ThreatWatch is a snapshot of the data breaches hitting organizations and individuals, globally, on a daily basis.
The information is based on accounts published by outside news organizations and researchers.
We have tried to provide you with a sample of the most prevalent and interesting cyber events. Each incident chronicled includes the suspected attackers' methods of penetration and apparent target to help highlight patterns of activity and emerging threats. The records are limited to episodes where data actually was compromised. These are not accounts of new viruses, spam, or malicious email campaigns that might lead to breaches.
Some of the events cited are more damaging than portrayed, while others may later turn out not to be hacks at all: as you’ll see, the number of people affected is one of the hardest measures to track.
About the map: The global map visualizes real-time malicious activity data captured by sensors used by the experimental Honeynet Project, an international non-profit security research organization dedicated to investigating the latest attacks and developing open source tools to improve Internet security. The green dots indicate the geographic locations of outgoing malicious activity. The map represents only some of the activity detected at any given time because not all of the project's sensors push their data.Collapse
Unauthorized use of system administrator privileges; User accounts compromised
User Forum at Court Reporting Service Was Hacked – But Transcripts Are Safe
Government (U.S.) // Government (Foreign) // Technology
Attackers compromised some posts and customer information in an online bulletin board maintained by transcription firm For the Record, ...
Network intrusion; Unauthorized use of system administrator privileges; Software vulnerability
Botnet-Makers Try Breaching Mandrill’s Servers
Attackers attempted to rope the email management company’s machines into a "botnet" network of hijacked computers that they presumably ...
Data dump; Insider attack; Unauthorized use of user privileges
RadioShack Is Auctioning Off Customer Personal Data
Among the assets the bankrupt retailer is selling are the names, e-mail addresses, and phone numbers of millions of RadioShack customers. ...
User accounts compromised
Amazon-owned Twitch Says It’s Probably Been Hacked
Entertainment // Web Services
The details are scant at this point. “We are writing to let you know that there may have been unauthorized access to some Twitch user ...
Stolen credentials; Unauthorized use of system administrator privileges
The Register: ‘British Judo in Deep Shido after Cyberattack’
Nonprofit // UK
Hackers accessed some details on members of the British Judo Association by breaching the organization’s online application system. It’s ...
Cyber espionage; Insider attack; Social engineering; Stolen credentials; Unauthorized use of employer’s data; User accounts compromised
NYPD Officer Bilked Accident Victims He Stalked On Computers
Government (U.S.) // New York, United States
A New York City inspector posed as a lawyer and sold his bogus legal services to car accident victims that he found through scraping NYPD ...
Credential-stealing malware; Cyber espionage; Spearphishing
Pakistani Cybersecurity Firm Allegedly Is Stealing Indian Military and Government Intelligence
Defense Industrial Base // Government (Foreign) // India
A cybersecurity company with ties to the Pakistani government allegedly is pocketing secrets from Indian agencies and defense companies. ...
Cyber espionage; Social engineering
Pair Sold Chinese Military Secrets to Foreigners
Government (Foreign) // China
Two men in China photographed military projects and equipment and sold them overseas. One of the men, described only by his family name ...
Insider attack; Stolen credentials; Unauthorized use of user privileges; Unauthorized use of employer’s data; User accounts compromised
Inside Job at Blue Cross Blue Shield Racked up $742,000 Worth of Sam’s Club Items
Financial Services // Healthcare and Public Health // Michigan, United States
A former customer service representative at Blue Cross Blue Shield of Michigan was part of an identity theft scheme that led to significant ...
Cyber espionage; Network intrusion; Social engineering
Medical Data Exposed As Another Blue Cross Insurer Succumbs to Hackers
Healthcare and Public Health // United States
A computer intrusion at Premera Blue Cross might have compromised health and financial information on 11 million customers. This seems to ...