The 35 Most Notorious Hacks History | Indusface Blog (2024)

Table of Contents
Broken Access Control 1. MGM Resort Breach(2023) 2. First American Financial Corp Data Leak (2019) 3. Quora Data Breach (2018) 4. Cambridge Analytica Scandal (2018) 5. Marriott International (2018) 6. The University of California, Los Angeles (UCLA) Data Breach (2014) 7. Target Data Breach (2013) Cryptographic Failures / Sensitive Data Exposure 8. Twitter Breach (2022) 9. Exactis (2018) 10. Facebook Data Breach (2019) 11. The Yahoo Hacks (2013 & 2014) Injection Attacks 12. Cl0p Gang Exploits Zero-Day in MOVEit Transfer App (2023) 13. Asia Pacific Websites Hit by GambleForce (2023) 14. Kaseya Ransomware Attack (2021) 15. WooCommerce Leak (2021) 16. The Heartland Payment Systems Hack (2008) 17. Equifax Data Breach (2017) Security Misconfigurations 18. Microsoft Teams Outage (2023) Vulnerable and Outdated Components 19. T-Mobile API Breach (2023) 20. Colonial Pipeline Ransomware Attack (2021) 21. JBS Ransomware Attack (2021) 22. Strava API Breach (2018) Identification and Authentication Failures 23. Sharp HealthCare Cyberattack (2023) 24. Okta’s Customer Data Support Breach (2023) 25. Norton LifeLock Stuffing Attack (2022) 26. LinkedIn API Breach (2021) 27. The iCloud Celebrity Hacks (2014) Security Logging and Monitoring Failures 28. SolarWinds Supply Chain Attack (2020) Server Side Request Forgery (SSRF) 29. Microsoft Exchange Server Vulnerability (2021) 30. Capital One Breach (2019) Lack of Resources & Rate Limiting 31. Bandwidth.com(2021) 32. GitHub (2018 and 2015) 33. Dyn (2016) 34. BBC (2015) 35. SpamHaus (2013) FAQs

Hacks and data leaks have affected many major players in recent years, including AT&T Vendor(9 Million accounts), T-Mobile (37 Million accounts), JD Sports(10 Million), MyDeal (2.2Million), Dropbox (nearly 69 million accounts), Flagstar bank (1.5 Million) and eBay (145 million).

Those were bad. But not the worst. What are the most notorious hacks in history? They’re subject to debate, but these 27 attacks categorized under OWASP Top 10 would be strong candidates for the title.

Broken Access Control

The 35 Most Notorious Hacks History | Indusface Blog (1)

1. MGM Resort Breach(2023)

MGM Resorts International suffered a breach orchestrated by the hacking group Scattered Spider, leading to a system outage for the $14 billion gaming giant. Researchers have connected ALPHV/Blackcat/Scattered Spider ransomware groups to attacks on MGM, with ALPHV/Blackcat openly claiming responsibility.

The group, boasting persistency in the network with super administrator privileges, deployed ransomware after locking out MGM’s network, indicating extensive visibility and implanted backdoors. Scattered Spider claimed to have exfiltrated data, threatening to expose any PII found unless a significant ransom was paid.

2. First American Financial Corp Data Leak (2019)

The US-based mortgage settlement and real estate financial services company First American Financial Corp faced one of the biggest hacks in history in 2019. Ben Shoval, a real estate developer, had found that approximately 885 million files containing sensitive customer data from 2003 onwards were freely available. He notified the company about the same.

This leak was a result of a human error. In January of that year, the internal team discovered an Insecure Direct Object Reference (IDOR) flaw during a manual pen test. This bug allowed users to access private information using a specific URL and sequentially changing its numbers. And without proper authentication, any user could access any information freely.

3. Quora Data Breach (2018)

100 million (50% of the user base) of Quora users’ data were exposed in one of the biggest hacker attacks in 2018. This occurred because malicious third parties gained unauthorized access to its internal systems.

The breach was discovered on November 30, 2018, and Quora publicly announced the incident on December 3, 2018.

Quora officials have acknowledged the discovery of unauthorized access, and their CEO, Adam D’Angelo, has declared that they have determined the root cause and implemented corrective actions.

According to Quora, the information that was compromised included:

  • Account information, such as usernames and email addresses
  • Encrypted passwords
  • Data imported from linked networks, such as Facebook and Twitter

Quora said it had taken immediate action to investigate the incident and notified law enforcement authorities. The company also said that it had reset the passwords of affected users and had logged them out of their accounts.

The Quora data breach highlights the importance of strong password hygiene and the need for users to use unique passwords for each online account. It also underscores the need for companies to implement robust security measures to protect their users’ personal information.

4. Cambridge Analytica Scandal (2018)

In 2018 it was discovered that political consulting firm Cambridge Analytica had obtained access to the personal information of millions of Facebook users without their consent. This was made possible by a broken access control vulnerability in Facebook’s application programming interface (API) that allowed third-party developers to access user data.

The scandal brought to light the issue of data privacy and the need for stricter access control measures to protect user data. Facebook faced widespread criticism for its role in the breach and was fined $5 billion by the U.S. Federal Trade Commission for violating users’ privacy.

5. Marriott International (2018)

One of the largest hacks in history was the Marriott International data breach in 2018 that exposed 500 million guest records, including passport details, credit cards, arrival-departure dates, PII, etc.

Attackers accessed Marriott’s guest data through email spoofing to spread malware into the vulnerable guest reservation system using legacy I.T. infrastructure. Britain’s Information Commissioner’s Office (ICO) fined the company 18.4 million pounds for GDPR violations.

Marriott discovered they had been hacked after a security tool flagged an unusual database query. Despite the query with administrator privileges, an investigation showed that the assigned account owner did not make it, indicating that someone else had taken control of the account.

6. The University of California, Los Angeles (UCLA) Data Breach (2014)

In 2014, UCLA suffered a data breach that exposed the personal information of approximately 4.5 million individuals. The breach was caused by a vulnerability in a database that allowed the attacker to gain unauthorized access to sensitive data.

The data compromised in the breach included names, Social Security numbers, dates of birth, addresses, and medical information of patients and staff associated with the university’s health system.

The University of California, Los Angeles (UCLA) Data Breach (2014)

In 2014, UCLA suffered a data breach that exposed the personal information of approximately 4.5 million individuals. The breach was caused by a vulnerability in a database that allowed the attacker to gain unauthorized access to sensitive data.

Following the detection of anomalous behavior on one of its computer servers in October, Atkinson, interim president of the UCLA Hospital System, stated that UCLA Health launched an inquiry with the assistance of the FBI. It was determined that the hackers infiltrated the hospital’s computer networks containing patient information. This unauthorized access could have commenced as early as September 2014, with some patient data dating back to 1990.

The data compromised in the breach included names, Social Security numbers, dates of birth, addresses, and medical information of patients and staff associated with the university’s health system.

7. Target Data Breach (2013)

Target suffered a data breach that exposed the credit and debit card information of approximately 40 million customers. The breach was caused by a misconfigured network segment allowing the attacker to access Target’s payment system.

The security misconfiguration that allowed the breach to occur was related to the access controls and security protocols used in Target’s payment processing system. The system was designed to segregate the network traffic of different departments and systems within Target, but this segregation was not properly implemented. As a result, the hackers could access the payment processing system through a vendor portal that had access to the system but was not properly secured.

The significant security breach at Target was a result of multiple factors, such as the absence of adequate system protection, making them susceptible to phishing attacks. In addition, prior warnings were not taken seriously.

Cryptographic Failures / Sensitive Data Exposure

The 35 Most Notorious Hacks History | Indusface Blog (2)

8. Twitter Breach (2022)

The Twitter APIs faced a classic case of excessive data exposure in 2022 when attackers sold 5.4 Million users’ information on a hacking forum. In January 2023, attackers further scraped 400 Million users’ public and private data, selling it on the dark web.

The excessive data exposure flaw enabled the attacker to check whether email ids and phone numbers were linked to Twitter accounts. This breach left several users, including high-profile users like celebrities, politicians, and activists, exposed to social engineering, targeted phishing attacks, and identity thefts, among others.

9. Exactis (2018)

The Exactis data breach of 2018 is yet another biggest hack in history. Exactis is a marketing and data aggregation company that stores customer data across various variables to target ads.

It had stored nearly 2TB of customer data on a publicly accessible cloud server. This left data of 340 million customers, including 400 variables of personal characteristics, exposed to the public.

10. Facebook Data Breach (2019)

The social media giant Facebook faced a massive data breach in 2019 that exposed over 533 Million Facebook users’ data. Sensitive personal information such as location, phone numbers, user IDs, account names, etc., were stolen and posted in hacking forums. The exposed data was scraped from two datasets from third-party Facebook apps.

The breach occurred because Facebook was storing user passwords in plain text, meaning the passwords were not encrypted. This made it easy for hackers to access user accounts by guessing or cracking passwords.

11. The Yahoo Hacks (2013 & 2014)

Poor Yahoo. At one time, the king of search engines, it’s fallen on hard times lately. People are abandoning it in droves for the likes of Google, Bing, and others. Its cause wasn’t helped much when in 2016, it revealed major hacks that had occurred years before.

Over one billion (yes, billion) Yahoo accounts were compromised in 2013, including names, DOBs, security questions, contact details, and passwords.

A further 500 million accounts were hacked in 2014. How many accounts overlap with the first hack is unknown, so the number of affected accounts is unclear. But it’s a lot.

It’s the largest hack of a single entity in the history of the internet. That’s not a great claim to fame for a company trying to woo users back to its flock.

And although Yahoo is much less relevant than it used to be, the tendency of people to reuse passwords and security questions has serious implications. If you had a Yahoo email account in 2009 but switched to Gmail with the same password, the hack means someone could access your current email account.

Reports indicate that the encryption used to protect the data was outdated and could be broken with ease.

Injection Attacks

The 35 Most Notorious Hacks History | Indusface Blog (3)

12. Cl0p Gang Exploits Zero-Day in MOVEit Transfer App (2023)

In a significant cyberattack, the Cl0p hacking group targeted Progress Software’s MOVEit Transfer app with a zero-day SQL injection vulnerability on May 27. Over 1,000 organizations and 60 million individuals worldwide were impacted, including high-profile victims like British Airways and the BBC.

Progress Software addressed the issue (CVE-2023-34362) on May 31, but reports of data breaches continued. CISA flagged the vulnerability, emphasizing the potential for extensive corporate data exposure and future extortion threats. Explore the AppTrana’s threat coverage for Moveit Transfer SQL vulnerabilities.

13. Asia Pacific Websites Hit by GambleForce (2023)

A cybersecurity company called Group-IB has identified a new threat actor named GambleForce. This group has been active since September 2023. It has targeted over 20 websites related to gambling, government, retail, and travel websites in Australia, China, India, Indonesia, the Philippines, South Korea, Thailand, and Brazil.

GambleForce uses basic but effective techniques like SQL injections and exploiting vulnerable website systems to steal vital information, including user credentials. Check out the detailed blog on how to stop SQL injection attacks.

Between September and December 2023, they successfully attacked 24 organizations in 8 different countries, compromising six websites in Australia (travel), Indonesia (travel and retail), the Philippines (government), and South Korea (gambling).

14. Kaseya Ransomware Attack (2021)

Kaseya is an IT solutions provider for MSP and enterprise clients. The company was a victim of a ransomware attack during the American Independence Day weekend in 2021. The REvil group, known for their ransomware attacks, claimed responsibility for this attack, impacting over 1500 of Kaseya’s clients.

Attackers exploited unpatched SQL vulnerabilities in the company’s VSA servers to carry out this attack. This may not be the biggest attack in terms of size, but it has been a notorious hack in the recent past.

15. WooCommerce Leak (2021)

WooCommerce offers a popular ecommerce plugin for WordPress CMS. In 2021, it was found that several of its plugins, features, and software versions were vulnerable to SQLi, and several attacks occurred as a result. Unpatched flaws in the plugin exposed data on 5 million websites to theft.

16. The Heartland Payment Systems Hack (2008)

The credit card payment processor is one of the world’s largest, processing about 100 Million monthly transactions for Visa, Mastercard, American Express, and Discover.

Its system was compromised in 2008, and an estimated 130 Million customer accounts were accessed, making it one of the largest credit card hacks in history.

An SQL injection attack targeted Heartlands’ computer. The attack manipulated the code of a web script, granting the attackers access to a web login page.

Albert Gonzalez and two Russian hackers placed sniffer programs within the Heartland system. These sniffers intercepted credit card credentials in real time and relayed the data back to them.

The sniffers remained undetected for six months. Gonzalez was already in police custody for two other hacks (Dave & Buster’s and TJX) when the sniffer programs were discovered, and the Heartland investigation began.

He was found guilty in 2010 and sentenced to an unprecedented 20 years in prison.

What makes his crime even more incredible is that Gonzalez had been cooperating with government officials – including the Secret Service – as an informant since 2003.

He hacked and stole over 180 million credit and debit card accounts right under the noses of those authorities tasked with preventing cybercrime.

The attack went unnoticed for several months as it traversed Heartlands’ system, enabling the attackers to obtain enough data to produce physical credit cards with the information coded into the magnetic strip.

17. Equifax Data Breach (2017)

One of the biggest hacks in history is the Equifax data breach that happened in 2017. Equifax, a credit reporting agency, had several security lapses that enabled attackers to access sensitive PII, date of birth, social security numbers, address, driver’s license numbers, etc., of over 143 million customers.

Attackers were able to wreak havoc for 76 days before they were discovered. The company spent USD 1.4 billion in recovery after this data breach.

Equifax used Apache Struts as a web framework, like many Fortune 100 companies, to build its APIs and applications. AnXXE vulnerabilityin the company’s customer complaints web portal made the initial hack possible. The vulnerability in the framework was left unpatched by Equifax’s internal failures.

The attackers made their way through the portal into other servers owing to a lack of proper segmentation. And a flaw in the company’s API enabled attackers to access data and credentials without authenticating themselves.

The attackers encrypted and exfiltrated data to escape detection for months. The non-renewal of an encryption certificate for one of the internal security tools made this possible. It was not until 2019 that the certificate was renewed.

Security Misconfigurations

18. Microsoft Teams Outage (2023)

On June 28, 2023, a significant Microsoft Teams outage occurred due to increased traffic identified by Microsoft in early June. Worldwide users were affected from 10:49 AM to 12:55 PM UTC.

The outage primarily impacted web access and new desktop client sign-ins, while existing and mobile clients remained unaffected. The root cause was an authentication error in a Teams back-end service responsible for configuration settings, causing operational failures.

Regrettably, the service was mistakenly set to require authentication, causing denied configuration requests and operational failures, hindering user access via specified channels.

Vulnerable and Outdated Components

19. T-Mobile API Breach (2023)

On Jan 19, 2023, T-Mobile revealed a security breach affecting around 37 million customers, with unauthorized access to a vulnerable API lasting over six weeks. The breach, starting on November 25th, 2022, exposed names, emails, phone numbers, and birthdates.

With data such as account lines and service plans compromised, prepaid and subscription customers were specifically impacted. The incident underscores the importance of robust API discovery to prevent unauthorized access in a distributed ecosystem.

20. Colonial Pipeline Ransomware Attack (2021)

Colonial Pipeline is an American fuel company that supplies fuel to a large section of the east coast of the US. During the Mother’s Day weekend, attackers unleashed the DarkSide ransomware on the company’s IT systems, taking advantage of the upcoming holiday.

This ransomware brought the entire IT systems of the company to a grinding halt and led to the suspension of pipeline operations for a week. The attackers targeted the billing infrastructure while the existing pumping systems worked fine.

However, the services could not be continued without being able to bill customers. The halting of the operations caused a fuel shortage along the east coast which caused panic buying among retail consumers and rescheduling flights among airline consumers.

Attackers had stolen 100GB of data in this recent major hack in history and demanded a ransom of 75 bitcoins in exchange for the decryption tool. The company had to oblige and pay the ransom to resume operations.

One of the main factors was a lack of proper security controls and protocols within Colonial Pipeline’s IT systems. The hackers could exploit a vulnerability in a legacy VPN (Virtual Private Network) system that had not been properly patched or updated. This vulnerability allowed the attackers to access Colonial Pipeline’s network and deploy the ransomware.

A lack of preparedness and response planning by the Colonial Pipeline also facilitated the attack. The company was initially slow to respond to the attack and struggled to contain the damage and restore operations. This led to significant disruption to the fuel supply chain in the southeastern United States and caused shortages and price increases at gas pumps.

21. JBS Ransomware Attack (2021)

In another holiday cyberattack, global meat supplier JBS was hit by a massive attack during the 2021 Memorial Day weekend. This was one of the biggest hacks in history to affect a player in food production. Attackers managed to get into JBS networks using flaws in the system and threatened to delete files or cause disruption until a cryptocurrency ransom was paid.

This ransomware attack brought its beef and pork slaughterhouses in North America and Australia to a standstill. The company obliged the attackers’ demand and paid USD 11 million ransom to resume its operations.

22. Strava API Breach (2018)

Another major hack in history that exposed global heatmaps of military bases was the Strava API breach in 2018. Strava is a fitness app widely leveraged by military personnel to track their fitness and training routines.

The poorly designed API vulnerabilities exposed the 3 trillion data points, including 1 billion online activities. The attackers were able to collect worldwide user activities from January 2015 to September 2017.

Identification and Authentication Failures

23. Sharp HealthCare Cyberattack (2023)

Sharp HealthCare, San Diego’s most significant health provider, announced that it has begun notifying 62,777 patients that some of their personal information was compromised during a hacking attack on the computers that run its website, sharp.com.

The investigation confirmed that an unauthorized third party successfully breached the web server, powering the sharp.com website briefly on January 12. During that time, the third party downloaded a patient data file.

24. Okta’s Customer Data Support Breach (2023)

Okta reported a security breach, initially affecting 366 customers between January 16 and January 21. The incident led to a $2 billion market cap loss. The breach involved unauthorized access to files in Okta’s customer support system for 134 customers from September 28 to October 17, 2023.

An attacker, compromising an Okta employee, accessed a service account via stored credentials in the employee’s personal Google account, allowing manipulation of customer support cases. Okta later revised the impact, stating that only two customers had their legitimate sessions hijacked using session tokens during the incident.

25. Norton LifeLock Stuffing Attack (2022)

Norton LifeLock warns of a security breach affecting 925,000 customers in a credential-stuffing attack. Personal details like names, phone numbers, and addresses may be exposed, and there’s a potential compromise of Norton Password Manager vaults.

Starting on December 1, 2022, the breach saw a surge in failed login attempts by December 12, 2022. Gen Digital, Norton LifeLock’s parent company, secured all affected accounts by December 22. The attack exploited the common practice of password reuse across multiple accounts, affecting nearly a million active and inactive Norton LifeLock accounts.

Credential stuffing involves exploiting authentication and session management vulnerabilities, precisely what the “Broken Authentication” category addresses.

26. LinkedIn API Breach (2021)

One of history’s most recent and biggest hacks is the LinkedIn API breach of 2021. Personal records of over 700 million users – 92% of the user base – were scraped from the platform and put up for sale in a hacker forum. Why did this happen? Attackers found a publicAPI without authenticationand breached it to scrape content.

Since users’ personal and professional information on this platform was exposed, an advisory was issued to users that the risk of identity theft, targeted phishing attacks, and impersonations are high. Users were advised to remain vigilant.

27. The iCloud Celebrity Hacks (2014)

Accounts – including many A-list celebrities like Jennifer Lawrence and Kate Upton – were accessed on the Apple cloud storage platform in 2014.

Hackers used a combination of brute-force guessing and phishing schemes to gain entry. They sent official-looking emails to account owners with instructions to log in and change their security credentials—Anyone who did so gave the hackers everything they needed to get in and copy files.

Several (seemingly) unconnected individuals were investigated over the next few months. At least two were found guilty and sentenced to between 9-18 months in late 2016 and early 2017 for crimes related to the hack.

Security Logging and Monitoring Failures

The 35 Most Notorious Hacks History | Indusface Blog (4)

28. SolarWinds Supply Chain Attack (2020)

SolarWinds is a network-monitoring software that nuclear labs leverage, intelligence agencies, several Fortune 500 companies, and the Pentagon. The company faced a supply chain attack in 2020 that exposed over 50 million records.

Russian hackers compromised and gained access to SolarWinds’ production environment and introduced malicious code into Orion, a network monitoring product. They sent out a tainted software update which more than 18000 customers installed.

The update installed Trojan horses into client systems and created a backdoor called SUNBURST. Breaking the chain of trust, this supply chain attack wreaked havoc on an undisclosed number of individuals and companies in the software supply chain.

The attackers gained access to SolarWinds’ systems through a combination of tactics, including password guessing, spear-phishing, and exploiting a zero-day vulnerability in the Orion software.

The attackers were able to evade detection for several months by exploiting insufficient logging and monitoring practices.

Server Side Request Forgery (SSRF)

29. Microsoft Exchange Server Vulnerability (2021)

In early 2021, Microsoft Exchange, an email and collaboration system used by many organizations, was targeted by a sophisticated hacking campaign. The attack was attributed to a state-sponsored group based in China.

Microsoft has reported that attackers use all four zero-day vulnerabilities to target organizations running Exchange Server products. One of the flaws, CVE-2021-26855, is a server-side request forgery (SSRF) vulnerability that enables the server to run commands that it should not have been allowed to execute.

The attackers have also used CVE-2021-26857 to run code under the system account on the Exchange server.

The remaining two zero-day flaws, CVE-2021-26858 and CVE-2021-27065, allow the attacker to write files to any part of the server. The attackers have deployed web shells on the compromised server to steal data and perform further malicious actions.

The scope of the attack was significant, with tens of thousands of organizations reportedly affected worldwide. Microsoft issued emergency patches for the affected Exchange servers, but many organizations were slow to apply them, leaving their systems vulnerable to attack.

The attack was highly sophisticated and well-coordinated, and it is believed to have been carried out to steal sensitive data for espionage purposes.

30. Capital One Breach (2019)

The Capital One breach of 2019 exposed customers’ sensitive personal, banking, and financial information, including Canadian social insurance and US social security numbers, loan applications, credit scores, credit limits, account balances, etc. This hack affected 100 million US and 6 million Canadian consumers, making it a major recent breach in history.

The attacker, a former software engineer at Amazon Web Services (AWS), orchestrated this attack and stole 80,000 bank account numbers and 140,000 US social security numbers, apart from exposing sensitive information.

While working at the company, she built a tool to scan misconfigured AWS accounts. Using the tool, she could hack into and access more accounts, including those belonging to Capital One. The breach was made possible due to misconfigured firewalls used by Capital One.

The company was fined USD 80 million by the US Office of the Comptroller of the Currency (OCC) owing to the breach and paid USD 190 million in settling customer lawsuits.

The former AWS employee was arrested and charged with the data breach that involved using a server-side request forgery (SSRF) attack against the AWS infrastructure that stored Capital One’s data.

Lack of Resources & Rate Limiting

The 35 Most Notorious Hacks History | Indusface Blog (5)

31. Bandwidth.com(2021)

A DDoS attack targeted Bandwidth.com, causing a major disruption to their services and portals and resulted in a widespread outage of voice services for their customers.

Although the issue was resolved, the incident highlighted the significant cost of such attacks in terms of financial losses and customer dissatisfaction.

The attack is estimated to have reduced the company’s CPaaS revenue by $9 million to $12 million for FY’21, with a $0.7 million impact in the third quarter. Indirect costs, such as damage to the company’s reputation and missed opportunities, also add to the overall impact.

32. GitHub (2018 and 2015)

This is the biggest known DDoS attack of all times wherein the source-code management/web hosting platform was flooded with a massive influx of traffic at the rate of 1.3TBps (the highest-ever recorded), sending packets at a rate of 126.9 million per second.

The attack was orchestrated using the mem caching method (a database caching system to improve website speed) instead of botnets to spoof GitHub’s IP address and amplify the requests sent to the platform.

The attack lasted 10 minutes and the platform was unavailable for 5 minutes. The attack could be stopped within this timeframe only because the platform had DDoS protection in place. However, recovery took nearly 1 week.

GitHub also faced a politically motivated DDoS attack in 2015 wherein browsers of everyone visiting Baidu (a popular web search platform in China) were infected with JavaScript Code, creating a botnet. The infected systems sent voluminous HTTP requests to the platform, causing downtimes across the GitHub network.

33. Dyn (2016)

Dyn, a major DNS provider, faced the second-largest DDoS attack. It directly disrupted the services of 80 of its clients (causing crashes and downtimes) including corporate heavyweights like Amazon, Netflix, Airbnb, Twitter, PayPal, Reddit, Spotify, Fox News, HBO, New York Times, Visa, etc.

It was orchestrated using a massive botnet of 100,000 IoT devices (created by infecting vulnerable devices with malware called Mirai) to overwhelm the Dyn platform with traffic spikes at the rate of 1.2TBps, lasting nearly 1 day. As a result of this attack, the company lost 14,500 domains and faced a total cost of USD 110 million.

34. BBC (2015)

One of the world’s largest news broadcasters, BBC, faced a series of DDoS attacks by the anti-Islamic State (IS) group, New World Hacking.

The attack brought the BBC’s on-demand TV service, iPlayer services, and radio services to a halt for nearly 3 hours with the significant disruption that lasted the entire day. The attack was orchestrated by leveraging 2 AWS-based DDoS tools to harness unlimited bandwidth and sent requests at the rate of 600 Gbps.

35. SpamHaus (2013)

A leading spam-filtering organization that helped filter 80% of all spam, SpamHaus, was faced with a highly damaging DDoS attack in 2013.

The attackers orchestrated a DNS reflection attack at the rate of 140-300 Gbps and lasted for a week nearly, heavily impacting their email servers, website, DNS IPs, and offline services.

Don’t become another statistic.

The dreaded hack. It can happen to anyone, anywhere, anytime. When will the next “most notorious hacks” happen? Probably sooner than you think.

Phishing schemes. DDoS attacks. Brute-force attacks.

Don’t make an appearance in the next edition of hacker history. Be smart. Be proactive. Be safe and secure.

Stay tuned for more relevant and interesting security updates. Follow Indusface onFacebook,Twitter, andLinkedIn


The 35 Most Notorious Hacks History | Indusface Blog (2024)

FAQs

Who is the most notorious hacker in history? ›

7 of the Most Famous Hackers in History: Would Your Cyber Security Hold Up?
  • Kevin Mitnick. Kevin Mitnick became “the world's most famous hacker” after stealing computer code from tech companies like Nokia and Motorola. ...
  • Anonymous. ...
  • Astra. ...
  • Gary McKinnon. ...
  • Steve Wozniak. ...
  • Gummo. ...
  • Adrian Lamo.

Which country has the best hackers in the world? ›

Here's the List of Countries with the Most Hackers in the World, Where Does Indonesia Rank?
  1. China. China is known as one of the countries with the most hackers in the world. ...
  2. Russia. Russia also ranks high in the number of hackers. ...
  3. United States. ...
  4. India. ...
  5. North Korea. ...
  6. Iran.

What gets hacked the most? ›

Healthcare and pharmaceuticals. In 2023, healthcare organizations experienced the most data breaches since 2009. A key motivator for hackers to breach healthcare institutions is financial gain. Stolen records can also be used to gain unauthorized access to medical data or obtain medication prescriptions.

Which of these hacks resulted in over 100 million credit card numbers being stolen? ›

Capital One. In 2019, Paige Thompson, a former Amazon Web Services (AWS) employee, hacked the Capital One servers and gained access to over 100 million customer account records and credit card applications from as far back as 2005.

Who is the scariest hackers? ›

Here's a look at the top ten most notorious hackers of all time.
  • Kevin Mitnick. A seminal figure in American hacking, Kevin Mitnick got his start as a teen. ...
  • Anonymous. ...
  • Adrian Lamo. ...
  • Albert Gonzalez. ...
  • Matthew Bevan and Richard Pryce. ...
  • Jeanson James Ancheta. ...
  • Michael Calce. ...
  • Kevin Poulsen.

Who is the smartest hacker in history? ›

Kevin Mitnick is one of the most famous black-hat hackers turned ethical hackers in history and is considered by many to be the no 1 hacker in the world. Mitnick's early years were marked by his extraordinary talent for hacking and manipulation of computer systems.

What language do most hackers use? ›

5 Best Programming Languages for Hacking
  1. Python. Exploit Writing: Python is a general-purpose programming language and used extensively for exploit writing in the field of hacking. ...
  2. JavaScript. Web Hacking: Currently, JavaScript is one of the best programming languages for hacking web applications. ...
  3. PHP. ...
  4. SQL. ...
  5. C Programming.
Sep 3, 2024

Who is the king of hackers? ›

Kevin Mitnick: The World's Most Famous Hacker.

Which country gets hacked the most? ›

The UK has the highest density of cyber crime victims per million internet users – 4783. This is followed by the USA with 1494. Russia currently has over 3.5 million breached users – the highest in the world in 2022.

What is the most common hacked password? ›

The 15 Most Common Passwords
  • p@ssw0rd.
  • 12345.
  • Qwerty123.
  • 1q2w3e.
  • 12345678.
  • 111111.
  • 1234567890.
  • Q2w3e4r5t.

Which phone is mostly hacked? ›

Samsung is ranked first on the ranking. Due to their widespread use worldwide, Samsung phones are a popular target for hackers. Hackers are known to exploit flaws in Samsung smartphones readily. The iPhone comes in second.

What age gets hacked the most? ›

Number of cyber crime victims in the United States in 2023, by age group
CharacteristicNumber of victims
Under 20 years18,174
20-29 years62,410
30-39 years88,138
40-49 years84,052
2 more rows
Apr 3, 2024

What is the biggest cyberattack in history? ›

What is the biggest cyberattack in history? The biggest cyberattack in history was arguably the Jonathan James attack on NASA and the U.S. Department of Defense in 1999, especially due to the fact that the attack compromised such trusted, high-profile organizations.

What is the largest bank hack in history? ›

Thirty-five fraudulent instructions were issued by security hackers via the SWIFT network to illegally transfer close to US$1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh Bank, the central bank of Bangladesh.

What is the mother of all breaches? ›

In January 2024, a data leak of 26 billion records was discovered by security researcher Bob Diachenko of Security Discovery. This data breach has quickly come to be known as The Mother Of All Breaches (aka MOAB) due to its size and contains 12 terabytes of user data from 3,876 domains.

Who is the deadliest hacker in history? ›

A perfect example of such a Japanese warrior is one of the deadliest archers in human history and that man was named Nasu No Yoichi, otherwise known as Nasu Suketaka Yoichi.

Who are the top 5 cyber criminals? ›

Computer criminals
NameHandleNationality
Kevin MitnickCondorUnited States
Julian Paul AssangeMendax/profffAustralia
Kevin PoulsenDark DanteUnited States
Chris PileThe Black BaronUnited Kingdom
36 more rows

Who is the powerful hacker? ›

Kevin Mitnick
Other namesThe Condor, The Darkside Hacker
OccupationsInformation technology consultant Author
OrganizationsMitnick Security Consulting Chief Hacking Officer at KnowBe4, Inc
Board member ofKnowBe4
8 more rows

Who was the first hacker? ›

John Draper is considered by many to be one of the first major hackers of the modern era. He gained notoriety for hacking into the phone system in the 1970s, and once claimed he was able to get a call through a secure line to then-President Richard Nixon.

Top Articles
PepperBall LIVE-MAXX™
Robinhood Gold Credit Card waitlist | Robinhood
Lengua With A Tilde Crossword
13 Easy Ways to Get Level 99 in Every Skill on RuneScape (F2P)
The Daily News Leader from Staunton, Virginia
Chelsea player who left on a free is now worth more than Palmer & Caicedo
CKS is only available in the UK | NICE
Jonathan Freeman : "Double homicide in Rowan County leads to arrest" - Bgrnd Search
What happens if I deposit a bounced check?
Amelia Bissoon Wedding
Mile Split Fl
[Birthday Column] Celebrating Sarada's Birthday on 3/31! Looking Back on the Successor to the Uchiha Legacy Who Dreams of Becoming Hokage! | NARUTO OFFICIAL SITE (NARUTO & BORUTO)
Divina Rapsing
Nurse Logic 2.0 Testing And Remediation Advanced Test
X-Chromosom: Aufbau und Funktion
Curver wasmanden kopen? | Lage prijs
EASYfelt Plafondeiland
Football - 2024/2025 Women’s Super League: Preview, schedule and how to watch
Dcf Training Number
Jeffers Funeral Home Obituaries Greeneville Tennessee
Raw Manga 1000
Troy Gamefarm Prices
Cb2 South Coast Plaza
Copper Pint Chaska
Narragansett Bay Cruising - A Complete Guide: Explore Newport, Providence & More
Login.castlebranch.com
TJ Maxx‘s Top 12 Competitors: An Expert Analysis - Marketing Scoop
Viduthalai Movie Download
Skepticalpickle Leak
Halsted Bus Tracker
Delta Rastrear Vuelo
Beaver Saddle Ark
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Marine Forecast Sandy Hook To Manasquan Inlet
Covalen hiring Ai Annotator - Dutch , Finnish, Japanese , Polish , Swedish in Dublin, County Dublin, Ireland | LinkedIn
The Bold And The Beautiful Recaps Soap Central
Space Marine 2 Error Code 4: Connection Lost [Solved]
Myfxbook Historical Data
Bill Manser Net Worth
Coroner Photos Timothy Treadwell
Despacito Justin Bieber Lyrics
Dr Mayy Deadrick Paradise Valley
Login
Blow Dry Bar Boynton Beach
Hampton In And Suites Near Me
News & Events | Pi Recordings
Lesson 5 Homework 4.5 Answer Key
Freightliner Cascadia Clutch Replacement Cost
What Does the Death Card Mean in Tarot?
Thrift Stores In Burlingame Ca
Shad Base Elevator
Códigos SWIFT/BIC para bancos de USA
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 5872

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.