Skip to main content
Open menu
Resources & insights

Recent Real Cyber Security Breach Examples: Lessons Learned in Today’s Digital Landscape

As technology advances and our reliance on digital platforms increases, so does the sophistication and frequency of cyber-attacks. Recent events have underscored the critical importance of implementing robust security measures to safeguard sensitive information and maintain the integrity of our digital infrastructure.

In this context, we will explore some recent real-world examples of cyber security breaches. These incidents, while unfortunate, provide valuable insights into the tactics employed by cybercriminals and the vulnerabilities they exploit. More importantly, they offer lessons on how organisations can enhance their security protocols to prevent similar breaches in the future.

From multinational corporations to small businesses, no entity is immune to these threats. Let’s delve into these examples and extract the lessons they offer.

1. Royal Mail Ransomware Attack (October 2023)

Royal Mail, the cornerstone of the UK postal service, found itself ensnared in a ransomware attack, a type of cybercrime that is becoming increasingly common and sophisticated.

Cybercriminals, exploiting vulnerabilities in the Royal Mail’s digital infrastructure, managed to infiltrate its systems. How did they do this? In the case of the Royal Mail attack, the method used by the attackers to gain access was a well-known form of social engineering – phishing. They encrypted critical data, effectively locking the Royal Mail out of its own information. The malefactors then demanded a ransom for the release of this data, holding the organisation’s digital assets hostage. 

Lessons Learned:

  • Robust Backup Strategy: Regularly backing up essential data can significantly mitigate the impact of ransomware attacks.
  • Incident Response Preparedness: Organisations must have well-defined incident response plans in place to swiftly address and contain such breaches.
  • Security Awareness Training: End users play a pivotal role in preventing cyber incidents. Organisations should conduct regular security awareness training sessions covering topics such as:
    • Identifying phishing emails and suspicious links.
    • Safe browsing habits.
    • Password hygiene.
    • Reporting security incidents promptly.
  • Email Hygiene:  Organisations should invest in advanced email security solutions that can detect and block phishing emails, malicious attachments, and suspicious links.

2. Okta customer support system breach (January 2024)

 In January 2024, an Okta employee unintentionally caused a security breach by accessing their personal Google account on a company-managed laptop. The employee saved their Okta service account credentials into their personal Google account. This action led to the compromise of a service account’s credentials, which allowed unauthorised access to Okta’s customer support system. The breach affected all of Okta’s customers, including notable companies such as 1Password (password management solutions), BeyondTrust (privileged access management and cybersecurity solutions), and Cloudflare (cloud-based services that enhance website performance, security, and reliability, including DDoS protection and content delivery network (CDN) services). The initial compromise of the employee’s personal account likely involved phishing or another social engineering technique.

Lessons Learned:

  • User Training: Educating employees about security best practices is paramount to prevent accidental data exposure.
  • Endpoint Security: Implementing stringent controls can help prevent unauthorised access to company devices.
  • Shadow IT and Personal Accounts: Organisations should enforce technical controls to limit or prohibit the use of personal accounts on corporate laptops.

3.  23andMe leaks profile and ethnicity information of millions of users (March 2024)

 In March 2024, the genetic testing company 23andMe was targeted by a credential stuffing attack. This cyber-attack led to the compromise of user accounts, posing a significant threat to the integrity of user data. Credential stuffing is a type of cyber-attack where stolen account credentials typically consisting of lists of usernames and/or email addresses and the corresponding passwords are used to gain unauthorised access to user accounts through large-scale automated login requests directed against a web application. 

Lessons Learned:

  •  Multi-Factor Authentication (MFA): Implementing MFA provides an additional layer of protection against unauthorised access. By requiring a second form of authentication (such as a text message or app-based code), organisations can significantly enhance security.
  • Password Hygiene: Avoid reusing passwords across different services. Introduce tools that block the use of common or weak passwords. Additionally, consider rate-limiting login attempts on portals or logins to protect against password stuffing or brute force attacks.
  • Regular Security Audits: Continuously monitoring user accounts for suspicious activity through regular audits is crucial for early detection.

4. File Transfer Tool MoveIt Breach Affected Over 2,000 Organisations (May 2023)

 In May 2023, a significant security breach occurred involving the File Transfer Tool MoveIt. This incident affected over 2,000 organizations, underscoring the vulnerabilities associated with third-party tools. The breach likely resulted in unauthorized access to sensitive data, causing potential harm to the organisations involved. This event emphasizes the critical need for stringent security measures and protocols, especially when using third-party tools for data transfer and storage. It also highlights the importance of regular security audits and updates to prevent such incidents.

Lessons Learned:

  • Vendor Risk Assessment: Regularly assessing third-party tools for security vulnerabilities is essential.
  • Data Encryption: Encrypting sensitive files during transfer can prevent unauthorised access and mitigate risks.

5. Shuts Down Following Website Vulnerability (July 2023)

 In July 2023, the well-known communication platform had to cease operations due to a severe security vulnerability that led to user data exposure. This incident underscores the significance of implementing proactive security measures to safeguard user data. The shutdown of serves as a stark reminder for all digital platforms about the potential risks and the necessity of robust security infrastructure to protect user data and maintain trust. It also highlights the need for continuous monitoring and timely updates to address any security vulnerabilities promptly.

Lessons Learned:

  • Security Patch Management: Promptly applying security patches can thwart potential exploitation.
  • Transparency: Open communication with users about security incidents fosters trust and ensures swift action.

6. Smishing Attack Exposes Activision (September 2023)

 In December 2022, Activision, the makers of Call of Duty, suffered a significant data breach due to a successful phishing attack. This breach led to unauthorised access to sensitive employee data and unreleased game content.

The attackers used an SMS-based phishing campaign, known as smishing. They sent messages posing as the “Activision Automated SMS Dispatcher” and tricked an employee into sharing their two-factor authentication (2FA) code. This allowed the attackers to gain access to the employee’s Activision account.

The leaked documents revealed plans for future game content, including collaborations, Gunfights, Spec Ops missions, Raids, and Tier 1 Events. They also hinted at a new instalment in the Call of Duty franchise, codenamed “Jupiter”.

Lessons Learned:

  • User Awareness: Educating users about smishing risks and promoting vigilance is crucial in preventing such attacks.
  • Account Recovery Processes: Strengthening account recovery mechanisms can thwart unauthorised access attempts.

In conclusion, these real-world examples underscore the imperative for organisations to bolster their cyber security posture, employing proactive measures, robust training protocols, and continuous vigilance to safeguard against evolving threats in today’s digital era.

We’re here to help

If you want to achieve better outcomes for your business through a more intelligent use of technology, talk to us.

Contact us