In 2021, data privacy leakage events frequently, involved in the broad crisis of broad crisis, and the enterprise, therefore caught in data protection compliance and social public opinion pressure. Recently, foreign media has combed the Top Ten data leaks in 2021, and reviewed the incident and is available for readers. According to statistics, nearly 220 million people were affected by the following top ten data security incidents, three leaks occurred in technology companies, and four leaks involved in sensitive records.

OnemoreLead

Number of people: 63 million

Discovery time: August 2021

Event Overview:

VPnmentor’s research team found in August, B2B Marketing Company OneMorerads stores at least 63 million Americans in an insecure database, which is completely open. The database contains basic personal identity information of each person listed, as well as similar data and information about its work and employers. This information is likely to be provided to customers or customers registered with their B2B marketing services. VPnMentor saw a large amount of .GOV and New York Police Authority email address in the database, which allows hackers to penetrate into advanced government agencies. VPnMentor said that the private data of the government and the police department is like the gold mine in the eyes of a hacker engaged in criminal activities, which may lead to major national security incidents, which make the public to be seriously trusted on the government. According to VPNMENTOR, the name, email address, and workplace information are exposed to anyone who has a web browser.

Event Review:

Technology and data are very important for today’s marketing, and the concept of big data marketing is also in the ascendants. When the marketer is rejoys to collect data, establish a model, do insights to guide the marketing, how can user data security, what is the bottom line of corporate marketing, worthy of marketing company.

2. T-Mobile

Number of affected people: 47.8 million

Discovery time: August 2021

Event Overview:

T-Mobile confirmed on August 17 that the system was attacked on March 18, millions of customers, the data of the former customers, and potential customers were disciprified. T-Mobile indicates that the leak information includes name, driver’s license, government ID card number, social security number, date of birth, T-Mobile recharge card PIN, address, and telephone number. T-Mobile, the criminals use the expertise of the technical system and the special tools and functions, and access the company’s test environment. Subsequently use brute force attacks and other methods to enter other IT servers containing customer data. T-Mobile, it figured out how the criminals illegally enter their servers and close these entry points. The company said it will provide all two-year free identity protection services that may be affected (Michael’s identity stealing protective service). In addition, T-Mobile expressed as the post-pay customer providing account takeover protection services, so that the customer account is more difficult to leak and steal by fraud.

Event Review:

T-Mobile is a multinational mobile phone operator, a subsidiary of German Telecom, which belongs to the FreeMove Alliance. T-Mobile operates GSM networks in Western Europe and the United States and participates in the network operations of Eastern Europe and Southeast Asia through financial means. The company has 10.9 billion users and is one of the world’s large mobile phone companies. This kind of company has a higher value for online criminals. Communication companies are obliged to protect customer information and need more homework in data security.

3. Unknown marketing database

Number of people: 35 million

Discovery time: June 2021

Data content: personal information

Event Overview:

Comparitech researchers reported on July 29, a mysterious marketing database containing 35 million individual details was disclosed online, and there was no password. The database includes name, contact information, home address, race, and numerous demographic information (including hobby, interest, shopping habits and media consumption, etc.). Related samples show that most records are related to the residents of Chicago, Los Angeles and San Diego. According to Comparitech, anyone who has a web browser and internet access can access all the contents of the database, and the information contained in it can be used to have targeted spam and fraud activities and phishing. The COMPARITECH network security research team discovered the database on June 26, although the decimal decisions were made, or they were not determined to be all. The company contacted the Amazon Network Services (AWS) hosting the database server, requiring the withdrawal of the database, but the data can still be accessed before July 27.

Event Review:

Behind the Internet provides accurate marketing, it is the request, finishing, analyzing, and excavating of user privacy data over and over again. Any laws in any country do not say that personal information is not allowed, all laws and regulations are a big premise around how to use this information correctly, not how to use this information, this is a big premise. So, how do personal data use correctly? This involves the principle of “agree”, the agreement is the starting point of the company’s personal information. Of course, there is also an exception to use personal information without personal consent, generally involving special circumstances such as national security. The agreement contains three types: the default consent, express consent and authorization consent. 4. ParkMobile

Number of people: 21 million

Discovery time: March 2021

Event Overview:

ParkMobile discovers network security events related to third-party software vulnerabilities in March. The survey found that its basic user information is accessed, including license plate numbers, email addresses, telephone numbers, and vehicle nicknames. In a few cases, the mailing address is also accessed. The company also found that encrypted passwords were accessed, but the encryption keys required to read these passwords were not accessed. ParkMobile indicates that it encrypts the user password using advanced hash and joining random strings to protect user passwords. ParkMobile, the user should consider changing the password as another precaution; the credit card or parking transaction history has not been accessed; it does not collect social security numbers, driver’s license numbers or date of birth. ParkMobile said: “As a large parking application software in the United States, the trust of users is the weight of our focus. Please rest assured that we carefully treat the responsibility of protecting user information security.”

Event Review:

Park Mobile is a popular mobile parking application in North America, which shows that the parking space ParkMobile on the streets also supports payment within the application, that is, the user enters the distance to meet the requirements of the parking space. However, special attention is that this feature is only open to ParkMobilePro payment users. It also provides parking discounts, roadside assistance, and temporary promotions. It also needs to be further strengthened while bringing convenience to users.

5. ClearvoiceRESEARCH.COM

Number of people affected: 15.7 million

Discovery time: April 2021

Event Overview:

ClearVoice learned in April that an unauthorized user released an individual information database containing August and September 2015 and September 2015 and sold this information to the public. Accessible data includes contact information, password, and responses made to user health, political factions, and ethnicity. ClearVoice said that this data may be abused by the criminals, leading to investigating participants to be contacted by people (such as advertisers). In addition, accessible information may be used to prepare personal data, and these materials can be used for commercial or political purposes. Within an hour of receiving an unauthorized user from an email, ClearVoice means that it finds a backup file to ensure that it is safe and eliminates the risk of leakage facing the cloud server. In addition, ClearVoice forced a password for all members that might leak information, and implemented security measures to prevent such events from happening again and protect the privacy of member data.

Event Review:

ClearVoice is a talent network and content marketing platform to help companies create fascinating content to support their blog, SEO, social media and marketing automation. ClearVoice integrates edit calendars and simplified content workflows improve productivity and help marketers achieve their content marketing goals. Obviously, the security is not well incorporated on its platform when it conducts marketing activities.

6. Jefit

Number of people: 905 million

Discovery time: March 2021

Event Overview:

Exercise Tracking Application JEFIT discovering the data leakage caused by security vulnerabilities in March, which affects the customer account registered before September 20, 2020. The criminals have accessed the following information: JEFIT account username, with an email address, encrypted password, and IP address when creating an account. JEFIT Save IP addresses to prevent robotics and register abuse accounts. The company found the root cause of data disclosure and confirmed that other systems of JEFIT did not affected. JEFIT said that it has taken safety steps to enhance the network to prevent similar leaks in the future and are adopting more powerful password policies on its products to further protect user accounts. In addition, JEFIT said that sensitive financial data is not involved because the company never stores customer payment information. When the customer purchases a product in the Jefit website, all payment processes are processed directly by the GooglePlay Store, the Apple App Store, or directly by the payment gateway company. Event Review:

Founded in 2010, Jefit is determined to become Facebook in the fitness industry. In this context, it has a large database that is difficult to shoulder with similar applications: more than 1300 training actions, and training programs shared by millions of users. Jefit can only do tracking and management of fitness training data, wanting to intuitively analyze the training status and physical performance of individuals during fitness within a certain period, but also have some data integration and analysis tools. Whether using your own system or by means of third-party tools, you need to do data protection.

7. Robinhiod

Number of people: 7 million

Discovery time: November 2021

Event Overview:

The electronic trading platform Robinhi has disclosed on November 8 that unauthorized relevant parties will be charged by employees through the phone five days ago and visit the customer support system. Robinhiod said that in this event, hackers have received a list of approximately 5 million email addresses and a full name of approximately 2 million people. Robinhiod said that thousands of entries in this 7 million records contain a phone number, approximately 310 names, birth dates, and postal codes have been disclosed, with more than 10 more customers’ more detailed account information being disclosed. Robinhi said after curbing this, the hacker is ranging to ransom. It in timely notifies the law enforcement department, will continue to investigate this incident with the help of Mandiant.

Event Review:

Popularizing others to log in to the corporate network, in fact, the identity of employees. Identity authentication is also called “authentication” or “identification”, refers to the process of confirming the operator identity in a computer and computer network system, thereby determining whether the user has access and access to a certain resource, thereby making a computer And the access policy of the network system is reliable, efficiently, prevent attackers from fake legitimate users to obtain resources access, ensuring the security of the system and data, and the legitimate interests of authorized visits. Single identity authentication means easy to cause the account to be taken, resulting in internal information disclosure, and companies need to further strengthen their identity authentication system to ensure the security of network information.

8. Accellion

Number of people: 6.76 million

Discovery time: early 2021

Event Overview:

At the beginning of 2021, the hacker combined with the old ACCELON file transmission equipment (FTA), leak data, requiring payment to ensure returning and deleting data. According to the HIPAAGUIDE website, the CLOP Lee Software Gang’s Data Lead Website is used to publish some stolen data to persuade victims to pay the ransom. As of April 2021, at least nine healthcare organizations were known from Accellion data leaks, including 1.470,000 customers of Krogerpharmacy, Health Net’s 1.87,000 members, Trinity Health, 88,000 members of CaliforniaHealth & Wellness, Trillium Health Plan 50,000 customers, and 29,000 members of Arizona Completehealth. Stanford Medicine, UNIVERSITY OF Miami Health and Centenecorp have also been influenced by this leak event, but the number of people affected in each organization has not been confirmed. The leak information includes name, social security number, date of birth, credit or bank account, health insurance number, and / or information related to health.

Event Review:

“Zero-day” is also called zero-time difference, refers to a security vulnerability that is maliciously utilized immediately after discovery. It is popular, that is, the security patches are in the same day of the flaws, and the relevant malicious procedures appear. This kind of attack is often very sudden and destructive. There is evidence that hackers are more good at discovering safety vulnerabilities, and implementing attack activities. Although there is currently not completely preventing zero-day vulnerability attacks, the scientific and perfect defense system can effectively reduce the chance of zero-day attacks and reduce the loss caused by zero-day attacks. 9. Infinity Insurance Company

Number of affected people: 572 million

Discovery time: August 2021

Event Overview:

In March, Infinity Insurance Company, in two days in December 2020, some people were unauthorized, short visiting the files on the server in the Infinity network. Infinity Fully reviews the files stored in the access server, some social security numbers or driver’s license numbers are included in the file. This event also affects Infinity’s current and previous employees, leak information includes employee name, social security number and / or limited cases related to sick leave or employee compensation claims. The affected employees and customers will receive a one-year free credit monitoring service member qualification. In order to reduce the risk of similar events, Infinity continues to review its network security programs and use survey information to determine additional measures to further enhance network security. The company wrote in a letter to employees: “We understand the importance of protecting personal information, and apologize for the inconvenience caused.”

Event Review:

Infinity property insurance company is headquartered in Birmingham, providing automotive insurance for US states. As one of the companies in the United States, providing non-standard car insurance, providing insurance services for individuals who cannot get security by standard insurance companies. These irregular factors may be because there is an accident record in the driving record, the age, model of the driver, and the other reasons. Infinity property insurance company is the third largest insurance company in non-standard underwriting industry, as an insurance company with such an influence, should strengthen its data security.

10. Nei Man Group (Neiman Marcus Group)

Number of people: 435 million

Discovery time: September 2021

Event Overview:

Luxury Department Store Chain Niiman disclosed in September, unauthorized relevant parties received personal information related to customer online accounts in May 2020. The company stated that it has notified the incident to the law enforcement department and has worked closely with Mandiant. Leak information may include: name and contact information, payment card number and validity period, Niman virtual voucher number, and username, password, and security issues related to online accounts. Nimeman said that approximately 3.1 million payment cards and virtual vouchers have been affected, and more than 85% of them expire or invalid. Nieman responded that it requested that the online account password has been reset since May 20020 has not changed the password. In addition, the company stated that if the affected client is the same or similar to the login information used by other online accounts, the login information should be changed.

Event Review:

Neiman Marcus is a reserved high-end department store in the United States to operate luxury goods. It is the retailer of high-end, unique fashion items in today’s world, has more than 100 years of development history, and its headquarters in Dallas, Texas, USA. Brands entering the department store are all leader in various industries. This data disclosure event makes its public reputation damage.