The biggest data breaches, hacks of 2021

The biggest data breaches, hacks of 2021

In 2021, countless brand-new cybersecurity events have actually been tape-recorded– and while cryptocurrency theft and information loss are now prevalent, this year stands apart due to a number of prominent occurrences including ransomware, supply chain attacks, and the exploitation of important vulnerabilities.

The Identity Theft Proving Ground (ITRC) has actually reported a boost of 17% in the variety of taped information breaches throughout 2021 in contrast to2020 An established absence of openness around the disclosure of security events continues to continue– and so this might be a low ball evaluation.

According to IBM, the typical expense of an information breach has actually now reached over $4 million, while Mimecast approximates that the typical ransomware need imposed versus United States business is well over $6 million The world record for the biggest payment, made by an insurance provider this year, now stands at $40 million.

Keep Reading: This is the ideal ransomware victim, according to cybercriminals| Business information breach expense reached record high throughout COVID-19 pandemic|

Specialists have actually alerted that the security concern might continue for several years with the current development and quick exploitation of the Log4j vulnerability. That chooses information leakages, breaches, and theft, too, which are not likely to decrease in number in the future.

Here are a few of the most significant security occurrences, cyberattacks, and information breaches over2021


  • Livecoin: Following a supposed hack in December, cryptocurrency exchange Livecoin knocked its doors shut and left the marketplace in January. The Russian trading post declared that hazard stars had the ability to break in and damage cryptocurrency currency exchange rate worths, resulting in irreversible monetary damage.
  • Microsoft Exchange Server: Among the most harmful cybersecurity occurrences this year was the extensive compromise of Microsoft Exchange servers brought on by a set of zero-day vulnerabilities understood jointly as ProxyLogon. The Redmond giant ended up being mindful of the defects in January and launched emergency situation spots in March; nevertheless, the Hafnium state-sponsored hazard group was signed up with by others for months after in attacks versus unpatched systems. 10s of countless companies are thought to have actually been jeopardized.
  • MeetMindful: The information of over 2 million users of the dating app was supposedly taken and dripped by a hacking group. The info dripped consisted of whatever from complete names to Facebook account tokens.


  • SITA: An IT provider for air travel services around the globe, SITA, stated a security occurrence including SITA Guest Service System servers resulted in the direct exposure of individual, recognizable details coming from airline company travelers. Airline companies associated with the information breach were then needed to connect to their clients.
  • ATFS: A ransomware attack versus payment processor ATFS required several United States cities to send information breach notices. The cybercriminal group which declared obligation, Cuba, declared to have actually taken a wide variety of monetary info on their leakage website.


  • Mimecast: Due to the Solarwinds supply chain attack revealed in December 2020, Mimecast discovered itself as a recipient of a harmful software application upgrade that jeopardized the company’s systems. Mimecast stated that its production grid environment had actually been jeopardized, causing the direct exposure and theft of source code repositories. In addition, Mimecast-issued certificates and some client server connection datasets were likewise captured in the breach.
  • Tether: Tether dealt with an extortion need from cyberattackers who threatened to leakage files online that would “damage the Bitcoin environment.” The need, of roughly $24 million or 500 Bitcoin (BTC), was met deaf ears as the blockchain company declined to pay
  • CNA Financial: CNA Financial staff members were left not able to gain access to business resources and were locked out following a ransomware attack which likewise included the theft of business information. The business apparently paid a $40 million ransom.


  • Facebook: An information dump of details coming from over 550 million Facebook users was released online. Facebook IDs, names, dates of birth, genders, areas, and relationship statuses were consisted of in the logs, of which Facebook– now called Meta– stated was gathered by means of scraping in 2019.


  • Colonial Pipeline: If there was ever an example of how a cyberattack can affect the real world, the cyberattack experienced by Colonial Pipeline is it. The fuel pipeline operator was struck by ransomware, courtesy of DarkSide, causing sustain shipment disturbance and panic purchasing throughout the United States. The business paid a ransom, however the damage was currently done.
  • Omiai: The Japanese dating app stated unapproved entry might have caused the direct exposure of information coming from 1.7 million users.


  • Volkswagen, Audi: The car manufacturers divulged an information breach affecting over 3.3 million consumers and some potential purchasers, most of which were based in the United States. A finger was pointed at an associated supplier as the reason for the breach, thought to be accountable for exposing this information in an unsecured way at “some point” in between August 2019 and Might 2021.
  • JBS U.S.A.: The global meatpacking giant suffered a ransomware attack, credited to the REvil ransomware group, which had such a devastating effect on operations that the business picked to pay an $11 million ransom in return for a decryption secret to bring back access to its systems.


  • UC San Diego Health: UC San Diego Health stated worker e-mail accounts were jeopardized by danger stars, causing a broader event in which client, trainee, and staff member information possibly consisting of medical records, declares details, prescriptions, treatments, Social Security numbers, and more were exposed.
  • The UK trading site for shotguns, rifles, and shooting devices stated that records coming from approximately 100,000 weapon owners, including their names and addresses, had actually been released online As weapon ownership and supply are strictly managed in the UK, this leakage has actually triggered severe personal privacy and individual security issues.

  • Kaseya: A vulnerability in a platform established by IT companies Kaseya was made use of in order to strike an approximated 800 – 1500 consumers, consisting of MSPs.


  • T-Mobile: T-Mobile experienced a yet-another information breach in August. According to reports, the names, addresses, Social Security numbers, motorist’s licenses, IMEI and IMSI numbers, and ID details of clients were jeopardized. It is possible that roughly 50 million existing and potential consumers were affected. A 21- year-old took duty for the hack and declared to have actually taken approximately 106 GB of information from the telecoms giant.
  • Poly Network: Blockchain company Poly Network divulged an Ethereum wise agreement hack utilized to take in excess of $600 million in different cryptocurrencies.
  • Liquid: Over $97 million in cryptocurrency was taken from the Japanese cryptocurrency exchange.


  • Cream Financing: Decentralized financing (DeFi) company Cream Financing reported a loss of $34 million after a vulnerability was made use of in the job’s market system.
  • AP-HP: Paris’ public healthcare facility system, AP-HP, was targeted by cyberattackers who handled to swipe the PII of people who took COVID-19 tests in2020

  • Debt-IN Specialists: The South African financial obligation healing company stated a cyberattack had actually led to a “substantial” occurrence affecting customer and staff member info. PII, consisting of names, contact information, income and work records, and financial obligations owed, are thought of being included.


  • Coinbase: Coinbase sent a letter to approximately 6,000 users after finding a “third-party project to get unapproved access to the accounts of Coinbase consumers and move consumer funds off the Coinbase platform.” Cryptocurrency was taken without authorization from some user accounts.
  • Neiman Marcus: In October, Neiman Marcus made an information breach that took place in May 2020 public. The invasion was just identified in September 2021 and consisted of the direct exposure and prospective theft of over 3.1 million payment cards coming from consumers, although many are thought to be void or ended.

  • Argentina: A hacker declared to have actually jeopardized the Argentinian federal government’s National Computer System Registry of Persons, therefore taking the information of 45 million locals. The federal government has actually rejected the report.


  • Panasonic: The Japanese tech giant exposed a cyberattack had occurred — an information breach taking place from June 22 to November 3, with discovery on November 11– and confessed that details had actually been accessed on a file server.
  • Squid Video Game: The operators of a cryptocurrency getting on the appeal of the Netflix program Squid Video game (although not formally associated) crashed the worth of the SQUID token in what seems an exit rip-off. The worth dropped from a peak of $2,850 to $0.003028 over night, losing financiers countless dollars. An anti-dumping system guaranteed that financiers might not offer their tokens– and might just view in scary as the worth of the coin was ruined.
  • Robinhood: Robinhood divulged an information breach affecting approximately 5 million users of the trading app. Email addresses, names, telephone number, and more were accessed through a client support group.


  • Bitmart: In December, Bitmart stated a security breach allowed cyberattackers to take approximately $150 million in cryptocurrency and has actually triggered overall losses, consisting of damages, to reach $200 million.
  • Log4j: A zero-day vulnerability in the Log4j Java library, a remote code execution (RCE) defect, is now being actively made use of in the wild. The bug is called Log4Shell and is now being weaponized by botnets, consisting of Mirai.
  • Kronos: Kronos, an HR platform, ended up being a victim of a ransomware attack. Some users of Kronos Private Cloud are now dealing with an interruption that might recently– and simply ahead of Christmas, too.

Previous and associated protection

Have a suggestion? Contact us safely by means of WhatsApp|Signal at 447713025 499, or over at Keybase: charlie0

Find Out More

Author: admin

Leave a Reply

Your email address will not be published.