Friday, February 28, 2025
HomeSecurity NewsTop 10 Biggest Data Breaches Of 2017

Top 10 Biggest Data Breaches Of 2017

Published on

SIEM as a Service

Follow Us on Google News

Last year many cyber incidents were reported. Here is the lookback of Top 10 Biggest Data Breaches and leaks reported in 2017 which made a huge impact on the organizations.

Here we have listed Top 10 Biggest Data Breaches which costs companies in million dollars and loss in reputation.

Also Read:  TOP 10 Cyber Attacks and Critical Vulnerabilities of 2017

1. Equifax

Hackers had breached the company’s system and accessed people’s names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers.

They also stole credit card numbers for about 209,000 people and dispute documents with personal identifying information for about 182,000 people.

2. Yahoo

Yahoo announced that all user accounts were affected in the August 2013 theft. Previously they announced that “more than one billion user accounts” may have been stolen by hackers during the attack that took place in August 2013.

Leaked details still remain secret, besides the range of affected users and that hackers stole names, email addresses, date of birth, phone numbers, hashed passwords, safety questions and answers.

3. American Households

A massive database that contains 123 Million American households sensitive personal information leaked online by California-based data analytics firm.

An unsecured cloud-based data repository was left publicly due to the bad misconfiguration in Amazon Web Services S3 cloud storage and the repository are massive data sets belonging to consumer credit reporting agency Alteryx partner Experian.

4. Accenture Data Leak

An Unsecured Server Hosted on Amazon’s S3 storage service which is holding 137 gigabytes of Customer data has completely left unsecured which Could be affected tons Accenture Cloud Platform Customer Sensitive Data.

Exposed Cloud Data servers belong to Accenture’s enterprise cloud offering, Accenture Cloud Platform, a “multi-cloud management platform” that is used for Accenture Customers.

5. Uber Data Breach

Uber data Breach, Hackers stole 57 million Uber users around the world and 600,000 drivers names including their license numbers.

The breach took place in October 2016 and the leaked data includes names, email addresses and mobile phone numbers that related to Uber accounts.

6 .California Voter Database Exposed

An unprotected MongoDB database contains a large volume of data which belongs to California state voters information exposed online. It can be accessed by anyone by having the just simple internet connection and the database named as ‘cool_db’.

Also, it was open to view, edit and modifying the entire database by anyone which contains 2 collections of the database.

one collection contains set of voter registration data and other collections contain entire California state voters that are holding 19,264,123 records, all open for public access.

7. Malaysian Data Breach

Malaysian’s Biggest Data Breach Exposed around 46.2 Million Mobile phone numbers have been leaked online from Malaysian telecoms and mobile virtual network operators (MVNO).

The information that has got out includes postpaid and prepaid numbers, customer details, addresses, IMEI and IMSI numbers.

8 .Verizon Data Breach

Telecommunications giant Verizon’s Customers 6 Million Sensitive personal data leaked online due to misconfigured cloud-based file repository and this Misconfiguration leads to exposed customer phone numbers, names, and some PIN codes publicly available online.

This Data Breach occurred due to “Human Error” and  Verizon’s Cloud-based file server was operated by Verizon’s Third Party vendor  NICE Systems.

9. Pentagon’s Data Leak

Pentagon Data Leak, Amazon Web Services S3 cloud storage buckets that contain social media surveillance data configured in the way that users with free AWS account can read and download the contents.

Leaked data consist of billions of public internet posts, news commentary and other writings from individuals from the US and other Countries.

10. Ai.Type keyboard Cata Breach

Millions of customer personal data exposed online due to a Misconfiguration with MongoDB that belongs to Ai.Type, the company that well know for developing the personalized virtual keyboard app for Android and iOS.

the company exposed their entire 577GB Mongo-hosted in public, anyone with internet connection can access the database.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...