Worst Data Breaches of 2015

Worst Data Breaches of 2015

Big data breaches made national news in 2015 measured by a variety of criteria that range from amount of records stolen to the types of data stolen to the potential threat to the specific groups, such as children. Below is a list of some of the top hacks of 2015 with a summary of what was stolen, how and the impact the data breach caused.

Ashley Madison

This dating site for married people, with the tagline, “Life is short, have an affair.” had their whole database stolen. 37 million customer records including millions of account passwords made vulnerable by a bad MD5 hash implementation.

While it is unclear how they got in, they hackers where discovered on July 12. The hackers, called the Impact Team, pushed a screen to employees’ computers on login that announced the breach. The attackers then posted personal information of customers seeking extramarital affairs with other married persons, which led to a lot of embarrassment, and in two cases, possible suicides.

Office of Personnel Management

Multiple breaches at the U.S. government’s Office of Personnel Management over nearly a year led to the theft of data on 22 million current and former federal employees that included the fingerprints of about 5 million.

The hackers got into the system using a contractor’s stole credentials to plant a malware backdoor in the network. After going undetected for 343 days, anomalous SSL traffic and a decryption tool were observed within the network, leading to a forensic investigation.

This was big because it appeared to be a data mining operation – seeking data on individuals for intelligence purposes as opposed to data to be exploited for cash. The stolen personnel records include those for workers with classified employees holding sensitive jobs in law enforcement and intelligence.

Anthem

Anthem Blue Cross, a health insurance company, was hacked with personal data from about more than 80 million people compromised, resulting in one of the biggest data breaches of the year.

The hacker went undetected in the system for about nine months because a systems administrator noticed a legitimate account was querying internal databases but without the legitimate users’ knowledge.

This breach resulted in the largest number of records compromised in a healthcare network and bore the fingerprints of Deep Panda, a group known for breaking into technology, aerospace and energy firms as well as another health insurer, Premera.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.