It's tempting to believe that important data breaches only happen in the US and the figures tend to bear that out – the US accounts for the overwhelming majority of the really big data breaches that have been made public, some of them absolutely vast. But US laws and regulations force organisations to admit to data breaches involving the customer, something which is not true in all countries.

In the UK, the most important piece of legislation organisations must worry about is the Data Protection Act and the possibility of fines by the information commissioner (ICO). Below we offer what we believe are the ten most significant data breaches to hit the globe, not in all cases because they were particularly large but because of the type of attack or vulnerability involved or the sensitivity of the data compromised.

Globally, the UK currently ranks a distant second behind the US for data breaches, which is no cause for complacency. Many of the breaches mentioned here happened in the last two years. Undoubtedly, larger and more serious breaches lie ahead.

This list is in Chronological order.

Uber 

Uber concealed a hack that affected 57 million customers and drivers, the company has confirmed.

The breach - which took place in 2016 - was kept under wraps by the taxi-hailing firm which paid hackers $100,000 (£75,000) to the hackers to delete the data.

Uber confirmed that names, email addresses and mobile phone numbers of customers were exposed and of the 57 million impacted, 600,000 drivers had their names and licence detail compromised. 

And while the drivers have been offered free credit monitoring protection, the firm is yet to offer anything to affected customers. 

According to Bloomberg, Uber's former chief executive Travis Kalanick knew about the breach over a year ago. The firm's chief security officer Joe Sullivan has left the company.

In a written statement, Uber CEO Dara Khosrowshahi said: "While we have not seen evidence of fraud or misuse tied to the incident, we are monitoring the affected accounts and have flagged them for additional fraud protection.

"None of this should have happened, and I will not make excuses for it."

Pizza Hut 

Pizza Hut has revealed that its website and app were hacked on 1 October, with personal information for an undisclosed amount of customers being jeopardised.

The hack is thought to have compromised billing information including delivery addresses, email addresses and payment card information containing account numbers, expiration dates and CVV numbers.

Pizza Hut has sent out emails to customers informing them of the breach, which reveal Pizza Hut knew of the breach two weeks before disclosing it.

In the email, the company said: "Pizza Hut has recently identified a temporary security intrusion that occurred on our website. We have learned that the information of some customers who visited our website or mobile application during an approximately 28-hour period (from the morning of October 1, 2017, through midday on October 2, 2017) and subsequently placed an order may have been compromised.

"Pizza hut identified the security intrusion quickly and took immediate action to halt it."

It's unclear how many customers have been affected by the hack, but a figure of 60,000 US customers has been reported by Slashdot.

Yahoo

Yahoo has disclosed that all of its 3 billion email users were likely compromised in a 2013 breach that it disclosed last year, breaking its own record for largest ever potential data breach.

The initial breach was disclosed in mid-2016 when Yahoo thought it had affected as many as 500 million accounts. This figure climbed to 1 billion by the end of the year, and as many as 3 billion today.

In a statement posted to a help page, Yahoo said: "Based on an analysis of the information with the assistance of outside forensic experts, Yahoo has determined that all accounts that existed at the time of the August 2013 theft were likely affected.

"It is important to note that, in connection with Yahoo's December 2016 announcement of the August 2013 theft, Yahoo took action to protect all accounts.

"The company required all users who had not changed their passwords since the time of the theft to do so. Yahoo also invalidated unencrypted security questions and answers so they cannot be used to access an account."

Yahoo previously said it believed hackers gained access by creating forged cookies, letting attackers into accounts without needing a password.

"We have connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft we disclosed on 22 September 2016," the company said.

Deloitte

One of the world's biggest accountancy firms, Deloitte, has been hit by a cyber attack, The Guardian revealed today (25 September 2017). 

The hackers may have gained details from the organisation's blue-chip clients, including usernames, passwords, personal details and even confidential emails detailing private plans and documents.

The attack - which could have been going on unnoticed for months - is said to have compromised Deloitte's global email server and via an administrator's account, granting the hackers access to restricted areas and information.

It is also believed that Deloitte did not have two-step verification set up, with access requiring only a single password.

Six unnamed clients of Deloitte have been told their information was 'impacted' by the hack, according to The Guardian, although further details are bound to be revealed as the matter continues.

"In response to a cyber incident, Deloitte implemented its comprehensive security protocol and began an intensive and thorough review including mobilising a team of cybersecurity and confidentiality experts inside and outside of Deloitte," a spokesman told The Guardian.

"As part of the review, Deloitte has been in contact with the very few clients impacted and notified governmental authorities and regulators.

"Our review enabled us to determine what the hacker did and what information was at risk as a result. That amount is a very small fraction of the amount that has been suggested."

Although the breach is thought to affect mainly US customers, the impact on the UK is yet to be revealed.

Equifax 

Global information solutions company, Equifax, reported a major cybersecurity incident, earlier this year, affecting 143 million consumers in the US.

The breach - initially discovered on 29 July - is thought to have revealed the names, Social Security numbers, birth dates and addresses of almost half the US population.

Also compromised was the credit card numbers of 209,000 consumers and the personal identifying information of 182,000.

Equifax, with investments in 23 other countries worldwide, initially reported that some customers in the UK were also affected, estimating around 400,000.

However, the company admitted today (11 October 2017) that the data of some 694,000 UK customers was compromised. 

The credit firm went on to say that up to 15,000 UK customers have had their financial information and passwords stolen, including partial credit card information.

Equifax had previously denied that any UK customers personal and financial information was stolen.

"This is clearly a disappointing event for our company and one that strikes at the heart of who we are and what we do," said CEO Richard F. Smith in a statement after the initial breach. "I apologise to consumers and our business customers for the concern and frustration this causes."

Equifax, shared with other credit monitoring companies Experian and TransUnion, have assigned a dedicated website and phone line for victims and free identity theft insurance for all US consumers.  

Perhaps an understatement considering the company's share price visibly plummeted 13 percent and is expected to fall further.

Three Equifax executives sold their shares soon after the incident, before the company's disclosure, for a combined $1.8 million. The breach put victims at a high risk of identity theft and consumers were told to watch their credit score and stay alert.

CEX

One of Britain's largest retail franchises, CEX, disclosed it has been hit by a data breach that could have compromised the information of as many as 2 million customers – including personal details like names and addresses.

In a statement posted to its website, CEX said that despite its best efforts at "robust security" a "sophisticated" attack compromised the data of up to 2 million customers. These details included names and surnames as well as email addresses and phone numbers.

A "small number" of encrypted credit card details were thought to be at risk as well, but the company, which owns the WeBuy.com website, noted that these would only be expired cards as the business stopped storing financial data in 2009.

CEX advised affected customers – who were notified by email – change their passwords as a precautionary measure.

Commenting on the breach, chief scientist at McAfee Raj Samani said: "Given the increasing amount of reported data breaches, it would be simple to shrug off the news as just another in a long line of companies impacted by digital crime.

"However, two million people will now be wondering just what the lasting impact of their personal data being disclosed will have on them. This concept of breach fatigue is a very real issue, and until further data becomes available that will determine whether CEX implemented the appropriate controls, we should be careful before apportioning any blame."

CEX did not disclose any further details of the breach but said it had introduced additional security measures and is working with the appropriate authorities, including the police.

'Onliner' spambot 

A security researcher in Paris has unearthed an open web server hosted in the Netherlands that contains as many as 711 million usernames and passwords. 

Infosec researcher and blogger Troy Hunt was contacted by cybersecurity researcher Benkow who pointed Hunt towards a machine that the "Onliner Spambot" was making use of to deliver the Ursnif banking malware. The data on the server is a mixture of email addresses on their own, which are used to send spam to, and email addresses with passwords, which are designed to get into an SMTP server to send out the spam, as Benkow goes into depth about here

Troy Hunt runs the Have I Been Pwned (HIBP) website, where users can crosscheck their email address with known breaches to see if their accounts might have been compromised.

The 711 million figure is by far the largest data dump that's been pulled into HIBP.

"Just for a sense of scale," Hunt writes, "that's almost one address for every single man, woman and child in all of Europe."

The data is likely to contain considerably fewer 'real' emails than 711 million, as the data also includes addresses with junk prefixes, poorly formed emails, or otherwise fake addresses that could have been scraped from the web. Nevertheless, the amount of potentially compromised accounts is enormous.

Bupa (2017) 

Bupa has suffered a data breach (13 July 2017) affecting 500,000 customers on its international health insurance plan.

The London-based private healthcare group said a Bupa employee inappropriately copied and removed information including names, dates of birth and some contact information, however no medical information was compromised. 

In a written statement, Bupa said that 43,000 of the total number affected had a UK address and that those that bought their medical insurance abroad could also be affected. 

"A thorough investigation is under way and we have informed the FCA [Financial Conduct Authority] and Bupa's other UK regulators," said Sheldon Kenton, managing director of Bupa Global. "The employee responsible has been dismissed and we are taking appropriate legal action."

Zomato

Zomato, which provides users with an online guide to restaurants, cafes and clubs, reported that data from 17 million users had been stolen, including email addresses and hashed passwords.

The Indian firm said that it had discovered the breach "recently" and subsequently logged affected users out of their accounts, as well as resetting passwords on the app and the website. 

Zomato said in a security notice to customers that users logging in via OAuth services such as Facebook or Google were not at risk, meaning that 60 percent of Zomato customers won't be affected by the breach. 

'Eddie' reveals over 560 million passwords 

The recent WannaCry ransomware infected 47 NHS England Trusts and hundreds of companies across the world. You'd think things couldn't get any worse. Well, you're wrong. While this isn't a UK company, its effects could have a big impact here.

Security researchers at the Kromtech Security Research Center discovered a massive database of 560 million login credentials which is believed to come from up to 10 popular online services such as LinkedIn and Dropbox, obtained during previous data breaches.

The database was run on the 'Have I Been Pwned' site, which lets users see if their accounts and personal information have been revealed in previous data breaches.

And while the author of the database is unknown, researchers are calling them 'Eddie' after a user profile discovered in the data.

Kromtech researcher Bob Diachenko, told Gizmodo that the database was running an insecure version of MongoDB's open-source database software. He said it still remains active and unprotected.

Wonga 

Payday loan company Wonga has fallen victim to a large data breach that could have hit as many as 245,000 of its customers including bank account numbers and sort codes.

In a customer help page Wonga said it is "urgently working to establish further details and contacting those who we know have been impacted". Along with the bank account number and sort codes, Wonga believes that full names, email addresses, home addresses, phone numbers, and the last four digits of debit card numbers have also gone amiss. The company thinks passwords are safe but recommends customers change these regardless.

It advises customers notify their banks and request that their accounts are put on alert for unusual activity. But Wonga also states that it believes accounts are now secure and no action is required. At the same time, it recommends being "extra vigilant" across "other accounts and online activity".

Wonga's statement finishes: "We take issues of customer data and security extremely seriously. Cyber attacks are, unfortunately, on the rise. While Wonga operates to the highest security standards, these illegal attacks are unfortunately increasingly sophisticated. We sincerely apologise for the inconvenience and concern this has caused."

Commenting on the attack, James Thompson, regional director for EMEA at authentication company SecureAuth, said that it will serve as a "hefty reminder" to any organisation holding personal and financial data to "continually innovate security and authentication to keep ahead of attackers."

"Recognising user behaviours that are out of character for an account is key to protecting against actors staying undetected within your network," Thompson said. "Businesses need to be able to identify and flag deviations in user behaviour."

Three

A major breach of Three's customer upgrade database revealed last November is worse than the network operator initially thought, it was disclosed this week.

The original hack - revealed in November 2016 - occurred when Three's upgrade database was accessed using an employee login. At the time the company said that no financial information was stolen, but names, phone numbers, addresses and dates of birth were taken.

Three said that of its 9 million customers it believed the data of 133,827 people was compromised.

This week Three said 76,373 more customers had been breached. The investigation is ongoing but the company claimed no further customer breaches are expected.

Commenting on the disclosure, IT security specialist at ESET, Mark James, said: "As always with this type of data breach the focus seems to be on financial information not being obtained, but when you look at names, addresses, dates of birth and methods of payment, the bank details are the easiest to change.

"The type of information we either would not or could not change is being sold, traded, stored or accessed online by cybercriminals to build a profile of you, the victim. It is then reused much later down the line, often to get more information that can be used either for financial gain or identity theft."

Sports Direct 

Sportswear retailer Sports Direct failed to tell its entire workforce that they might have had their personal credentials stolen in an internal security breach.

The Register reports that Sports Direct noticed its systems had been compromised in September 2016, but it wasn't until December that they discovered the data breach – including names, email addresses and phone numbers.

The attacker reportedly gained access through an unpatched content management system running on the open source DNN platform.

Sports Direct did notify the Information Commissioner's Office but avoided sharing details of the breach with staff – because there was no evidence that the data had been copied.

Sports Direct did not comment on the breach.  

Three Mobile 

Three, one of Britain's largest mobile operators has revealed it has had a major data breach that could put millions of its customers at risk.

According to The Telegraph, hackers accessed Three's customer upgrade database by using an employee login.

Three said that the data accessed did not include any financial information but did say that names, phone numbers, addresses and dates of birth of its customers were obtained.

Since the announcement of the breach (the evening of 17th November), police have arrested three men in connection with the breach.

Tesco Bank

Late last year, Tesco Bank, the consumer finance wing of the British supermarket giant, froze its online operations – after as many as 20,000 customers had money stolen from their accounts.

Chief executive Benny Higgins said in a statement published on the Tesco Bank website that 40,000 accounts had been compromised – and half of those had money stolen from them. Customers will be able to use their cards for cash withdrawals, direct debit and chip and pin, but will not be able to make online transactions until the situation is under control.

The bank only confirmed that it was subject to criminal activity, and did not describe the attack.

Tesco Bank, which has over seven million customer accounts, has said it will cover any financial costs of the breach. Higgins said: "Any financial loss that results from this fraudulent activity will be borne by the bank. Customers are not at financial risk."

But one customer, Kevin Smith, from Blackpool, told the BBC that he had lost £500 from one of his accounts, while another claimed to have lost £600 and left without emergency funds from the bank.

Adrian Davis, Managing director for EMEA (ISC)2, the independent body for infosec professionals, the breach is evidence of Tesco Bank losing control of operational risk.

"I believe we are at a point where, despite growing awareness of the issues, business leaders are losing control and visibility of core business risk," Davis said. "They have not realised just how much their organisations have changed in the digital age and how this is leaving them vulnerable. They have not treated cyber risk as anything more than an IT problem, and now they, and we, are paying the price."

Sage 

As a FTSE-100 firm, the apparent insider attack admitted by accounting and HR software firm Sage could turn out to be one of the most important in UK data breach history if its scale is confirmed. According to the firm, the employee data of up to 280 UK customers representing a large number of individual users could be at risk. "We are investigating unauthorised access to customer information using an internal login," the firm said in a vague statement that will inevitably re-ignite the contentious issue of insider access.

Kiddicare

Online child products retailer Kiddicare was forced to admit it had exposed real customer data when testing a new website in 2015. In this case, the mistake was only noticed when customers started receiving suspicious SMS text messages asking them to take an online survey and an investigation eventually uncovered to error. As with many UK breaches, the company played down the fact it had let names, addresses and contact details of up to 800,000 people fall into malevolent hands with the excuse that no credit card data had been compromised (which would have been its liability had it done so).  

TalkTalk

Publicised in October 2015, TalkTalk initially struggled to confirm how many of its four million customers were affected after hackers exploited a reported weakness in the firm's website. TalkTalk CEO Baroness Dido Harding sounded disquietingly vague about the attack's scale when interviewed on TV, and it later transpired that a 'mere' 157,000 personal records had been compromised. Shockingly, the incident was the second (and possibly third) data breach affecting the company in under a year, which could mark it as the moment when dissatisfaction over the rising number of breaches becomes both political and mainstream in the UK.

Moonpig

Another biggie, a software flaw in the firm's Android app let a researcher access the records of any Moonpig account holder he tried, in theory compromising a total of three million people. As serious, the researcher reported the issue to the firm 18 months before going public in early 2015 after receiving an inadequate response. Significant partly because it involved a mobile app rather than the more common website breach.

Think W3 Limited

A serious attack in which a hacker was able to get his or her hands on 1,163,996 credit and debit card records from online holiday firm Think W3 by using an SQL injection attack to exploit a weakness on its website. The ICO described the incident as a "staggering lapse" and fined it £150,000.

Mumsnet 

A direct victim of the infamous and widespread Heartbleed SSL software flaw, the compromise allowed hackers to access anything up to 1.5 million user accounts on the hugely popular site, its owners revealed. Although the data inside these accounts was less sensitive than for some of the other accounts, the hack revealed both the potency of big but undiscovered software issues affecting multiple sites and that even big brands could be affected.

Staffordshire University

A re-run on the lost laptop theme that people assumed had been consigned to history, this time involving 125,000 students and applicants on a computer stolen from a car.  But the files had been password-protected said the University, plaintively. That wouldn't have been much of a barrier to the name, address, telephone number and email data.

Included this incident as a reminder that just because times have moved on doesn't mean the old problems go away.

Morrison's supermarket 

An unusual example of the insider attack, the attacker published details of the firm's entire workforce database online, 100,000 employees in all. An employee was eventually arrested for the incident and will presumably come to court at some point which could reveal more details of how the firm's security was bypassed. Inside events are rare but particularly feared because they abuse privileged access that is hard to lock down. Some employees later launched legal action against Morrison's.

Yahoo 

It seems hard to pin down just one data breach spawning from Yahoo's 22 years in business. Last year appeared to unearth a mammoth lack of security on Yahoo's part with reports uncovering a breach affecting over 500 million Yahoo user accounts during 2014.

Another data breach was reported dating back to 2013, in which an unprecedented 1 billion user accounts were thought to have been affected, creating the largest ever recorded information breach. It's believed that names, email addresses, telephone numbers, security questions (both encrypted and unencrypted) and their answers were exposed during the breach.

Yahoo is now facing numerous lawsuits after being criticised for not disclosing this information sooner, impacting its sale to Verizon, which reduced its bid by $350 million from the initial $4.8 billion price tag.

Most recently, Yahoo revealed this week that 32 million user accounts were compromised in the last two years. The accounts were said to have been accessed using forged cookies which enable an intruder to access an account without its password.

And while it's not a UK-based company, Yahoo has a large number of UK customers, which its data breaches have impacted.

Sony PlayStation Network

The largest data breach in history at the time, Sony's disastrous 2011 breach saw hackers make off with the customer records of 77 million people relating to its PlayStation Network, including a small number revealing credit card numbers. Apart from downing the company's systems for an extraordinary 23 days, the breach crossed national frontiers, affecting people from all over the world, including the UK. Britain's ICO eventually issued a £250,000 fine for what will go down as the first big data breach to affect people across the globe.

Brighton and Sussex University Hospitals NHS Trust 

The Information Commissioner (ICO) ended up imposing a fine of £325,000 after sensitive patient data of thousands of people was discovered on hard drives sold on eBay.  An investigation found that at least 232 de-commissioned drives that should have been deep cleaned and destroyed by a contractor ended up being sold second hand.

T-Mobile

Sales staff were caught selling customer records to brokers who used the information to market them as their contracts were coming to an end. It was never clear how many records were involved in this murky insider trade but it was believed to run from half a million to millions. Initially, the ICO refused to name the firm but was forced to after rival networks said they were not involved, leaving only one name.

In 2011, the two employees involved were fined £73,000 by the courts.

HM Revenue & Customs

Probably the most infamous large data breach ever to occur in the UK, two CDs containing the records of 25 million child benefit claimant in the UK (including every child in the country) went missing in the post. There was never any indication that these password-protected discs had fallen into the wrong hands but the incident underlined how valuable data was being handled by poorly trained junior employees.

Nationwide Building Society 

The moment date breaches entered consciousness in the UK, the Nationwide incident involved an unencrypted laptop stolen from a company employee that put at risk the personal data of 11 million savers. The UK's poor disclosure rules made it difficult for outsiders to get information on what had occurred.

The Financial Services Authority (FSA) eventually fined Nationwide £980,000, still the largest sum ever imposed for data loss in the UK, seen at the time as a warning shot for other firms that might have similar incidents.  Not everyone noticed.

Find your next job with techworld jobs