By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

GadgetBond

  • Latest
  • How-to
  • Tech
    • AI
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Add GadgetBond as a preferred source to see more of our stories on Google.
Font ResizerAa
GadgetBondGadgetBond
  • Latest
  • Tech
  • AI
  • Deals
  • How-to
  • Apps
  • Mobile
  • Gaming
  • Streaming
  • Transportation
Search
  • Latest
  • Deals
  • How-to
  • Tech
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • AI
    • Anthropic
    • ChatGPT
    • ChatGPT Atlas
    • Gemini AI (formerly Bard)
    • Google DeepMind
    • Grok AI
    • Meta AI
    • Microsoft Copilot
    • OpenAI
    • Perplexity
    • xAI
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Follow US
SecurityTech

Top 6 Most Notable Cyber Attacks

By
Shubham Sawarkar
Shubham Sawarkar's avatar
ByShubham Sawarkar
Editor-in-Chief
I’m a tech enthusiast who loves exploring gadgets, trends, and innovations. With certifications in CISCO Routing & Switching and Windows Server Administration, I bring a sharp...
Follow:
- Editor-in-Chief
Sep 11, 2021, 2:29 PM EDT
Share
We may get a commission from retail offers. Learn more
Top 6 Most Notable Cyber Attacks
Image: Pixabay
SHARE

The past year was one, I’m sure will never be forgotten. We witnessed one of the largest pandemics in history while being introduced to a wide range of new technologies. Many of which we hope will shape the way we live forever.

The unfortunate reality is that these shifts, as a result of the situation, led to cybercriminals coming up with new and improved ways to compromise businesses. We witnessed a huge surge in the number of ransomware, malware, and other cybersecurity attacks, with many cybercriminals coming in to take advantage of our increased reliance on digital technology.

Below I’ve listed a number of the most significant cyber attacks in recorded history.

1. WHO Cyber Attack

During the worst period of the global pandemic, there were a series of cybercriminals that went as far as to launch attacks on the credibility of many of the world’s leaders in the health industry. More than 25,000 emails were sent out containing leaked passwords and addresses, belonging to a range of groups, all of which worked in the health industry, fighting to maintain sanity during the height of the pandemic.

In these emails, there was information specifically on the WHO (World Health Organization), US CDC, Gates Foundation, and NIH. This went on to be confirmed by the WHO, that confidential information about many of their staff members, had in fact been leaked online, although they argued that much of the leaked data was outdated, and thus, didn’t pose as much as a risk to the staff members and organization; WHO reacted to this incident by improving the security of the organization.

2. Zoom Credentials Hack

Since the introduction of the pandemic, in early 2020, Zoom has emerged, establishing itself as one of the most important and valuable companies around. But this is not without a couple of problems. Specifically, the Zoom video conferencing software was hugely popular amongst these cybercriminals in the past year, and in a very short time, the software became a liability, vulnerable, to a wide range of security threats. By April 2020, there were reports that over 500,000 passwords had been stolen – all of which were from the Zoom program.

These criminals then proceeded to put this confidential data from Zoom, up for the highest bidder on the Dark Web. This led to many unscrupulous individuals logging into other people’s private meetings and acting out of pocket. The hackers were also able to obtain personal information about the different individuals participating in the Zoom conferences.

3. Twitter

By July 2020, one of the most popular social media companies around suffered a breach. This breach was carried out by three individuals, the end result of which, led to the hijacking of a number of very high-profile accounts on the Twitter service. The actual attack utilized social engineering, which was later confirmed to be phone phishing, by Twitter themselves.

The attackers or hackers were able to steal confidential data about the employees, which they used to gain access to Twitter’s information management system. A fairly significant number of high-profile accounts were compromised as a result, these include Barack Obama (former American President), Elon Musk, CEO of Tesla and SpaceX, and Jeff Bezos, executive chairman and former president and CEO of Amazon. The cybercriminals then used their unauthorized access to these accounts to tweet out bitcoin scams, which fetched them an additional $100k.

Less than a month later (three weeks to be precise), the three culprits were arrested and later charged. The leader was a 17-year-old Graham Ivan Clark, who went on to be charged as an adult, for an attack, he supposedly led, based on authority reports.

4. Marriott Hotels Attack

When Marriott went on to acquire Starwood Hotels group, a cyberattack was almost inevitable. This later came to light in 2018, sometime after the initial attack. Prior to this period, cybercriminals had unfettered access to the personal details of the company’s guests. This was close to 340 million people – all of which had their personal affix compromised. The end result was a fining of Marriott Hotels, to the tune of £18 million by the United Kingdom’s Data Privacy Watchdogs.

5. Software AG

In October 2020, this software giant from Germany became the victim of a significant extortion attack. This resulted in the company’s internal systems being shut down and a large amount of company data being leaked. Through the utilization of this Clop ransomware, large amounts of company data were encrypted and stolen. According to different sources, the ransom for the data was put at around $20 million, which, naturally Software AG refused to pay.

Because of the company’s refusal to pay, the hackers went on to do what they threatened to do, which was to publish the confidential information on a data leak site. This data contained information such as employee’s passport details, financial information, and internal emails. The perpetrators of the Clop ransomware attack were not the only group carrying out these double extortion attacks.

Throughout the remainder of 2020, these kinds of attacks, these name-and-shame tactics became increasingly popular. We can argue that it’s now the modus operandi for ransomware gangs today.

6. Wishbone Data Breach

Wishbone is another popular social media app, primarily amongst teens, and in May of 2020, they witnessed a major data breach where hackers had obtained and sold the company’s user records, containing over 40 million accounts, on the dark web. Due to the reputation of the dark web and the general age of the user accounts that had been compromised, there was a lot of fear and worry for the victims.

Up to today, there has been no follow-up information, detailing exactly how they were able to access these records, but this massive data leak led to a wide range of information being revealed, such as social media profile data, gender of the users, home and mobile phone numbers, personal emails and even geolocation being exposed. Experts did however note that this problem could have been avoided if better encryption software had been used by the company.


This post was written by our guest member “Uchenna Ani-Okoye,” you will find him and his work on his own website below. Thank you Uchenna Ani-Okoye for your contribution to GadgetBond.com

–GUEST AUTHOR INFO—

Uchenna Ani-Okoye is a former IT Manager who now runs his own computer support website https://www.compuchenna.co.uk.


Discover more from GadgetBond

Subscribe to get the latest posts sent to your email.

Leave a Comment

Leave a ReplyCancel reply

Most Popular

Kindle Colorsoft hits rare $170 pricing with 32% discount in spring sale

Kindle Scribe is nearly 40% off in Amazon’s Big Spring Sale

Snapchat brings one-tap AI video magic to Lens Studio

Firefox 149 update: Split View browsing, free VPN and more

Sony unveils BRAVIA Theatre soundbars and new BRAVIA 3 II, 2 II TVs

Also Read
Nintendo Switch 2 game card red

Nintendo makes physical Switch 2 cartridges $10 pricier than digital ones

The Apple logo, a white silhouette of an apple with a bite taken out of it, is displayed in the center of a circular, colorful pattern. The pattern consists of small, multicolored dots arranged in a radial pattern around the apple. The background is black.

Apple taps Google Shopping VP to lead its AI marketing charge

WhatsApp new features infographic on a beige background showing three key announcements: 'Two accounts, one phone' displaying an Accounts menu with Adriana Work and Adriana Personal accounts; 'Cross-platform transfer' with an illustration of data transfer between iPhone and Android devices with buttons for 'Transfer to iPhone' and 'Transfer to Android'; and 'Free up space in Chats' showing a chat interface for 'Bachelorette Trip 2026' group with options to manage storage (3GB used), show media in phone gallery, and a file size selector displaying video thumbnails with checkmarks. The central 'New Feature Roundup' text is accompanied by the WhatsApp logo.

WhatsApp adds dual accounts, better storage controls and Meta AI

2027 Chevrolet Corvette Grand Sport in blue and Grand Sport X in white parked on a desert highway with mountains in the background.

2027 Corvette Grand Sport’s new LS6 engine becomes Corvette’s core V8

Red Netflix “N” logo centered on a dark, textured black-to-red gradient background, creating a bold and dramatic brand visual.

Netflix hikes U.S. prices across all plans

Opera browser interface showcasing integration with Gemini and Google Translate. The left side displays the Opera logo with two AI feature cards: the colorful Gemini four-pointed star icon and the Google Translate icon. The right side shows the start page with website shortcuts for Medium, Twitch, Reddit, Airbnb, YouTube, Netflix, and more on a purple gradient background.

Opera One sidebar now packs Gemini AI and Google Translate shortcuts

A close‑up shot of a vertical white PS5 Pro console against a black background, highlighting the side panel, rear ventilation grilles, and back I/O ports.

Sony hikes PS5, PS5 Pro and PlayStation Portal prices worldwide

A compact DJI Avata 360 FPV drone flies through a smooth, tunnel‑like circular opening toward a bright sky, framed by curved gray walls and dramatic natural light.

DJI Avata 360 is here to shoot 8K HDR 360‑degree FPV footage

Company Info
  • Homepage
  • Support my work
  • Latest stories
  • Company updates
  • GDB Recommends
  • Daily newsletters
  • About us
  • Contact us
  • Write for us
  • Editorial guidelines
Legal
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • DMCA
  • Disclaimer
  • Accessibility Policy
  • Security Policy
  • Do Not Sell or Share My Personal Information
Socials
Follow US

Disclosure: We love the products we feature and hope you’ll love them too. If you purchase through a link on our site, we may receive compensation at no additional cost to you. Read our ethics statement. Please note that pricing and availability are subject to change.

Copyright © 2026 GadgetBond. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | Do Not Sell/Share My Personal Information.