>From money to marital status, your customer\u2019s data is at risk when cybersecurity measures aren\u2019t in place. The solution? Safeguard systems with top notch <a href=\"http:\/\/www.kaspersky.com\/business\" target=\"_blank\" rel=\"noopener nofollow\">endpoint products<\/a> and, perhaps more importantly, train colleagues to spot and know how to react when they see the first signs of a breach.<\/p>\n<p><em>This article represents the personal opinion of the author.<\/em><\/p>\n<p><em>Article published in 2019.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What a decade it\u2019s been. Highs, lows and some of the biggest cyber-fails our world has ever seen. Can you remember all of them?  <\/p>\n","protected":false},"author":2520,"featured_media":28995,"template":"","coauthors":[3424],"class_list":{"0":"post-28994","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-breaches","7":"emagazine-category-trends","8":"emagazine-tag-data-breaches"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/decade-data-breaches\/28994\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/decade-data-breaches\/21922\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/28994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/28995"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=28994"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=28994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}