More Than 340 Million User Accounts Breached So Far This Year

Exclusive new research shows that over 340 million people have been affected by business data breaches already in the first four months of 2023. The biggest breach that happened this year so far was at Twitter around the time of Elon Musk's takeover which impacted 235 million user accounts.

These figures come from a new Company Data Breach Tracker launched by by the Independent  Advisor  who produce a regularly updated, month by month timeline of the latest company data breaches and hacks happening in 2023. 

Providing an overview of the impact data breaches have on businesses and their customers, here are the key overall insights of company data breaches in 2023:

  • Number of people affected in 2023: 346,758,345
  • 2023’s biggest breach: Twitter with allegedly 235 million emails leaked
  • ·UK’s biggest breach: 10 million JD Sports customers exposed
  • US’s biggest breach: T-mobile with 37 million customers affected
  •  Data leaks caused by threat actors: 275,630,000
  • Number of potential records compromised in:
  • January: 288,082,463
  • February: 25,342,580 
  • March: 31,413,302
  • April: 1,920,000

Staying secure online is a huge concern for companies in 2023. More and more fall victim to cyber  attacks, phishing and ransomware leading to data leaks, huge payouts and often lawsuits.

Tracking the key details of these corporate attacks, the guide breaks each down by date, company, company info, attack type, and the amount of accounts affected. The three largest company breaches of 2023 so far were:   

Company: Twitter
Attack type: Data leak (threat actor)
Affected: 235 million
Description: The largest attack of 2023 so far was on social media platform Twitter at the very start of the year. 235 million Twitter users and their associated email addresses were leaked to an online hacking forum, selling for around 2$.    

Company: T-Mobile
Attack type: Bad actor, hack
Affected/data leaked: 37 million
Description: The next largest was on mobile telecom company T-Mobile, with the hacker gaining access to customer data from 37 million accounts, including names, birth dates, and phone numbers

Company: TruthFinder and Instant Checkmate
Attack type: Cyber attack
Affected: 20.22 million
Description: The third was PeopleConnect-owned background check services TruthFinder and Instant Checkmate. Hackers leaked a 2019 backup database containing information of 20.22 million users including their PII, encrypted passwords and expired or inactive password reset tokens.

The causes of the breaches have also been highlighted with threat actors accounting for 289,700,000. The next largest cause is hacking at 32,303,580, followed by third party data exposure at 11,354,000, and then human error at 382,466. 

With an estimated 8,000 cyber attacks per year, the ability of Internet users to stay safe online simply can’t be taken for granted and as cyber criminals grow more skillful, almost anyone can become a victim. While not all cases of a data breach lead to fraud or identity theft, compromised data is an expensive business for companies and the repercussions stretch further to impact consumer trust and brand reputation, in addition to economic loss.

With hackers now using cutting edge AI-powered tools for increasingly sophisticated attacks, cyber security teams are having to work doubly hard to keep pace with cyber criminals. The need for adequate staff training as well as creating awareness and the trust to report any issues has never been greater. 

Advice for businesses on how to protect their data against these types of attack include the following basis measures:- 

  • Training of staff to help recognise phishing emails and malicious activity.
  • Generating trust with employees , so that should someone realise they opened a file or clicked a link by mistake, they will be comfortable reporting the incident without fear of being blamed.
  • Setting up secure VPNs across all devices (laptop, mobile, tablet,) for users in all locations. 
  • Turning on Two Factor Authentication (2FA)  to verify identity
  • Regularly updating passwords.

Data is often stolen by hackers when they succeed in gaining unauthorised online network access. Phishing is the most common form of attack when a seemingly innocuous email is sent to victims containing links that may install ransomware or allow a bad actor access to systems. Phishing can also be used to lure people into entering personal information, leading to data theft or fraud.

Threat actors are slightly different from hackers in that they may not necessarily have technical skills to hack a system but will exploit a vulnerable server, eventually leading to a data breach or another other type of cybercrime. Other factors that commonly lead to a data breach include malware, damaging software that infects devices with viruses, ransomware and spyware. which can then corrupt files and compromise data.

You Might Also Read: 

Take Practical Measures To Avoid An Attack:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A House Of Cards
XDR vs. SIEM: Do You Need One or Both? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

CERT.JE

CERT.JE

CERT.JE is responsible for promoting and improving the cyber resilience across the critical national infrastructure, business communities and citizens in Jersey.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.