What Is a Data Breach & How Does It Happen?

Data breaches are a major threat to businesses of all sizes, regardless of industry, location, or reputation. If an organization suffers a data breach, the consequences range from costly fines and settlements to long-term brand damage, loss of customers, and, in extreme cases, going out of business.

This article is an introduction to data breaches and the most common attack vectors hackers rely on to compromise sensitive files. We also offer advice on how to prevent data breaches, so read on to see what steps you can take to protect your business from breach attempts.

Guide to data breaches

Data Breach Definition

A data breach is a security incident in which an unauthorized person accesses, steals, copies, or discloses protected data without the data holder's permission or knowledge. A data breach includes both instances in which:

Data breaches are a threat to any organization, from small and medium businesses to major corporations and government entities. While criminals will go after anyone they deem vulnerable, hackers typically prioritize targeting businesses that keep:

In 2021, the average cost of suffering a data breach was $4.24 million, a 10% rise from the stats in 2020. The financial penalty typically comes from fines and lawsuits following a breach, but the victim also often suffers long-term reputation hits and can even lose the right to operate in specific regions or sectors.

If the $4.24 million figure did not concern you enough, our article on data breach statistics presents a range of other numbers that demonstrate the true impact a data breach can have on an organization.

How Do Data Breaches Happen?

In most cases, the cause of a data breach is either a security vulnerability, protocol loophole, or human error. Statistically, most data breaches occur because of malware or hacking (25%), but other noteworthy causes include:

A small percentage of data breaches (around 3.2%) have an unknown cause. While some companies prefer not to disclose the way someone compromised their files, others have no idea what caused the breach.

How do data breaches happen - most common data breach causes

Below are some of the most common scenarios that can lead to a data breach:

Data breaches and leaks often overlap in causes and consequences. Our article on data leakage explains how to protect your company from both accidental and intentional leaks.

Data Breach Methods

A hacker behind a data breach can use various techniques to exploit overlooks in tech and uncareful user behavior. Some of the most common tactics are:

Want to learn more about online risks? Our article on cyber security attack types outlines the 17 most prominent online threats to your company.

Data Breach Stages

Each data breach is a unique incident, but most attacks follow a similar pattern. Below is a step-by-step look at each stage of an average data breach coming from outside the victim's organization.

Data breach stages

Stage 1: Initial Research

Unless the breach happens due to an opportunistic event (such as someone losing a mobile phone or sending an email to a wrong address), hackers start the attack with in-depth research of the target. The criminals try to gather as much helpful info about the company as possible, which typically involves:

Once hackers know the target's weak points, they develop a strategy for creating an initial entry point into the network.

Stage 2: Creating an Entry Point

The tools and techniques a hacker uses at this stage depend on the info the criminal gathered in step one. Most strategies rely on trying to:

Depending on the strategy, we can classify this stage of a data breach into two categories:

In a network-based attack, a hacker exploits a vulnerability in the target's toolset or network infrastructure. Some of the most common exploits include:

In a social attack, the attacker tries to trick an employee to gain access into the target network. While some social attacks try to get an intruder on-premises, most social breaches start with a phishing email that tricks the reader into clicking a malware-infected link or attachment.

Learn about spear phishing, a highly targeted phishing attack that relies less on spam and more on personalized messages intended for a specific employee.

Data breaches

Stage 3: Establishing a Foothold

Once a hacker has an entry point into the target system, the criminal aims to:

Hackers must keep their presence a secret during these activities, which is why most skilled criminals try to cover their actions by:

Typically, a criminal tries to gain system control for as long as possible, which is why command-and-control (C2) tools are a common choice at this stage. However, some hackers can use so-called "living off the land" strategies that rely entirely on existing system functions to maintain local control.

Once a hacker controls the system, the goal is to locate target data and, if there is no plan already, figure out how to steal the files most effectively.

Keeping intruders out of your system starts with a safe hosting infrastructure. Our Bare Metal Servers come with built-in high levels of security and offer various automation features that keep deployments safe, repeatable, and non-exploitable.

Stage 4: Going After Data

The most common goal of this stage is data exfiltration (also known as data extrusion or exportation), a process that is notoriously difficult to detect as it often resembles usual network traffic. During exfiltration, the hacker:

DDoS-based distractions are also common during exfiltration as the hacker tries to divert the security team's attention. After the unauthorized data transfer happens, the hacker has successfully stolen files and can sell files to the highest bidder.

Sometimes, the victim does not find out about the data breach even after the hacker steals data. In that case, the criminal often attempts to set up an advanced persistent threat (APT) within the network to stay up to date with the latest files.

Some hackers do not aim to exfiltrate data and instead look to encrypt sensitive files before demanding a ransom for the decryption key. These breaches are known as ransomware and are among the most common and costly cyberattacks a company can encounter.

Our article on ransomware types explains the diverse ways hackers encrypt sensitive data. You can also check out our ransomware protection guide to learn how best to keep your business safe against this cyber threat.

Data Breach Examples

The table below examines some of the most devastating data breaches in the last ten years, the reason each incident occurred, and the approximate number of records hackers managed to steal.

DateTarget organizationNumber of compromised recordsData breach method
August 2013Yahoo3,000,000,000A phishing scheme
November 2019Alibaba1,100,000,000Custom crawler software
June 2021LinkedIn1,000,000,000Data scraping techniques
April 2019Facebook500,000,000Data scraping
October 2016Adult Friend Finder412,000,000  Poor security practices
May 2016MySpace360,000,000Exploit of a security flaw
June 2012LinkedIn165,000,000A weakness in the blog page
October 2013Adobe153,000,000Raid on a backup server
February 2018Under Armour (MyFitnessPal app)150,000,000  Unconfirmed (suspected security vulnerability or actions of an employee)
May-July 2017Equifax145,500,000A vulnerability within the dispute portal servers
May 2014eBay145,000,000Stolen employee log-in credentials
December 2013Target110,000,000Stolen credentials of a third-party vendor
April 2011Sony PlayStation Network102,000,000Exploit of a security flaw
October 2017MyHeritage92,000,000Poor security practices
July 2014JP Morgan & Chase83,000,000A phishing scheme
February 2015Anthem79,000,000Spear phishing emails and backdoor malware

Data Breach Prevention - Best Practices

Data breach prevention

While you cannot stop a hacker from attempting to cause a data breach, you can adopt best practices that help ensure criminals do not succeed in their attempts. Here is some advice for protecting yourself from data breaches:

Ready to capitalize on the security benefits of encryption? Our encryption management platform centralizes all key-related tasks and enables you to manage your encryption strategy from a single pane of glass.

Data Breaches Should be a Security Team's Top Concern

At the very least, a successful data breach can cause brand damage and hurt the bottom line. At worst, this incident can lead to costly legal trouble and be the first step to going out of business. Prevention is the key to stopping breaches, so ensure the security team proactively protects sensitive files to keep the company out of the financial mess caused by a full-blown data breach.