Breach Library
Anatomy of the most significant cybersecurity breaches of the past decade — MGM, Change Healthcare, SolarWinds, MOVEit, and 50+ more. Attack vectors, financial impact, and the specific lessons that protect PE portfolios.
Adobe Data Breach 2026: 13 Million Customer Records Exposed via ShinyHunters
In April 2026, the ShinyHunters threat group claimed responsibility for a major breach of Adobe's systems, exposing 13 million customer support tickets, 15,000 employee records, internal company documents, and submissions from Adobe's bug bounty program. The breach was accessed via a third-party entry point — AppsFlyer, a marketing analytics partner — making it the most significant enterprise software supply chain breach of 2026 so far.
All Breaches
Microsoft Token Theft Campaign 2026: 35,000 Users Across 13,000 Organizations Targeted in 48 Hours
Between April 14 and 16, 2026, Microsoft tracked a large-scale credential theft campaign that targeted more than 35,000 users across 13,000+ organizations in 26 countries. The attackers used a sophisticated combination of code-of-conduct-themed phishing lures and legitimate email services to direct targets to attacker-controlled domains, where they harvested authentication tokens. The campaign was notable for its scale, precision, and the sophistication of its evasion — using trusted email infrastructure to bypass email security controls and legitimate-looking pages to steal tokens rather than passwords.
Healthcare and life sciences organizations (19% of targets) were the primary sector targeted, followed by financial services and technology companies. 92% of targets were located in the United States.
European Commission Ivanti Breach 2026: Staff Data Exposed in Government MDM Attack
The European Commission disclosed in February 2026 that a cyberattack had compromised staff data through its mobile device management infrastructure — exploiting a vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that had been disclosed by Ivanti in January 2026. The Commission contained the incident within nine hours but confirmed that staff names and mobile phone numbers may have been accessed by the attackers. The attack was part of a broader wave of Ivanti EPMM exploitation that affected government agencies across Europe and the United States in early 2026.
Blue Shield of California 2025: 4.7 Million Members' Health Data Shared with Google Ads for 3 Years
Blue Shield of California disclosed in April 2025 that it had been sharing protected health information for approximately 4.7 million members with Google Ads and Google Analytics for nearly three years, from April 2021 through January 2024. The disclosure was not triggered by an external breach — it was triggered by an internal review that discovered the organization had configured its website analytics in a manner that transmitted health information to Google's advertising platforms without member consent or HIPAA authorization.
Blue Shield is one of the largest health insurers in the United States. The scale of inadvertent health data disclosure — 4.7 million members, three years, to an advertising platform — makes this one of the most significant HIPAA violations in the history of the regulation.
Bybit Exchange Hack 2025: North Korea Steals $1.5 Billion in the Largest Crypto Theft in History
On February 21, 2025, the Lazarus Group — North Korea's premier cybercrime unit — stole approximately $1.5 billion in Ethereum from Bybit, one of the world's largest cryptocurrency exchanges. It was the single largest theft in the history of cryptocurrency, and it was executed not through a vulnerability in Bybit's own systems but through a compromise of Safe{Wallet}, the third-party multi-signature wallet infrastructure Bybit used to manage cold storage transfers. The attack demonstrated that supply chain compromise of wallet infrastructure represents an existential risk for any cryptocurrency exchange, regardless of the security of the exchange's own systems.
Match Group / Tinder Breach 2026: ShinyHunters Hits Dating Apps via Third-Party Analytics
In early 2026, the ShinyHunters threat group — which had breached Match Group's family of dating applications including Tinder, Hinge, and OkCupid — claimed to possess millions of user records and began attempting extortion. Match Group characterized the incident as a security incident under investigation, consistent with the group's typical handling of breach disclosures. ShinyHunters cited AppsFlyer — a third-party mobile analytics provider — as the entry point, mirroring the same approach used in the Adobe breach of April 2026.
The Match Group breach demonstrates ShinyHunters' systematic targeting of high-value consumer data platforms via shared third-party analytics infrastructure.
PowerSchool Data Breach 2025: 60 Million Student Records and the K-12 SIS Vulnerability
The PowerSchool breach of December 2024–January 2025 exposed the personal records of an estimated 60 million students and 10 million teachers across 18,000 school districts in the United States and Canada — making it the largest breach of K-12 education data in history. The attacker accessed PowerSchool's Student Information System (SIS) — the administrative platform that tracks student enrollment, grades, attendance, and sensitive family information — using compromised credentials on a customer support portal.
What made the breach particularly damaging was the subsequent extortion campaign: after school districts paid ransom to prevent data publication, PowerSchool's threat actor returned with fresh extortion demands directly against individual districts months later, demonstrating that ransom payments had not produced data deletion.
Oracle Health Breach 2025: Patient Data Exposed During Cerner Cloud Migration
In early 2025, Oracle Health — the healthcare division of Oracle formed through its $28 billion acquisition of Cerner — disclosed a breach of its legacy Cerner data migration servers that exposed patient health data from dozens of US hospital systems. The breach highlighted a specific and underappreciated risk in major M&A transactions: the security posture of legacy systems during data migration is often significantly weaker than either the acquiring company's production environment or the target's pre-acquisition systems.
Stryker Cyberattack 2026: Iranian Hacktivists Wipe Medical Device Giant in Real Time
In March 2026, Stryker Corporation — one of the world's largest medical device companies — was hit by a cyberattack carried out by Handala, an Iran-linked hacktivist group. Unlike ransomware attacks focused on financial gain, the attack appeared designed for maximum operational disruption and public embarrassment: employees watched in real time as company computers were remotely wiped, forcing offices across the globe to shut down while security teams worked to contain the damage.
Stryker confirmed system outages and launched an investigation with third-party cybersecurity experts. The attack illustrated the growing threat of Iranian hacktivist groups targeting Western healthcare and defense-adjacent companies as geopolitical tools.
Salt Typhoon 2024–2025: China's 8-Month Infiltration of US Telecom Wiretap Infrastructure
Salt Typhoon — a Chinese state-sponsored APT group — infiltrated the systems of at least nine major US telecommunications carriers over an eight-month period, gaining access to the lawful intercept infrastructure that US law enforcement uses to conduct court-authorized wiretaps. The attackers didn't steal financial data or encrypt systems for ransom. They accessed the list of individuals under federal surveillance — providing Chinese intelligence with a real-time window into who the US government was watching, and why.
The Salt Typhoon breach is arguably the most consequential intelligence compromise in a decade. It wasn't discovered by any of the carriers. It was discovered by the FBI.
Adobe Data Breach 2026: 13 Million Customer Records Exposed via ShinyHunters
In April 2026, the ShinyHunters threat group claimed responsibility for a major breach of Adobe's systems, exposing 13 million customer support tickets, 15,000 employee records, internal company documents, and submissions from Adobe's bug bounty program. The breach was accessed via a third-party entry point — AppsFlyer, a marketing analytics partner — making it the most significant enterprise software supply chain breach of 2026 so far.
SolarWinds CISO Charges 2023: Individual Executive Accountability for Cybersecurity Fraud
The SEC's 2023 enforcement action against SolarWinds Corporation and its Chief Information Security Officer Timothy Brown was the most consequential individual accountability action in cybersecurity history — the first time the SEC charged a CISO personally with securities fraud and internal controls violations related to cybersecurity disclosures. The charges alleged that SolarWinds and Brown had known about significant security vulnerabilities and misrepresented the company's security posture to investors in the years before the SUNBURST breach was discovered.
Royal / BlackSuit Ransomware Group Profile (Conti Successor)
The Royal and BlackSuit ransomware operations represent the evolution of Conti ransomware through a succession of rebranding and restructuring that followed Conti's February 2022 dissolution. Royal emerged in mid-2022 as a sophisticated, highly targeted ransomware operation that explicitly avoided the RaaS model, operating as a private group with handpicked team members. In 2023, Royal rebranded as BlackSuit, continuing operations under new branding while maintaining the same core team and techniques.
Business Email Compromise (BEC): The $50 Billion Silent Threat
Business Email Compromise (BEC) is the single largest category of cybercrime financial loss, generating more than $50 billion in global victim losses since 2013 and consistently outpacing ransomware as the highest-dollar cybercrime category in FBI IC3 reporting. Unlike ransomware, BEC requires no malware, no technical exploitation, and no data breach — only a convincing impersonation of a trusted party combined with a wire transfer request or payment redirection.
Capital One Data Breach 2019
The Capital One breach of 2019 exposed 106 million customers' financial applications through a misconfigured Web Application Firewall in Amazon Web Services. It became the defining case for cloud security misconfiguration liability and resulted in the first major CISO-level criminal indictment related to a cloud breach at a different organization.
Scattered Spider / UNC3944 Group Profile
Scattered Spider — also known as UNC3944, Muddled Libra, and Octo Tempest — is a loosely organized threat group of primarily English-speaking young adults who executed some of the most financially damaging social engineering attacks in enterprise history during 2022–2023. The group's targets included MGM Resorts, Caesars Entertainment, Okta, Twilio, Cloudflare, and dozens of others. Their weapon of choice was not malware but the telephone.
AT&T Data Breach 2024
The AT&T data breach of 2024 was actually two separate incidents affecting nearly 110 million AT&T customers. The first, in March 2024, involved data from a 2021 database that had circulated on the dark web. The second, in July 2024, revealed that records of virtually all AT&T customer calls and texts from 2022 had been stolen from AT&T's Snowflake cloud environment — one of the most consequential telecom breaches in US history.
Conti Ransomware Group Profile
The Conti ransomware group was the most destructive ransomware operation of 2020 and 2021, responsible for hundreds of millions in ransom payments and the functional destruction of Ireland's National Health Service. A unique window into Conti's operations was opened in February 2022 when a Ukrainian security researcher, following Russia's invasion of Ukraine, leaked over 160,000 internal Conti chat messages and the group's complete ransomware source code — the most detailed inside view of a major ransomware operation ever made public.
National Public Data Breach 2024
The National Public Data breach of 2024 was one of the largest data breaches in US history by scope, exposing Social Security numbers, addresses, and personal information for approximately 2.9 billion individuals from a data aggregation company most people had never heard of. The breach illustrated the privacy risks of the data broker industry and the compounding harm of data aggregated without the knowledge or consent of the individuals whose information was compiled.
SEC Cybersecurity Disclosure Rule 2023: What Every Public Company Must Know
The SEC's cybersecurity disclosure rules, effective December 2023, require public companies to disclose material cybersecurity incidents within 4 business days of determining materiality, and to provide annual disclosures about cybersecurity risk management and governance. The rules fundamentally changed the relationship between cybersecurity and public company disclosure obligations — making CISO decisions about incident response part of the SEC's regulatory purview for the first time.
LoanDepot Ransomware 2024: 16.9 Million Records, SEC Disclosure Test
The LoanDepot ransomware attack of January 2024 exposed the sensitive personal and financial information of approximately 16.9 million customers of one of the largest US nonbank mortgage lenders. The attack disrupted LoanDepot's online services, loan processing systems, and customer-facing platforms for weeks, demonstrating the operational and reputational consequences of ransomware against financial services companies processing sensitive consumer mortgage data.
MailChimp Breach 2023: Third Breach in Eight Months, Crypto Companies Targeted
The MailChimp breach of January 2023 was the third breach of the email marketing platform in eight months, with an attacker using social engineering against a MailChimp employee to gain access to an internal tool used to support customer accounts — and then using that access to export email lists for cryptocurrency and Web3 companies specifically targeted for downstream phishing campaigns against their subscribers.
Norton LifeLock Credential Stuffing 2023
The Norton LifeLock credential stuffing attack of January 2023 affected approximately 925,000 customer accounts, with attackers using credentials stolen from other breached services to attempt logins against Norton accounts. The breach was notable not only for its scale but for what attackers were trying to reach: Norton Password Manager vaults containing every stored password of affected users.
Log4Shell 2021: The Vulnerability That Broke the Internet for a Week
The Log4Shell vulnerability disclosed on December 9, 2021 was the most significant software vulnerability in a decade — a critical remote code execution flaw in Log4j, a ubiquitous Java logging library embedded in thousands of enterprise applications. Within hours of disclosure, attackers were exploiting it at scale.
Uber Breach 2022
The Uber breach of 2022 is the definitive case study for social engineering and MFA bypass in the enterprise. Attackers with no sophisticated technical capability breached Uber's entire corporate infrastructure through a combination of purchased credentials, MFA fatigue, and vishing — then exfiltrated data from Uber's internal security tools, cloud environments, and code repositories.
Boeing LockBit Ransomware 2023: $200M Demand, Defense Contractor Breach
The Boeing LockBit attack of October 2023 was one of the highest-profile ransomware incidents of the year, with the LockBit ransomware group initially claiming a $200 million ransom demand against one of the world's largest defense contractors before publishing stolen data when Boeing did not pay. The attack targeted Boeing's global services and parts distribution business rather than aircraft manufacturing or defense systems.
Rackspace Ransomware 2022: Hosted Exchange Shutdown, 30,000 Customers Down
The Rackspace Hosted Exchange ransomware attack of December 2022 took down the hosted email service used by thousands of small and mid-market businesses over the holiday period, demonstrating the cascading impact when a managed service provider's core infrastructure is hit with ransomware and the unique legal and contractual challenges when customers' own data is compromised through their service provider.
GoAnywhere MFT Zero-Day 2023
In January-February 2023, the Cl0p ransomware group exploited a zero-day vulnerability in Fortra's GoAnywhere Managed File Transfer software, compromising over 130 organizations in a campaign that directly preceded and presaged their MOVEit attack three months later. The GoAnywhere and MOVEit attacks together established Cl0p's strategy of mass exploitation of managed file transfer vulnerabilities as a core business model.
Marriott-Starwood Data Breach 2018
The Marriott-Starwood breach is the canonical example of inherited M&A cyber risk. Marriott acquired Starwood Hotels in 2016. Starwood's reservation system had been compromised by Chinese threat actors since 2014. Marriott inherited the breach, inherited the liability, and discovered it two years after acquisition close — at a total cost exceeding $100 million and affecting 500 million guests.
Kronos/UKG Ransomware 2021: Payroll Down for Thousands of Employers Over the Holidays
The Kronos/UKG ransomware attack of December 2021 disrupted payroll processing for thousands of employers across the United States during the holiday period, preventing companies from paying their employees accurately and on time through the HR systems they depended on — demonstrating that HR technology ransomware attacks can have direct employee compensation consequences across an entire customer ecosystem.
Microsoft Exchange HAFNIUM Zero-Day 2021
Operation Hafnium, disclosed in March 2021, involved Chinese state-sponsored actors exploiting four zero-day vulnerabilities in Microsoft Exchange Server — affecting hundreds of thousands of organizations globally. The attack enabled complete compromise of any organization running on-premises Exchange, including the installation of web shells that persisted even after patching. It prompted the first-ever White House attribution of a cyberattack to the Chinese Ministry of State Security.
Kaseya VSA Ransomware 2021: 1,500 Businesses Hit Through One MSP Tool
The Kaseya VSA ransomware attack of July 4, 2021 was the most impactful ransomware supply chain attack in history — exploiting a zero-day vulnerability in Kaseya's remote monitoring and management software to push REvil ransomware to approximately 1,500 businesses through their managed service providers, on the Independence Day holiday weekend when IT staff coverage was minimal.
Frontier Communications Ransomware 2024: 750K Customers, RansomHub
The Frontier Communications ransomware attack of April 2024 disrupted operations at one of the largest US internet service providers, with the RansomHub ransomware group stealing sensitive data on approximately 750,000 customers including Social Security numbers. The attack demonstrated that internet infrastructure companies are high-value ransomware targets whose compromise can have cascading effects on the customers and businesses that depend on their connectivity services.
T-Mobile Breach 2023: 37 Million Records and a Pattern That Won't Stop
The T-Mobile data breach disclosed in January 2023 — the ninth significant T-Mobile security incident since 2018 — exposed the account information of approximately 37 million customers. The breach occurred through an API that was accessible without authentication, and the attacker exploited it for approximately six weeks before T-Mobile detected the unauthorized access. By then, customer names, billing addresses, emails, phone numbers, and account numbers had been exfiltrated at scale.
T-Mobile's breach pattern — nine incidents in five years, each disclosing a different security gap — illustrates a systemic problem that goes beyond any individual vulnerability. It represents an organization that has repeatedly failed to translate breach lessons into structural security improvement. For executive and board audiences, the T-Mobile pattern is the case study in security culture deficit, not technology deficit.
CDK Global Breach 2024: When Your Software Vendor's Ransomware Shuts Down 15,000 Dealerships
The CDK Global ransomware attack in June 2024 crippled car dealerships across North America for nearly two weeks, preventing tens of thousands of dealers from processing sales, accessing vehicle inventory, or managing service operations. CDK Global provides dealer management software (DMS) to approximately 15,000 North American automotive dealerships. When ransomware actors took CDK's systems offline, those 15,000 dealerships lost the digital infrastructure running their entire operations — from inventory management and finance and insurance (F&I) processing to parts ordering and service scheduling.
CDK Global is particularly relevant for private equity audiences because the automotive dealership sector is a significant PE investment category, and because the incident illustrates how a single software vendor's security failure can simultaneously disrupt thousands of small and mid-market businesses that represent portfolio companies or acquisition targets.
MGM Resorts 2023 Breach: A $100M Lesson in Help Desk Security
The September 2023 ransomware attack on MGM Resorts International is the most financially damaging and strategically instructive cyberattack against a US enterprise in recent history. A single 10-minute phone call to MGM's IT help desk — preceded by a LinkedIn search — triggered a chain of events that cost the company more than $100 million, took slot machines offline for days, locked hotel room keys, and disrupted reservations across 30+ properties. The perpetrators were members of Scattered Spider, a loosely organized group of English-speaking threat actors ranging in age from 19 to 24. They used no zero-day exploits. They deployed no custom malware. They made a phone call.
The MGM breach is important not because it is unique but because it is representative — of the social engineering techniques now being used at scale against mid-market enterprises, of the inadequacy of MFA as a complete identity control, and of the catastrophic financial consequences that follow when social engineering succeeds against an organization without compensating controls.
Caesars Entertainment Breach 2023: The $15M Ransom That Taught Us Nothing New
Caesars Entertainment paid a $15 million ransom to Scattered Spider in September 2023 — quietly, discreetly, and without the operational disruption that characterized the simultaneous MGM breach. The Caesars payment is significant not primarily as a ransomware event but as a data point in the economics of extortion: paying the ransom is sometimes the rational financial decision, does not prevent data exposure, and does not prevent the attacker from claiming success and applying the same technique to the next target.
The Caesars breach also provides the clearest documented example of the Scattered Spider identity attack methodology in action against an organization that chose to pay rather than resist — offering a useful comparison point against MGM, which did not pay and suffered operational disruption, to evaluate the actual consequences of each response strategy.
Yahoo Data Breaches 2013 and 2016
The Yahoo breaches of 2013 and 2016 represent the largest data breaches in internet history by volume, exposing credentials for every Yahoo account in existence. The 2013 breach — 3 billion accounts — was not disclosed until 2016. The 2016 breach — 500 million accounts — was disclosed during Verizon's acquisition of Yahoo, triggering the first major demonstration of cyber breach impact on M&A deal value.
Target Corporation Data Breach 2013
The Target data breach of 2013 remains one of the most consequential retail cyberattacks in history, exposing 40 million payment cards and 70 million customer records during the peak holiday shopping season. It fundamentally changed how corporations, boards, and regulators think about third-party vendor risk and network segmentation.
Change Healthcare Breach 2024: The $872M Ransomware Attack That Broke US Healthcare
On February 21, 2024, Change Healthcare — a UnitedHealth Group subsidiary that processes approximately 40% of all US healthcare claims — suffered a ransomware attack that took its payment processing infrastructure offline for weeks, disrupting care delivery across hospitals, pharmacies, and physician practices nationwide. The financial impact to UnitedHealth Group exceeded $872 million in the first quarter alone. The human impact — delayed prescriptions, disrupted billing, deferred procedures — was immeasurable. The technical cause was a single Citrix remote access portal without multi-factor authentication.
Change Healthcare is not primarily important as a ransomware event. It is important as a systemic risk event — a demonstration that a single critical infrastructure company can become a single point of failure for an entire healthcare sector, and that the attack surface protecting that infrastructure may be no more sophisticated than a missing MFA configuration.
ALPHV/BlackCat Ransomware Group Profile
ALPHV/BlackCat was the most technically sophisticated ransomware-as-a-service operation of 2022-2024, responsible for the Change Healthcare breach, the MGM Resorts attack, and hundreds of other high-profile incidents. The group traced its lineage to DarkSide — the Colonial Pipeline attackers — through the BlackMatter RaaS, establishing BlackCat as the third-generation evolution of one of the most historically significant ransomware operations. The group's 2024 exit scam effectively ended the operation after a $22 million Change Healthcare ransom payment.
SolarWinds Breach 2020: The Supply Chain Attack That Changed Everything
The SolarWinds supply chain attack, disclosed in December 2020, is the most comprehensively documented nation-state cyberattack in history — and the one that most fundamentally changed how security professionals think about supply chain risk, software trust, and the limitations of endpoint security. Russian SVR intelligence unit APT29 (Cozy Bear) compromised SolarWinds' software build pipeline and inserted malicious code into the Orion IT management platform, which was then distributed to approximately 18,000 customers through a legitimate signed software update. Among those 18,000 were the US Treasury Department, the US Department of Homeland Security, the US Department of Commerce, NATO, and dozens of the world's largest technology companies — including Microsoft, Intel, and Cisco.
The attack went undetected for nine months. The detection itself was accidental — FireEye, a cybersecurity firm that was itself a victim, discovered anomalous activity in its own network and traced it to the Orion update.
3CX Supply Chain Attack 2023: One Compromise Enables Another
The 3CX supply chain attack of March 2023 was the first documented case of one supply chain attack being used to enable a second supply chain attack — North Korean Lazarus Group operators compromised a 3CX employee's personal computer through a malicious trading software package, then used that access to trojanize 3CX's legitimate desktop application, which was installed by hundreds of thousands of businesses worldwide.
LastPass Breach 2022: When the Password Manager Gets Breached
The LastPass breach of 2022 is the most instructive data breach in the password security space precisely because it happened to the company that was supposed to be the answer to password security. LastPass stores the master passwords and encrypted password vaults of over 30 million users and 85,000 businesses. When attackers breached LastPass twice in 2022 — once in August, and again in November using data from the first breach — they obtained copies of customer password vaults that, if cracked, would give complete access to every password those customers had ever stored.
The LastPass breach is still unfolding. Cracking efforts against stolen vaults are ongoing. Users who reused their LastPass master password, chose a weak master password, or had weaker encryption parameters due to using LastPass under older settings remain at risk from their 2022 vault copy being cracked years after the breach.
Volt Typhoon 2023: China's Pre-Positioning in US Critical Infrastructure
Volt Typhoon is the designation assigned by Microsoft, CISA, and US intelligence agencies to a Chinese state-sponsored threat actor pre-positioning within US critical infrastructure networks — not to steal data, but to establish persistent access capable of disrupting energy, water, communications, and transportation at a moment of geopolitical conflict. The campaign, disclosed in May 2023, represents a fundamentally different threat from financially motivated cybercrime: patient, stealthy intrusion with a strategic military purpose.
Equifax Data Breach 2017
The Equifax breach of 2017 exposed the personal information of 147 million Americans — including Social Security numbers, birth dates, addresses, and driver's license numbers — making it the most consequential identity data breach in US history. The breach was caused by a known vulnerability for which a patch had been available for two months.
REvil/Sodinokibi Ransomware Group Profile
REvil — also known as Sodinokibi — was the dominant ransomware threat of 2019-2021, responsible for attacks on JBS Foods, Kaseya VSA, Acer, and dozens of other high-profile organizations. The group pioneered aggressive extortion tactics and operated the most professionally organized ransomware-as-a-service platform of its era. REvil was disrupted twice by law enforcement — in mid-2021 and early 2022 — when the US, Russia, and allies coordinated arrests of multiple members.
Twitter Bitcoin Hack 2020: Vishing Compromises Obama, Biden, Gates Accounts
The Twitter breach of July 2020 compromised the accounts of the highest-profile individuals in the world — Barack Obama, Joe Biden, Elon Musk, Bill Gates, Jeff Bezos, Apple, and dozens of others — through a targeted vishing attack on Twitter employees that provided access to internal administrative tools. The attack demonstrated that the most sophisticated social engineering can succeed against even technology-forward organizations with substantial security investment.
Microsoft Storm-0558 2023: Forged Tokens, Government Email Breach
In June 2023, Chinese state-sponsored hackers designated Storm-0558 breached the Microsoft Exchange Online email accounts of US State Department officials, Commerce Secretary Gina Raimondo, and approximately 22 US government organizations — by forging authentication tokens using a stolen Microsoft cryptographic signing key. The breach demonstrated that cloud platform authentication infrastructure itself can be the attack target, with customers having no visibility into or control over platform-level security events.
LockBit Ransomware Group Profile
The LockBit ransomware group was the most prolific and damaging ransomware operation in history, responsible for more confirmed attacks than any other ransomware group across 2022 and 2023. A profile of LockBit's operations provides essential context for understanding the modern ransomware threat landscape, the Ransomware-as-a-Service model, and the law enforcement operations that ultimately disrupted the group in 2024.
Medibank Data Breach 2022
The Medibank breach of 2022 affected all 9.7 million current and former Medibank customers in Australia — the country's largest health insurer — exposing health claims data, diagnoses, and treatment information for the entire customer base. The attackers threatened to publish particularly sensitive health data about individual policyholders including claims related to substance abuse treatment, HIV status, and pregnancy terminations as extortion leverage.
Colonial Pipeline Breach 2021: When Ransomware Shut Down the Eastern Seaboard
The Colonial Pipeline ransomware attack in May 2021 shut down the largest fuel pipeline in the United States for six days, creating fuel shortages across the Eastern Seaboard, triggering a federal emergency declaration, and demonstrating to boards and executives across every sector what operational technology ransomware consequences look like at scale. The $4.4 million ransom paid to DarkSide — most of which was subsequently recovered by the FBI — was a footnote to the operational, regulatory, and reputational consequences of the event.
Colonial Pipeline is the definitive case study for board-level ransomware risk discussion because it translated cybersecurity into supply chain disruption visible to every American who drove a car that week. It moved ransomware from an IT problem to a national security problem in the public consciousness, and it accelerated federal regulatory action on critical infrastructure cybersecurity that continues to shape compliance requirements today.
Twilio Smishing Breach 2022
The Twilio breach of 2022 is the most documented example of smishing as a corporate attack vector. Attackers sent SMS messages to Twilio employees impersonating IT, directing them to phishing pages that stole credentials. The breach cascaded to Twilio customers including Signal and Authy, demonstrating how a communications platform breach amplifies impact across the companies that depend on it.
Ascension Health Ransomware 2024
The Ascension Health ransomware attack of May 2024 was the most disruptive healthcare cyberattack in US history, forcing Ascension — one of the nation's largest nonprofit hospital systems with 140 hospitals across 19 states — to divert ambulances, cancel surgeries, revert to paper records, and take clinical systems offline for weeks. The attack demonstrated in the most consequential terms the patient safety implications of healthcare ransomware.
Okta Breach 2023: When Your Identity Provider Becomes the Attack Vector
The 2023 Okta support system breach is one of the most consequential identity security incidents in enterprise history — not because of what attackers took from Okta, but because of what Okta's position as a universal identity provider made accessible through the breach. Okta serves as the identity and access management backbone for thousands of organizations. When Scattered Spider compromised Okta's customer support system in September 2023, they gained visibility into the identity configurations of Okta's customers — turning a breach of one identity vendor into a supply chain attack on every organization that trusted Okta's support environment.
The downstream victims of the Okta breach — 1Password, BeyondTrust, Cloudflare, and MGM Resorts among them — demonstrate that the blast radius of a compromised identity provider extends far beyond the provider itself.
CNA Financial Ransomware 2021: $40 Million, The Largest Known Ransomware Payment
The CNA Financial ransomware attack of March 2021 resulted in the largest known ransomware payment in history — $40 million paid to the Evil Corp-affiliated Phoenix ransomware group — and raised significant concern because CNA is itself a major cyber insurance underwriter, meaning the company that helps other organizations manage cyber risk had paid an unprecedented ransom to resolve its own attack.
MOVEit Breach 2023: How One Zero-Day Hit 1,000+ Organizations Simultaneously
The MOVEit Transfer mass exploitation in May–June 2023 is the largest single vulnerability exploitation event in documented history by number of affected organizations. The Clop ransomware group exploited a SQL injection zero-day in Progress Software's MOVEit Transfer file sharing platform, compromising over 1,000 organizations and exposing data belonging to tens of millions of individuals in a single coordinated campaign. The victims ranged from Shell and British Airways to the US Department of Energy and the personal data of 101,000 Oregon DMV customers.
MOVEit represents a paradigm shift in ransomware economics: rather than compromising organizations individually, Clop identified a single vulnerability in widely-deployed managed file transfer software and simultaneously exploited every internet-accessible instance in the world. The economics of mass exploitation — one vulnerability, thousands of victims, thousands of potential ransom demands — are fundamentally more efficient than targeted attack campaigns.
23andMe Data Breach 2023: Genetic Data, DNA Relatives Exposed
The 23andMe data breach of October 2023 exposed the genetic data, ancestry information, and personal details of approximately 6.9 million users through credential stuffing against user accounts whose login credentials had been compromised in unrelated breaches. The breach was uniquely significant because the data exposed included not just the account holder's information but genetic relatives' information surfaced through 23andMe's DNA Relatives feature.
JBS Foods Ransomware 2021: $11M Ransom, US Beef Supply Threatened
The JBS Foods ransomware attack of May 2021 shut down the largest beef producer in the world for several days, demonstrating that ransomware against the food and agriculture sector can threaten national food supply chains and force government emergency responses — the same playbook that Colonial Pipeline established the month before had a direct sequel in food production.
Facebook-Cambridge Analytica 2018
The Facebook-Cambridge Analytica scandal of 2018 was not a traditional data breach — no systems were hacked. Instead, it was the most consequential case of unauthorized data harvesting through permitted API access, demonstrating that compliance with platform terms of service is not equivalent to adequate data protection.
Snowflake Customer Breach Campaign 2024
The Snowflake customer breach campaign of 2024 was the most consequential cloud data warehouse attack in history. A threat actor group used credentials stolen by information-stealing malware to access dozens of major companies' Snowflake environments — including AT&T, Ticketmaster, Advance Auto Parts, and Santander Bank — resulting in the theft of data affecting hundreds of millions of individuals across multiple high-profile incidents.
.png)