Data Breaches

July 9, 2019

Fortnite Data Breach

The Fortnite data breach has impacted millions of players. Is your information safe?

It’s all fun and games until someone gets breached.

In January of 2019, Epic Games, the creator of the popular online game Fortnite, came clean about a potential hacker situation.

Sadly, this is not the first data breach to impact gamers and it is surely not the last.

With data breaches on the rise, potential threats to personal information are becoming more and more common every day. Some major data breaches that have occurred so far in 2019 include the City of Baltimore Hack and the recent Healthcare Data Breaches.

Is your information safe? If you or a loved one has a Fortnite account, you may already be in jeopardy.

Read more to learn about the recent Fortnite data breach, other data breaches that have impacted the gaming industry, and how to protect your information online.


The Fortnite Data Breach

By now, we are sure that you have heard of the wildly popular battle royale game Fortnite. Loved by people of all ages, Fortnite has taken the world by storm.

In January, a flaw in Fortnite’s login system allowed cybercriminals to impersonate other Fortnite players. This allowed them to take over other player’s accounts with ease.

The flaw was discovered in November of 2018 and was not successfully resolved until January of 2019, almost 2 months later.

Once in the account, the hackers had access to the cards on file for the accounts to make in-game purchases and then transfer those purchases from the hijacked account into their own account.

So – how exactly did they gain access to these accounts?

Due to a flaw in the Fortnite system, hackers were able to steal pieces of code that identified who the player was when they logged into the game. Hackers gained access to the code whenever a player clicked on a malicious link. This allowed them to copy the code and access the accounts without needing a password to sign in.

Once in the account, hackers had access to personal account information, the player’s contact lists, and could even hear the player’s private voice chats during the game. 

It is unclear how many people were affected by this privacy breach – around 80 million Fortnite players play Fortnite regularly. However, there are over 200 million registered Fortnite accounts.

Other Fortnite Data Breaches

Unfortunately, this is not the first time Fortnite has experienced security problems. Last summer, in August of 2018, there was an issue with the Fortnite app for Android devices.

At the time, Fortnite was not made available through the Google Play Store. Instead of playing the game on a different device, some Fortnite users downloaded the app through an Epic Games site instead of the verified App Store. This left room for possible malicious content to be downloaded easily onto Android devices.

Fortnite is now offered through the Google Play Store, allowing users a secure download.

This may seem frightening, especially if you or someone you know is paying Fortnite. However, they are not the only video game that has been breached.

Other Video Game Data Breaches

The online gaming industry is not as secure as we are lead to believe.

Throughout the years, many other popular online games and video game companies have been breached. Some of the most recent gaming hacks include:

Town of Salem 

Town of Salem is an online, multiplayer computer game. This game has quickly risen in popularity and has attracted over 300,000 players every month.  

This data breach occurred in January of 2019 and exposed the information of 7.6 million players. The hack was not announced by the game marker – it was discovered when an anonymous person sent a copy of the breached information to the data breach indexing service DeHashed.  

After several weeks, the game maker, BlankMediaGroup,  announced that the problem was resolved by removing the game’s backdoors, which allowed the hackers access to their player’s personal information in the first place.

During this breach, hackers obtained:

  • Usernames
  • Email addresses
  • Passwords
  • IP addresses
  • Game/forum activity

Armor Games

Armor Games is a computer-based online gaming website. They offer a variety of different games, thus attracting an array of different players.

The Armor Games data breach also occurred in January of 2019. The breach was detected at the beginning of the month of January and announced to their players on January 29, 2019. 11 million players were affected by this breach.

Armor Games was one of the many websites who were hacked during this time – MyFitnessPal, HauteLook, and DubSmash were among the other sites who were impacted. The website data from Armor Games was later put up for sale on the darknet.

Information stolen from users include:

  • Public profile information
  • Email addresses
  • IP addresses
  • Passwords
  • Birthdays

Sony PlayStation

This data breach isn’t as recent, but it is proof that even massive companies who are household names, like Sony, can be breached. 

Sony’s PlayStation network is one of the largest gaming networks in the world with 110 million registered users. At the time of the breach, this was one of the largest data breaches ever.

The breach occurred in April of 2011. After the breach, Sony shut down the entire PlayStation network to prevent further damage. It is said that the breach occurred due to lack of security measures – the hackers were able to take over a computer of a system administrator through a phishing email scam.

Sony PlayStation users had the following information stolen:

  • Full names
  • Addresses
  • Logins – both usernames and passwords
  • Birthdates 
  • Security questions and answers
  • Credit card information – including security code

Keeping Your Information Safe Online

Like anything, protecting your gaming information can be a struggle. As hackers become more and more stealthy, we must also do more to protect our personal information.

Some best ways to protect yourself online while online gaming include:

  • Only play authorized games. Make sure that you are only downloading and playing games from an authorized source. Downloading games elsewhere can leave room for hackers to create a malicious game.
  • Do not share your gaming profile information. Sharing usernames, passwords, or other login credentials with others can increase the risk that your information will end up in the wrong hands.
  • Update your software. It is important to keep both your device and your game up to date. Updates prevent hackers from accessing backdoors, so make sure to keep up with any software updates for your devices.
  • Beware of scams. Other players or entities may try to trick you into giving away personal information to access your account. Beware of any messages or other players that do not seem legit.
  • Set guidelines. As with anything, set guidelines for yourself and others in your household when playing online games.


Whether you are a Fortnite player, online gamer, or a concerned family member or friend, we hope that you have gotten some clarity from this blog.

It is important to protect yourself before something bad happens to avoid any possible damage to your information and identity.

If you have any questions, concerns, or want to sign up for an identity theft protection plan through American Identity Group, give us a call at 855-514-8140.


Thanks for reading!

June 17, 2019

Healthcare Data Breaches on the Rise in 2019

In early June of 2019, 2 major healthcare institutions suffered from a data breach. This resulted in millions of people having their personal information exposed.

Doctor Stethoscope

If you have been following our blogs, you will know that data breaches have been occurring more and more frequently. Over the past few months, amongst many, smaller data breaches, we have covered the Earl Enterprises data breach and the City of Baltimore hack.

Who knows when the next data breach will occur.

June of 2019 has been a major month for healthcare data breaches. Within days of one another, two major medical testing lab companies have announced that they have been affected by a data breach.

This breach targeted the AMCA, or the American Medical Collection Agency, which is the billing processing company for many major healthcare companies.

Although it is claimed that no medical information has been stolen, other personal and financial information was compromised.

First, the Quest Diagnostics data breach was announced on June 3rd. This breach made the personal information of over 12 million Quest patients vulnerable.

Next, the LabCorp data breach left 7.7 million LabCorp customers’ data exposed.


So – what exactly does this mean for us and how do we recover?

Read more to learn about what a healthcare data breach is, information regarding the Quest Diagnostic and LabCorp data breach, and a potential strategy for moving forward after these breaches.

What is a Healthcare Data Breach?

A healthcare data breach occurs when a healthcare institution becomes a victim of a data breach. Although we may not hear about them as frequently, according to the Ponemon Institute and Verizon Data Breach Investigations Report, the healthcare industry experiences more data breaches than any other industry sector.


It is reported that from 2009 – 2018, there were over 2,500 healthcare data breaches, exposing more than 194 million personal records.

When broken down, this number of records would mean that over half of the current U.S. population has had their information breached.

Although healthcare data breaches are getting more and more common, they are not new.

So far, the largest attack within the healthcare sector was the 2014 Anthem Health Insurance.

Anthem Healthcare - Logo

This breach affected a total of 80 million Americans – revealing information such as names, addresses, birthdates, and medical IDs.

It is believed that this hack occurred due to Anthem not properly encrypting their patient files before falling victim to a well-executed phishing attack.

So – onto the big question – how and why are these breaches occurring?


The biggest reasons data is breached includes:

  • IT Incidents (43.3%)
  • Unauthorized access/disclosures (39.2%)
  • Theft incidents (11.5%)
  • Loss of personal healthcare information (3.56%)
  • Improper disposal of information (2.47%)


As for the why, healthcare records, and any form of personal information for that matter, is extremely valuable for cybercriminals.


Once a cybercriminal obtains your information, they can either:

  • Sell it on the Dark Web. This allows them to profit off of your stolen information while others use it for their own personal gain.
  • Use the information themselves. This option allows hackers to take over your identity – opening credit cards in your name, obtaining loans with your Social Security number, or, even using your medical information to receive medical treatment.
  • Use the information as a weapon. Ransomware is a rising trend in the hacking industry. This occurs when someone clicks on a malicious link that infects the overall system. If a healthcare system fell victim to a ransomware attack, the hackers will ask for a certain payment amount within a strict timespan to regain the information before they leak it.


Basically, once the information has been breached, the cybercriminal has the upper hand in the situation.

Unfortunately, all that the victims can do is work on recovery efforts to minimize the effects of the attack.

2019 Healthcare Data Breaches

Before we talk about the breaches individually, we have to discuss the larger breach that made Quest Diagnostics and LabCorp vulnerable.

As we mentioned previously, the individual breaches were a part of a larger breach that the American Medical Collection Agency suffered from. The AMCA announced a month prior to the Quest breach that there was unauthorized activity on their web payment pages. This unauthorized activity occurred from August 1, 2018 – March 30, 2019.


This makes all healthcare entities using the AMCA for billing purposes susceptible to a data breach. Quest Diagnostics and LabCorp are the only two business’ who have identified a breach thus far.

Since the hack, AMCA has hired a third party firm to investigate the incident. They have also moved all web payment services to a different vendor and brought on more help to increase security.

Quest Diagnostics

During the Quest Diagnostics data breach, the personal, financial, and medical records of almost 12 million people were stolen.

Quest Diagnostics Logo

Quest revealed that information obtained included information such as credit card numbers, bank account information, medical information and Social Security numbers. Because results are not given to AMCA for billing purposes, hackers did not gain access to any test results.

Due to the hack, Quest has stopped using AMCA for billing requests and purposes.



During the Labcorp data breach, personal and financial data of 7.7 million people was stolen.

The hackers were able to obtain names, birthdays, addresses, phone numbers, dates of service, account balances, credit card information, banking information and more that is still unknown.

LabCorp says that the hackers did not gain information regarding which tests were ordered or what the results of those tests were.


How do You Recover?

First of all – do not panic.

Once you receive notification that your information has been involved in a healthcare data breach, it is time to stay calm and focus.

In this situation, you want to

  • Check your credit card/banking statements. The majority of the information compromised in the most recent breaches was financial information. Review your financial records for the past year to see if there is any suspicious activity. You may also want to take a look at your credit report to see if there is any discrepancy.
  • Stay informed on the AMCA data breach. This is not the last you will hear about this breach. This breach was only discovered recently, so investigations are still ongoing. It is likely that AMCA will be making frequent announcements of new discoveries. Once announced, you can act accordingly.
  • Protect yourself. The best time to protect your identity is before something bad happens. Luckily, we are offering single plan and family plan identity protection services for only $1! While with American Identity Group, if you are ever involved in a breach like this, we will alert you immediately and set up an individualized recovery plan.



How do you feel about the recent healthcare data breaches? Let your questions, comments, or opinions in the comments below!

June 3, 2019

Baltimore Hack 2019 – Latest Data Breach

Have you heard the latest news?  At this point, we are all aware of the terms – a hack, a ransom, and a cyber attack. Well, listen up folks! The entire city of Baltimore (yes, you read that correctly! The entire city.) was HACKED.  


The Baltimore cyber attack occurred a little over 3 weeks ago. On Saturday, May 7th, 2019 the citizens of Baltimore Maryland woke up to a cyber attack and data breach alerts.

Baltimore Hack

According to the New York Times:

“a hacking vulnerability known as EternalBlue has been exploited to blackmail Baltimore’s local government. The NSA discovered the flaw, but the paper claims that its cyber-spies kept the discovery secret for years.”


Here’s the biggest shocker of all – the NSA declined to comment.


Let’s dive more into hackers, the 2019 Baltimore Hack, and the consequences of the Baltimore Hack.


Hacker Tactics

Hackers have “secret words” with specific meanings. For example, a term hackers use to describe a vulnerability that they find and only they know about is called a “Zero Day.” The term “Zero Day” means that there are zero days of public knowledge where there are preventions created for any attack.


In certain cases, hacker have a “Zero Day exploit.” This means they have an advantage that might backdoor a server using its newly found vulnerability.


Vulnerability is defined, loosely, as something that would allow a user to control or submit code that they write that allows them to run the code on the server.


According to the New York Times, The EternalBlue flaw has accounted for a wide range of cyber attacks in the past 3 years. Some of the cyber attacks include the major Wannacry assault. This cyber attack was one of Europe’s first major attacks in history. This hack affected the United Kingdom’s National Health Service.


In layman’s terms, the NSA may have been using the Zero Day vulnerability to get an upper hand on our enemies. It is always portrayed to us that this type of hacking is more common to have in other countries. However, sadly, it is not. Microsoft Windows users are more vulnerable to the Zero Day tactic.


My question is quite simple – why did we create something that was “easy” to “steal” or “hack” by others? Why was there no “off ” switch or master reset created? Why have we not caught the hackers, whom all happen to be members of The Shadow Brokers. This group is an elite hacker group who stole data disks of NSA information in 2017?

As the saying goes, history will repeat itself. In this case, it has with the Baltimore Hack.


What is EternalBlue?

Well, this should come as no shocker. EternalBlue is a tool developed by the United States National Security Agency (NSA). This tool exploits a flaw in the Windows operating system. It is the tool behind the ongoing ransomware attack on the City of Baltimore, according to reports.

We are NOT surprised by this bit of information, are you?

The New York Times states that EternalBlue is a flaw in Microsoft Windows XP and Vista systems. This flow allows cyber hackers to execute remote commands on their target.

EnternalBlue Baltimore Hack

This is where it gets tricky. According to the Washington Post, the “NSA, created the EternalBlue in the early part of the decade and was used for over 5 years, until it was stolen in April 2017. Since 2017, “The EternalBlue flaw has since been used to cause cyber destruction around the world, including attacks such as WannaCry in May 2017 and the NotPetya attacks in June of the same year.

Due to the severity of the attacks, the NSA is being forced to come clean to Microsoft.

Fast forward to May 7, 2019, the Baltimore Hack, ransomware attacks that have shut the city down a month, has occurred. The citizens of Maryland land the local government want answers from the NSA.

According to The Baltimore Sun, “The agency has never confirmed how it came to lose control of its hacking tool, nor officially commented on the affair.”


The Victims Pay the Price!

The citizens of Maryland are experiencing an email blackout. Thousands of American citizens are concerned as their emails have been locked frozen. The Baltimore Sun reports that citizens were in for a shock when the criminals responsible demanded 13 Bitcoins to unlock them all, or three Bitcoins to release specific systems ahead of a deadline, which has now passed.

Baltimore and its citizens are in a complete standstill. Hospitals and doctor offices face ongoing issues! All staff are unable to open, send, or receive emails from their accounts. Surgeries, medical devices, medical equipment, doctor appointments, water, electricity, taxes, health alerts, and many other crucial services are all shut down and affected.

Let’s take a moment to think about the risk factors and repercussions this will have on America.

NSA - Baltimore Hack

According to The New York Times, Since 2017, the NSA lost control of EternalBlue. The Shadow Brokers carried out the hack. According to the New York Times, the state hackers reside in North Korea, Russia, and, more recently, China. The group who goes by Shadow Hackers reportedly affected thousands of citizens and caused billions of dollars in damages.


Stay alert! This can be the beginning of a larger major cyberattack.


What Happens Now?

According to the New York Times, “It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.


Baltimore citizens are concerned and worried. Most of them are wondering how are they going to recover from this. What is our Government doing to protect us? Why is this crucial life-changing issue not pursued and explained thoroughly enough on the news and social media outlets?

According to the Baltimore Sun, Senator Chris Van Hollen and Congressman Dutch Ruppersberger has told the Baltimore Sun newspaper that they are now seeking “a full briefing” directly from the NSA.

“We must ensure that the tools developed by our agencies do not make their way into the hands of bad actors,” the Senator told the paper. 

Why is there no “patch” or an extra layer of security for this software?

I am no conspiracy theorist, but this devastating cyber hack seems as if it could have been prevented. Don’t you agree?

At American Identity Group we believe in protecting your freedom by protecting your Identity. Try our Full-Service Restoration service for only $1

American Identity Group - Protection Plans

American Identity Group - Protection Plans

What are your thoughts on the Baltimore Hack? Do you believe we could have prevented this? Comment with your thoughts below!


May 20, 2019

Verizon 2019 Data Breach Investigations Report

Have you read the 2019 Verizon Data Breach Investigations Report? If not, no worries! We read it for you and selected the most important information for you to know.

Verizon Logo

It’s the year 2019, and, honestly, nothing should come as a surprise, especially when discussing data breaches! We have talked about data breaches, such as the Earl Enterprises data breach and the 17 Biggest Data Breaches Ever.


On Wednesday, May 9, 2019, Verizon released the 2019 Verizon Data Breach Investigations Report (DBIR). The DBIR provides information on the evolving threat landscape and is the most valuable annual report. It is the “state of the nation” in the theft and identity protection world.


The Data Breach Investigations Report

Verizon 2019 Data Breach Investigations Report

This year’s DBIR involved the analysis of 41,686 security incidents from 66 global data sources in addition to Verizon. The report analyzed 41,686 security incidents, of which 2,013 were confirmed data breaches, with data provided by 73 sources.

The report showed an increase in nationwide state attacks last year; 23% of the analyzed breaches were attributed to nation states or state-sponsored actors, compared to just 12% in the 2018 report.

The 2019 Verizon DBIR also stated 25% of breaches were motivated by cyberespionage, compared to just 13% of breaches in last year’s report.” Cyberespionage is defined as a type of cyber attack that steals information in order to gain an advantage over a competitor.

The issue is that this is a constant uphill battle between cyber hackers and defenders. Sadly, this issue is not getting any better. In fact, the 2019 Verizon Data Breach Investigations Report (DBIR) proves that this is a growing threat to our society.

Two important questions you are probably asking yourself is…

  1. How long does it take for a cybercriminal to steal your information?
  2. How long does it take for a defender to realize what has happened to their data?

Phishing Scams

Well, the answers might not be what you would like to hear.

The truth of the matter is that we, as defenders, take days, even weeks or months, before we realize our data has been breached. On the other hand, it takes a few seconds for cyber thieves to steal your information and leak any data they want!

This may not be what you wanted to hear but this is the scary truth.


Technology is a beautiful thing as it has made everyone’s lives easier, including cyber hackers.

Some of the key takeaways noted while reviewing The 2019 Verizon Data Breach Investigations Report (DBIR are as follows:

DBIR 2019 Key Takeaways

  • 43% of small businesses suffered from a data breach
  • Compromise of web-based email accounts using stolen credentials (98%) is on the rise. This is seen in 60% of attacks involving the hacking of a web-based application
  • Financial gain remains the most common motivation behind data breaches (71%)
  • A third (32%) of data breaches involved phishing tactics
  • One-quarter of all breaches associated with cyberespionage
  • Ransomware attacks are still strong, accounting for 24% of the malware incidents analyzed and ranking #2 in most-used malware varieties
  • Nation-state threats are increasing, with 23% of breaches by nation-state actors
  • More than half (56%) of data breaches took a month or longer to discover
  • Ransomware remains a major threat. It is the second most common type of malware
  • Social engineering attackers, such as phishing or BEC, business email compromise, targets business executives
  • 60 million records breached due to misconfigured cloud service buckets
  • Crypto-mining malware accounts for less than 5% of data breaches. Despite the publicity, it didn’t make the top ten malware listed in the from being breached?


Strike Fast!

As mentioned at the top of this blog, the amount of time it takes for a cyber hacker to steal your identity and breach or leak your data is very short, typically in minutes. Unfortunately, the victim normally isn’t as lucky and doesn’t find out until the damage is done.

According to Forbes, 56% of 2018 breaches “took months or longer” to discover. Keep in mind, the time of discovering data breaches varies by type of attack. Regardless of the attack, American Identity Group is here to protect YOU! American Identity Group cares about you and your freedom. Cyber hackers, on the other hand, could care less about your freedom. Instead, they focus on making our lives a living hell.

The American Identity Group consists of dedicated experts that will be monitoring your identity and alerting you to any changes that are made. American Identity Group was created for this exact reason. As Americans, we understand the privilege of our freedom. We understand the NEED for identity theft protection services, especially with today’s technology.

How can you detect if you have been a victim of a cyber attack?

3 simple words, American Identity Group!

Learn more about our identity protection service plans for $1.00 down

April 3, 2019

17 Largest Data Breaches Ever

Have you ever been involved in a data breach? Your personal information may have been compromised without you even knowing it.

Concerned about protecting your identity? Get a Free dark web scan!

Last year alone, 1,244 data breaches occurred impacting 446.5 million people.

Find out today if your information was involved in one of the major data breaches. Below are 17 of the biggest data breaches ever.


1. Equifax Data Breach

When it Happened: July 2017

equifax - data breach

Number of Victims: 147.9 million

Equifax is one of the largest credit bureaus in the United States. Equifax stated that an application vulnerability on their website led to a breach in their customer data. Users had the following information stolen:

  • Social Security numbers
  • Birth dates
  • Addresses
  • Drivers’ license numbers
  • Credit card data

2. eBay’s Data Breach

When it Happened: February 2014

Number of Victims: 145 Millionebay - data breach

This data hack occurred after a number of employee login credentials were obtained, giving hackers open access to eBay’s corporate network. eBay emailed all users a notice after the attack took place, asking them to change their password information. During the attack, both eBay employees and eBay customers had the following information stolen:

  • Encrypted passwords
  • Customer names
  • Email addresses
  • Mailing addresses
  • Phone numbers
  • Dates of birth

3. Experian’s Data Breach

When it Happened: September 2017

Number of Victims: 143 Millionexperian - data breach

The breach at Experian began in May 2017. However, it was not discovered until almost a month after it was already in progress. Experian did not reveal the full extent of the data breach until September of the same year. The hackers used a website vulnerability to obtain information about British, Canadian, and American Experian customers. During the breach, hackers obtained:

  • Social security numbers
  • Birth dates
  • Home addresses
  • Driver’s licenses
  • Credit card numbers
  • Credit card dispute documents

4. Heartland Payment Systems Breach

When it Happened: May 2008

Number of Victims: 134 Millionheartland payment systems - data breach

At the time of the breach, Heartland was the sixth-largest payment processor in the U.S. It is unknown how the breach occurred, but the company was alerted to an issue after unauthorized credit card transactions began appearing on customer accounts. The breached data includes:

  • Credit card data
  • Payment card transactions

5. Target Stores Data Breach

When it Happened: December 2013

Number of Victims: Around 110 Milliontarget - data breach

The Target data breach was announced several weeks after hackers had already stolen customer information. During this breach, hackers gained access to Target’s system. The attack was carried out through Target’s Point of Sale card readers. The hackers proceeded to collect:

  • Credit card numbers
  • Debit card numbers
  • Full names
  • Addresses
  • Email addresses
  • Telephone numbers

6. TJX Companies, Inc.

When it Happened: December 2006

Number of Victims: 94 millionTJX - data breach

TJX Companies operates more than 2,000 retail stores throughout the U.S. Their range of stores include Marshalls, TJ Maxx, and HomeGoods. How the hack began is unknown. TJX stated that it either began with hackers taking advantage of a weak data encryption system to steal customer credit card data or with hackers breaking into the TJX network via in-store job application kiosks. During the hacking, stolen information included:

  • Debit card information
  • Credit card information

7. Sony’s PlayStation Network Data Breach

When it Happened: April 2011

Number of Victims: 77 MillionPlaystation Netword - data breach

This breach is the worst gaming data breach of all time. The data breach was not revealed to PlayStation customers until after customers began to notice unusual activity on the same payment account as their PlayStation accounts. During this breach, stolen information included…

  • Full Names
  • Passwords
  • Emails
  • Home addresses
  • Purchasing history
  • Credit card numbers
  • PlayStation Network logins and passwords

8. JPMorgan Chase Data Breach

When it Happened: June 2014

Number of Victims: 76 Million individuals + 7 Million small businessesjp morgan - data breach

The data breach at JPMorgan Chase occurred in June of 2014. It was not made public until October of 2014. Customers using, JPMorganOnline, Chase Mobile, or JPMorgan Mobile were impacted.  During the attack, hackers obtained information from Chase customers such as:

  • Contact information
  • Names
  • Addresses
  • Phone numbers
  • Email addresses

9. Home Depot Data Breach

When it Happened: September 2014

Number of Victims: 56 Millionhome depot - data breach

In this data breach, Home Depot’s Point of Sale system was infected with malware. The infection took place almost 5 months before it was released to the public. The hackers disguised the malware used in this attack as an anti-virus software service. The Home Depot breach resulted in hackers obtaining:

  • Payment card data
  • Email addresses

10. CardSystems Solutions Inc. Breach

When it Happened: June 2005

Number of Victims: 40 Millioncard systems inc - data breach

CardSystems Solutions is a company that processes payment data for MasterCard and other major credit card companies. A cybercriminal was able to hack into the CardSystems Network to obtain customer information. During the data breach, hackers stole:

  • Credit card numbers

11. RSA Security Breach

When it Happened: April 2011

Number of Victims: 40 Million BusinessesRSA - Data Breach

RSA Security was considered one of the world’s top computer-security companies. Hackers gained access to RSA’s SecurID two-factor authentication information through a phishing scam. The hackers sent two groups of RSA employees fake emails with the subject-line “2011 Recruitment Plan.” When one employee clicked, the hackers gained access to all SecurID information. RSA Security did not real much about the ordeal, but the following information was confirmed stolen:

  • RSA serial numbers
  • SecurID account information

12. Ashley Madison Data Breach

When it Happened: July 2015

Number of Victims: 37 MillionAshley Madison - Data Breach

Ashley Madison was America’s most prominent dating website. The hackers decided to hack the site because they did not agree with what it was promoting. During the hack, information stolen included:

  • Users’ real names
  • Addresses
  • Personal photographs
  • Payment information
  • Chat logs

13. Adobe’s Data Breach

When it Happened: October 2013

Number of Victims: 38 MillionAdobe - Data breach

Adobe announced this data breach in October of 2013. However, it took weeks for the Abode team to determine the scale of the breach. During the Abode breach, hackers accessed:

  • Credit card records
  • Customer login data
  • Encrypted passwords
  • Customer names

14. The Data Breach at Nasdaq

When it Happened: October 2010

Number of Victims: 38 MillionNasdaq - Data Breach

During this data breach, a group infiltrated the Nasdaq system. The hackers utilized traded text-strings to exploit SQL-injection vulnerabilities. PNCBank, 7-Eleven, JCPenney and other companies on the Nasdaq stock exchange were impacted during this data breach. During this hack, information obtained included:

  • Login credentials
  • Sensitive data
  • Credit card data

15. Zappos Breach

When it Happened: January 2012

Number of Victims: 24 MillionZappos - Data Breach

Zappos is a major online retailer. When the retailer was hacked, cybercriminals obtained:

  • Customer account information
  • Full names
  • Email addresses
  • Billing addresses
  • Shipping addresses
  • Phone numbers
  • Last 4 digits of credit/debit cards
  • Encrypted passwords

16. Staples Breach

When it Happened: October 2014

Number of Victims: 1.16 MillionStaples - data breach

Staples suspected a cyberhacking when multiple credit card companies found a pattern of payment fraud. This suggested that the Staples’ computer system had been breached. Stolen information included:

  • Customers’ names
  • Payment information
  • Card numbers
  • Expiration dates
  • Card verification codes

17. Global Payments Data Breach

When it Happened: April 2012

Number of Victims: 1.5 MillionGlobal Payments - Data Breach

The Global Payment data breach affected mainly North America. It is warned that the breach may have affected transactions dating back to June of 2011. During this breach, hackers stole:

  • Credit card numbers
  • Names & Addresses

Concerned about protecting your identity? Get a Free dark web scan!

Scroll to top

Medicare Supplement Breach Alert! has exposed the records of 5 million Americans 🔓

Call 855-717-4608 TODAY to see if your identity is AT RISK of being stolen!


American Identity Group

AT&T Breach Alert!

AT&T employees have planted malware on the company’s internal systems to unlock cell phones 📱

Illegal hardware was installed within the network to help hackers gain remote access and unlock millions of smartphones.

Call 855-717-4608 TODAY to see if your information is SAFE!

American Identity Group

State Farm Breach Alert!

STATE FARM has suffered from a Credential Stuffing data breach 🔓💰

A list of user IDs and passwords were obtained from the dark web in to attempt to access to STATE FARM online accounts.

If you have a STATE FARM account, your information may be in the WRONG hands!

Give us a CALL NOW at 855-717-4608 to find out.

American Identity Group

Capital One Data Breach Alert!

A hacker has gained access to the accounts of 100 million Capital One customers 🔓If you use Capital One, your information may be in the WRONG hands!

Find out if your Identity has been compromised!

CALL NOW at 855-717-4608 to find out.

verified by American Identity Group

Google Home Speaker Data Breach Alert!

Your GOOGLE HOME SPEAKER may be recording your conversations and leaking your information without your knowledge 📢

Google regularly records and listens to private conversations via the GOOGLE HOME SPEAKER when you aren’t using the speaker or asking it a question.

Give us a CALL NOW at 855-717-4608 to protect yourself today.

verified by American Identity Group