A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. Incidents range from concerted attack by black hats associated with organized crime, political activist or national governments to careless disposal of used computer equipment or data storage media.
Definition: "A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so." Data breaches may involve financial information such as credit card or bank details, personal health information (PHI), Personally identifiable information (PII), trade secrets of corporations or intellectual property. Most data breaches involve overexposed and vulnerable unstructured data – files, documents, and sensitive information.
According to the nonprofit consumer organization Privacy Rights Clearinghouse, a total of 227,052,199 individual records containing sensitive personal information were involved in security breaches in the United States between January 2005 and May 2008, excluding incidents where sensitive data was apparently not actually exposed.
Many jurisdictions have passed data breach notification laws, requiring a company that has been subject to a data breach to inform customers and take other steps to remediate possible injuries.
This may include incidents such as theft or loss of digital media such as computer tapes, hard drives, or laptop computers containing such media upon which such information is stored unencrypted, posting such information on the world wide web or on a computer otherwise accessible from the Internet without proper information security precautions, transfer of such information to a system which is not completely open but is not appropriately or formally accredited for security at the approved level, such as unencrypted e-mail, or transfer of such information to the information systems of a possibly hostile agency, such as a competing corporation or a foreign nation, where it may be exposed to more intensive decryption techniques.
ISO/IEC 27040 defines a data breach as: compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored or otherwise processed.
Trust and privacyEdit
The notion of a trusted environment is somewhat fluid. The departure of a trusted staff member with access to sensitive information can become a data breach if the staff member retains access to the data after termination of the trust relationship. In distributed systems, this can also occur with a breakdown in a web of trust. Data quality is one way of reducing the risk of a data breach, partly because it allows the owner of the data to rate data according to importance and give better protection to more important data.
Most such incidents publicized in the media involve private information on individuals, e.g. social security numbers. Loss of corporate information such as trade secrets, sensitive corporate information, and details of contracts, or of government information is frequently unreported, as there is no compelling reason to do so in the absence of potential damage to private citizens, and the publicity around such an event may be more damaging than the loss of the data itself.
Insider versus external threatsEdit
Those working inside an organization are a major cause of data breaches. Estimates of breaches caused by accidental "human factor" errors range from 37% by Ponemon Institute to 14% by the Verizon 2013 Data Breach Investigations Report. The external threat category includes hackers, cybercriminal organizations and state-sponsored actors. Professional associations for IT asset managers work aggressively with IT professionals to educate them on best risk-reduction practices for both internal and external threats to IT assets, software and information. While security prevention may deflect a high percentage of attempts, ultimately a motivated attacker will likely find a way into any given network. One of the top 10 quotes from Cisco CEO John Chambers is, "There are two types of companies: those that have been hacked, and those that don't know they have been hacked." FBI Special Agent for Cyber Special Operations Leo Taddeo warned on Bloomberg television, "The notion that you can protect your perimeter is falling by the wayside & detection is now critical."
Medical data breachEdit
Some celebrities have found themselves to be the victims of inappropriate medical record access breaches, albeit more so on an individual basis, not part of a typically much larger breach. Given the series of medical data breaches and the lack of public trust, some countries have enacted laws requiring safeguards to be put in place to protect the security and confidentiality of medical information as it is shared electronically and to give patients some important rights to monitor their medical records and receive notification for loss and unauthorized acquisition of health information. The United States and the EU have imposed mandatory medical data breach notifications.
Although such incidents pose the risk of identity theft or other serious consequences, in most cases there is no lasting damage; either the breach in security is remedied before the information is accessed by unscrupulous people, or the thief is only interested in the hardware stolen, not the data it contains. Nevertheless, when such incidents become publicly known, it is customary for the offending party to attempt to mitigate damages by providing to the victim's subscription to a credit reporting agency, for instance, new credit cards, or other instruments. In the case of Target, the 2013 breach cost Target a significant drop in profit, which dove an estimated 40 percent in the 4th quarter of the year.  At the end of 2015, Target published a report claiming a total loss of $290 million to data breach related fees.
The Yahoo breach disclosed in 2016 may be one of the most expensive today. It may lower the price of its acquisition by Verizon by $1 billion. Cybercrime cost energy and utilities companies an average of $12.8 million each year in lost business and damaged equipment according to DNV GL, an international certification body and classification society based in Norway. Data breaches cost healthcare organizations $6.2 billion in the last two years (presumably 2014 and 2015), according to a Ponemon study.
Notable incidents include:
- Ameriprise Financial, stolen laptop, December 24, 260,000 customer records
- ChoicePoint, February, 163,000 consumer records
- AOL search data scandal (sometimes referred to as a "Data Valdez", due to its size)
- Department of Veterans Affairs, May, 28,600,000 veterans, reserves, and active duty military personnel,
- Ernst & Young, May, 234,000 customers of Hotels.com (after a similar loss of data on 38,000 employees of Ernst & Young clients in February)
- Boeing, December, 382,000 employees (after similar losses of data on 3,600 employees in April and 161,000 employees in November, 2005)
- D. A. Davidson & Co. 192,000 clients' names, customer account and social security numbers, addresses and dates of birth
- The 2007 loss of Ohio and Connecticut state data by Accenture
- TJ Maxx, data for 45 million credit and debit accounts
- 2007 UK child benefit data scandal
- CGI Group, August, 283,000 retirees from New York City
- The Gap, September, 800,000 job applicants
- Memorial Blood Center, December, 268,000 blood donors
- Davidson County Election Commission, December, 337,000 voters
- In January 2008, GE Money, a division of General Electric, disclosed that a magnetic tape containing 150,000 social security numbers and in-store credit card information from 650,000 retail customers is known to be missing from an Iron Mountain Incorporated storage facility. J.C. Penney is among 230 retailers affected.
- Horizon Blue Cross and Blue Shield of New Jersey, January, 300,000 members
- Lifeblood, February, 321,000 blood donors
- British National Party membership list leak
- In Early 2008, Countrywide Financial (since acquired by Bank of America) allegedly fell victim to a data breach when, according to news reports and court documents, employee Rene L. Rebollo Jr. stole and sold up to 2.5 million customers' personal information including social security numbers. According to the legal complaint: "Beginning in 2008 – coincidentally after they sold their mortgage portfolios under wrongful and fraudulent 'securitization pools,' and coincidentally after their mortgage portfolio went into massive default as a result thereof – Countrywide learned that the financial information of potentially millions of customers had been stolen by certain Countrywide agents, employees or other individuals." In July 2010, Bank of America settled more than 30 related class-action lawsuits by offering free credit monitoring, identity theft insurance and reimbursement for losses to as many as 17 million consumers impacted by the alleged data breach. The settlement was estimated at $56.5 million not including court costs.
- In December 2009 a RockYou! password database was breached containing 32 million usernames and plaintext passwords, further compromising the use of weak passwords for any purpose.
- In May 2009 the United Kingdom parliamentary expenses scandal was revealed by The Daily Telegraph. A hard disk containing scanned receipts of UK Members of Parliament and Peers in the House of Lords was offered to various UK newspapers in late April, with The Daily Telegraph finally acquiring it. They published details in instalments from 8 May onwards. Although it was intended by Parliament that the data was to be published, this was to be in redacted form, with details the individual members considered "sensitive" blanked out. The newspaper published unredacted scans which showed details of the claims, many of which appeared to be in breach of the rules and suggested widespread abuse of the generous expenses system. The resulting media storm led to the resignation of the Speaker of the House of Commons and the prosecution and imprisonment of several MPs and Lords for fraud. The expenses system was overhauled and tightened up, being put more on a par with private industry schemes. The Metropolitan Police Service continues to investigate possible frauds, and the Crown Prosecution Service is considering further prosecutions. Several MPs and Lords apologised and made whole, partial or no restitution, and retained their seats. Others who had been shamed in the media did not offer themselves for re-election at the United Kingdom general election, 2010. Although numbering less than 1,500 individuals, the affair received the largest global media coverage of any data breach (as at February 2012).
- In January 2009 Heartland Payment Systems announced that it had been "the victim of a security breach within its processing system", possibly part of a "global cyber fraud operation". The intrusion has been called the largest criminal breach of card data ever, with estimates of up to 100 million cards from more than 650 financial services companies compromised.
- Throughout the year, Chelsea Manning (then known as Bradley Manning) released large volumes of secret military data to the public.
- In April 2011, Sony experienced a data breach within their PlayStation Network. It is estimated that the information of 77 million users was compromised.
- In March 2011, RSA suffered a breach of their SecurID token system seed-key warehouse, where the seed keys for their 2 Factor Authentication system were stolen, allowing the attackers to replicate the hardware tokens used for secure access in corporate and government environments.
- In June 2011, Citigroup disclosed a data breach within their credit card operation, affecting approximately 210,000 or 1% of their customers' accounts.
- In the Summer of 2012, Wired.com Senior Writer Mat Honan claims that "hackers destroyed my entire digital life in the span of an hour” by hacking his Apple, Twitter, and Gmail passwords in order to gain access to his Twitter handle and in the process, claims the hackers wiped out every one of his devices, deleting all of his messages and documents, including every picture he had ever taken of his 18-month-old daughter. The exploit was achieved with a combination of information provided to the hackers by Amazon's tech support through social engineering, and the password recovery system of Apple which used this information. Related to his experience, Mat Honan wrote a piece outlining why passwords cannot keep users safe.
- In October 2012, a law enforcement agency contacted the South Carolina Department of Revenue (DoR) with evidence that Personally Identifiable Information (PII) of three individuals had been stolen. It was later reported that an estimated 3.6 million Social Security numbers were compromised along with 387,000 credit card records.
- In October 2013, Adobe Systems revealed that their corporate database was hacked and some 130 million user records were stolen. According to Adobe, "For more than a year, Adobe’s authentication system has cryptographically hashed customer passwords using the SHA-256 algorithm, including salting the passwords and iterating the hash more than 1,000 times. This system was not the subject of the attack we publicly disclosed on October 3, 2013. The authentication system involved in the attack was a backup system and was designated to be decommissioned. The system involved in the attack used Triple DES encryption to protect all password information stored."
- In late November to early December 2013, Target Corporation announced that data from around 70 million credit and debit cards was stolen. It is the second largest credit and debit card breach after the TJX Companies data breach where almost 46 million cards were affected.
- In 2013, Edward Snowden published a series of secret documents that revealed widespread spying by the United States National Security Agency and similar agencies in other countries.
- In August 2014, nearly 200 photographs of celebrities were posted to the image board website 4chan. An investigation by Apple found that the images were obtained "by a very targeted attack on user names, passwords and security questions".
- In September 2014, Home Depot suffered a data breach of 56 million credit card numbers.
- In October 2014, Staples suffered a data breach of 1.16 million customer payment cards.
- In November 2014 and for weeks after, Sony Pictures Entertainment suffered a data breach involving personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of (previously) unreleased Sony films, and other information. The hackers involved claim to have taken over 100 terabytes of data from Sony.
- In October 2015, the British telecommunications provider TalkTalk suffered a data breach when a group of 15-year-old hackers stole information on its 4 million customers. The stock price of the company fell substantially due to the issue – around 12% – owing largely to the bad publicity surrounding the leak.
- In July 2015, adult website Ashley Madison suffered a data breach when a hacker group stole information on its 37 million users. The hackers threatened to reveal usernames and specifics if Ashley Madison and a fellow site, EstablishedMen.com, did not shut down permanently.
- In February 2015, Anthem suffered a data breach of nearly 80 million records, including personal information such as names, Social Security numbers, dates of birth, and other sensitive details.
- In June 2015, The Office of Personnel Management of the U.S. government suffered a data breach in which the records of 22.1 million current and former federal employees of the United States were hacked and stolen.
- In March 2016, the website of the Commission on Elections in the Philippines was defaced by hacktivist group, "Anonymous Philippines". A larger problem arose when a group called LulzSec Pilipinas uploaded COMELEC’s entire database on Facebook the following day.
- In April 2016, news media carried information stolen from a successful network attack of the Central American law firm, Mossack Fonseca, and the resulting “Panama Papers” sent reverberations throughout the world. Perhaps a justified vindication of illegal or unethical activity, this nonetheless illustrates the impact of secrets coming to light. The Prime Minister of Iceland was forced to resign and a major reshuffling of political offices occurred in countries as far-flung as Malta. Multiple investigations were immediately initiated in countries around the world, including a hard look at international or offshore banking rules in the U.S. Obviously the implications are enormous to the ability of an organization—whether a law firm or a governmental department—to keep secrets.
- In September 2016 Yahoo reported that up to 500 million accounts in 2014 had been breached in an apparent "state-sponsored" data breach. It was later reported in October 2017 that 3 billion accounts had been breached, accounting for every Yahoo account at the time.
- Equifax, July 2017, 145,500,000 consumer records, the largest known data breach in history at the time leading to the potential for the largest class action lawsuit in history As of early October 2017, the cities of Chicago and San Francisco and the Commonwealth of Massachusetts have filed enforcement actions against Equifax following the July 2017 data breach, in which hackers allegedly exploited a vulnerability in the open-source software used to create Equifax's online consumer dispute portal.
- United States-South Korea classified military documents, October 2017, South Korean lawmaker claimed that North Korean hackers stoles over 235 gigabytes of military documents were taken from the Defense Integrated Data Center in September 2016. Leaked documents including South Korea-U.S. wartime operational plan.
- Paradise Papers, November 2017.
- Facebook and Cambridge Analytica data breach in March.
- On 29 March, Under Armour disclosed a data breach of 150 million accounts at MyFitnessPal, with compromised data consisting of user names, the users' e-mail addresses and hashed passwords. Under Armour were notified of the breach on the week of 19–25 March, and that the leak happened sometime in February.
- It was reported on 1 April that a data breach occurred at Saks Fifth Avenue / Lord & Taylor. About 5 million credit card holders may have had their data compromised in stores in North America.
- United States Department of Health and Human Services, Administration for Children and Families. Information Memorandum. Retrieved 2015-09-01.
- "Panama Papers Leak: The New Normal?". Xconomy. 2016-04-26. Retrieved 2016-08-20.
- "Chronology of Data Breaches", Privacy Rights Clearinghouse
- When we discuss incidents occurring on NSSs, are we using commonly defined terms?, "Frequently Asked Questions on Incidents and Spills", National Archives Information Security Oversight Office
- The NHS Must Prioritise Quality To Prevent Further Data Breaches
- Risk of Insider Fraud: Second Annual Study. Ponemon.org (2013-02-28). Retrieved 2014-06-10.
- Verizon Data Breach Investigations Report | Verizon Enterprise Solutions. VerizonEnterprise.com. Retrieved 2014-06-10.
- Welcome to IAITAM Archived 2015-02-16 at the Wayback Machine.. Iaitam.org. Retrieved 2014-06-10.
- "The IT Checklist to Prevent Data Breach". IT Solutions & Services Philippines - Aim.ph. Retrieved 2016-05-06.
- "John Chambers' 10 most memorable quotes as Cisco CEO". Network World. Retrieved 2016-11-10.
- "FBI on Bloomberg TV".
- Ornstein, Charles (2008-03-15). "Hospital to punish snooping on Spears". Los Angeles Times. Retrieved 2013-07-26.
- Kierkegaard, Patrick (2012). "Medical data breaches: Notification delayed is notification denied". Computer Law. 28 (2): 163–183. doi:10.1016/j.clsr.2012.01.003. Retrieved 11 May 2016.
- "2010 Annual Study: German Cost of a Data Breach" (PDF). Ponemon Institute. February 2011. Retrieved 2011-10-12.
- "Data Breach Hurts Profit at Target". The New York Times. 27 February 2014. Retrieved 11 May 2016.
- Manworren, Nathan; Letwat, Joshua; Daily, Olivia (May 2016). "Why you should care about the Target data breach". Business Horizons. 59 (3): 257–266. doi:10.1016/j.bushor.2016.01.002. ISSN 0007-6813.
- "Verizon Wants $1 Billion Discount After Yahoo Privacy Concerns". TechCrunch. October 6, 2016.
- "Hydrocarbon Processing". September 29, 2016.
- "Data breaches cost healthcare industry $6.2B". Becker's ASC Review. May 12, 2016.
- "ChoicePoint to pay $15 million over data breach", NBC News
- data Valdez Doubletongued dictionary
- AOL's Massive Data Leak Archived 2008-10-13 at the Wayback Machine., Electronic Frontier Foundation
- data Valdez, Net Lingo
- "Active-duty troop information part of stolen VA data Archived 2010-04-01 at the Wayback Machine.", Network World, June 6, 2006
- Manning, Jeff (2010-04-13). "D.A. Davidson fined over computer security after data breach". The Oregonian. Retrieved 2013-07-26.
- "T.J. Maxx data theft worse than first reported". MSNBC. 2007-03-29. Retrieved 2009-02-16.
- "GE Money Backup Tape With 650,000 Records Missing At Iron Mountain". InformationWeek. Retrieved 11 May 2016.
- "UK - BNP activists' details published". BBC. Retrieved 11 May 2016.
- "Bank of America settles Countrywide data theft suits". Los Angeles Times. August 24, 2010.
- "Countrywide Sued For Data Breach, Class Action Suit Seeks $20 Million in Damages", Bank Info Security, April 9, 2010
- "Countrywide Sold Private Info, Class Claims", Courthouse News, April 5, 2010
- "The Convergence of Data, Identity, and Regulatory Risks", Making Business a Little Less Risky Blog
- Heartland Payment Systems Uncovers Malicious Software In Its Processing System Archived 2009-01-27 at the Wayback Machine.
- Lessons from the Data Breach at Heartland, MSNBC, July 7, 2009
- Greenberg, Andy (9 June 2011). "Citibank Reveals One Percent Of Credit Card Accounts Exposed In Hacker Intrusion". Forbes. Retrieved 2014-09-05.
- Honan, Mat (2012-11-15). "Kill the Password: Why a String of Characters Can't Protect Us Anymore". Wired. Retrieved 2013-01-17.
- Honan, Mat (August 6, 2012). "How Apple and Amazon Security Flaws Led to My Epic Hacking". Wired. Retrieved 26 Jan 2013.
- "Protecting the Individual from Data Breach". The National Law Review. Raymond Law Group. 2014-01-14. Retrieved 2013-01-17.
- "Public Incident Response Report" (PDF). State of South Carolina. 2012-11-12. Retrieved 2014-10-10.
- "South Carolina: The mother of all data breaches". The Post and Courier. 2012-11-03. Retrieved 2014-10-10.
- Goodin, Dan. (2013-11-01) How an epic blunder by Adobe could strengthen hand of password crackers. Ars Technica. Retrieved 2014-06-10.
- "Target Confirms Unauthorized Access to Payment Card Data in U.S. Stores". Target Corporation. 19 December 2013. Retrieved 19 January 2016.
- "Apple Media Advisory: Update to Celebrity Photo Investigation". Business Wire. StreetInsider.com. September 2, 2014. Retrieved 2014-09-05.
- Melvin Backman (18 September 2014). "Home Depot: 56 million cards exposed in breach". CNNMoney.
- "Staples: Breach may have affected 1.16 million customers' cards". Fortune. December 19, 2014. Retrieved 2014-12-21.
- James Cook (December 16, 2014). "Sony Hackers Have Over 100 Terabytes Of Documents. Only Released 200 Gigabytes So Far". Business Insider. Retrieved December 18, 2014.
- "TalkTalk Hacked…Again". Check&Secure. 2015-10-23. Archived from the original on 2015-12-23. Retrieved 2015-10-23.
- "Online Cheating Site AshleyMadison Hacked". krebsonsecurity.com. 2015-07-15. Retrieved 2015-07-20.
- "Data breach at health insurer Anthem could impact millions". 15 February 2015.
- "Hacks of OPM databases compromised 22.1 million people, federal authorities say". The Washington Post. July 9, 2015.
- "5 IT Security Lessons from the Comelec Data Breach". IT Solutions & Services Philippines - Aim.ph. Retrieved 2016-05-06.
- The massive Panama Papers data leak explained. Computerworld. April 5, 2016.
- Freytas-tamura, Kimiko De (2016-10-30). "Iceland's Prime Minister Resigns, After Pirate Party Makes Strong Gains". The New York Times. ISSN 0362-4331. Retrieved 2016-11-10.
- Ltd, Allied Newspapers. "Watch: Will Panama scandal go away after the reshuffle?". Times of Malta. Retrieved 2016-11-10.
- "U.S. Readies Bank Rule on Shell Companies Amid 'Panama Papers' Fury". NBC News. Retrieved 2016-11-10.
- "Can secrets stay secret anymore?". CIO Dive. Retrieved 2016-11-10.
- Shane, Scott; Mazzetti, Mark; Rosenberg, Matthew (7 March 2017). "WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents". The New York Times.
- Mathews, Lee, "Equifax Data Breach Impacts 143 Million Americans", Forbes, September 7, 2017.
- Mills, Chris, "Equifax is already facing the largest class-action lawsuit in US history", BGR, September 8, 2017.
- Reise, Sarah T. (3 October 2017). "State and Local Governments Move Swiftly to Sue Equifax". The National Law Review. Ballard Spahr LLP. Retrieved 7 October 2017.
- North Korea hackers stole South Korea-U.S. military plans to wipe out North Korea leadership: lawmaker, Reuters, Christine Kim, October 10, 2017
- Graham-Harrison, Emma; Cadwalladr, Carole (17 March 2018). "Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach". The Guardian. Archived from the original on 18 March 2018.
- "MyFitness Pal Data Breach March 15, 2018 - Hacked". www.javarosa.org. Retrieved 2018-04-03.
- "Saks, Lord & Taylor breach: Data stolen on 5 million cards". CNNMoney. Retrieved 2018-04-03.
- "Data Loss Database" is a research project aimed at documenting known and reported data loss incidents world-wide.
- "A Chronology of Data Breaches", Privacy Rights Clearinghouse, updated twice a week
- "Breaches Affecting 500 or More Individuals", Breaches reported to the U.S. Department of Health and Human Services by (HIPAA-covered) entities
- "What is a Data Breach?"
- "11 Expert Tips for Data Breach Prevention in 2018"