Top 5 Worst Security Breaches of 2018
by Josh Lamb on Jul 28, 2019 12:00:00 AM
As we start the third fiscal quarter of 2019, it’s important to look back and learn from mistakes made last year. 2018 was rife with security breaches that put millions at risk of having their sensitive information exposed. Chances are you’ve heard of one or two high profile breaches from last year, but others might surprise you. All in all, there were over 1,200 data breaches in 2018 alone, with more compromised records being released per breach than ever before. Some breaches happened due to an organizational oversight, and some occurred because hackers took advantage of vulnerabilities in a site’s security.
Let’s take a look at the top 5 worst breaches of 2018 to see what went wrong.
1. Exactis: 340 Million Records Breached
2. Under Armour/MyFitnessPal: 150 Million Records Breached
Under Armour’s fitness app, MyFitnessPal, discovered a breach of approximately 150 Million records in March 2018 that exposed usernames, emails, and passwords. This all happened because of weak security algorithms. It is standard security practice to secure passwords through a process known as “hashing”, where the original password is rendered unintelligible. When a user enters their password, it is then matched to the hash in the database. Unfortunately, Under Armour used a hashing function known as “SHA1”, which has been deemed vulnerable for over a decade.
3. British Airways: 380,000 Records Breached
In September 2018, British Airways revealed that personal and financial details of customers had been compromised by hackers. In this case, names, email addresses, and credit card information were stolen–including CVV numbers and expiration dates. This put customers at risk of dealing with unauthorized transactions. British Airways claims to not store CVV numbers, which is prohibited, leading security experts to speculate that hackers were able to obtain this information by intercepting a website script. This indicates either that their booking site or a third-party provider was compromised. This attack reinforces the need for companies to keep a close watch on “dependencies”, which is industry slang for third party code which is used in a company’s software.
4. Panera Bread: 37 Million Records Breached
In April 2018, Panera Bread Company revealed that its website had been leaking millions of records exposing customer information including names, addresses, birthdays, and the last four digits of credit cards. Moreover, these leaks took place for at least eight months before reaching a resolution, despite a tip-off from a concerned security expert and constant follow-up. The data could be found for any user who had signed up for a Panera account, accessible in plain text and easily searchable by automated tools.
5. DNSpionage : Unknown Number of Records Breached
Though by the end of the year many companies, government agencies, and other organizations had already been hit by major security breaches, there was still trouble to come. Near the end of November 2018, Cisco Talos discovered a cyber-espionage scheme targeting Lebanon and the United Arab Emirates (UAE) through .gov domains. Hackers were able to hijack DNS servers for their target and redirect all email and VPN tracking to their a domain under their control. With this access, hackers were able to get further access that allowed them to decrypt email and VPN credentials. Experts urge organizations to pay close attention to their DNS infrastructure to help combat DNS attacks, but this level of defense is often taken for granted.
What Can We Take Away From 2018’s Security Troubles?
One thing that these 5 breaches have in common is that they demonstrate the importance of protection against online threats. Cyber attacks on organizations are on the rise—particularly phishing and ransomware attacks—and they can come from all sides. This list illustrates how information was made vulnerable by using outdated security methods, as well as how hackers are using more sophisticated methods to gather information. Without taking the proper precautions, organizations are putting themselves and their customers at risk. Knowing this, companies must take precautions against vulnerabilities.
Small-midsize businesses (SMBs) are particularly vulnerable because they often assume that cybersecurity is only for the “big guys”. However, attackers view SMBs as easy prey. First, because they are often more lax with implementing security measures. Second, because they often lack the IT resources and budget of larger organizations.
DNSFilter recognizes the importance of accessible solutions for preventing security risks. We believe that security is a prime issue, but it doesn’t need to come at a premium price. By utilizing DNSFilter to protect against online threats, your organization is adding a vital layer to its security toolbelt at a time when protecting information isn’t only important, but imperative.
Want more lists of data breaches? Check out our list of the biggest data breaches in 2020.
When researchers talk about DNS security, they often refer to anything that protects DNS infrastructure. Although protective DNS and DNS security fall under the cybersecurity umbrella, protective DNS takes a different approach to cybersecurity than standard DNS security. Both security strategies are important for the stability of your business, but protective DNS reduces risks from your weakest link–human error. Protective DNS is critical for you...
The impending Cisco Umbrella RC End-of-Life has many Umbrella users concerned about their next steps and questioning which protective DNS solution might be able to fill the gap for their organization.
Industry State of the Art
This month there was a high level of focus on compliance issues spanning several focus areas from governments and oversight agencies around the world. And while there were actions taken with regard to specific vulnerabilities, a larger spotlight was placed on bigger picture security considerations in a more general context.