Ivanti VPN (Multiple Victims)
Critical zero-day chain exploited by state-sponsored actors — CISA emergency directive
SaaS platforms, cloud providers, developer tooling, and app-layer infrastructure are concentrated attack surfaces. One tech vendor breach can expose thousands of downstream customers. Below is every tech-sector breach LeakTrace has indexed.
Critical zero-day chain exploited by state-sponsored actors — CISA emergency directive
Chinese APT exploited VPN zero-days affecting thousands of organizations
Chinese state hackers mass-exploited Ivanti VPN zero-days — 1,700+ organizations breached
Multiple zero-day VPN vulnerabilities exploited by Chinese APT
41.5M subscriber records exposed — emails, addresses, device info
LockBit attempted extortion of French IT services giant
Encrypted password vaults stolen — 25M users at risk of brute-force decryption attacks
Rhysida published 1.67TB of game development data including Wolverine game
35.9M customer records exposed via Citrix Bleed vulnerability
Snatch ransomware group claimed breach of food manufacturer
Sandworm wiped telecom infrastructure — 24M customers lost service for days
13,405 records exposed — Email addresses, Genders, IP addresses, Passwords and 1 more
1.67M files leaked by Rhysida ransomware including unreleased games
4,563,166 records exposed — Device information, Email addresses, Names, Passwords and 1 more
3,901,179 records exposed — Dates of birth, Email addresses, Passwords, Usernames
4,461,787 records exposed — Email addresses, IP addresses, Passwords, Usernames
4,774,445 records exposed — Email addresses, IP addresses, Passwords, Usernames
82K employee records exposed including SSNs in network breach
4,999,001 records exposed — Email addresses, IP addresses, Passwords, Usernames
143,711 records exposed — Email addresses, Passwords, Usernames
Unauthorized access to customer data — names, addresses, DOBs, ID documents
440K user records including message metadata exposed via Naver Cloud compromise
12,629,245 records exposed — Device information, Email addresses, Genders, Geographic locations and 2 more
Nation-state actor used stolen Okta tokens to access internal Atlassian — source code viewed