SlideShare a Scribd company logo
<THE COST OF HACKING>
The threat hackers pose
to businesses is
undeniable, but what
costs exactly do those
threats entail? Let's take a
closer look at some of the
costliest attacks hackers
have ever performed:
Click this icon to tweet information from each slide.
HEARTLAND
(2008)
In 2008, hackers broke into the network at
Heartland Payment Systems, the fifth largest
payments processor in the U.S. Thirteen
pieces of malware capitalized on weaknesses
in Microsoft software. When card issuers
reported a possible breach in October,
Heartland hired two companies to search the
network. The following January, they located
the breach.
TYPE OF DATA STOLEN
cardholder namesaccount numberstrack data from credit
card magnetic strips
555687
950361
555687
950361
MONEY LOST
RECORDS LOST
130 Million
$12.6 Million
In May of 2014, global online retailer eBay
discovered a breach in its main database,
which held user passwords.
Compromised between late February and
early March, the system remained
vulnerable for at least three months.
Financial costs are not specified, but
“Non-GAAP operating margin was 24.4
percent, down 190 basis points.”
EBAY
(2014)
phone numbers dates of birth
TYPE OF DATA STOLEN
email registered addressespasswordscustomer names
RECORDS LOST
145 Million
TJ MAXX
(2005-07)
In 2005, hackers broke into wireless networks
that made use of WEP, a relatively weak security
protocol. The bad guys then accessed TJX
internal systems, and remained undetected for 1
1/2 to 2 years. In the end, the hackers accessed
94 million records -- more than twice the 46
million originally estimated.
RECORDS LOST
94 MillionMONEY LOST
$130 Million
TYPE OF DATA STOLENcredit card numbers
RECORDS LOST
145 Million
LIVINGSOCIAL
(2013) In April of 2013, hackers tapped into
LivingSocial computer systems,
accessing customer data from servers.
Among the stolen data: encrypted
passwords, though LivingSocial does
"hash" and "salt" its PWs. Thankfully,
credit card information lived elsewhere
and was untouched.
TYPE OF DATA STOLEN
names email
addresses
dates of birth encrypted
passwords
MONEY LOST
RECORDS LOST
56 Million
$43 Million
Attackers used a 3rd-party vendor's login
information to gain entry into Home Depot's
network—then acquired elevated rights,
which enabled them to release customized
malware into the retailer's self-checkout
systems. Home Depot reported $43 million
of pre-tax expenses linked to the breach in
the 3rd quarter of 2014 alone. These
included costs to investigate the breach,
protect the identities of affected customers,
staff additional call centers, and secure legal
and professional services. The
home-improvement giant expects additional
lawsuits from payment card networks that
suffered fraud losses, and that incurred
additional operating expenses, such as card
replacement costs. As of November 2014,
44 lawsuits were in the wings.
HOME DEPOT
(2014)
TYPE OF DATA STOLEN
credit & debit
card information
email
addresses
MONEY LOST
RECORDS LOST
77 Million
$15 Million
customer names billing addresses birthdates PSN passwords
and logins
profile data securirty
questions
purchase
histories
TYPE OF DATA STOLEN
SONY PSN
(2011)
On April 19, 2011, Sony discovered hackers had breached its Playstation
Network (PSN) and stolen data from 77 million user accounts over the
previous two days. The mega-brand immediately shut down the
network... but waited a week to announce the reason. Sony denies that
any credit card data was taken, while attorneys involved in a class-action
suit claim the hackers offered for purchase 2.2 million credit card
numbers and verification codes.
RECORDS LOST
700 MillionMONEY LOST
$38 Million
ADOBE
(2013)
TYPE OF DATA STOLENusernames encrypted
passwords
********
credit & debit
card information
source code for products like
Photoshop & Acrobat
In October of 2013, attackers stole several million
usernames and encrypted passwords, as well as
approximately 2.9 million encrypted credit or debit
card numbers. Shortly after, a 3.8GB file with more
passwords showed up online though Adobe
claimed that this could include inactive IDs, test
accounts, and IDs with invalid passwords.
RECORDS LOST
10 Million
SONY PICTURES
(2014)
TYPE OF DATA STOLEN
5 filmspasswordssalaries of
6000 employees
In November 2014, anonymous hackers
e-mailed execs at Sony Pictures,
alleging "great damage by Sony Pictures
(sic)," and threatening the company
would be "bombarded as a whole" if
demands weren't met. A few days later,
suspicions indicated that the attack was
related to the pending release of The
Interview, a Sony comedy about the
assassination of the North Korean
Leader Kim Jong Un. As well, several
pieces of sensitive data leaked online,
including Sony employee salaries and
contact information, and torrents of
unreleased Sony films, including Annie,
Mr. Turner, Still Alice, and To Write Love
on Her Arms. Specific numbers aren't
yet available, but even brand reputation
costs are huge. Sony canceled the
release of The Interview, and employees
filed a class-action lawsuit against their
own company for not securing networks,
nor protecting companies after their
personal information was compromised.
Heartland
http://krebsonsecurity.com/tag/heartland-payment-systems/
http://www.bloomberg.com/bw/stories/2009-07-06/lessons-from-the-data-breach-at-heartlandbusinessweek-business-news-stock-market-and-financial-advice
http://www.networkworld.com/article/2254061/lan-wan/security-breach-cost-heartland--12-6-million-so-far.html
eBay
http://www.forbes.com/sites/gordonkelly/2014/05/21/ebay-suffers-massive-security-breach-all-users-must-their-change-passwords/
TK / TJ Maxx
http://money.cnn.com/gallery/technology/security/2013/12/19/biggest-credit-card-hacks/3.html
http://www.internetnews.com/ent-news/article.php/3714611/How+TJX+Became+a+Lesson+In+Proper+Security.htm
Sony PSN
https://www.cocc.com/whitepaper/16/lessons-sony-playstation-breaches
http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426
http://www.polygon.com/2014/7/23/5931793/sony-2011-data-breach-class-action-lawsuit
Home Depot
http://phx.corporate-ir.net/phoenix.zhtml?c=63646&p=irol-newsArticle&ID=1964976
https://corporate.homedepot.com/MediaCenter/Documents/Press%20Release.pdf
http://www.esecurityplanet.com/network-security/home-depot-breach-has-already-cost-the-company-43-million.html
LivingSocial
http://www.crn.com/news/security/240153803/livingsocial-data-breach-affects-millions.htm
https://www.livingsocial.com/createpassword
Adobe
http://www.pcworld.com/article/2059002/adobe-security-breach-worse-than-originally-thought.html
https://www.wisepiggy.com/credit_tutorial/credit_score/major-security-breaches.html
Sony Pictures
http://thenextweb.com/insider/2014/12/13/timeline-sony-breach-data-leaks-far/
http://rt.com/usa/229291-sony-hack-cost-millions/
REFERENCES
</THE COST OF HACKING>

More Related Content

PPTX
World`s Most Expensive Cyber Security Breach
PDF
10 of the Top Data Breaches of the Decade
PDF
IT Sample Paper
PDF
Databreach forecast
PDF
The Current State of Cybercrime 2014
 
PDF
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
PDF
THE CHANGING FACE OF IDENTITY THEFT
PDF
Protection on cyber fraud
World`s Most Expensive Cyber Security Breach
10 of the Top Data Breaches of the Decade
IT Sample Paper
Databreach forecast
The Current State of Cybercrime 2014
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
THE CHANGING FACE OF IDENTITY THEFT
Protection on cyber fraud

What's hot (19)

PDF
Rise of cyber security v0.1
PPT
Unearthing and Dissecting Internet Fraud
PDF
BLURRING BOUNDARIES
PDF
User authentication-info-graphic
PPT
Matt Luallen Explains What, How and Responding to Identity Theft
PDF
Payment Week - Andrew Barnes, Managing Director___Gemalto
PPTX
Risk base approach for security management fujitsu-fms event 15 aug 2011
PDF
Keep your office secure
PDF
2014 Cybercrime Roundup: The Year of the POS Breach
 
PDF
RSA Monthly Online Fraud Report - June 2013
 
PDF
CyberID-Sleuth
PDF
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
PDF
ISTR Internet Security Threat Report 2019
PPTX
T-Mobile has confirmed much of what a threat actor bragged about over the wee...
PPTX
Cyber law
PPTX
Cyber fraud a threat to E commerce
PDF
RSA Online Fraud Report - August 2014
 
PPTX
Cyber ID Sleuth Data Security Forensics
PDF
Dealing with Fraud in E-Banking Sphere
Rise of cyber security v0.1
Unearthing and Dissecting Internet Fraud
BLURRING BOUNDARIES
User authentication-info-graphic
Matt Luallen Explains What, How and Responding to Identity Theft
Payment Week - Andrew Barnes, Managing Director___Gemalto
Risk base approach for security management fujitsu-fms event 15 aug 2011
Keep your office secure
2014 Cybercrime Roundup: The Year of the POS Breach
 
RSA Monthly Online Fraud Report - June 2013
 
CyberID-Sleuth
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
ISTR Internet Security Threat Report 2019
T-Mobile has confirmed much of what a threat actor bragged about over the wee...
Cyber law
Cyber fraud a threat to E commerce
RSA Online Fraud Report - August 2014
 
Cyber ID Sleuth Data Security Forensics
Dealing with Fraud in E-Banking Sphere

Viewers also liked (20)

PDF
Ethical Hacking Tools
PDF
ZaCon 4 (2012) - Game Hacking
PPTX
Cyber Security
PPT
Introduction to Hacking
PPTX
Intelligent ram
PPTX
Hacking
PPTX
Introduction to Information Security
PDF
Prometheus X
PDF
UML daigrams for Bank ATM system
PPTX
PPT on Ethical Hacking
PPTX
Sci-Fi film
PPTX
Ethical hacking
PPTX
Ethical hacking ppt
PPTX
Kevin Mitnick
PDF
Trends in Sensors, Wearable Devices and IoT
PPT
ATM Frauds and Solutions
PPTX
Automated Teller Machine
PPT
Ethical Hacking and Network Security
PPTX
InformationSecurity
Ethical Hacking Tools
ZaCon 4 (2012) - Game Hacking
Cyber Security
Introduction to Hacking
Intelligent ram
Hacking
Introduction to Information Security
Prometheus X
UML daigrams for Bank ATM system
PPT on Ethical Hacking
Sci-Fi film
Ethical hacking
Ethical hacking ppt
Kevin Mitnick
Trends in Sensors, Wearable Devices and IoT
ATM Frauds and Solutions
Automated Teller Machine
Ethical Hacking and Network Security
InformationSecurity

Similar to The Cost Of Hacking (20)

PDF
Worst security data breaches till 2015 - SecPod
PPTX
So whats in a password
PDF
Cybersecurity and The Board
PPTX
Hacker risks presentation to ACFE PR Chapter
PDF
Oracle tech db-02-hacking-neum-15.04.2010
PPSX
APT & Data Breach - Lesson Learned
PPTX
What is data privacy?
PPTX
ID Theft and Computer Security 2008
PPTX
Unethical access to website’s databases hacking using sql injection
PPT
PPT
Hackers
PPT
Hackers
PPT
Securing Your Digital Assets slides NYC July 14, 2015
PPTX
Data breach
DOCX
What Happens to Your Data When a Company Gets Breached
PDF
IT Security Awareness Posters
PPT
Hacking presentation
PPTX
Web defacement
PPT
Worst security data breaches till 2015 - SecPod
So whats in a password
Cybersecurity and The Board
Hacker risks presentation to ACFE PR Chapter
Oracle tech db-02-hacking-neum-15.04.2010
APT & Data Breach - Lesson Learned
What is data privacy?
ID Theft and Computer Security 2008
Unethical access to website’s databases hacking using sql injection
Hackers
Hackers
Securing Your Digital Assets slides NYC July 14, 2015
Data breach
What Happens to Your Data When a Company Gets Breached
IT Security Awareness Posters
Hacking presentation
Web defacement

Recently uploaded (20)

PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Internet___Basics___Styled_ presentation
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPT
tcp ip networks nd ip layering assotred slides
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Introduction to the IoT system, how the IoT system works
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
innovation process that make everything different.pptx
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Internet___Basics___Styled_ presentation
Decoding a Decade: 10 Years of Applied CTI Discipline
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
tcp ip networks nd ip layering assotred slides
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Introuction about WHO-FIC in ICD-10.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Introduction to the IoT system, how the IoT system works
Cloud-Scale Log Monitoring _ Datadog.pdf
Slides PDF The World Game (s) Eco Economic Epochs.pdf
international classification of diseases ICD-10 review PPT.pptx
presentation_pfe-universite-molay-seltan.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Introuction about ICD -10 and ICD-11 PPT.pptx
innovation process that make everything different.pptx
Mathew Digital SEO Checklist Guidlines 2025
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
introduction about ICD -10 & ICD-11 ppt.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx

The Cost Of Hacking

  • 1. <THE COST OF HACKING>
  • 2. The threat hackers pose to businesses is undeniable, but what costs exactly do those threats entail? Let's take a closer look at some of the costliest attacks hackers have ever performed: Click this icon to tweet information from each slide.
  • 3. HEARTLAND (2008) In 2008, hackers broke into the network at Heartland Payment Systems, the fifth largest payments processor in the U.S. Thirteen pieces of malware capitalized on weaknesses in Microsoft software. When card issuers reported a possible breach in October, Heartland hired two companies to search the network. The following January, they located the breach. TYPE OF DATA STOLEN cardholder namesaccount numberstrack data from credit card magnetic strips 555687 950361 555687 950361 MONEY LOST RECORDS LOST 130 Million $12.6 Million
  • 4. In May of 2014, global online retailer eBay discovered a breach in its main database, which held user passwords. Compromised between late February and early March, the system remained vulnerable for at least three months. Financial costs are not specified, but “Non-GAAP operating margin was 24.4 percent, down 190 basis points.” EBAY (2014) phone numbers dates of birth TYPE OF DATA STOLEN email registered addressespasswordscustomer names RECORDS LOST 145 Million
  • 5. TJ MAXX (2005-07) In 2005, hackers broke into wireless networks that made use of WEP, a relatively weak security protocol. The bad guys then accessed TJX internal systems, and remained undetected for 1 1/2 to 2 years. In the end, the hackers accessed 94 million records -- more than twice the 46 million originally estimated. RECORDS LOST 94 MillionMONEY LOST $130 Million TYPE OF DATA STOLENcredit card numbers
  • 6. RECORDS LOST 145 Million LIVINGSOCIAL (2013) In April of 2013, hackers tapped into LivingSocial computer systems, accessing customer data from servers. Among the stolen data: encrypted passwords, though LivingSocial does "hash" and "salt" its PWs. Thankfully, credit card information lived elsewhere and was untouched. TYPE OF DATA STOLEN names email addresses dates of birth encrypted passwords
  • 7. MONEY LOST RECORDS LOST 56 Million $43 Million Attackers used a 3rd-party vendor's login information to gain entry into Home Depot's network—then acquired elevated rights, which enabled them to release customized malware into the retailer's self-checkout systems. Home Depot reported $43 million of pre-tax expenses linked to the breach in the 3rd quarter of 2014 alone. These included costs to investigate the breach, protect the identities of affected customers, staff additional call centers, and secure legal and professional services. The home-improvement giant expects additional lawsuits from payment card networks that suffered fraud losses, and that incurred additional operating expenses, such as card replacement costs. As of November 2014, 44 lawsuits were in the wings. HOME DEPOT (2014) TYPE OF DATA STOLEN credit & debit card information email addresses
  • 8. MONEY LOST RECORDS LOST 77 Million $15 Million customer names billing addresses birthdates PSN passwords and logins profile data securirty questions purchase histories TYPE OF DATA STOLEN SONY PSN (2011) On April 19, 2011, Sony discovered hackers had breached its Playstation Network (PSN) and stolen data from 77 million user accounts over the previous two days. The mega-brand immediately shut down the network... but waited a week to announce the reason. Sony denies that any credit card data was taken, while attorneys involved in a class-action suit claim the hackers offered for purchase 2.2 million credit card numbers and verification codes.
  • 9. RECORDS LOST 700 MillionMONEY LOST $38 Million ADOBE (2013) TYPE OF DATA STOLENusernames encrypted passwords ******** credit & debit card information source code for products like Photoshop & Acrobat In October of 2013, attackers stole several million usernames and encrypted passwords, as well as approximately 2.9 million encrypted credit or debit card numbers. Shortly after, a 3.8GB file with more passwords showed up online though Adobe claimed that this could include inactive IDs, test accounts, and IDs with invalid passwords.
  • 10. RECORDS LOST 10 Million SONY PICTURES (2014) TYPE OF DATA STOLEN 5 filmspasswordssalaries of 6000 employees In November 2014, anonymous hackers e-mailed execs at Sony Pictures, alleging "great damage by Sony Pictures (sic)," and threatening the company would be "bombarded as a whole" if demands weren't met. A few days later, suspicions indicated that the attack was related to the pending release of The Interview, a Sony comedy about the assassination of the North Korean Leader Kim Jong Un. As well, several pieces of sensitive data leaked online, including Sony employee salaries and contact information, and torrents of unreleased Sony films, including Annie, Mr. Turner, Still Alice, and To Write Love on Her Arms. Specific numbers aren't yet available, but even brand reputation costs are huge. Sony canceled the release of The Interview, and employees filed a class-action lawsuit against their own company for not securing networks, nor protecting companies after their personal information was compromised.
  • 11. Heartland http://krebsonsecurity.com/tag/heartland-payment-systems/ http://www.bloomberg.com/bw/stories/2009-07-06/lessons-from-the-data-breach-at-heartlandbusinessweek-business-news-stock-market-and-financial-advice http://www.networkworld.com/article/2254061/lan-wan/security-breach-cost-heartland--12-6-million-so-far.html eBay http://www.forbes.com/sites/gordonkelly/2014/05/21/ebay-suffers-massive-security-breach-all-users-must-their-change-passwords/ TK / TJ Maxx http://money.cnn.com/gallery/technology/security/2013/12/19/biggest-credit-card-hacks/3.html http://www.internetnews.com/ent-news/article.php/3714611/How+TJX+Became+a+Lesson+In+Proper+Security.htm Sony PSN https://www.cocc.com/whitepaper/16/lessons-sony-playstation-breaches http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426 http://www.polygon.com/2014/7/23/5931793/sony-2011-data-breach-class-action-lawsuit Home Depot http://phx.corporate-ir.net/phoenix.zhtml?c=63646&p=irol-newsArticle&ID=1964976 https://corporate.homedepot.com/MediaCenter/Documents/Press%20Release.pdf http://www.esecurityplanet.com/network-security/home-depot-breach-has-already-cost-the-company-43-million.html LivingSocial http://www.crn.com/news/security/240153803/livingsocial-data-breach-affects-millions.htm https://www.livingsocial.com/createpassword Adobe http://www.pcworld.com/article/2059002/adobe-security-breach-worse-than-originally-thought.html https://www.wisepiggy.com/credit_tutorial/credit_score/major-security-breaches.html Sony Pictures http://thenextweb.com/insider/2014/12/13/timeline-sony-breach-data-leaks-far/ http://rt.com/usa/229291-sony-hack-cost-millions/ REFERENCES </THE COST OF HACKING>