Data masking vs. data encryption: How do they differ? Data security requires DLP platform convergence
X

10 biggest data breaches in history, and how to prevent them

Did you know the biggest data breach in history exposed a whopping 3 billion user records? Don't make the same mistakes these companies did in the largest data breaches in history.

Data breaches don't discriminate -- victims include organizations of all shapes and sizes spanning every industry. Attackers are at the ready with both new and tried-and-true tactics, techniques and procedures to break into networks and steal precious data.

From outdated or vulnerable networks to employees clicking phishing emails to misconfigured cloud instances, all organizations would benefit from learning lessons from past data breaches. In fact, many of the biggest data breaches in history could have been prevented if organizations had followed simple cybersecurity hygiene best practices.

Learn more about the largest data breaches, based on the number of records compromised, and get advice on the data protection and data security measures that can help prevent a similar incident at your organization.

1. Yahoo

Records compromised: 3 billion
Breach date: August 2013
Disclosure date: December 2016

Yahoo originally announced in December 2016 that its 2013 breach affected only 1 billion user accounts. After Verizon acquired Yahoo, news broke in October 2017 that the figure was actually 3 billion. The breach affected Yahoo email accounts and other company services, including Tumblr, Flickr, Yahoo Fantasy Sports and Yahoo Finance.

Malicious hackers obtained users' names, dates of birth, phone numbers and passwords, as well as security questions and email addresses used to reset passwords. No financial data -- such as credit card numbers or bank account details -- was exposed. Yahoo announced in its initial disclosure that it forced password resets for all accounts that had been changed since 2013 and invalidated old security questions and accounts. To date, the cause of the breach has not been disclosed.

How to prevent this type of attack

2. National Public Data

Records compromised: 2.9 billion
Breach date: December 2023, April 2024, summer 2024
Disclosure date: August 2024

In August 2024, data aggregator National Public Data (NPD) confirmed it sustained a breach in April 2024. The company, which performed background checks for organizations, private investigators and staffing agencies, later reported that cybercriminals hacked its systems in December 2023, with leaks occurring in April and summer of 2024.

Attackers obtained 2.9 billion records from users in the U.S., U.K. and Canada, including users' names, email addresses, phone numbers, Social Security numbers, mailing addresses and dates of birth. In April 2024, USDoD, the threat group allegedly behind the cyberattack, put the data, which it claimed was from 2019-2024, up for sale on the dark web for $3.5 million in bitcoin or Monero.

Days after NPD acknowledged the breach, security researcher Brian Krebs reported RecordsCheck.net, a sister NPD site, hosted a publicly available database containing source code and site admins' plaintext credentials. Krebs said RecordsCheck.net and NPD were "visually similar" and had "identical login pages." In investigating the database, Krebs said it appeared admins were assigned default passwords, many of which were not changed.

In October 2024, NPD filed for Chapter 11 bankruptcy, and in December 2024 shuttered operations. RecordsCheck.net is also now defunct.

How to prevent this type of attack

  • Protect all databases with passwords.
  • Encrypt all sensitive data.
  • Require users to change default passwords.

3. Real Estate Wealth Network

Records compromised: 1.5 billion
Breach date: Unknown
Disclosure date: December 2023

In December 2023, cybersecurity researcher Jeremiah Fowler reported an unsecured database belonging to Real Estate Wealth Network, an online real estate education and services provider, was publicly available online. The 1.16 TB database, which was not password protected, contained more than 1.5 billion records on users and companies, including celebrities, politicians and Fowler himself.

Exposed personal data included physical addresses, purchase price and date, mortgage company, mortgage loan amount, tax ID numbers, and taxes owed, paid and due.

Fowler said he contacted Real Estate Wealth Network and that the company protected the database "shortly after."

It is unclear how long the database was exposed, but Fowler said it included daily logging records from April 22 to October 23, 2023.

How to prevent this type of attack

  • Follow database security best practices.
  • Protect all databases with passwords.
  • Use encryption to secure data in use, in transit and at rest.
Bar graph of the 10 biggest data breaches in history
Data breaches impact all industries, from entertainment to healthcare, government and financial sectors, and social media networks.

4. Aadhaar

Records compromised: 1.1 billion
Breach date: Unknown
Disclosure date: January 2018

The records of 1.1 billion Indian citizens were exposed after a breach of Aadhaar, the country's government ID database. While citizens aren't required to register with the database, it is required for those who want access to certain government resources or assistance.

The Tribune reported the breach after reporters paid someone on WhatsApp 500 Indian rupees (approximately $8 in 2018) for a code that provided unauthorized access to names, birthdates, email addresses, phone numbers and postal codes from the database. The seller offered reporters -- for an additional Rs 300 (approximately $5 in 2018) -- software that would enable them to print unique ID cards.

The seller was part of a group that gained access to the database through former Aadhaar employees, according to The Tribune. ZDNet later reported the database contained biometric data, including fingerprints and iris scans. ZDNet also said the leak was on a system run by a state-owned utility company that had access to the database via an unsecured API used to verify customers' identities.

How to prevent this type of attack

5. Shanghai Police

Records compromised: 1 billion
Breach date: Unknown
Disclosure date: June 2022

In June 2022, a threat actor under the profile name of ChinaDan put an alleged 1 billion users' records from the Shanghai National Police database up for sale on a hacker forum. The 23 TB of data, allegedly from a database hosted on Alibaba Cloud, contained names, addresses, birthplaces, phone numbers, photos, national IDs and criminal records.

Both the New York Times and CNN reported they had verified with multiple individuals the information obtained from samples posted by ChinaDan.

Cybersecurity company LeakIX reported the database used a Kibana instance running version 5.5.3 -- an outdated and unprotected instance of Elastic Stack (formerly known as the ELK Stack). The gateway was not password protected.

Access to the database was revoked soon after ChinaDan posted the listing online.

The exact breach date is unknown, but several researchers have said the database was accessible since April 2021. LeakIX reported that Alibaba privatized or shut down all Kibana servers running version 5.5.3 in July 2022.

Shanghai authorities have not acknowledged or addressed the incident.

How to prevent this type of attack

6. First American Financial

Records compromised: 885 million
Breach date: Unknown
Disclosure date: May 2019

In May 2019, Brian Krebs reported 885 million of First American Financials' files were leaked on the insurance company's website. The records, which dated back to 2003, included bank account information, Social Security numbers, mortgage records, tax documents and photocopies of drivers' licenses. The website didn't require a password to access the files.

First American said it had "learned of a design defect in an application that made possible unauthorized access to customer data." The design error, known as insecure direct object reference, is an access control vulnerability where a link meant for a specific viewer is made but does not verify the viewer's identity to allow access.

How to prevent this kind of attack

7. Indian Council of Medical Research

Records compromised: 815 million
Breach date: Unknown
Disclosure date: October 2023

In October 2023, a threat actor under the alias pwn001 advertised a database containing 815 million records on a dark web forum. They claimed the information, which included users' names, addresses, phone numbers, Aadhaar ID numbers and passport information, was gathered from the COVID-19 test details of citizens, sourced from the Indian Council of Medical Research, a biomedical research organization in India.

Cybersecurity company Resecurity's research team, Resecurity Hunter Unit, said it contacted the threat actor, who said they would sell the data set for $80,000. The team acquired 400,000 sample records from pwn001 and verified the user data with several victims.

Resecurity Hunter updated its October 15, 2023, report saying that pwn001's post was removed by October 31.

The Indian government has not publicly commented on the incident, and no cause for the breach has been published.

How to prevent this type of attack

  • Protect all databases with passwords.
  • Encrypt all sensitive information.
  • Regularly conduct network anomaly detection.

8. Onliner spambot

Records compromised: 711 million
Breach date: Unknown
Disclosure date: August 2017

In August 2017, security researcher Troy Hunt reported that Benkow, a Paris-based security researcher, discovered an exposed spam server known as Onliner. Benkow gave Hunt the spambot's list of 711 million exposed records, which included email addresses and passwords.

Onliner spread via a data-stealing Trojan horse for at least a year before its detection.

How to prevent this kind of attack

9. Ticketmaster

Records compromised: 560 million
Breach date: May 2024
Disclosure date: May 2024

On May 27, 2024, hacker group ShinyHunters posted a message on the dark web selling an alleged 1.3 TB of compromised data containing records of 560 million Ticketmaster users for $500,000.

In a Securities and Exchange Commission filing dated May 31, 2024, Live Nation, the parent company of Ticketmaster, confirmed it identified unauthorized activity in a third-party cloud database on May 20. The company said the database contained company data primarily from Ticketmaster and that Live Nation had launched an investigation into the event.

Ticketmaster later reported the breach affected users in the U.S., Canada and Mexico. In a notice to affected customers, Ticketmaster said personal information stolen included customer names, basic contact information and payment card information, such as encrypted credit or debit card numbers and expiration dates.

While Ticketmaster did not reveal the third-party provider, members of the threat intelligence community confirmed with Dark Reading that it was Snowflake, which saw many of its customers under attack during the same time period. In a May 2024 post, Snowflake said it became aware of unauthorized access experienced by some of its customers on May 23, though the company did not name Ticketmaster or any other specific customer.

After an investigation in conjunction with CrowdStrike and Mandiant, Snowflake said it did not find any vulnerabilities, misconfigurations, credential leaks or breaches of its product. It later reported that customers with single-factor authentication appeared to be targeted and that the accounts compromised had credentials previously purchased or obtained through other malware attacks. It named threat group UNC5537 as the perpetrator.

How to prevent this type of attack

10. Yahoo

Records compromised: 500 million
Breach date: November/December 2014
Disclosure date: September 2016

Yahoo announced in September 2016 that 500 million of its accounts were compromised in a 2014 state-sponsored attack. Bob Lord, Yahoo CISO at the time, said the stolen data "may have" included names, email addresses, birthdates, phone numbers, passwords hashed with Bcrypt and, in some cases, encrypted and unencrypted security questions and answers. Lord said payment card data and bank account information was not involved.

In 2018, Karim Baratov received a five-year prison sentence for the breach after he was found guilty of helping Russian intelligence officers access the accounts of "individuals of interest." Three other defendants were also named, but remain out of reach of U.S. law enforcement agencies.

Yahoo attributed the attack to a spear phishing email, following an internal investigation.

How to prevent this kind of attack

Sharon Shea is executive editor of Informa TechTarget's SearchSecurity site.

Isabella Harford previously contributed to writing this article.

Dig Deeper on Data security and privacy