Blog

  • Data Breach Report: January 2026 — 8 New Breaches, 131.2M Accounts Exposed

    Data Breach Report: January 2026 — 8 New Breaches, 131.2M Accounts Exposed

    January 2026 has seen the addition of eight new data breaches, collectively exposing a staggering total of 131,170,154 accounts. This continues the upward trend in large-scale data exposures that have characterized recent years, underscoring the persistent vulnerabilities in both private and public sector digital infrastructures. The breaches span a diverse range of industries including social media, retail, fitness, entertainment, and niche online communities, reflecting that no sector is immune to cybersecurity threats.

    Notable Breaches

    • Under Armour: This breach is the largest in terms of accounts exposed, affecting 72,742,892 users. The incident was initially identified on November 17, 2025, but the data became publicly known and was added to breach databases in January 2026. The scale of this breach highlights the risks associated with fitness and health-related applications, which often store sensitive personal information.
    • SoundCloud: With 29,815,722 accounts compromised, the SoundCloud breach dates back to December 15, 2025. As a popular music streaming platform, the breach potentially exposes user data including account credentials and personal details, which could be exploited for identity theft or account hijacking.
    • Raaga: Also from mid-December 2025, Raaga’s breach impacted 10,225,145 users. Raaga, a music streaming service focusing on Indian content, illustrates how breaches affect global platforms beyond Western-centric services.
    • Instagram: The breach affecting 6,215,150 accounts was reported on January 7, 2026. Given Instagram’s massive user base and its role as a key social media platform, exposure of user data here is particularly concerning for privacy and potential social engineering attacks.
    • Pass’Sport: This breach, recorded on December 17, 2025, compromised 6,366,133 user accounts. The nature of Pass’Sport’s service typically involves identity verification, making the breach especially sensitive given the potential exposure of personal identification information.
    • Panera Bread: On January 7, 2026, it was confirmed that 5,112,502 accounts were affected by a breach at this food service chain. Breaches in the retail sector often involve payment information and loyalty program data, which can facilitate fraud and unauthorized transactions.
    • BreachForums (2025): This niche online forum experienced a breach exposing 672,247 accounts on August 11, 2025. Forums often contain user-generated content that can include personal details and private communications, making such breaches a risk for targeted harassment or blackmail.
    • WhiteDate: Added most recently, this breach affects 20,363 accounts as of December 29, 2025. Though smaller in scale, breaches of dating platforms can have severe personal and reputational consequences for users.

    Data Types Trends

    The top types of data exposed across these breaches reflect common targets for attackers seeking to maximize the utility of stolen information. Email addresses were compromised in all eight breaches, underscoring their value as keys to further phishing and credential stuffing attacks.

    Geographic locations and names were both exposed in five breaches each, providing attackers with contextual details that enhance the effectiveness of social engineering schemes. Usernames and genders appeared in four breaches each, adding layers of personal identity that can be exploited in identity fraud or targeted marketing scams.

    Passwords were leaked in three breaches, representing a critical security failure given their role in protecting user accounts. The exposure of phone numbers in three breaches further increases risks by enabling SIM swapping attacks and phone-based phishing.

    Forum posts and private messages were each compromised in two breaches, revealing that attackers are increasingly interested in not only static personal information but also dynamic user-generated content that can be leveraged for blackmail or reputation damage.

    Physical addresses were exposed in two breaches, adding a dimension of physical security risk, including stalking or identity theft that can lead to fraudulent transactions or account takeovers.

    Recommendations

    • For Organizations: Companies must prioritize robust cybersecurity frameworks, including regular security audits, penetration testing, and rapid patch management. Employing multi-factor authentication (MFA) across all user accounts is essential to safeguard against credential-based attacks.
    • Data Minimization: Collecting and retaining only necessary user data reduces the potential impact of a breach. Encryption of sensitive data both at rest and in transit should be a standard practice.
    • Incident Response Planning: Organizations should develop and regularly update incident response plans to ensure swift containment, investigation, and notification following a breach. Transparent communication with affected users builds trust and aids in mitigating secondary risks.
    • For Users: Users are strongly advised to use unique, complex passwords for different services and adopt password managers to maintain them. Enabling MFA wherever possible adds an additional layer of defense.
    • Awareness and Vigilance: Users should remain alert to phishing attempts, particularly following a breach notification. Monitoring financial accounts and credit reports for unauthorized activity can help in early fraud detection.
    • Regular Updates: Keeping software and applications up to date ensures protection against known vulnerabilities exploited by attackers.

    In conclusion, the January 2026 data breach landscape emphasizes the persistent risk posed by cyber threats to a wide variety of sectors and user demographics. Both organizations and individuals must adopt proactive security measures to mitigate the impact of these increasingly frequent and large-scale breaches.


    Data from Have I Been Pwned | Report generated with AI assistance

  • Ransomware Report: February 2026 — 722 Attacks, 51 Active Groups

    Ransomware Report: February 2026 — 722 Attacks, 51 Active Groups

    In February 2026, the ransomware landscape continued to demonstrate significant activity and diversification. A total of 722 ransomware attacks were recorded, involving 51 distinct ransomware groups targeting victims across 63 countries. This sustained level of activity underscores the persistent threat ransomware poses to organizations worldwide, with attackers continuously adapting their tactics and expanding their reach.

    Most Active Groups

    The month saw a concentration of attacks by a few dominant ransomware groups. Qilin emerged as the most aggressive group, responsible for 114 victims, accounting for nearly 16% of all attacks in February. Close behind were thegentlemen and clop, who targeted 83 and 79 victims respectively. These three groups alone were responsible for almost 40% of all attacks, highlighting their operational scale and effectiveness.

    Other notable groups included akira with 47 victims and incransom with 40 victims. The presence of these groups in the top five active list indicates a competitive environment among ransomware operators, with each group continually seeking new victims and expanding their footprint.

    Several high-profile victims were linked to these groups, illustrating the broad range of targets ransomware actors are willing to pursue. For example, Pro-Plastics, North Andover Country Club (US), Schmuck Welt (DE), and Unibros Shipping (GR) were attacked by qilin. Other groups like alphalocker and everest also compromised significant companies such as www.pyramisgroup.com (GR) and UD Trucks (JP), respectively. The group vect was active in multiple countries, targeting organizations such as keliweb (IT), Casas del Mediterraneo (ES), and jdaas (IN).

    Geographic Distribution

    The United States remained the most targeted country by a wide margin, with 287 victims accounting for almost 40% of all ransomware attacks. This dominance highlights the US as a primary focus for ransomware operators, possibly due to the number of high-value targets and the potential for lucrative ransom payments.

    European countries also experienced significant ransomware activity. Germany (31 victims), Canada (30 victims), Italy (19 victims), and France (17 victims) rounded out the top five targeted countries. This geographic distribution suggests that ransomware actors continue to prioritize economically developed regions with substantial digital infrastructure. The presence of victims in countries like Greece, Israel, Japan, Spain, and India, as seen in notable cases, further indicates the global reach of ransomware campaigns.

    Sector Analysis

    Sector-specific targeting in February 2026 revealed some noteworthy patterns. Interestingly, the category labeled Not Found accounted for the largest number of victims, with 296 incidents. This likely represents cases where sector data was not publicly disclosed or victims fall outside traditional classification frameworks.

    Among identified sectors, the Technology sector was the most impacted, with 89 victims. This sector’s prominence is consistent with its critical role in the global economy and the valuable intellectual property it holds, making it an attractive target for ransomware groups.

    The Manufacturing sector followed with 60 victims, indicating that ransomware attacks continue to threaten operational technology environments, supply chains, and production continuity. The Healthcare sector was also targeted with 42 victims, maintaining its status as a high-risk sector due to the sensitive nature of patient data and the critical services it provides.

    Financial Services faced 38 ransomware incidents, reflecting the persistent threat to institutions managing sensitive financial data and transactions. This sector remains a lucrative target for attackers seeking both ransom payments and potential secondary gains through data theft.

    Outlook

    Looking ahead, the ransomware threat landscape is expected to remain dynamic and challenging throughout 2026. The continued dominance of groups like qilin, thegentlemen, and clop suggests that well-resourced and organized cybercriminal entities will maintain their operational tempo. Meanwhile, emerging groups such as akira and incransom may increase their activity, contributing to a more competitive and fragmented threat environment.

    The geographic distribution of attacks highlights the need for a global cybersecurity approach, with particular emphasis on bolstering defenses in the United States and across Europe. Organizations in the technology, manufacturing, healthcare, and financial services sectors should prioritize ransomware resilience, including improved detection, incident response, and backup strategies.

    Moreover, the substantial number of victims categorized as Not Found points to a gap in sector reporting and transparency. Enhanced sharing of incident details and victim sector information could aid in better understanding ransomware trends and tailoring defensive measures accordingly.

    In conclusion, February 2026 reaffirmed that ransomware remains a significant cybersecurity challenge, requiring coordinated efforts across industries and governments to mitigate its impact. Vigilance, proactive defense, and collaboration will be critical to reducing ransomware’s reach and effectiveness in the coming months.


    Data from Ransomware.live | Report generated with AI assistance

  • Cyberattack on Gemeinde Matten — March 2026

    Cyberattack on Gemeinde Matten — March 2026

    On the weekend of March 14-15, 2026, the ICT infrastructure of the Matten municipality in Switzerland came under a cyberattack. The attack targeted key municipal systems, resulting in the encryption of some data files. However, thanks to rapid response and robust security measures, the administration was able to maintain operations without interruption, and no data was stolen or published, according to an official statement from the Gemeinde Matten published by Radio BeO.

    The cyberattack affected the local government sector, specifically the administrative systems of the municipality of Matten bei Interlaken. While some files were encrypted during the incident, these were fully recovered without data loss. Importantly, critical systems such as the resident registry (Einwohner- und Fremdenkontrolle), business administration, and finance systems were reportedly never compromised. Throughout the incident, the municipal administration remained accessible to the public during regular hours both by phone and in person, ensuring continuity of essential services.

    Immediately after detecting the attack, Matten’s authorities involved external cybersecurity experts to restore affected systems, conduct a forensic analysis of the event, and secure evidence for further investigation. The Bern Canton Police (Kantonspolizei Bern) was informed promptly, and a criminal complaint was filed against unknown perpetrators. As of current reports, no ransomware group has claimed responsibility, and there is no confirmation of any data breach or exfiltration. The attack vector remains undisclosed, and officials have not provided additional details regarding how the attackers infiltrated the network.

    While the incident did not result in data theft or operational downtime, the municipality acknowledged a reputational impact and the significant effort required to restore and secure their systems. In response, Gemeinde Matten has implemented additional technical and organizational security measures, focusing on hardening their ICT infrastructure. Furthermore, ongoing employee training and cybersecurity awareness programs have been intensified to reduce the risk of future incidents.

    This event underscores the importance of preparedness and swift incident response within public administration environments. Organizations, especially those in the public sector, can draw several key lessons from Matten’s experience. First, maintaining regular backups and robust recovery procedures ensures that encrypted data can be restored without paying ransoms or suffering prolonged outages. Second, the rapid engagement of external cybersecurity specialists and law enforcement can significantly aid in mitigating damage and preserving forensic evidence. Third, continuous strengthening of security protocols and staff awareness are critical to reducing vulnerability to cyber threats.

    For municipal and similar organizations seeking to protect themselves, the following recommendations are prudent:

    • Implement comprehensive data backup strategies with offline or immutable copies to safeguard against encryption attacks.
    • Regularly update and patch ICT systems to close vulnerabilities that attackers could exploit.
    • Establish clear incident response plans that include coordination with external experts and law enforcement.
    • Conduct ongoing cybersecurity training programs to educate employees about phishing, social engineering, and other common attack vectors.
    • Perform routine security audits and penetration testing to identify and remediate weaknesses proactively.
    • Deploy layered security controls such as endpoint protection, network segmentation, and multi-factor authentication.

    The cyberattack on Gemeinde Matten serves as a reminder that even well-prepared public institutions remain targets for cybercriminals. Vigilance, preparation, and swift action remain vital components of effective cybersecurity defense.

    Sources: Radio BeO, https://www.radiobeo.ch/cyberangriff-auf-gemeinde-matten/


    Source: Kategorien: | Data from Ransomware.live | Generated with AI assistance