{"id":38468,"date":"2020-12-01T16:06:12","date_gmt":"2020-12-01T16:06:12","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31811\/The-Biggest-Hacks-Data-Breaches-Of-2020.html"},"modified":"2020-12-01T16:06:12","modified_gmt":"2020-12-01T16:06:12","slug":"the-biggest-hacks-data-breaches-of-2020","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/","title":{"rendered":"The Biggest Hacks, Data Breaches Of 2020"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2020\/11\/20\/a2b62afd-2116-4088-b3e5-dc45f7379248\/thumbnail\/770x578\/425e8929623acfebd0e11a50704270bf\/screenshot-2020-11-20-at-07-55-36.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybersecurity may be far from many of our minds this year, and in light of a <span class=\"link\"><a href=\"https:\/\/www.zdnet.com\/topic\/coronavirus-business-and-technology-in-a-pandemic\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;link_anchor&quot;, &quot;pageType&quot;: &quot;article&quot;}\">pandemic<\/a><\/span> and catastrophic economic disruption, remembering to maintain our own personal privacy and security online isn&#8217;t necessarily a priority.&nbsp; <\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best VPN 2020: NordVPN, PureVPN, others with free VPN tiers<\/strong><\/a><strong>&nbsp;<\/strong><\/p>\n<p>However, cyberattackers certainly haven&#8217;t given anyone a break this year. Data breaches, network infiltrations, bulk data theft and sale, identity theft, and <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware outbreaks<\/a> have all occurred over 2020 and the underground market shows no signs of stopping. <\/p>\n<p>As a large swathe of the global population shifted to <a href=\"https:\/\/www.zdnet.com\/article\/remote-working-101-professionals-guide-to-the-tools-of-the-trade\/\" target=\"_blank\" rel=\"noopener noreferrer\">work from home<\/a> models and businesses rapidly transitioned to remote operations, threat actors also pivoted. <a href=\"https:\/\/www.zdnet.com\/article\/working-from-home-trend-causes-surge-in-cybersecurity-costs-security-breaches\/\" target=\"_blank\" rel=\"noopener noreferrer\">Research suggests<\/a> that remote workers have become the source of up to 20% of cybersecurity incidents, ransomware is <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-is-growing-here-are-four-ways-attackers-are-getting-into-your-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">on the rise<\/a>, and we are yet to learn that &#8220;123456&#8221; is not an <a href=\"https:\/\/www.zdnet.com\/article\/the-worst-passwords-of-2020-show-we-are-as-lazy-about-security-as-ever\/\" target=\"_blank\" rel=\"noopener noreferrer\">adequate password<\/a>.&nbsp;<\/p>\n<p>Many companies and organizations, too, have yet to practice reasonable security hygiene, and vulnerabilities pose a constant threat to corporate networks. As a result, we&#8217;ve seen a variety of cyberattacks this year, the worst of which we have documented below. <\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/what-is-cyber-insurance-everything-you-need-to-know-about-what-it-covers-and-how-it-works\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>What is cyber insurance? Everything you need to know about what it covers and how it works<\/strong><\/a><strong>&nbsp;<\/strong><\/p>\n<h3> January: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/new-years-eve-malware-attack-strikes-travelex-services-still-offline\/\" target=\"_blank\" rel=\"noopener noreferrer\">Travelex<\/a>: Travelex services were pulled offline following a malware infection. The company itself and businesses using the platform to provide currency exchange services were all affected.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/man-jailed-for-using-data-breach-info-leaks-to-claim-over-12-million-in-irs-tax-refunds\/\" target=\"_blank\" rel=\"noopener noreferrer\">IRS tax refunds<\/a>: A US resident was jailed for using information leaked through data breaches to file fraudulent tax returns worth $12 million.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/texas-school-district-falls-for-scam-email-hands-over-2-3-million\/\" target=\"_blank\" rel=\"noopener noreferrer\">Manor Independent School District<\/a>: The Texas school district lost $2.3 million during a phishing scam.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/wawa-card-breach-may-rank-as-one-of-the-biggest-of-all-times\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wawa<\/a>: 30 million records containing customers&#8217; details were made available for sale online.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-discloses-security-breach-of-customer-support-database\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>: The Redmond giant disclosed that five servers used to store anonymized user analytics were exposed and open on the Internet without adequate protection.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/data-leak-strikes-us-cannabis-users-sensitive-information-exposed\/\" target=\"_blank\" rel=\"noopener noreferrer\">Medical marijuana<\/a>: A database backing point-of-sale systems used in medical and recreational marijuana dispensaries was compromised, impacting an estimated 30,000 US users.<\/li>\n<\/ul>\n<h3> February: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.essentialretail.com\/news\/este-lauder-breach\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Est\u00e9e Lauder<\/a>: 440 million internal records were reportedly exposed due to middleware security failures.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/software-error-exposes-the-id-numbers-for-1-26-million-danish-citizens\/\" target=\"_blank\" rel=\"noopener noreferrer\">Denmark&#8217;s government tax portal<\/a>: The taxpayer identification numbers of 1.26 million Danish citizens were accidentally exposed.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/dod-disa-discloses-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">DOD DISA<\/a>: The Defense Information Systems Agency (DISA), which handles IT for the White House, admitted to a data breach potentially compromising employee records.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/uk-financial-watchdog-admits-to-leaking-confidential-consumer-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">UK Financial Conduct Authority (FCA<\/a>): The FCA released sensitive information belonging to roughly 1,600 consumers by accident as part of an FOIA request.<\/li>\n<li><a href=\"https:\/\/www.cnet.com\/news\/clearview-ai-had-entire-client-list-stolen-in-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Clearview<\/a>: Clearview AI&#8217;s entire client list was stolen due to a software vulnerability.<\/li>\n<li><a href=\"https:\/\/www.itpro.co.uk\/security\/data-breaches\/355097\/ge-employees-hit-by-canon-data-breach\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">General Electric<\/a>: GE warned workers that an unauthorized individual was able to access information belonging to them due to security failures with supplier Canon Business Process Service.<\/li>\n<\/ul>\n<h3> March: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/t-mobile-says-hacker-gained-access-to-employee-email-accounts-user-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">T-Mobile<\/a>: A hacker gained access to employee email accounts, compromising data belonging to customers and employees.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/marriott-discloses-new-data-breach-impacting-5-2-million-hotel-guests\/\" target=\"_blank\" rel=\"noopener noreferrer\">Marriott<\/a>: The hotel chain suffered a cyberattack in which email accounts were infiltrated. 5.2 million hotel guests were impacted.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private\/\" target=\"_blank\" rel=\"noopener noreferrer\">Whisper<\/a>: The anonymous secret-sharing app exposed millions of users&#8217; private profiles and datasets online.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/uk-home-office-breached-gdpr-100-times-through-botched-handling-of-eu-settlement-scheme\/\" target=\"_blank\" rel=\"noopener noreferrer\">UK Home Office<\/a>: GDPR was breached 100 times in the handling of the Home Office&#8217;s EU Settlement Scheme.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/europol-tackles-massive-sim-swap-hacking-rings\/\" target=\"_blank\" rel=\"noopener noreferrer\">SIM-swap hacking rings<\/a>: Europol made arrests across Europe, taking out SIM-swap hackers responsible for the theft of over \u20ac3 million.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/virgin-media-exposes-data-of-900000-users-via-unprotected-marketing-database\/\" target=\"_blank\" rel=\"noopener noreferrer\">Virgin Media<\/a>: The company exposed the data of 900,000 users through an open marketing database.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private\/\" target=\"_blank\" rel=\"noopener noreferrer\">Whisper<\/a>: Millions of users&#8217; private profiles and datasets were left, exposed and online, for the world to see.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/financial-apps-leak-425gb-in-company-data-through-open-database\/\" target=\"_blank\" rel=\"noopener noreferrer\">MCA Wizard<\/a>: 425GB in sensitive documents belonging to financial companies was publicly accessible through a database linked to the MCA Wizard app.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/skimming-code-lurking-on-nutribullet-website-puts-customer-credit-card-data-at-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\">NutriBullet<\/a>: NutriBullet became a victim of a Magecart attack, with payment card skimming code infecting the firm&#8217;s e-commerce store.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/marriott-discloses-new-data-breach-impacting-5-2-million-hotel-guests\/\" target=\"_blank\" rel=\"noopener noreferrer\">Marriott<\/a>: Marriott disclosed a new data breach impacting 5.2 million hotel guests.<\/li>\n<\/ul>\n<h3> April: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/sba-reveals-potential-data-breach-impacting-8000-emergency-business-loan-applicants\/\" target=\"_blank\" rel=\"noopener noreferrer\">US Small Business Administration<\/a> (SBA): Up to 8,000 applicants for emergency loans were embroiled in a PII data leak.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/nintendo-says-160000-users-impacted-in-recent-account-hacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nintendo<\/a>: 160,000 users were affected by a mass account hijacking campaign.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/email-provider-got-hacked-data-of-600000-users-now-sold-on-the-dark-web\/\" target=\"_blank\" rel=\"noopener noreferrer\">Email.it<\/a>: The Italian email provider failed to protect the data of 600,000 users, leading to its sale on the Dark Web.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/nintendo-says-160000-users-impacted-in-recent-account-hacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nintendo<\/a>: Nintendo said 160,000 users were impacted by a mass account hijacking account caused by the NNID legacy login system.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/sba-reveals-potential-data-breach-impacting-8000-emergency-business-loan-applicants\/\" target=\"_blank\" rel=\"noopener noreferrer\">US Small Business Administration (SBA)<\/a>: The SBA revealed as many as 8,000 business emergency loan applicants were involved in a data breach.<\/li>\n<\/ul>\n<h3> May: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/easyjet-faces-18-billion-class-action-lawsuit-over-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">EasyJet<\/a>: The budget airline revealed a data breach exposing data belonging to nine million customers, including some financial records.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/cloud-provider-stopped-ransomware-attack-but-had-to-pay-ransom-demand-anyway\/\" target=\"_blank\" rel=\"noopener noreferrer\">Blackbaud<\/a>: The cloud service provider was hit by ransomware operators who hijacked customer systems. The company later paid a ransom to stop client data from being leaked online.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/japan-investigates-potential-leak-of-prototype-missile-design-in-mitsubishi-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mitsubishi:<\/a> A data breach suffered by the company potentially also resulted in confidential missile design data being stolen.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/transport-logistics-firm-toll-group-hit-by-ransomware-for-the-second-time-in-three-months\/\" target=\"_blank\" rel=\"noopener noreferrer\">Toll Group<\/a>: The logistics giant was hit by a second ransomware attack in three months.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/details-of-44m-pakistani-mobile-users-leaked-online-part-of-bigger-115m-cache\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pakistani mobile users<\/a>: Data belonging to 44 million Pakistani mobile users was leaked online.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/illinois-blames-glitch-for-exposure-of-applicant-social-security-numbers-private-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">Illinois<\/a>: The Illinois Department of Employment Security (IDES) leaked records concerning citizens applying for unemployment benefits.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/hacker-selling-40-million-user-records-from-popular-wishbone-app\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wishbone<\/a>: 40 million user records were published online by the ShinyHunters hacking group.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/easyjet-faces-18-billion-class-action-lawsuit-over-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">EasyJet<\/a>: An \u00a318 billion class-action lawsuit was launched to compensate customers impacted by a data breach in the same month.<\/li>\n<\/ul>\n<h3> June: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/amtrak-discloses-data-breach-potential-leak-of-sensitive-customer-information\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amtrak<\/a>: Customer PII was leaked and some Amtrak Guest Rewards accounts were accessed by hackers.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/university-of-california-sf-pays-ransomware-hackers-1-14-million-to-salvage-research\/\" target=\"_blank\" rel=\"noopener noreferrer\">University of California SF<\/a>: The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/aws-said-it-mitigated-a-2-3-tbps-ddos-attack-the-largest-ever\/\" target=\"_blank\" rel=\"noopener noreferrer\">AWS<\/a>: AWS mitigated a massive 2.3 Tbps DDoS attack.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/south-african-bank-to-replace-12m-cards-after-employees-stole-master-key\/\" target=\"_blank\" rel=\"noopener noreferrer\">Postbank<\/a>: A rogue employee at the South African bank obtained a master key and stole $3.2 million.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-gang-says-it-breached-one-of-nasas-it-contractors\/\" target=\"_blank\" rel=\"noopener noreferrer\">NASA<\/a>: The DopplePaymer ransomware gang claimed to have breached a NASA IT contractor&#8217;s networks.&nbsp;<\/li>\n<li><a href=\"https:\/\/sansec.io\/research\/magecart-corona-lockdown\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Claire&#8217;s<\/a>: The accessories company fell prey to a card-skimming Magecart infection.<\/li>\n<\/ul>\n<h3> July: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/couchsurfing-investigates-data-breach-after-17m-user-records-appear-on-hacking-forum\/\" target=\"_blank\" rel=\"noopener noreferrer\">CouchSurfing<\/a>: 17 million records belonging to CouchSurfing were found on an underground forum.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/university-of-york-discloses-data-breach-staff-and-student-records-stolen\/\" target=\"_blank\" rel=\"noopener noreferrer\">University of York<\/a>: The UK university disclosed a data breach caused by Blackbaud. Staff and student records were stolen.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/us-actor-casting-company-leaked-private-data-of-over-260000-individuals\/\" target=\"_blank\" rel=\"noopener noreferrer\">MyCastingFile<\/a>: A US casting platform for actors exposed the PII of 260,000 users.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/critical-sigred-vulnerability-impacts-microsoft-windows-dns-2003-2019-patch-now\/\" target=\"_blank\" rel=\"noopener noreferrer\">SigRed<\/a>: Microsoft patched a 17-year-old exploit that could be used to hijack Microsoft Windows Servers.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/a-hacker-is-selling-details-of-142-million-mgm-hotel-guests-on-the-dark-web\/\" target=\"_blank\" rel=\"noopener noreferrer\">MGM Resorts<\/a>: A hacker put the records of 142 million MGM guests online for sale.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/v-shred-data-leak-exposes-pii-sensitive-photos-of-fitness-customers-and-trainers\/\" target=\"_blank\" rel=\"noopener noreferrer\">V Shred<\/a>: The PII of 99,000 customers and trainers was exposed online and V Shred only partially resolved the problem.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/german-authorities-seize-blueleaks-server-that-hosted-data-on-us-cops\/\" target=\"_blank\" rel=\"noopener noreferrer\">BlueLeaks<\/a>: Law enforcement closed down a portal used to host 269 GB in stolen files belonging to US police departments.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/edp-energy-confirms-cyberattack-ragnar-locker-ransomware-blamed\/\" target=\"_blank\" rel=\"noopener noreferrer\">EDP<\/a>: The energy provider confirmed a Ragnar Locker ransomware incident. Over 10TB in business records were apparently stolen.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/hacker-ransoms-23k-mongodb-databases-and-threatens-to-contact-gdpr-authorities\/\" target=\"_blank\" rel=\"noopener noreferrer\">MongoDB<\/a>: A hacker attempted to ransom 23,000 MongoDB databases.<\/li>\n<\/ul>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/russian-and-north-korean-hackers-are-targeting-covid-19-vaccine-researchers\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Russian and North Korean hackers are targeting COVID-19 vaccine researchers<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.cnet.com\/news\/best-outdoor-home-security-cameras-for-2020\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">The best outdoor home security cameras for 2020<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.cnet.com\/news\/android-and-iphones-are-all-about-privacy-now-but-startup-osom-thinks-it-can-do-better\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Android and iPhones are all about privacy now, but startup OSOM thinks it can do better<\/a> <\/p>\n<h3> August: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/former-cisco-engineer-pleads-guilty-to-network-damage-wiping-16000-webex-teams-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco:<\/a> A former engineer pleaded guilty to causing massive amounts of damage to Cisco networks, costing the company $2.4 million to fix.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/canon-suffers-ransomware-attack-maze-claims-responsibility\/\" target=\"_blank\" rel=\"noopener noreferrer\">Canon<\/a>: The photography giant was struck by ransomware gang Maze.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox\/\" target=\"_blank\" rel=\"noopener noreferrer\">LG, Xerox<\/a>: Maze struck again, publishing data belonging to these companies after failing to secure blackmail payments.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/intel-investigating-breach-after-20gb-of-internal-documents-leak-online\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intel<\/a>: 20GB of sensitive, corporate data belonging to Intel was published online.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/ritz-london-struck-by-data-breach-fraudsters-pose-as-staff-in-credit-card-data-scam\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Ritz, London<\/a>: Fraudsters posed as staff in a clever phishing scam against Ritz clients.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/free-photos-graphics-site-freepik-discloses-data-breach-impacting-8-3m-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">Freepik<\/a>: The free photos platform disclosed a data breach impacting 8.3 million users.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/university-of-utah-pays-457000-to-ransomware-gang\/\" target=\"_blank\" rel=\"noopener noreferrer\">University of Utah<\/a>: The university gave in to cybercriminals and paid a $457,000 ransom to stop the group from publishing student information.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/experian-south-africa-discloses-data-breach-impacting-24-million-customers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Experian, South Africa<\/a>: Experian&#8217;s South African branch disclosed a data breach impacting 24 million customers.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/worlds-largest-cruise-line-operator-discloses-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Carnival<\/a>: The cruise operator disclosed a ransomware attack and subsequent data breach.<\/li>\n<\/ul>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p><strong>See also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/black-hat-when-penetration-testing-earns-you-a-felony-record\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Black Hat: When penetration testing earns you a felony arrest record<\/strong><\/a> <\/p>\n<h3> September: <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/nevada-school-district-refuses-to-submit-to-ransomware-blackmail-hacker-responds-by-publishing-student-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nevada<\/a>: A Nevada school, suffering a ransomware attack, refused to pay the cybercriminals &#8212; and so student data was published online in retaliation.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/first-death-reported-following-a-ransomware-attack-on-a-german-hospital\/\" target=\"_blank\" rel=\"noopener noreferrer\">German hospital ransomware<\/a>: A hospital patient passed away after being redirected away from a hospital suffering an active ransomware infection.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/hackers-leak-details-of-1000-high-ranking-belarus-police-officers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Belarus law enforcement:<\/a> The private information of 1,000 high-ranking police officers was leaked.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/ceo-of-cyber-fraud-company-arrested-for-financial-fraud\/\" target=\"_blank\" rel=\"noopener noreferrer\">NS8<\/a>: The CEO of the cyberfraud startup was accused of defrauding investors out of $123 million.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/us-charges-iranian-hackers-for-breaching-us-satellite-companies\/\" target=\"_blank\" rel=\"noopener noreferrer\">Satellites<\/a>: Iranian hackers were charged for compromising US satellites.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/cerberus-banking-trojan-source-code-released-for-free-to-cyberattackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cerberus<\/a>: The developers of the Cerberus banking Trojan released the malware&#8217;s source code after failing to sell it privately.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/chilean-bank-shuts-down-all-branches-following-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">BancoEstado<\/a>: The Chilean bank was forced to close down branches due to ransomware.<\/li>\n<\/ul>\n<h3> October:&nbsp; <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/barnes-noble-confirms-cyberattack-customer-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">Barnes &amp; Noble<\/a>: The bookseller experienced a cyberattack, believed to be the handiwork of the ransomware group Egregor. Stolen records were leaked online as proof.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/un-maritime-agency-says-it-was-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer\">UN IMO<\/a>: The United Nations International Maritime Organization (UN IMO) disclosed a security breach affecting public systems.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/boom-mobile-falls-prey-to-magecart-card-skimming-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Boom! Mobile<\/a>: The telecom service provider became the victim of a Magecart card-skimming attack.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/google-says-it-mitigated-a-2-54-tbps-ddos-attack-in-2017-largest-known-to-date\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a>: Google said it mitigated a 2.54 Tbps DDoS attack, one of the largest ever recorded.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/card-details-for-3-million-dickeys-customers-posted-on-carding-forum\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dickey&#8217;s<\/a>: The US barbeque restaurant chain suffered a point-of-sale attack between July 2019 and August 2020. Three million customers had their card details later posted online. &nbsp;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/ubisoft-crytek-data-posted-on-ransomware-gangs-site\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ubisoft, Crytek<\/a>: Sensitive information belonging to the gaming giants was released online by the Egregor ransomware gang.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/amazon-finance-manager-and-family-charged-with-insider-trading\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon insider trading<\/a>: A former Amazon finance manager and their family were charged for running a $1.4 million insider trading scam.<\/li>\n<\/ul>\n<h3> November:&nbsp; <\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/manchester-united-football-club-discloses-security-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">Manchester United<\/a>: Manchester United football club said it was investigating a security incident impacting internal systems.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/info-of-27-7-million-texas-drivers-exposed-in-vertafore-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">Vertafore<\/a>: 27.7 million Texas drivers&#8217; PII was compromised due to &#8220;human error.&#8221;<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/italian-beverage-vendor-campari-knocked-offline-after-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Campari<\/a>: Campari was knocked offline following a ransomware attack.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/russian-hacker-jailed-over-botnet-data-scraping-scheme-that-drained-victim-bank-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">$100 million botnet<\/a>: A Russian hacker was jailed for operating a botnet responsible for draining $100 million from victim bank accounts.&nbsp;<\/li>\n<li><a href=\"https:\/\/mashable.com\/article\/mashable-data-security-issue\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Mashable<\/a>: A hacker published a copy of a Mashable database online.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/capcom-quietly-discloses-cyberattack-impacting-email-file-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Capcom<\/a>: Capcom became a victim of the Ragnar Locker ransomware, disrupting internal systems.<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/home-depot-agrees-to-17-5m-settlement-over-2014-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">Home Depot<\/a>: The US retailer agreed to a $17.5 million settlement after a PoS malware infection impacted millions of shoppers.<\/li>\n<\/ul>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-remote-working-poses-security-risks-for-your-organization\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">How remote working poses security risks for your organization<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.techrepublic.com\/article\/how-phishing-attacks-are-exploiting-googles-own-tools-and-services\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">How phishing attacks are exploiting Google&#8217;s own tools and services<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.techrepublic.com\/article\/linux-and-open-source-the-biggest-issue-in-2020\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Linux and open source: The biggest issue in 2020<\/a> <\/p>\n<h3> December: <\/h3>\n<ul>\n<li>As new cybersecurity incidents occur, we will update for the month of December.<\/li>\n<\/ul>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 <\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31811\/The-Biggest-Hacks-Data-Breaches-Of-2020.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38469,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[1647],"class_list":["post-38468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacydata-loss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Biggest Hacks, Data Breaches Of 2020 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Biggest Hacks, Data Breaches Of 2020 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-01T16:06:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/the-biggest-hacks-data-breaches-of-2020.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Biggest Hacks, Data Breaches Of 2020\",\"datePublished\":\"2020-12-01T16:06:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/\"},\"wordCount\":1697,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/the-biggest-hacks-data-breaches-of-2020.png\",\"keywords\":[\"headline,hacker,privacy,data loss\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/\",\"name\":\"The Biggest Hacks, Data Breaches Of 2020 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/the-biggest-hacks-data-breaches-of-2020.png\",\"datePublished\":\"2020-12-01T16:06:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/the-biggest-hacks-data-breaches-of-2020.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/the-biggest-hacks-data-breaches-of-2020.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-hacks-data-breaches-of-2020\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,data loss\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacydata-loss\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Biggest Hacks, Data Breaches Of 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Biggest Hacks, Data Breaches Of 2020 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/","og_locale":"en_US","og_type":"article","og_title":"The Biggest Hacks, Data Breaches Of 2020 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-01T16:06:12+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/the-biggest-hacks-data-breaches-of-2020.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Biggest Hacks, Data Breaches Of 2020","datePublished":"2020-12-01T16:06:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/"},"wordCount":1697,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/the-biggest-hacks-data-breaches-of-2020.png","keywords":["headline,hacker,privacy,data loss"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/","url":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/","name":"The Biggest Hacks, Data Breaches Of 2020 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/the-biggest-hacks-data-breaches-of-2020.png","datePublished":"2020-12-01T16:06:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/the-biggest-hacks-data-breaches-of-2020.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/the-biggest-hacks-data-breaches-of-2020.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-hacks-data-breaches-of-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,data loss","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydata-loss\/"},{"@type":"ListItem","position":3,"name":"The Biggest Hacks, Data Breaches Of 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38468"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38468\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38469"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}