Breach Library

Anatomy of the most significant cybersecurity breaches of the past decade — MGM, Change Healthcare, SolarWinds, MOVEit, and 50+ more. Attack vectors, financial impact, and the specific lessons that protect PE portfolios.

All Breaches

2026-04-14
High
Credential Stuffing
Multi-Sector
2026-04-14

Microsoft Token Theft Campaign 2026: 35,000 Users Across 13,000 Organizations Targeted in 48 Hours

Between April 14 and 16, 2026, Microsoft tracked a large-scale credential theft campaign that targeted more than 35,000 users across 13,000+ organizations in 26 countries. The attackers used a sophisticated combination of code-of-conduct-themed phishing lures and legitimate email services to direct targets to attacker-controlled domains, where they harvested authentication tokens. The campaign was notable for its scale, precision, and the sophistication of its evasion — using trusted email infrastructure to bypass email security controls and legitimate-looking pages to steal tokens rather than passwords.

Healthcare and life sciences organizations (19% of targets) were the primary sector targeted, followed by financial services and technology companies. 92% of targets were located in the United States.

Financial Impact
35,000+ users
Records Exposed
Undisclosed per org
2026-01-30
High
Unpatched Vulnerability
Government
2026-01-30

European Commission Ivanti Breach 2026: Staff Data Exposed in Government MDM Attack

The European Commission disclosed in February 2026 that a cyberattack had compromised staff data through its mobile device management infrastructure — exploiting a vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that had been disclosed by Ivanti in January 2026. The Commission contained the incident within nine hours but confirmed that staff names and mobile phone numbers may have been accessed by the attackers. The attack was part of a broader wave of Ivanti EPMM exploitation that affected government agencies across Europe and the United States in early 2026.

Financial Impact
EU Commission staff affected
Records Exposed
Contained — staff data only
2021-04-01
High
Cloud Misconfiguration
Healthcare
2021-04-01

Blue Shield of California 2025: 4.7 Million Members' Health Data Shared with Google Ads for 3 Years

Blue Shield of California disclosed in April 2025 that it had been sharing protected health information for approximately 4.7 million members with Google Ads and Google Analytics for nearly three years, from April 2021 through January 2024. The disclosure was not triggered by an external breach — it was triggered by an internal review that discovered the organization had configured its website analytics in a manner that transmitted health information to Google's advertising platforms without member consent or HIPAA authorization.

Blue Shield is one of the largest health insurers in the United States. The scale of inadvertent health data disclosure — 4.7 million members, three years, to an advertising platform — makes this one of the most significant HIPAA violations in the history of the regulation.

Financial Impact
4.7M members affected
Records Exposed
FTC/OCR investigation ongoing
2025-02-21
Critical
Supply Chain Attack
Financial Services
2025-02-21

Bybit Exchange Hack 2025: North Korea Steals $1.5 Billion in the Largest Crypto Theft in History

On February 21, 2025, the Lazarus Group — North Korea's premier cybercrime unit — stole approximately $1.5 billion in Ethereum from Bybit, one of the world's largest cryptocurrency exchanges. It was the single largest theft in the history of cryptocurrency, and it was executed not through a vulnerability in Bybit's own systems but through a compromise of Safe{Wallet}, the third-party multi-signature wallet infrastructure Bybit used to manage cold storage transfers. The attack demonstrated that supply chain compromise of wallet infrastructure represents an existential risk for any cryptocurrency exchange, regardless of the security of the exchange's own systems.

Financial Impact
N/A — financial theft
Records Exposed
$1.5B stolen
2026-01-15
High
Third-Party Compromise
Technology
2026-01-15

Match Group / Tinder Breach 2026: ShinyHunters Hits Dating Apps via Third-Party Analytics

In early 2026, the ShinyHunters threat group — which had breached Match Group's family of dating applications including Tinder, Hinge, and OkCupid — claimed to possess millions of user records and began attempting extortion. Match Group characterized the incident as a security incident under investigation, consistent with the group's typical handling of breach disclosures. ShinyHunters cited AppsFlyer — a third-party mobile analytics provider — as the entry point, mirroring the same approach used in the Adobe breach of April 2026.

The Match Group breach demonstrates ShinyHunters' systematic targeting of high-value consumer data platforms via shared third-party analytics infrastructure.

Financial Impact
Millions of users
Records Exposed
Undisclosed
2024-12-28
Critical
Data Theft
Technology
2024-12-28

PowerSchool Data Breach 2025: 60 Million Student Records and the K-12 SIS Vulnerability

The PowerSchool breach of December 2024–January 2025 exposed the personal records of an estimated 60 million students and 10 million teachers across 18,000 school districts in the United States and Canada — making it the largest breach of K-12 education data in history. The attacker accessed PowerSchool's Student Information System (SIS) — the administrative platform that tracks student enrollment, grades, attendance, and sensitive family information — using compromised credentials on a customer support portal.

What made the breach particularly damaging was the subsequent extortion campaign: after school districts paid ransom to prevent data publication, PowerSchool's threat actor returned with fresh extortion demands directly against individual districts months later, demonstrating that ransom payments had not produced data deletion.

Financial Impact
60M+ students affected
Records Exposed
$0 ransom — then extortion
2025-01-22
High
Cloud Breach
Healthcare
2025-01-22

Oracle Health Breach 2025: Patient Data Exposed During Cerner Cloud Migration

In early 2025, Oracle Health — the healthcare division of Oracle formed through its $28 billion acquisition of Cerner — disclosed a breach of its legacy Cerner data migration servers that exposed patient health data from dozens of US hospital systems. The breach highlighted a specific and underappreciated risk in major M&A transactions: the security posture of legacy systems during data migration is often significantly weaker than either the acquiring company's production environment or the target's pre-acquisition systems.

Financial Impact
Undisclosed hospital count
Records Exposed
Under investigation
2026-03-01
High
Nation-State Attack
Healthcare
2026-03-01

Stryker Cyberattack 2026: Iranian Hacktivists Wipe Medical Device Giant in Real Time

In March 2026, Stryker Corporation — one of the world's largest medical device companies — was hit by a cyberattack carried out by Handala, an Iran-linked hacktivist group. Unlike ransomware attacks focused on financial gain, the attack appeared designed for maximum operational disruption and public embarrassment: employees watched in real time as company computers were remotely wiped, forcing offices across the globe to shut down while security teams worked to contain the damage.

Stryker confirmed system outages and launched an investigation with third-party cybersecurity experts. The attack illustrated the growing threat of Iranian hacktivist groups targeting Western healthcare and defense-adjacent companies as geopolitical tools.

Financial Impact
Undisclosed
Records Exposed
Undisclosed — operational disruption
2024-08-01
Critical
Nation-State Attack
Telecommunications
2024-08-01

Salt Typhoon 2024–2025: China's 8-Month Infiltration of US Telecom Wiretap Infrastructure

Salt Typhoon — a Chinese state-sponsored APT group — infiltrated the systems of at least nine major US telecommunications carriers over an eight-month period, gaining access to the lawful intercept infrastructure that US law enforcement uses to conduct court-authorized wiretaps. The attackers didn't steal financial data or encrypt systems for ransom. They accessed the list of individuals under federal surveillance — providing Chinese intelligence with a real-time window into who the US government was watching, and why.

The Salt Typhoon breach is arguably the most consequential intelligence compromise in a decade. It wasn't discovered by any of the carriers. It was discovered by the FBI.

Financial Impact
9+ carriers breached
Records Exposed
National security cost
2026-04-01
High
Data Theft
Technology
2026-04-01

Adobe Data Breach 2026: 13 Million Customer Records Exposed via ShinyHunters

In April 2026, the ShinyHunters threat group claimed responsibility for a major breach of Adobe's systems, exposing 13 million customer support tickets, 15,000 employee records, internal company documents, and submissions from Adobe's bug bounty program. The breach was accessed via a third-party entry point — AppsFlyer, a marketing analytics partner — making it the most significant enterprise software supply chain breach of 2026 so far.

Financial Impact
13M+ tickets
Records Exposed
Undisclosed
2023-10-30
High
SEC Enforcement
Regulatory
2023-10-30

SolarWinds CISO Charges 2023: Individual Executive Accountability for Cybersecurity Fraud

The SEC's 2023 enforcement action against SolarWinds Corporation and its Chief Information Security Officer Timothy Brown was the most consequential individual accountability action in cybersecurity history — the first time the SEC charged a CISO personally with securities fraud and internal controls violations related to cybersecurity disclosures. The charges alleged that SolarWinds and Brown had known about significant security vulnerabilities and misrepresented the company's security posture to investors in the years before the SUNBURST breach was discovered.

Financial Impact
N/A — enforcement
Records Exposed
$26M settlement
2022-09-01
Critical
Ransomware
Healthcare
2022-09-01

Royal / BlackSuit Ransomware Group Profile (Conti Successor)

The Royal and BlackSuit ransomware operations represent the evolution of Conti ransomware through a succession of rebranding and restructuring that followed Conti's February 2022 dissolution. Royal emerged in mid-2022 as a sophisticated, highly targeted ransomware operation that explicitly avoided the RaaS model, operating as a private group with handpicked team members. In 2023, Royal rebranded as BlackSuit, continuing operations under new branding while maintaining the same core team and techniques.

Financial Impact
Hundreds of victims
Records Exposed
$275M (US ransoms)
2023-01-01
Critical
Business Email Compromise
Multi-Sector
2023-01-01

Business Email Compromise (BEC): The $50 Billion Silent Threat

Business Email Compromise (BEC) is the single largest category of cybercrime financial loss, generating more than $50 billion in global victim losses since 2013 and consistently outpacing ransomware as the highest-dollar cybercrime category in FBI IC3 reporting. Unlike ransomware, BEC requires no malware, no technical exploitation, and no data breach — only a convincing impersonation of a trusted party combined with a wire transfer request or payment redirection.

Financial Impact
N/A — financial fraud
Records Exposed
$50B+ global
2019-07-01T00:00:00.000Z
Critical
Cloud Misconfiguration
Financial Services
2019-07-01T00:00:00.000Z

Capital One Data Breach 2019

The Capital One breach of 2019 exposed 106 million customers' financial applications through a misconfigured Web Application Firewall in Amazon Web Services. It became the defining case for cloud security misconfiguration liability and resulted in the first major CISO-level criminal indictment related to a cloud breach at a different organization.

Financial Impact
106M records
Records Exposed
$270M+ penalties
2022-01-01
Critical
Social Engineering
Multi-Sector
2022-01-01

Scattered Spider / UNC3944 Group Profile

Scattered Spider — also known as UNC3944, Muddled Libra, and Octo Tempest — is a loosely organized threat group of primarily English-speaking young adults who executed some of the most financially damaging social engineering attacks in enterprise history during 2022–2023. The group's targets included MGM Resorts, Caesars Entertainment, Okta, Twilio, Cloudflare, and dozens of others. Their weapon of choice was not malware but the telephone.

Financial Impact
Undisclosed
Records Exposed
$500M+ total
2024-07-01T00:00:00.000Z
Critical
Cloud Breach
Telecommunications
2024-07-01T00:00:00.000Z

AT&T Data Breach 2024

The AT&T data breach of 2024 was actually two separate incidents affecting nearly 110 million AT&T customers. The first, in March 2024, involved data from a 2021 database that had circulated on the dark web. The second, in July 2024, revealed that records of virtually all AT&T customer calls and texts from 2022 had been stolen from AT&T's Snowflake cloud environment — one of the most consequential telecom breaches in US history.

Financial Impact
73M+ customers
Records Exposed
$370K ransom paid
2021-01-01T00:00:00.000Z
Critical
Ransomware-as-a-Service
Multi-Sector
2021-01-01T00:00:00.000Z

Conti Ransomware Group Profile

The Conti ransomware group was the most destructive ransomware operation of 2020 and 2021, responsible for hundreds of millions in ransom payments and the functional destruction of Ireland's National Health Service. A unique window into Conti's operations was opened in February 2022 when a Ukrainian security researcher, following Russia's invasion of Ukraine, leaked over 160,000 internal Conti chat messages and the group's complete ransomware source code — the most detailed inside view of a major ransomware operation ever made public.

Financial Impact
400+ organizations
Records Exposed
$150M+ in ransoms
2024-04-01T00:00:00.000Z
Critical
Data Theft
Data Broker
2024-04-01T00:00:00.000Z

National Public Data Breach 2024

The National Public Data breach of 2024 was one of the largest data breaches in US history by scope, exposing Social Security numbers, addresses, and personal information for approximately 2.9 billion individuals from a data aggregation company most people had never heard of. The breach illustrated the privacy risks of the data broker industry and the compounding harm of data aggregated without the knowledge or consent of the individuals whose information was compiled.

Financial Impact
2.9B records
Records Exposed
Bankruptcy filed
2023-12-18
High
Regulatory Action
Regulatory
2023-12-18

SEC Cybersecurity Disclosure Rule 2023: What Every Public Company Must Know

The SEC's cybersecurity disclosure rules, effective December 2023, require public companies to disclose material cybersecurity incidents within 4 business days of determining materiality, and to provide annual disclosures about cybersecurity risk management and governance. The rules fundamentally changed the relationship between cybersecurity and public company disclosure obligations — making CISO decisions about incident response part of the SEC's regulatory purview for the first time.

Financial Impact
N/A — regulatory
Records Exposed
Compliance costs
2024-01-08
High
Ransomware
Financial Services
2024-01-08

LoanDepot Ransomware 2024: 16.9 Million Records, SEC Disclosure Test

The LoanDepot ransomware attack of January 2024 exposed the sensitive personal and financial information of approximately 16.9 million customers of one of the largest US nonbank mortgage lenders. The attack disrupted LoanDepot's online services, loan processing systems, and customer-facing platforms for weeks, demonstrating the operational and reputational consequences of ransomware against financial services companies processing sensitive consumer mortgage data.

Financial Impact
16.9M customers
Records Exposed
$26.9M direct costs
2023-01-11
High
Social Engineering
Technology
2023-01-11

MailChimp Breach 2023: Third Breach in Eight Months, Crypto Companies Targeted

The MailChimp breach of January 2023 was the third breach of the email marketing platform in eight months, with an attacker using social engineering against a MailChimp employee to gain access to an internal tool used to support customer accounts — and then using that access to export email lists for cryptocurrency and Web3 companies specifically targeted for downstream phishing campaigns against their subscribers.

Financial Impact
133 customer accounts
Records Exposed
Undisclosed
2023-01-13
High
Credential Stuffing
Cybersecurity
2023-01-13

Norton LifeLock Credential Stuffing 2023

The Norton LifeLock credential stuffing attack of January 2023 affected approximately 925,000 customer accounts, with attackers using credentials stolen from other breached services to attempt logins against Norton accounts. The breach was notable not only for its scale but for what attackers were trying to reach: Norton Password Manager vaults containing every stored password of affected users.

Financial Impact
925K targeted
Records Exposed
Undisclosed
2021-12-09
Critical
Zero-Day Exploit
Multi-Sector
2021-12-09

Log4Shell 2021: The Vulnerability That Broke the Internet for a Week

The Log4Shell vulnerability disclosed on December 9, 2021 was the most significant software vulnerability in a decade — a critical remote code execution flaw in Log4j, a ubiquitous Java logging library embedded in thousands of enterprise applications. Within hours of disclosure, attackers were exploiting it at scale.

Financial Impact
Thousands of orgs
Records Exposed
$10B+ remediation
2022-09-01T00:00:00.000Z
Critical
Social Engineering
Technology
2022-09-01T00:00:00.000Z

Uber Breach 2022

The Uber breach of 2022 is the definitive case study for social engineering and MFA bypass in the enterprise. Attackers with no sophisticated technical capability breached Uber's entire corporate infrastructure through a combination of purchased credentials, MFA fatigue, and vishing — then exfiltrated data from Uber's internal security tools, cloud environments, and code repositories.

Financial Impact
Undisclosed
Records Exposed
Undisclosed
2023-10-28
High
Ransomware
Aerospace & Defense
2023-10-28

Boeing LockBit Ransomware 2023: $200M Demand, Defense Contractor Breach

The Boeing LockBit attack of October 2023 was one of the highest-profile ransomware incidents of the year, with the LockBit ransomware group initially claiming a $200 million ransom demand against one of the world's largest defense contractors before publishing stolen data when Boeing did not pay. The attack targeted Boeing's global services and parts distribution business rather than aircraft manufacturing or defense systems.

Financial Impact
43GB data leaked
Records Exposed
$200M demanded
2022-12-02
High
Ransomware
Technology
2022-12-02

Rackspace Ransomware 2022: Hosted Exchange Shutdown, 30,000 Customers Down

The Rackspace Hosted Exchange ransomware attack of December 2022 took down the hosted email service used by thousands of small and mid-market businesses over the holiday period, demonstrating the cascading impact when a managed service provider's core infrastructure is hit with ransomware and the unique legal and contractual challenges when customers' own data is compromised through their service provider.

Financial Impact
30K customers
Records Exposed
Undisclosed
2023-01-28
Critical
Zero-Day Exploit
Multi-Sector
2023-01-28

GoAnywhere MFT Zero-Day 2023

In January-February 2023, the Cl0p ransomware group exploited a zero-day vulnerability in Fortra's GoAnywhere Managed File Transfer software, compromising over 130 organizations in a campaign that directly preceded and presaged their MOVEit attack three months later. The GoAnywhere and MOVEit attacks together established Cl0p's strategy of mass exploitation of managed file transfer vulnerabilities as a core business model.

Financial Impact
130+ orgs affected
Records Exposed
Multiple ransoms
2018-11-01T00:00:00.000Z
Critical
Nation-State Attack
Hospitality & Gaming
2018-11-01T00:00:00.000Z

Marriott-Starwood Data Breach 2018

The Marriott-Starwood breach is the canonical example of inherited M&A cyber risk. Marriott acquired Starwood Hotels in 2016. Starwood's reservation system had been compromised by Chinese threat actors since 2014. Marriott inherited the breach, inherited the liability, and discovered it two years after acquisition close — at a total cost exceeding $100 million and affecting 500 million guests.

Financial Impact
500M guests
Records Exposed
$124M+ total costs
2021-12-11
High
Ransomware
Technology
2021-12-11

Kronos/UKG Ransomware 2021: Payroll Down for Thousands of Employers Over the Holidays

The Kronos/UKG ransomware attack of December 2021 disrupted payroll processing for thousands of employers across the United States during the holiday period, preventing companies from paying their employees accurately and on time through the HR systems they depended on — demonstrating that HR technology ransomware attacks can have direct employee compensation consequences across an entire customer ecosystem.

Financial Impact
Thousands of orgs
Records Exposed
$6M+ settlement
2021-03-02T00:00:00.000Z
Critical
Nation-State Attack
Multi-Sector
2021-03-02T00:00:00.000Z

Microsoft Exchange HAFNIUM Zero-Day 2021

Operation Hafnium, disclosed in March 2021, involved Chinese state-sponsored actors exploiting four zero-day vulnerabilities in Microsoft Exchange Server — affecting hundreds of thousands of organizations globally. The attack enabled complete compromise of any organization running on-premises Exchange, including the installation of web shells that persisted even after patching. It prompted the first-ever White House attribution of a cyberattack to the Chinese Ministry of State Security.

Financial Impact
250K+ organizations
Records Exposed
National security
2021-07-02
Critical
Supply Chain Attack
Technology
2021-07-02

Kaseya VSA Ransomware 2021: 1,500 Businesses Hit Through One MSP Tool

The Kaseya VSA ransomware attack of July 4, 2021 was the most impactful ransomware supply chain attack in history — exploiting a zero-day vulnerability in Kaseya's remote monitoring and management software to push REvil ransomware to approximately 1,500 businesses through their managed service providers, on the Independence Day holiday weekend when IT staff coverage was minimal.

Financial Impact
1,500 businesses
Records Exposed
$70M demanded
2024-04-14
High
Ransomware
Telecommunications
2024-04-14

Frontier Communications Ransomware 2024: 750K Customers, RansomHub

The Frontier Communications ransomware attack of April 2024 disrupted operations at one of the largest US internet service providers, with the RansomHub ransomware group stealing sensitive data on approximately 750,000 customers including Social Security numbers. The attack demonstrated that internet infrastructure companies are high-value ransomware targets whose compromise can have cascading effects on the customers and businesses that depend on their connectivity services.

Financial Impact
750K customers
Records Exposed
Undisclosed
January 2023 (November 2022–January 2023)
High
API Exploitation
Telecommunications
January 2023 (November 2022–January 2023)

T-Mobile Breach 2023: 37 Million Records and a Pattern That Won't Stop

The T-Mobile data breach disclosed in January 2023 — the ninth significant T-Mobile security incident since 2018 — exposed the account information of approximately 37 million customers. The breach occurred through an API that was accessible without authentication, and the attacker exploited it for approximately six weeks before T-Mobile detected the unauthorized access. By then, customer names, billing addresses, emails, phone numbers, and account numbers had been exfiltrated at scale.

T-Mobile's breach pattern — nine incidents in five years, each disclosing a different security gap — illustrates a systemic problem that goes beyond any individual vulnerability. It represents an organization that has repeatedly failed to translate breach lessons into structural security improvement. For executive and board audiences, the T-Mobile pattern is the case study in security culture deficit, not technology deficit.

Financial Impact
37M customers
Records Exposed
$350M+ settlement
June 2024
Critical
Ransomware
Automotive Tech
June 2024

CDK Global Breach 2024: When Your Software Vendor's Ransomware Shuts Down 15,000 Dealerships

The CDK Global ransomware attack in June 2024 crippled car dealerships across North America for nearly two weeks, preventing tens of thousands of dealers from processing sales, accessing vehicle inventory, or managing service operations. CDK Global provides dealer management software (DMS) to approximately 15,000 North American automotive dealerships. When ransomware actors took CDK's systems offline, those 15,000 dealerships lost the digital infrastructure running their entire operations — from inventory management and finance and insurance (F&I) processing to parts ordering and service scheduling.

CDK Global is particularly relevant for private equity audiences because the automotive dealership sector is a significant PE investment category, and because the incident illustrates how a single software vendor's security failure can simultaneously disrupt thousands of small and mid-market businesses that represent portfolio companies or acquisition targets.

Financial Impact
Ops disruption
Records Exposed
$1B+ dealer losses
September 2023
Critical
Social Engineering
Hospitality & Gaming
September 2023

MGM Resorts 2023 Breach: A $100M Lesson in Help Desk Security

The September 2023 ransomware attack on MGM Resorts International is the most financially damaging and strategically instructive cyberattack against a US enterprise in recent history. A single 10-minute phone call to MGM's IT help desk — preceded by a LinkedIn search — triggered a chain of events that cost the company more than $100 million, took slot machines offline for days, locked hotel room keys, and disrupted reservations across 30+ properties. The perpetrators were members of Scattered Spider, a loosely organized group of English-speaking threat actors ranging in age from 19 to 24. They used no zero-day exploits. They deployed no custom malware. They made a phone call.

The MGM breach is important not because it is unique but because it is representative — of the social engineering techniques now being used at scale against mid-market enterprises, of the inadequacy of MFA as a complete identity control, and of the catastrophic financial consequences that follow when social engineering succeeds against an organization without compensating controls.

Financial Impact
Undisclosed
Records Exposed
$100M+ impact
August–September 2023
High
Social Engineering
Hospitality & Gaming
August–September 2023

Caesars Entertainment Breach 2023: The $15M Ransom That Taught Us Nothing New

Caesars Entertainment paid a $15 million ransom to Scattered Spider in September 2023 — quietly, discreetly, and without the operational disruption that characterized the simultaneous MGM breach. The Caesars payment is significant not primarily as a ransomware event but as a data point in the economics of extortion: paying the ransom is sometimes the rational financial decision, does not prevent data exposure, and does not prevent the attacker from claiming success and applying the same technique to the next target.

The Caesars breach also provides the clearest documented example of the Scattered Spider identity attack methodology in action against an organization that chose to pay rather than resist — offering a useful comparison point against MGM, which did not pay and suffered operational disruption, to evaluate the actual consequences of each response strategy.

Financial Impact
Tens of millions
Records Exposed
$15M ransom paid
2016-09-01T00:00:00.000Z
Critical
Nation-State Attack
Technology
2016-09-01T00:00:00.000Z

Yahoo Data Breaches 2013 and 2016

The Yahoo breaches of 2013 and 2016 represent the largest data breaches in internet history by volume, exposing credentials for every Yahoo account in existence. The 2013 breach — 3 billion accounts — was not disclosed until 2016. The 2016 breach — 500 million accounts — was disclosed during Verizon's acquisition of Yahoo, triggering the first major demonstration of cyber breach impact on M&A deal value.

Financial Impact
3B accounts
Records Exposed
$350M Verizon cut
2013-12-01T00:00:00.000Z
Critical
Third-Party Compromise
Retail
2013-12-01T00:00:00.000Z

Target Corporation Data Breach 2013

The Target data breach of 2013 remains one of the most consequential retail cyberattacks in history, exposing 40 million payment cards and 70 million customer records during the peak holiday shopping season. It fundamentally changed how corporations, boards, and regulators think about third-party vendor risk and network segmentation.

Financial Impact
110M records
Records Exposed
$292M net loss
February 2024
Critical
Ransomware
Healthcare
February 2024

Change Healthcare Breach 2024: The $872M Ransomware Attack That Broke US Healthcare

On February 21, 2024, Change Healthcare — a UnitedHealth Group subsidiary that processes approximately 40% of all US healthcare claims — suffered a ransomware attack that took its payment processing infrastructure offline for weeks, disrupting care delivery across hospitals, pharmacies, and physician practices nationwide. The financial impact to UnitedHealth Group exceeded $872 million in the first quarter alone. The human impact — delayed prescriptions, disrupted billing, deferred procedures — was immeasurable. The technical cause was a single Citrix remote access portal without multi-factor authentication.

Change Healthcare is not primarily important as a ransomware event. It is important as a systemic risk event — a demonstration that a single critical infrastructure company can become a single point of failure for an entire healthcare sector, and that the attack surface protecting that infrastructure may be no more sophisticated than a missing MFA configuration.

Financial Impact
100M+ patients
Records Exposed
$872M+ (UHG Q1 2024)
2021-11-01
Critical
Ransomware-as-a-Service
Multi-Sector
2021-11-01

ALPHV/BlackCat Ransomware Group Profile

ALPHV/BlackCat was the most technically sophisticated ransomware-as-a-service operation of 2022-2024, responsible for the Change Healthcare breach, the MGM Resorts attack, and hundreds of other high-profile incidents. The group traced its lineage to DarkSide — the Colonial Pipeline attackers — through the BlackMatter RaaS, establishing BlackCat as the third-generation evolution of one of the most historically significant ransomware operations. The group's 2024 exit scam effectively ended the operation after a $22 million Change Healthcare ransom payment.

Financial Impact
Hundreds of victims
Records Exposed
$2.3B+ (all attacks)
March–December 2020
Critical
Supply Chain Attack
Government
March–December 2020

SolarWinds Breach 2020: The Supply Chain Attack That Changed Everything

The SolarWinds supply chain attack, disclosed in December 2020, is the most comprehensively documented nation-state cyberattack in history — and the one that most fundamentally changed how security professionals think about supply chain risk, software trust, and the limitations of endpoint security. Russian SVR intelligence unit APT29 (Cozy Bear) compromised SolarWinds' software build pipeline and inserted malicious code into the Orion IT management platform, which was then distributed to approximately 18,000 customers through a legitimate signed software update. Among those 18,000 were the US Treasury Department, the US Department of Homeland Security, the US Department of Commerce, NATO, and dozens of the world's largest technology companies — including Microsoft, Intel, and Cisco.

The attack went undetected for nine months. The detection itself was accidental — FireEye, a cybersecurity firm that was itself a victim, discovered anomalous activity in its own network and traced it to the Orion update.

Financial Impact
Classified
Records Exposed
Classified
2023-03-29
High
Supply Chain Attack
Technology
2023-03-29

3CX Supply Chain Attack 2023: One Compromise Enables Another

The 3CX supply chain attack of March 2023 was the first documented case of one supply chain attack being used to enable a second supply chain attack — North Korean Lazarus Group operators compromised a 3CX employee's personal computer through a malicious trading software package, then used that access to trojanize 3CX's legitimate desktop application, which was installed by hundreds of thousands of businesses worldwide.

Financial Impact
600K+ companies
Records Exposed
12M daily users hit
August–December 2022
Critical
Supply Chain Attack
Cybersecurity
August–December 2022

LastPass Breach 2022: When the Password Manager Gets Breached

The LastPass breach of 2022 is the most instructive data breach in the password security space precisely because it happened to the company that was supposed to be the answer to password security. LastPass stores the master passwords and encrypted password vaults of over 30 million users and 85,000 businesses. When attackers breached LastPass twice in 2022 — once in August, and again in November using data from the first breach — they obtained copies of customer password vaults that, if cracked, would give complete access to every password those customers had ever stored.

The LastPass breach is still unfolding. Cracking efforts against stolen vaults are ongoing. Users who reused their LastPass master password, chose a weak master password, or had weaker encryption parameters due to using LastPass under older settings remain at risk from their 2022 vault copy being cracked years after the breach.

Financial Impact
30M+ vaults
Records Exposed
Ongoing exposure
2023-05-24
Critical
Nation-State Attack
Critical Infrastructure
2023-05-24

Volt Typhoon 2023: China's Pre-Positioning in US Critical Infrastructure

Volt Typhoon is the designation assigned by Microsoft, CISA, and US intelligence agencies to a Chinese state-sponsored threat actor pre-positioning within US critical infrastructure networks — not to steal data, but to establish persistent access capable of disrupting energy, water, communications, and transportation at a moment of geopolitical conflict. The campaign, disclosed in May 2023, represents a fundamentally different threat from financially motivated cybercrime: patient, stealthy intrusion with a strategic military purpose.

Financial Impact
N/A — pre-positioning
Records Exposed
Strategic threat
2017-05-01T00:00:00.000Z
Critical
Unpatched Vulnerability
Financial Services
2017-05-01T00:00:00.000Z

Equifax Data Breach 2017

The Equifax breach of 2017 exposed the personal information of 147 million Americans — including Social Security numbers, birth dates, addresses, and driver's license numbers — making it the most consequential identity data breach in US history. The breach was caused by a known vulnerability for which a patch had been available for two months.

Financial Impact
147.9M Americans
Records Exposed
$1.4B total costs
2019-04-01
Critical
Ransomware-as-a-Service
Multi-Sector
2019-04-01

REvil/Sodinokibi Ransomware Group Profile

REvil — also known as Sodinokibi — was the dominant ransomware threat of 2019-2021, responsible for attacks on JBS Foods, Kaseya VSA, Acer, and dozens of other high-profile organizations. The group pioneered aggressive extortion tactics and operated the most professionally organized ransomware-as-a-service platform of its era. REvil was disrupted twice by law enforcement — in mid-2021 and early 2022 — when the US, Russia, and allies coordinated arrests of multiple members.

Financial Impact
Hundreds of victims
Records Exposed
$1B+ all attacks
2020-07-15
High
Social Engineering
Social Media
2020-07-15

Twitter Bitcoin Hack 2020: Vishing Compromises Obama, Biden, Gates Accounts

The Twitter breach of July 2020 compromised the accounts of the highest-profile individuals in the world — Barack Obama, Joe Biden, Elon Musk, Bill Gates, Jeff Bezos, Apple, and dozens of others — through a targeted vishing attack on Twitter employees that provided access to internal administrative tools. The attack demonstrated that the most sophisticated social engineering can succeed against even technology-forward organizations with substantial security investment.

Financial Impact
130 accounts
Records Exposed
$120K stolen
2023-06-15
Critical
Nation-State Attack
Government
2023-06-15

Microsoft Storm-0558 2023: Forged Tokens, Government Email Breach

In June 2023, Chinese state-sponsored hackers designated Storm-0558 breached the Microsoft Exchange Online email accounts of US State Department officials, Commerce Secretary Gina Raimondo, and approximately 22 US government organizations — by forging authentication tokens using a stolen Microsoft cryptographic signing key. The breach demonstrated that cloud platform authentication infrastructure itself can be the attack target, with customers having no visibility into or control over platform-level security events.

Financial Impact
22 gov. orgs
Records Exposed
Classified
2022-01-01T00:00:00.000Z
Critical
Ransomware-as-a-Service
Multi-Sector
2022-01-01T00:00:00.000Z

LockBit Ransomware Group Profile

The LockBit ransomware group was the most prolific and damaging ransomware operation in history, responsible for more confirmed attacks than any other ransomware group across 2022 and 2023. A profile of LockBit's operations provides essential context for understanding the modern ransomware threat landscape, the Ransomware-as-a-Service model, and the law enforcement operations that ultimately disrupted the group in 2024.

Financial Impact
2,000+ organizations
Records Exposed
$120M+ in ransoms
2022-10-01T00:00:00.000Z
Critical
Ransomware
Healthcare
2022-10-01T00:00:00.000Z

Medibank Data Breach 2022

The Medibank breach of 2022 affected all 9.7 million current and former Medibank customers in Australia — the country's largest health insurer — exposing health claims data, diagnoses, and treatment information for the entire customer base. The attackers threatened to publish particularly sensitive health data about individual policyholders including claims related to substance abuse treatment, HIV status, and pregnancy terminations as extortion leverage.

Financial Impact
9.7M customers
Records Exposed
AUD $500M+ costs
May 2021
Critical
Ransomware
Energy
May 2021

Colonial Pipeline Breach 2021: When Ransomware Shut Down the Eastern Seaboard

The Colonial Pipeline ransomware attack in May 2021 shut down the largest fuel pipeline in the United States for six days, creating fuel shortages across the Eastern Seaboard, triggering a federal emergency declaration, and demonstrating to boards and executives across every sector what operational technology ransomware consequences look like at scale. The $4.4 million ransom paid to DarkSide — most of which was subsequently recovered by the FBI — was a footnote to the operational, regulatory, and reputational consequences of the event.

Colonial Pipeline is the definitive case study for board-level ransomware risk discussion because it translated cybersecurity into supply chain disruption visible to every American who drove a car that week. It moved ransomware from an IT problem to a national security problem in the public consciousness, and it accelerated federal regulatory action on critical infrastructure cybersecurity that continues to shape compliance requirements today.

Financial Impact
N/A — ops disruption
Records Exposed
$4.4M ransom
2022-08-01T00:00:00.000Z
High
Social Engineering
Technology
2022-08-01T00:00:00.000Z

Twilio Smishing Breach 2022

The Twilio breach of 2022 is the most documented example of smishing as a corporate attack vector. Attackers sent SMS messages to Twilio employees impersonating IT, directing them to phishing pages that stole credentials. The breach cascaded to Twilio customers including Signal and Authy, demonstrating how a communications platform breach amplifies impact across the companies that depend on it.

Financial Impact
~125 customers
Records Exposed
Undisclosed
2024-05-08T00:00:00.000Z
Critical
Ransomware
Healthcare
2024-05-08T00:00:00.000Z

Ascension Health Ransomware 2024

The Ascension Health ransomware attack of May 2024 was the most disruptive healthcare cyberattack in US history, forcing Ascension — one of the nation's largest nonprofit hospital systems with 140 hospitals across 19 states — to divert ambulances, cancel surgeries, revert to paper records, and take clinical systems offline for weeks. The attack demonstrated in the most consequential terms the patient safety implications of healthcare ransomware.

Financial Impact
5.6M patients
Records Exposed
$2.66B+ losses
September–October 2023
Critical
Supply Chain Attack
Cybersecurity
September–October 2023

Okta Breach 2023: When Your Identity Provider Becomes the Attack Vector

The 2023 Okta support system breach is one of the most consequential identity security incidents in enterprise history — not because of what attackers took from Okta, but because of what Okta's position as a universal identity provider made accessible through the breach. Okta serves as the identity and access management backbone for thousands of organizations. When Scattered Spider compromised Okta's customer support system in September 2023, they gained visibility into the identity configurations of Okta's customers — turning a breach of one identity vendor into a supply chain attack on every organization that trusted Okta's support environment.

The downstream victims of the Okta breach — 1Password, BeyondTrust, Cloudflare, and MGM Resorts among them — demonstrate that the blast radius of a compromised identity provider extends far beyond the provider itself.

Financial Impact
Undisclosed
Records Exposed
Undisclosed
2021-03-21
Critical
Ransomware
Financial Services
2021-03-21

CNA Financial Ransomware 2021: $40 Million, The Largest Known Ransomware Payment

The CNA Financial ransomware attack of March 2021 resulted in the largest known ransomware payment in history — $40 million paid to the Evil Corp-affiliated Phoenix ransomware group — and raised significant concern because CNA is itself a major cyber insurance underwriter, meaning the company that helps other organizations manage cyber risk had paid an unprecedented ransom to resolve its own attack.

Financial Impact
75K individuals
Records Exposed
$40M ransom paid
May–June 2023
Critical
Zero-Day Exploit
Multi-Sector
May–June 2023

MOVEit Breach 2023: How One Zero-Day Hit 1,000+ Organizations Simultaneously

The MOVEit Transfer mass exploitation in May–June 2023 is the largest single vulnerability exploitation event in documented history by number of affected organizations. The Clop ransomware group exploited a SQL injection zero-day in Progress Software's MOVEit Transfer file sharing platform, compromising over 1,000 organizations and exposing data belonging to tens of millions of individuals in a single coordinated campaign. The victims ranged from Shell and British Airways to the US Department of Energy and the personal data of 101,000 Oregon DMV customers.

MOVEit represents a paradigm shift in ransomware economics: rather than compromising organizations individually, Clop identified a single vulnerability in widely-deployed managed file transfer software and simultaneously exploited every internet-accessible instance in the world. The economics of mass exploitation — one vulnerability, thousands of victims, thousands of potential ransom demands — are fundamentally more efficient than targeted attack campaigns.

Financial Impact
Tens of millions
Records Exposed
$1B+ aggregate
2023-10-01
High
Credential Stuffing
Consumer Tech
2023-10-01

23andMe Data Breach 2023: Genetic Data, DNA Relatives Exposed

The 23andMe data breach of October 2023 exposed the genetic data, ancestry information, and personal details of approximately 6.9 million users through credential stuffing against user accounts whose login credentials had been compromised in unrelated breaches. The breach was uniquely significant because the data exposed included not just the account holder's information but genetic relatives' information surfaced through 23andMe's DNA Relatives feature.

Financial Impact
6.9M users
Records Exposed
Bankruptcy 2025
2021-05-30
High
Ransomware
Food & Agriculture
2021-05-30

JBS Foods Ransomware 2021: $11M Ransom, US Beef Supply Threatened

The JBS Foods ransomware attack of May 2021 shut down the largest beef producer in the world for several days, demonstrating that ransomware against the food and agriculture sector can threaten national food supply chains and force government emergency responses — the same playbook that Colonial Pipeline established the month before had a direct sequel in food production.

Financial Impact
N/A — ops disruption
Records Exposed
$11M ransom paid
2018-03-01T00:00:00.000Z
High
Data Harvesting
Social Media
2018-03-01T00:00:00.000Z

Facebook-Cambridge Analytica 2018

The Facebook-Cambridge Analytica scandal of 2018 was not a traditional data breach — no systems were hacked. Instead, it was the most consequential case of unauthorized data harvesting through permitted API access, demonstrating that compliance with platform terms of service is not equivalent to adequate data protection.

Financial Impact
87M profiles
Records Exposed
$5B FTC fine
2024-04-01T00:00:00.000Z
Critical
Info-Stealer Credential Theft / Cloud Platform Attack
Technology / Cloud Data (impact: Retail, Telecommunications, Financial Services)
2024-04-01T00:00:00.000Z

Snowflake Customer Breach Campaign 2024

The Snowflake customer breach campaign of 2024 was the most consequential cloud data warehouse attack in history. A threat actor group used credentials stolen by information-stealing malware to access dozens of major companies' Snowflake environments — including AT&T, Ticketmaster, Advance Auto Parts, and Santander Bank — resulting in the theft of data affecting hundreds of millions of individuals across multiple high-profile incidents.

Financial Impact
Records Exposed