More Than 340 Million User Accounts Breached So Far This Year

Exclusive new research shows that over 340 million people have been affected by business data breaches already in the first four months of 2023. The biggest breach that happened this year so far was at Twitter around the time of Elon Musk's takeover which impacted 235 million user accounts.

These figures come from a new Company Data Breach Tracker launched by by the Independent  Advisor  who produce a regularly updated, month by month timeline of the latest company data breaches and hacks happening in 2023. 

Providing an overview of the impact data breaches have on businesses and their customers, here are the key overall insights of company data breaches in 2023:

  • Number of people affected in 2023: 346,758,345
  • 2023’s biggest breach: Twitter with allegedly 235 million emails leaked
  • ·UK’s biggest breach: 10 million JD Sports customers exposed
  • US’s biggest breach: T-mobile with 37 million customers affected
  •  Data leaks caused by threat actors: 275,630,000
  • Number of potential records compromised in:
  • January: 288,082,463
  • February: 25,342,580 
  • March: 31,413,302
  • April: 1,920,000

Staying secure online is a huge concern for companies in 2023. More and more fall victim to cyber  attacks, phishing and ransomware leading to data leaks, huge payouts and often lawsuits.

Tracking the key details of these corporate attacks, the guide breaks each down by date, company, company info, attack type, and the amount of accounts affected. The three largest company breaches of 2023 so far were:   

Company: Twitter
Attack type: Data leak (threat actor)
Affected: 235 million
Description: The largest attack of 2023 so far was on social media platform Twitter at the very start of the year. 235 million Twitter users and their associated email addresses were leaked to an online hacking forum, selling for around 2$.    

Company: T-Mobile
Attack type: Bad actor, hack
Affected/data leaked: 37 million
Description: The next largest was on mobile telecom company T-Mobile, with the hacker gaining access to customer data from 37 million accounts, including names, birth dates, and phone numbers

Company: TruthFinder and Instant Checkmate
Attack type: Cyber attack
Affected: 20.22 million
Description: The third was PeopleConnect-owned background check services TruthFinder and Instant Checkmate. Hackers leaked a 2019 backup database containing information of 20.22 million users including their PII, encrypted passwords and expired or inactive password reset tokens.

The causes of the breaches have also been highlighted with threat actors accounting for 289,700,000. The next largest cause is hacking at 32,303,580, followed by third party data exposure at 11,354,000, and then human error at 382,466. 

With an estimated 8,000 cyber attacks per year, the ability of Internet users to stay safe online simply can’t be taken for granted and as cyber criminals grow more skillful, almost anyone can become a victim. While not all cases of a data breach lead to fraud or identity theft, compromised data is an expensive business for companies and the repercussions stretch further to impact consumer trust and brand reputation, in addition to economic loss.

With hackers now using cutting edge AI-powered tools for increasingly sophisticated attacks, cyber security teams are having to work doubly hard to keep pace with cyber criminals. The need for adequate staff training as well as creating awareness and the trust to report any issues has never been greater. 

Advice for businesses on how to protect their data against these types of attack include the following basis measures:- 

  • Training of staff to help recognise phishing emails and malicious activity.
  • Generating trust with employees , so that should someone realise they opened a file or clicked a link by mistake, they will be comfortable reporting the incident without fear of being blamed.
  • Setting up secure VPNs across all devices (laptop, mobile, tablet,) for users in all locations. 
  • Turning on Two Factor Authentication (2FA)  to verify identity
  • Regularly updating passwords.

Data is often stolen by hackers when they succeed in gaining unauthorised online network access. Phishing is the most common form of attack when a seemingly innocuous email is sent to victims containing links that may install ransomware or allow a bad actor access to systems. Phishing can also be used to lure people into entering personal information, leading to data theft or fraud.

Threat actors are slightly different from hackers in that they may not necessarily have technical skills to hack a system but will exploit a vulnerable server, eventually leading to a data breach or another other type of cybercrime. Other factors that commonly lead to a data breach include malware, damaging software that infects devices with viruses, ransomware and spyware. which can then corrupt files and compromise data.

You Might Also Read: 

Take Practical Measures To Avoid An Attack:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A House Of Cards
XDR vs. SIEM: Do You Need One or Both? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.