By using ECSS site, you agree to the Privacy Policy and Terms of Use.
Accept
ECSS - Egyptian Center for Strategic StudiesECSS - Egyptian Center for Strategic Studies
  • Home
  • International Relations
    International Relations
    Show More
    Top News
    Another obstacle on the Grand Ethiopian Renaissance Dam?
    June 5, 2020
    Varied paths of reform in Africa
    March 22, 2019
    G20 Membership Justified: Africa and the Road to the G20
    June 14, 2020
    Latest News
    Power Play: Why Is Azerbaijan Setting Its Sights on the Horn of Africa?
    May 22, 2025
    Trump’s Gulf Tour: US Economic Gains and Reshaping the Geopolitical Landscape
    May 21, 2025
    The Future of the India-Pakistan Ceasefire
    May 19, 2025
    Trump’s Deal-Driven Approach: Priority Issues in His Middle East Visit
    May 14, 2025
  • Defense & Security
    Defense & Security
    Show More
    Top News
    A Multi-dimensional Affair: Women and Terrorism in Africa
    June 14, 2020
    On deradicalisation: Marc Sageman and the psychology of jihadists
    June 22, 2020
    Assessing Deterrent Measures and the Prospects of War: US Military Movement in the Gulf to Confront Iran
    June 22, 2020
    Latest News
    Israel-Iran War: Does Israel Stand Alone?
    June 18, 2025
    Navigating Security and Diplomacy: What Russia’s Delisting of the Taliban Means for Bilateral Ties
    May 17, 2025
    Lakurawa: Armed Bandit Violence in Nigeria
    May 12, 2025
    Europe amid US–Iran Escalation: Can It Play the Diplomat or Become Entangled in the Crisis?
    April 13, 2025
  • Public Policy
    Public Policy
    Show More
    Top News
    Sinai: A Strategy for Development amid Fighting Terrorism
    June 17, 2020
    Egypt’s Comprehensive Vision for Human Rights
    June 22, 2020
    The Right to Health in Egypt
    June 22, 2020
    Latest News
    Weaponization of Resources: The Role of Rare Earth Metals in the US-China Trade War
    May 25, 2025
    The Carbon Border Adjustment Mechanism: A Catalyst or a Challenge for Egypt’s Export Ambitions?
    May 15, 2025
    The Suez Canal amidst Global Competition (3): National Strides Outpacing Time
    April 29, 2025
    Gaza’s Changing Demographics: The Toll of War and Blockade
    March 9, 2025
  • Analysis
    • Opinion
    • Analysis
    • Situation Assessment
    • Readings
  • Activities
    • Conferences
    • ECSS Agenda
    • Panel Discussion
    • Seminar
    • Workshops
  • ECSS Shop
  • العربية
  • Defense & Security
  • International Relations
  • Public Policy
All Rights Reserved to ECSS © 2022,
Reading: Global Rise in Data Leaks
Share
Notification Show More
Latest News
Israel-Iran War: Does Israel Stand Alone?
Defense & Security
Weaponization of Resources: The Role of Rare Earth Metals in the US-China Trade War
Economic & Energy Studies
Power Play: Why Is Azerbaijan Setting Its Sights on the Horn of Africa?
Asian Studies Others
Trump’s Gulf Tour: US Economic Gains and Reshaping the Geopolitical Landscape
Arab & Regional Studies
The Future of the India-Pakistan Ceasefire
Asian Studies
Aa
ECSS - Egyptian Center for Strategic StudiesECSS - Egyptian Center for Strategic Studies
Aa
  • اللغة العربية
  • International Relations
  • Defense & Security
  • Special Edition
  • Public Policy
  • Analysis
  • Activities & Events
  • Home
  • اللغة العربية
  • Categories
    • International Relations
    • Defense & Security
    • Public Policy
    • Analysis
    • Special Edition
    • Activities & Events
    • Opinions Articles
  • Bookmarks
Follow US
  • Advertise
All Rights Reserved to ECSS © 2022, Powered by EgyptYo Business Services.
Analysis

Global Rise in Data Leaks

Dr. Raghda al Bahi
Last updated: 2023/01/21 at 5:19 PM
Dr. Raghda al Bahi
Share
13 Min Read
SHARE

Data leakage, commodification, and sale on hacking forums and the black network have skyrocketed in 2022 and the early days of 2023 amidst the massive amount of data circulated globally every day, which conflicts with both international privacy principles and the acceleration of data localization policies.

If anything, this is an indication of the proliferation and globalization of data security risks, the growing importance of preventative security procedures and measures to keep data secure, and the increased value of user data as a commodity subject to theft, extortion, and other crimes.

Notable Data Breach Cases

There have been many instances of data leakage since the beginning of 2022, including the following:

1. Social Media: In April 2022, approximately 487 million personal phone numbers of WhatsApp users from 84 different countries were leaked onto the dark web and were then put up for sale on a well-known hacking forum. 94 million of these numbers belonged to app users in Arab countries, including 34 million Egyptians. Prior to that, in April 2021 as well, a hacker website posted the phone numbers and email addresses of half a billion Facebook users along with other personal information. On January 6, 2023, in one of the biggest data breaches in Twitter history, some hackers stole the email addresses of over 200 million users, and this information was later sold on Breached for just €2 per account. In November 2022, a security flaw in the API caused Twitter to accidentally disclose the data of 5.4 million users.

2. Cloud Storage Applications: In November 2022, Apple’s iCloud application suffered a data breach in which several videos and photos belonging to a number of users were leaked, which the company blamed on a technical malfunction affecting users of the iPhone 13 Pro and 14 Pro. As a result, some videos on the app went black, rendering them unwatchable during the saving or downloading process, while others had black lines across the screen and a single image from an unknown source fixed to them, possibly belonging to accounts on the app.

3. Government Services: The British Royal Mail’s Click and Drop parcel service experienced a data breach and subsequent glitch in November 2022, exposing users’ personal information. The company temporarily suspended postal services as a preventative measure to contain this, without disclosing the reason for the flaw that affected its services. Similarly, the Indian Railway experienced a cyberattack that compromised the information of about 30 million of its customers, including their emails and phone numbers, amid concerns that user travel records—including passenger name, phone number, location, train number, arrival time, email, and nationality—had been compromised. In Morocco, the Ministry of Higher Education, Scientific Research, and Professional Training database was breached in December 2022, exposing the personal information of tens of thousands of Moroccan students enrolled at the Cadi Ayyad University in Marrakech.

4. Private Enterprises: Uber launched an investigation into a data breach that occurred in September 2022 as a result of a flaw in the Slack account used to communicate with customers, according to which the hacker had access to the company’s internal databases and systems. As a result, the service was discontinued by the company after a 5 percent decline in share price. After making it clear that he had hacked the company for amusement, the hacker threatened to leak the company’s source code. The hacker gained control of the company’s web services as well as some of its internal financial data.

5. Banking Services: On BidenCash in October 2022, information about a million and a quarter bank cards was exposed online. The leak included personal information such as email addresses, customer phone numbers, and addresses. Security experts have linked this attack to registration information discovered on purchase pages on a number of hacked e-commerce websites. In February 2022, information about the clients of the Swiss bank Credit Suisse was leaked to the German newspaper Süddeutsche Zeitung, revealing the enormous wealth of some political figures, former and current rulers, and a number of those involved in money laundering and drug trafficking crimes in Egypt, Jordan, Algeria, Oman, and elsewhere. In total, more than 18,000 bank accounts holding more than $100 billion were included in the leaked data, but with no mention of current banking activities. 

6. Major International Firms: In October 2022, a breach on a Microsoft server called Azure Blob Storage resulted in the data leakage of more than 65,000 businesses from 111 countries. This data leak included customer information such as names, phone numbers, and e-mail addresses as well as some business names and information about their sales. Microsoft has reached out to customers who were affected by the breach, but the company has not revealed any hard data about how many people were affected.

7. Healthcare Companies: In November 2022, hackers demanded a ransom of $10 million to prevent the leakage of the records of Medibank, one of the largest Australian healthcare companies, after gaining access to the information of 9.7 million current and former customers, including Australian Prime Minister Anthony Albanese. This data included sensitive information about drug addicts, patients with sexually transmitted diseases, and abortions, as well as the names, addresses, and dates of birth of hundreds of customers.

Significant Implications

The following are some notable ramifications for the rise in data leaks:

1. Increased Cases of Extortion: Hackers and intruders typically target the data of some of the most powerful and wealthy people, large institutions that worry for their reputation and market value, or entities that can pay a hefty price to keep their data from being published. The likelihood of extortion increases as data becomes more sensitive. This implies that disclosing it could necessarily involve committing additional crimes, such as selling it to local media outlets or the black market. However, by paying a ransom to stop the data from being published or traded, the intruders or hackers will succeed in their objectives, which may encourage them to continue penetrating the same parties in the future, in the hopes of receiving another ransom payment. Failure to pay, on the other hand, results in the publication of user data and increases the likelihood that those impacted will demand compensation, which could be less or more than the ransom. That said, paying the ransom does not ensure that the data will be retrieved or not published.

2. Global in Scope and Nature: Any country, regardless of its level of development, and any company, regardless of its size, could be vulnerable to a data breach. For instance, in July 2022, a database belonging to the Shanghai police in China containing information about a billion citizens and more than 23 terabytes of data were sold on a hacking forum for 10 bitcoins (roughly $200,000). In December 2022, a security issue with the server of the International Table Tennis Federation resulted in the leak of the passport information and vaccination records of hundreds of professional table tennis players from the Netherlands via the Internet.

3. The Increasing Global Importance of Data: Data is vulnerable to piracy and hacking, just like software and video platforms, and as people and businesses depend more on it, it’s becoming a bigger target. The vast global scope of data leakage cases—which involved governmental agencies, major tech firms, international supply chains, etc.—indicates their extreme importance and their transformation into the oil of the twenty-first century. Data has evolved into one of the most crucial pillars of economic development and the foundation of the global economy. It also serves as the basis for digital transformation and the main entry point into the global digital economy.

4. Inadequate Protection Mechanisms: Despite the numerous privacy protection laws, they are ineffective at stopping hackers and intruders, especially given how difficult it is to determine who they are due to sophisticated multiform obfuscation techniques. However, cases where major technology companies pay monetary fines for leaking their users’ data are often cited as evidence of the efficacy of these laws. This is why a hacker contacted Elon Musk to purchase the stolen Twitter data in order to avoid paying a hefty fine. In a related context, Meta consented to pay $725 million to resolve a long-running lawsuit accusing it of violating its user data protection policies in 2018 and sharing that data with Cambridge Analytica. Amazon, too, was fined €746 million by the National Data Protection Commission in Luxembourg in 2021 for violating European Union data protection laws.

5. Increasing Significance of Data Localization: The frequency of data leakage cases, particularly those involving social media, highlights the significance of data localization, which refers to the storage and processing of data on domestic servers rather than those located overseas in order to ensure the establishment of a secure environment for information exchange in cyberspace. This, first and foremost, requires locating alternatives to social networking on a national scale. It is noteworthy that China imposed new content restrictions and required foreign technology companies to store user data within the country, despite the fact that its social networking sites accounted for more than half of the list of the most popular social networking sites worldwide.

In short, there is a need for better protection of user data, which has emerged as the greatest asset of social media platforms that offer users free services without making it clear to them that they are paying for it. Users will never be aware of the fate of their data or how many businesses, organizations, governmental bodies, and hackers are vying for it. Ergo, it is crucial to invest in cybersecurity measures and spread knowledge about the value of data protection and localization, especially given the variety of difficulties it faces.

Related Posts

Gaza Crisis between Israeli and American Perspectives

Sudan Matters, Always

The End of Globalization?

The Israel–Turkey Power Dynamics in Syria

TAGGED: Cyber attack, Data leak
Dr. Raghda al Bahi January 21, 2023
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Telegram Email Copy Link Print

Stay Connected

Facebook Like
Twitter Follow
Instagram Follow
Youtube Subscribe

Latest Articles

Sinai: Human Rights and Combating Terrorism
Defense & Security June 22, 2020
Will the Battle of Kharkiv Turn The Course of War in Ukraine?
International Relations September 27, 2022
The impact of climate change on sustainable development
Others November 9, 2022
Heated Competition: Turkish Election Map and Potential Voting Trends
Arab & Regional Studies May 13, 2023

Latest Tweets

International Relations

  • African Studies
  • American Studies
  • Arab & Regional Studies
  • Asian Studies
  • European Studies
  • Palestinian & Israeli Studies

Defence & Security

  • Armament
  • Cyber Security
  • Extremism
  • Terrorism & Armed Conflict

Public Policies

  • Development & Society
  • Economic & Energy Studies
  • Egypt & World Stats
  • Media Studies
  • Public Opinion
  • Women & Family Studies

All Rights Reserved to Egyptian Center for Strategic Studies - ECSS © 2023

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?