By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

GadgetBond

  • Latest
  • How-to
  • Tech
    • AI
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Add GadgetBond as a preferred source to see more of our stories on Google.
Font ResizerAa
GadgetBondGadgetBond
  • Latest
  • Tech
  • AI
  • Deals
  • How-to
  • Apps
  • Mobile
  • Gaming
  • Streaming
  • Transportation
Search
  • Latest
  • Deals
  • How-to
  • Tech
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • AI
    • Anthropic
    • ChatGPT
    • ChatGPT Atlas
    • Gemini AI (formerly Bard)
    • Google DeepMind
    • Grok AI
    • Meta AI
    • Microsoft Copilot
    • OpenAI
    • Perplexity
    • xAI
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Follow US
SecurityTech

Top 6 Most Notable Cyber Attacks

By
Shubham Sawarkar
Shubham Sawarkar's avatar
ByShubham Sawarkar
Editor-in-Chief
I’m a tech enthusiast who loves exploring gadgets, trends, and innovations. With certifications in CISCO Routing & Switching and Windows Server Administration, I bring a sharp...
Follow:
- Editor-in-Chief
Sep 11, 2021, 2:29 PM EDT
Share
We may get a commission from retail offers. Learn more
Top 6 Most Notable Cyber Attacks
Image: Pixabay
SHARE

The past year was one, I’m sure will never be forgotten. We witnessed one of the largest pandemics in history while being introduced to a wide range of new technologies. Many of which we hope will shape the way we live forever.

The unfortunate reality is that these shifts, as a result of the situation, led to cybercriminals coming up with new and improved ways to compromise businesses. We witnessed a huge surge in the number of ransomware, malware, and other cybersecurity attacks, with many cybercriminals coming in to take advantage of our increased reliance on digital technology.

Below I’ve listed a number of the most significant cyber attacks in recorded history.

1. WHO Cyber Attack

During the worst period of the global pandemic, there were a series of cybercriminals that went as far as to launch attacks on the credibility of many of the world’s leaders in the health industry. More than 25,000 emails were sent out containing leaked passwords and addresses, belonging to a range of groups, all of which worked in the health industry, fighting to maintain sanity during the height of the pandemic.

In these emails, there was information specifically on the WHO (World Health Organization), US CDC, Gates Foundation, and NIH. This went on to be confirmed by the WHO, that confidential information about many of their staff members, had in fact been leaked online, although they argued that much of the leaked data was outdated, and thus, didn’t pose as much as a risk to the staff members and organization; WHO reacted to this incident by improving the security of the organization.

2. Zoom Credentials Hack

Since the introduction of the pandemic, in early 2020, Zoom has emerged, establishing itself as one of the most important and valuable companies around. But this is not without a couple of problems. Specifically, the Zoom video conferencing software was hugely popular amongst these cybercriminals in the past year, and in a very short time, the software became a liability, vulnerable, to a wide range of security threats. By April 2020, there were reports that over 500,000 passwords had been stolen – all of which were from the Zoom program.

These criminals then proceeded to put this confidential data from Zoom, up for the highest bidder on the Dark Web. This led to many unscrupulous individuals logging into other people’s private meetings and acting out of pocket. The hackers were also able to obtain personal information about the different individuals participating in the Zoom conferences.

3. Twitter

By July 2020, one of the most popular social media companies around suffered a breach. This breach was carried out by three individuals, the end result of which, led to the hijacking of a number of very high-profile accounts on the Twitter service. The actual attack utilized social engineering, which was later confirmed to be phone phishing, by Twitter themselves.

The attackers or hackers were able to steal confidential data about the employees, which they used to gain access to Twitter’s information management system. A fairly significant number of high-profile accounts were compromised as a result, these include Barack Obama (former American President), Elon Musk, CEO of Tesla and SpaceX, and Jeff Bezos, executive chairman and former president and CEO of Amazon. The cybercriminals then used their unauthorized access to these accounts to tweet out bitcoin scams, which fetched them an additional $100k.

Less than a month later (three weeks to be precise), the three culprits were arrested and later charged. The leader was a 17-year-old Graham Ivan Clark, who went on to be charged as an adult, for an attack, he supposedly led, based on authority reports.

4. Marriott Hotels Attack

When Marriott went on to acquire Starwood Hotels group, a cyberattack was almost inevitable. This later came to light in 2018, sometime after the initial attack. Prior to this period, cybercriminals had unfettered access to the personal details of the company’s guests. This was close to 340 million people – all of which had their personal affix compromised. The end result was a fining of Marriott Hotels, to the tune of £18 million by the United Kingdom’s Data Privacy Watchdogs.

5. Software AG

In October 2020, this software giant from Germany became the victim of a significant extortion attack. This resulted in the company’s internal systems being shut down and a large amount of company data being leaked. Through the utilization of this Clop ransomware, large amounts of company data were encrypted and stolen. According to different sources, the ransom for the data was put at around $20 million, which, naturally Software AG refused to pay.

Because of the company’s refusal to pay, the hackers went on to do what they threatened to do, which was to publish the confidential information on a data leak site. This data contained information such as employee’s passport details, financial information, and internal emails. The perpetrators of the Clop ransomware attack were not the only group carrying out these double extortion attacks.

Throughout the remainder of 2020, these kinds of attacks, these name-and-shame tactics became increasingly popular. We can argue that it’s now the modus operandi for ransomware gangs today.

6. Wishbone Data Breach

Wishbone is another popular social media app, primarily amongst teens, and in May of 2020, they witnessed a major data breach where hackers had obtained and sold the company’s user records, containing over 40 million accounts, on the dark web. Due to the reputation of the dark web and the general age of the user accounts that had been compromised, there was a lot of fear and worry for the victims.

Up to today, there has been no follow-up information, detailing exactly how they were able to access these records, but this massive data leak led to a wide range of information being revealed, such as social media profile data, gender of the users, home and mobile phone numbers, personal emails and even geolocation being exposed. Experts did however note that this problem could have been avoided if better encryption software had been used by the company.


This post was written by our guest member “Uchenna Ani-Okoye,” you will find him and his work on his own website below. Thank you Uchenna Ani-Okoye for your contribution to GadgetBond.com

–GUEST AUTHOR INFO—

Uchenna Ani-Okoye is a former IT Manager who now runs his own computer support website https://www.compuchenna.co.uk.


Discover more from GadgetBond

Subscribe to get the latest posts sent to your email.

Leave a Comment

Leave a ReplyCancel reply

Most Popular

ChatGPT for Clinicians is now free for verified US doctors

Apple TV shares Star City trailer previewing its next premium sci-fi drama after For All Mankind

Microsoft finally adds passkey sync to its built-in password manager

OpenAI’s new workspace agents let ChatGPT run end-to-end team processes

Perplexity Pro and Max just got Kimi K2.6 support

Also Read
Promotional graphic showing Samsung SmartThings integration with IKEA smart home devices. The SmartThings and IKEA logos appear at the top, while connected devices such as sensors, smart plugs, lighting, a thermostat, and home control accessories are arranged around a central smart home hub. Dotted connection lines illustrate seamless device integration and Matter-compatible smart home connectivity between Samsung SmartThings and IKEA products.

Samsung SmartThings now supports IKEA Matter devices

Samsung Galaxy Z Fold7 foldable smartphone displayed partially open beside a black retail box labeled “Samsung Certified Re-Newed.” The device is shown in a silver finish with its large inner folding display visible, highlighting Samsung’s refurbished premium foldable phone program.

Samsung Certified Re-Newed now includes Galaxy Z Fold7 and Flip7

Illustration of hands holding a smartphone displaying a Meta account management screen, surrounded by social media app icons including Facebook, Instagram, Threads, WhatsApp, and other connected platforms. The image represents unified account access and identity management across Meta services and linked apps on a soft purple background.

Meta Account is replacing Accounts Center

Promotional collage of the Threads app interface showcasing live chat features for NBA discussions. Multiple overlapping screens display live chats such as “Warriors @ Clippers,” message threads, reactions, join chat buttons, and community pages labeled “NBA Threads.” The design highlights real-time sports conversations and group chat engagement within the Threads platform.

Meta launches Live Chats on Threads

Person relaxing on a couch in a cozy living room while wearing a virtual reality headset and watching a large curved floating screen. The screen displays a live TV program with emergency responders near an ambulance, creating an immersive home entertainment experience. Bookshelves, warm lighting, and modern decor surround the scene, highlighting mixed reality media viewing.

Meta Quest adds DIRECTV streaming

A stylish logo for Alexa, Amazon's digital voice assistant technology.

Amazon launches Alexa+ in Spain with local features

Hand holding a smartphone displaying the Amazon One Medical app with a GLP-1 weight loss treatment page. The screen shows a medication bottle image, the text “GLP-1 weight loss treatment,” and a yellow “Get started” button. The phone is centered against a soft mint-green circular background, representing digital healthcare access through Amazon One Medical.

Amazon One Medical launches GLP-1 weight loss program

Outdoor close-up of an Amazon Project Kuiper low Earth orbit satellite internet terminal mounted on a stand overlooking a golf course. The flat rectangular antenna dish is positioned against a background of green fairways, tall trees, and a clear blue sky, representing Amazon’s Leo satellite internet connectivity for the DP World Tour.

DP World Tour adds Amazon Leo for live event connectivity

Company Info
  • Homepage
  • Support my work
  • Latest stories
  • Company updates
  • GDB Recommends
  • Daily newsletters
  • About us
  • Contact us
  • Write for us
  • Editorial guidelines
Legal
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • DMCA
  • Disclaimer
  • Accessibility Policy
  • Security Policy
  • Do Not Sell or Share My Personal Information
Socials
Follow US

Disclosure: We love the products we feature and hope you’ll love them too. If you purchase through a link on our site, we may receive compensation at no additional cost to you. Read our ethics statement. Please note that pricing and availability are subject to change.

Copyright © 2026 GadgetBond. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | Do Not Sell/Share My Personal Information.