Worst Data Breaches of 2015

Worst Data Breaches of 2015

Big data breaches made national news in 2015 measured by a variety of criteria that range from amount of records stolen to the types of data stolen to the potential threat to the specific groups, such as children. Below is a list of some of the top hacks of 2015 with a summary of what was stolen, how and the impact the data breach caused.

Ashley Madison

This dating site for married people, with the tagline, “Life is short, have an affair.” had their whole database stolen. 37 million customer records including millions of account passwords made vulnerable by a bad MD5 hash implementation.

While it is unclear how they got in, they hackers where discovered on July 12. The hackers, called the Impact Team, pushed a screen to employees’ computers on login that announced the breach. The attackers then posted personal information of customers seeking extramarital affairs with other married persons, which led to a lot of embarrassment, and in two cases, possible suicides.

Office of Personnel Management

Multiple breaches at the U.S. government’s Office of Personnel Management over nearly a year led to the theft of data on 22 million current and former federal employees that included the fingerprints of about 5 million.

The hackers got into the system using a contractor’s stole credentials to plant a malware backdoor in the network. After going undetected for 343 days, anomalous SSL traffic and a decryption tool were observed within the network, leading to a forensic investigation.

This was big because it appeared to be a data mining operation – seeking data on individuals for intelligence purposes as opposed to data to be exploited for cash. The stolen personnel records include those for workers with classified employees holding sensitive jobs in law enforcement and intelligence.

Anthem

Anthem Blue Cross, a health insurance company, was hacked with personal data from about more than 80 million people compromised, resulting in one of the biggest data breaches of the year.

The hacker went undetected in the system for about nine months because a systems administrator noticed a legitimate account was querying internal databases but without the legitimate users’ knowledge.

This breach resulted in the largest number of records compromised in a healthcare network and bore the fingerprints of Deep Panda, a group known for breaking into technology, aerospace and energy firms as well as another health insurer, Premera.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.