{"id":44637,"date":"2021-12-31T14:02:50","date_gmt":"2021-12-31T14:02:50","guid":{"rendered":"http:\/\/bbf0f7b5-ce58-404d-a2c3-843c77fbf9d4"},"modified":"2021-12-31T14:02:50","modified_gmt":"2021-12-31T14:02:50","slug":"the-biggest-data-breaches-hacks-of-2021","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/","title":{"rendered":"The biggest data breaches, hacks of 2021"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\/2019\/03\/01\/817912d7-4468-491c-a4b8-4809761588e3\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>In 2021, thousands of new cybersecurity incidents have been recorded &#8212; and while cryptocurrency theft and data loss are now commonplace, this year stands out due to several high-profile incidents involving ransomware, supply chain attacks, and the exploitation of critical vulnerabilities.<\/p>\n<p>The Identity Theft Research Center (ITRC) has reported an increase <a href=\"https:\/\/www.idtheftcenter.org\/post\/identity-theft-resource-center-to-share-latest-data-breach-analysis-with-u-s-senate-commerce-committee-number-of-data-breaches-in-2021-surpasses-all-of-2020\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">of 17%<\/a> in the number of recorded data breaches during 2021 in comparison to 2020. However, an entrenched lack of transparency around the disclosure of security incidents continues to persist &#8212; and so this may be a low ball estimation.&nbsp;<\/p>\n<p>According to IBM, the <a href=\"https:\/\/www.zdnet.com\/article\/enterprise-data-breach-cost-reached-record-high-during-covid-19-pandemic\/\" target=\"_blank\" rel=\"noopener\">average cost<\/a> of a data breach has now reached over $4 million, while Mimecast estimates that the average ransomware demand levied against US companies is well <a href=\"https:\/\/www.zdnet.com\/article\/average-ransomware-payment-for-us-victim-more-than-6-million-mimecast\/#:~:text=ZDNet%20Recommends&amp;text=Of%20that%2080%25%2C%2039%25,less%20than%20%24250%2C000%20on%20average.\" target=\"_blank\" rel=\"noopener\">over $6 million<\/a>. The <a href=\"https:\/\/www.varonis.com\/blog\/ransomware-statistics-2021\/#:~:text=37%25%20of%20respondents'%20organizations%20were,million%2C%20setting%20a%20world%20record.\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">world record<\/a> for the largest payout, made by an insurance company this year, now stands at $40 million. &nbsp;<\/p>\n<hr>\n<p><strong>Read on: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/this-is-the-perfect-ransomware-victim-according-to-cybercriminals\/\" target=\"_blank\" rel=\"noopener\"><strong>This is the perfect ransomware victim, according to cybercriminals<\/strong><\/a>&nbsp;| <a href=\"https:\/\/www.zdnet.com\/article\/enterprise-data-breach-cost-reached-record-high-during-covid-19-pandemic\/\" target=\"_blank\" rel=\"noopener\"><strong>Enterprise data breach cost reached record high during COVID-19 pandemic<\/strong><\/a>&nbsp;|<\/p>\n<hr>\n<p>Experts have warned that the security issue could persist <a href=\"https:\/\/www.zdnet.com\/article\/log4j-update-experts-say-log4shell-exploits-will-persist-for-months-if-not-years\/\" target=\"_blank\" rel=\"noopener\">for years<\/a>&nbsp;with the recent emergence and rapid exploitation of the Log4j vulnerability. That goes for data leaks, breaches, and theft, too, which are unlikely to decline in number in the near future.&nbsp;<\/p>\n<p>Here are some of the most notable security incidents, cyberattacks, and data breaches over 2021.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<\/p><\/div>\n<h2>January:<\/h2>\n<ul>\n<li><strong>Livecoin:<\/strong> Following an alleged hack in December, cryptocurrency exchange Livecoin slammed <a href=\"https:\/\/www.zdnet.com\/article\/livecoin-slams-its-doors-shut-after-failing-to-recover-from-hack-financial-loss\/\" target=\"_blank\" rel=\"noopener\">its doors shut<\/a> and exited the market in January. The Russian trading post claimed that threat actors were able to break in and tamper with cryptocurrency exchange rate values, leading to irreparable financial damage.&nbsp;<\/li>\n<li><strong>Microsoft Exchange Server<\/strong>: One of the most damaging <a href=\"https:\/\/www.zdnet.com\/article\/everything-you-need-to-know-about-microsoft-exchange-server-hack\/\" target=\"_blank\" rel=\"noopener\">cybersecurity incidents<\/a> this year was the widespread compromise of Microsoft Exchange servers caused by a set of zero-day vulnerabilities known collectively as ProxyLogon. The Redmond giant became aware of the flaws in January and released emergency patches in March; however, the Hafnium state-sponsored threat group was joined by others for months after in attacks against unpatched systems. Tens of thousands of organizations are believed to have been compromised.&nbsp;<\/li>\n<li><strong>MeetMindful<\/strong>: The data of over <a href=\"https:\/\/www.zdnet.com\/article\/hacker-leaks-data-of-2-28-million-dating-site-users\/\" target=\"_blank\" rel=\"noopener\">two million users<\/a> of the dating app was reportedly stolen and leaked by a hacking group. The information leaked included everything from full names to Facebook account tokens.&nbsp;<\/li>\n<\/ul>\n<h2>February:<\/h2>\n<ul>\n<li><strong>SITA<\/strong>: An IT supplier for aviation services around the world, SITA, said <a href=\"https:\/\/www.zdnet.com\/article\/airlines-warn-passengers-of-data-breach-after-aviation-tech-supplier-is-hit-by-cyberattack\/\" target=\"_blank\" rel=\"noopener\">a security incident<\/a> involving SITA Passenger Service System servers led to the exposure of personal, identifiable information belonging to airline passengers. Airlines involved in the data breach were then required to reach out to their customers.&nbsp;<\/li>\n<li><strong>ATFS<\/strong>: A <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-cities-disclose-data-breaches-after-vendors-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">ransomware attack<\/a> against payment processor ATFS forced multiple US cities to send out data breach notifications. The cybercriminal group which claimed responsibility, Cuba, claimed to have stolen a wide range of financial information on their leak site. &nbsp;<\/li>\n<\/ul>\n<h2>March:<\/h2>\n<ul>\n<li><strong>Mimecast:<\/strong> Due to the <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-fireeye-confirm-solarwinds-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener\">Solarwinds<\/a> supply chain attack disclosed in December 2020, Mimecast found itself as a recipient of a malicious software update that compromised the firm&#8217;s systems. <a href=\"https:\/\/www.zdnet.com\/article\/mimecast-reveals-source-code-theft-in-solarwinds-hack\/\" target=\"_blank\" rel=\"noopener\">Mimecast said<\/a> that its production grid environment had been compromised, leading to the exposure and theft of source code repositories. In addition, Mimecast-issued certificates and some customer server connection datasets were also caught in the breach.&nbsp;<\/li>\n<li><strong>Tether<\/strong>: Tether faced an extortion demand from cyberattackers who threatened to leak documents online that would &#8220;harm the Bitcoin ecosystem.&#8221; The demand, of approximately $24 million or 500 Bitcoin (BTC), was met with deaf ears as the blockchain organization <a href=\"https:\/\/www.zdnet.com\/article\/tether-faces-500-bitcoin-ransom-we-are-not-paying\/\" target=\"_blank\" rel=\"noopener\">refused to pay<\/a>.&nbsp;<\/li>\n<li><strong>CNA Financial<\/strong>: CNA Financial employees were left unable to access corporate resources and were locked out following a <a href=\"https:\/\/www.zdnet.com\/article\/us-insurance-giant-cna-financial-paid-40-million-ransom-to-wrestle-back-control-of-systems\/\" target=\"_blank\" rel=\"noopener\">ransomware attack<\/a> which also involved the theft of company data. The company reportedly paid a $40 million ransom.<\/li>\n<\/ul>\n<h2>April:<\/h2>\n<ul>\n<li><strong>Facebook<\/strong>: A data dump of information belonging to over <a href=\"https:\/\/www.zdnet.com\/article\/facebook-scraping-led-to-data-of-553m-users-leaked-online-how-to-see-if-you-are-impacted\/\" target=\"_blank\" rel=\"noopener\">550 million Facebook users<\/a> was published online. Facebook IDs, names, dates of birth, genders, locations, and relationship statuses were included in the logs, of which Facebook &#8212; now known as Meta &#8212; said was collected via scraping in 2019.<\/li>\n<\/ul>\n<h2>May:&nbsp;<\/h2>\n<ul>\n<li><strong>Colonial Pipeline<\/strong>: If there was ever an example of how a cyberattack can impact the physical world, the cyberattack experienced by Colonial Pipeline is it. The fuel pipeline operator was struck by ransomware, courtesy <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">of DarkSide<\/a>, leading to fuel delivery disruption and panic buying across the United States. The company paid a ransom, but the damage was already done.&nbsp;<\/li>\n<li><strong>Omiai<\/strong>: The Japanese dating app said <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-24\/millions-of-accounts-exposed-in-hack-of-leading-japan-dating-app\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">unauthorized entry<\/a> may have led to the exposure of data belonging to 1.7 million users.<\/li>\n<\/ul>\n<h2>June:<\/h2>\n<ul>\n<li><strong>Volkswagen, Audi:<\/strong> The automakers <a href=\"https:\/\/www.zdnet.com\/article\/volkswagen-audi-disclose-data-breach-impacting-over-3-3-million-customers-interested-buyers\/\" target=\"_blank\" rel=\"noopener\">disclosed a data breach<\/a> impacting over 3.3 million customers and some prospective buyers, the majority of which were based in the United States. A finger was pointed at an associated vendor as the cause of the breach, believed to be responsible for exposing this data in an unsecured manner at &#8220;some point&#8221; between August 2019 and May 2021.<\/li>\n<li><strong>JBS USA:<\/strong> The international meatpacking giant suffered a <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-meat-firm-jbs-says-it-paid-out-11m-after-attack\/\" target=\"_blank\" rel=\"noopener\">ransomware attack<\/a>, attributed to the REvil ransomware group, which had such a disastrous impact on operations that the company chose to pay an $11 million ransom in return for a decryption key to restore access to its systems.&nbsp;<\/li>\n<\/ul>\n<h2>July:<\/h2>\n<ul>\n<li><strong>UC San Diego Health<\/strong>: UC San Diego Health said <a href=\"https:\/\/health.ucsd.edu\/data-security\/Pages\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">employee email accounts<\/a> were compromised by threat actors, leading to a wider incident in which patient, student, and employee data potentially including medical records, claims information, prescriptions, treatments, Social Security numbers, and more were exposed.&nbsp;<\/li>\n<li><strong>Guntrader.uk<\/strong>: The UK trading website for shotguns, rifles, and shooting equipment said that records belonging to roughly 100,000 gun owners, including their names and addresses, had been <a href=\"https:\/\/www.bbc.com\/news\/technology-57932823\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">published online<\/a>. As gun ownership and supply are strictly controlled in the UK, this leak has caused serious privacy and personal safety concerns.&nbsp;<\/li>\n<li><strong>Kaseya<\/strong>: A vulnerability in a platform developed by IT services provider Kaseya <a href=\"https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/\" target=\"_blank\" rel=\"noopener\">was exploited<\/a> in order to hit an estimated 800 &#8211; 1500 customers, including MSPs.&nbsp;<\/li>\n<\/ul>\n<h2>August:<\/h2>\n<ul>\n<li><strong>T-Mobile:<\/strong> T-Mobile experienced a yet-another <a href=\"https:\/\/www.zdnet.com\/article\/t-mobile-says-hackers-accessed-user-data-but-wont-confirm-ssn-breach-of-100-million-customers\/\" target=\"_blank\" rel=\"noopener\">data breach<\/a> in August. <a href=\"https:\/\/www.zdnet.com\/article\/t-mobile-hack-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">According to reports<\/a>, the names, addresses, Social Security numbers, driver&#8217;s licenses, IMEI and IMSI numbers, and ID information of customers were compromised. It is possible that approximately 50 million existing and prospective customers were impacted. A 21-year-old took responsibility for the hack and claimed to have stolen roughly 106GB of data from the telecoms giant.&nbsp;<\/li>\n<li><strong>Poly Network<\/strong>: Blockchain organization Poly Network disclosed an Ethereum <a href=\"https:\/\/www.zdnet.com\/article\/poly-network-hackers-potentially-stole-610-million-is-bitcoin-still-safe\/\" target=\"_blank\" rel=\"noopener\">smart contract hack<\/a> used to steal in excess of $600 million in various cryptocurrencies.<\/li>\n<li><strong>Liquid<\/strong>: Over <a href=\"https:\/\/www.zdnet.com\/article\/more-than-97-million-stolen-from-liquid-cryptocurency-exchange\/\" target=\"_blank\" rel=\"noopener\">$97 million<\/a> in cryptocurrency was stolen from the Japanese cryptocurrency exchange.<\/li>\n<\/ul>\n<h2>September:<\/h2>\n<ul>\n<li><strong>Cream Finance<\/strong>: Decentralized finance (DeFi) organization Cream Finance reported a loss <a href=\"https:\/\/www.zdnet.com\/article\/cream-finance-wallet-pilfered-for-34-million-in-cryptocurrency\/\" target=\"_blank\" rel=\"noopener\">of $34 million<\/a> after a vulnerability was exploited in the project&#8217;s market system.<\/li>\n<li><strong>AP-HP<\/strong>: Paris&#8217; public hospital system, AP-HP, <a href=\"https:\/\/www.rfi.fr\/en\/france\/20210916-hackers-steal-covid-test-data-of-1-4-million-people-from-paris-hospital-system\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">was targeted<\/a> by cyberattackers who managed to swipe the PII of individuals who took COVID-19 tests in 2020.&nbsp;<\/li>\n<li><strong>Debt-IN Consultants<\/strong>: The South African debt recovery firm said a cyberattack had resulted in a &#8220;significant&#8221; incident impacting <a href=\"https:\/\/portswigger.net\/daily-swig\/millions-of-south-africans-caught-up-in-security-incident-after-debt-recovery-firm-suffers-significant-data-breach\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">client and employee<\/a> information. PII, including names, contact details, salary and employment records, and debts owed, are suspected of being involved.&nbsp;<\/li>\n<\/ul>\n<h2>October:<\/h2>\n<ul>\n<li><strong>Coinbase:<\/strong> Coinbase sent out a letter to roughly <a href=\"https:\/\/www.zdnet.com\/article\/coinbase-sends-out-breach-notification-letters-after-6000-accounts-had-funds-stolen\/\" target=\"_blank\" rel=\"noopener\">6,000 users<\/a> after detecting a &#8220;third-party campaign to gain unauthorized access to the accounts of Coinbase customers and move customer funds off the Coinbase platform.&#8221; Cryptocurrency was taken without permission from some user accounts.&nbsp;<\/li>\n<li><strong>Neiman Marcus<\/strong>: In October, Neiman Marcus made a data breach that occurred in May 2020 public. The intrusion was only detected in <a href=\"https:\/\/www.zdnet.com\/article\/neiman-marcus-breach-includes-payment-card-numbers-and-expiration-dates\/\" target=\"_blank\" rel=\"noopener\">September 2021<\/a> and included the exposure and potential theft of over 3.1 million payment cards belonging to customers, although most are believed to be invalid or expired. &nbsp;<\/li>\n<li><strong>Argentina<\/strong>: A hacker claimed to have compromised the Argentinian government&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/twitter-suspends-hacker-who-stole-data-of-46-million-argentinians\/\" target=\"_blank\" rel=\"noopener\">National Registry of Persons<\/a>, thereby stealing the data of 45 million residents. The government has denied the report.&nbsp;<\/li>\n<\/ul>\n<h2>November:<\/h2>\n<ul>\n<li><strong>Panasonic<\/strong>: The Japanese tech giant revealed a cyberattack had <a href=\"https:\/\/www.zdnet.com\/article\/panasonic-confirms-cyberattack-and-data-breach\/#:~:text=ZDNet%20Recommends&amp;text=In%20a%20statement%20released%20on,been%20accessed%20during%20the%20intrusion.%22\" target=\"_blank\" rel=\"noopener\">taken place<\/a>&nbsp; &#8212; a data breach occurring from June 22 to November 3, with discovery on November 11 &#8212; and admitted that information had been accessed on a file server.&nbsp;<\/li>\n<li><strong>Squid Game<\/strong>: The operators of a cryptocurrency jumping on the popularity of the Netflix show Squid Game (although not officially associated) crashed the value of <a href=\"https:\/\/www.zdnet.com\/article\/squid-game-cryptocurrency-creators-pull-the-rug-from-under-investors-steal-millions\/\" target=\"_blank\" rel=\"noopener\">the SQUID token<\/a> in what appears to be an exit scam. The value plummeted from a peak of $2,850 to $0.003028 overnight, losing investors millions of dollars. An anti-dumping mechanism ensured that investors could not sell their tokens &#8212; and could only watch in horror as the value of the coin was destroyed.&nbsp;<\/li>\n<li><strong>Robinhood<\/strong>: Robinhood disclosed <a href=\"https:\/\/blog.robinhood.com\/news\/2021\/11\/8\/data-security-incident\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">a data breach<\/a> impacting roughly five million users of the trading app. Email addresses, names, phone numbers, and more were accessed via a customer support system.&nbsp;<\/li>\n<\/ul>\n<h2>December:<\/h2>\n<ul>\n<li><strong>Bitmart<\/strong>: In December, Bitmart said <a href=\"https:\/\/www.zdnet.com\/article\/bitmart-breach-losses-reach-200-million\/\" target=\"_blank\" rel=\"noopener\">a security breach<\/a> permitted cyberattackers to steal roughly $150 million in cryptocurrency and has caused total losses, including damages, to reach $200 million.<\/li>\n<li><strong>Log4j:<\/strong> A <a href=\"https:\/\/www.zdnet.com\/article\/log4j-rce-activity-began-on-december-1-as-botnets-start-using-vulnerability\/\" target=\"_blank\" rel=\"noopener\">zero-day vulnerability<\/a> in the Log4j Java library, a remote code execution (RCE) flaw, is now being actively exploited in the wild. The bug is known as <a href=\"https:\/\/www.zdnet.com\/article\/security-warning-new-zero-day-in-the-log4j-java-library-is-already-being-exploited\/\" target=\"_blank\" rel=\"noopener\">Log4Shell<\/a> and is now being weaponized by botnets, including Mirai.&nbsp;<\/li>\n<li><strong>Kronos<\/strong>: Kronos, an HR platform, <a href=\"https:\/\/www.zdnet.com\/article\/hr-platform-kronos-brought-down-by-ransomware-attack-ukg-warns-of-data-breach\/\" target=\"_blank\" rel=\"noopener\">became a victim<\/a> of a ransomware attack. Some users of Kronos Private Cloud are now facing an outage that may last weeks &#8212; and just ahead of Christmas, too.&nbsp;<\/li>\n<\/ul>\n<hr>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/the-biggest-data-breaches-of-2021\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As COVID-19 continues to cause disruption, cyberattacks haven&#8217;t let up, either.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44637","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The biggest data breaches, hacks of 2021 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The biggest data breaches, hacks of 2021 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-31T14:02:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\/2019\/03\/01\/817912d7-4468-491c-a4b8-4809761588e3\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The biggest data breaches, hacks of 2021\",\"datePublished\":\"2021-12-31T14:02:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/\"},\"wordCount\":1557,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\\\/2019\\\/03\\\/01\\\/817912d7-4468-491c-a4b8-4809761588e3\\\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/\",\"name\":\"The biggest data breaches, hacks of 2021 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\\\/2019\\\/03\\\/01\\\/817912d7-4468-491c-a4b8-4809761588e3\\\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-12-31T14:02:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\\\/2019\\\/03\\\/01\\\/817912d7-4468-491c-a4b8-4809761588e3\\\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\\\/2019\\\/03\\\/01\\\/817912d7-4468-491c-a4b8-4809761588e3\\\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-biggest-data-breaches-hacks-of-2021\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The biggest data breaches, hacks of 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The biggest data breaches, hacks of 2021 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/","og_locale":"en_US","og_type":"article","og_title":"The biggest data breaches, hacks of 2021 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-31T14:02:50+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\/2019\/03\/01\/817912d7-4468-491c-a4b8-4809761588e3\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The biggest data breaches, hacks of 2021","datePublished":"2021-12-31T14:02:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/"},"wordCount":1557,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\/2019\/03\/01\/817912d7-4468-491c-a4b8-4809761588e3\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/","url":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/","name":"The biggest data breaches, hacks of 2021 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\/2019\/03\/01\/817912d7-4468-491c-a4b8-4809761588e3\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-12-31T14:02:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\/2019\/03\/01\/817912d7-4468-491c-a4b8-4809761588e3\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d5a434b760ab9217c36f2071645d7bdbb6c5bd1\/2019\/03\/01\/817912d7-4468-491c-a4b8-4809761588e3\/istock-488253356.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-biggest-data-breaches-hacks-of-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The biggest data breaches, hacks of 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44637"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44637\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}