True crime news logo

Sign up for our newsletter and get the latest stories

Never miss the latest true crime news, reviews and top lists — plus new podcasts, series, films and books.

You can unsubscribe with one click from any email.

True crime news logo

The international true crime destination. Cases, documentaries, podcasts and travel routes.

© 2026 truecrime.news. All rights reserved.

A hacker accessing secure computer servers, lines of code representing stolen data, investigators analyzing digital forensic evidence on computer screens.

Data breach

When your data is stolen – definition, motives, and the complex investigation

Data breaches revealed: Understand what happens when sensitive information falls into the wrong hands, the motives behind them, and why they are central to true crime.


When your data is stolen – definition, motives, and the complex investigation


What is a data breach and why is it key to cybercrime?


In true crime, a data breach is defined as an incident where sensitive, protected, or confidential data is compromised through illegal access, copying, transmission, theft, or use by an unauthorized party. Far from being merely a technical mishap, a data breach often forms the core of modern cybercrime, with potentially far-reaching and devastating consequences for individuals, businesses, and government institutions. This makes the investigation of data breaches a central element in many criminal cases.


From financial gain to espionage: Data breach motives


The motives behind a data breach are diverse and can include financial gain through the sale of stolen personal information, credit card details, or login credentials on the dark web, which often leads to extensive identity theft with severe consequences for victims' finances and reputations. Other perpetrators use the compromised data for extortion, commit industrial espionage to gain competitive advantages, or engage in state-sponsored hacking for political or intelligence purposes. The data compromised in a breach can include a wide range of information: from deeply personal data such as personal identification numbers, financial information, and health records, to critical business secrets, intellectual property, and even national security information. This spectrum of potentially stolen data underscores the immense severity and far-reaching dangers associated with a data breach.


Victims' nightmares and investigators' fight: Cybercriminals


For victims of a data breach, the consequences can be long-lasting and deeply personal, including financial losses, significant emotional distress, and an often grueling battle to restore their identity and digital security. Organizations affected by a data breach face potentially enormous financial costs, loss of customer trust, severe reputational damage, and extensive legal repercussions. The investigation of data breaches itself is an extremely complex digital forensic process, where specialized cybercrime units must navigate a global network of anonymization techniques, encrypted systems, and jurisdictional barriers to track down and prosecute those responsible. A thorough understanding of data breaches is therefore essential in modern true crime, as this form of cybercrime represents an ever-growing and often invisible threat, whose technical complexity and severe consequences continue to challenge both investigators and societal efforts to improve information security and protection.


From stolen credit card details to extensive corporate espionage. What do data breaches look like in practice? Read our harrowing case studies on the subject below.

Posts Tagged “Data breach”

14 posts
A laptop screen displaying the Ashley Madison logo amidst lines of code, symbolizing the 2015 data breach that exposed millions of users and led to global blackmail and personal tragedies
CaseJune 6, 2025

Ashley Madison Breach: 37 Million Exposed in 2015 Hack

In July 2015, hackers calling themselves "The Impact Team" breached Ashley Madison, a website marketed for extramarital affairs, stealing personal data from approximately 37 million users across 40 countries. The incident exposed not only intimate details but also widespread corporate deception that defined the scandal.

Data breachExtortionScandal+32
A computer screen displays Binance's cryptocurrency dashboard, a red alert notification flashing next to the balance showing a missing 7,000 bitcoin, symbolizing the massive cyberattack that rocked the exchange.
CaseJune 6, 2025

Hackers Steal $570 Million in Binance Coin Cyberattack

Unknown hackers exploited a vulnerability in Binance's BSC Token Hub bridge on October 4, 2022, stealing approximately 2 million BNB tokens valued at $570 million. The attack, discovered two days later, marked one of crypto's largest bridge heists but left user funds untouched.

CybercrimeMoney launderingCrypto+15
A cracked Equifax logo on a glass door with reflection of anonymous figures in suits, symbolizing espionage and security failure, against the backdrop of a busy urban landscape.
CaseJune 6, 2025

U.S. Charges Chinese Military Officers in Massive Equifax Hack

U.S. federal prosecutors charged four members of China's People's Liberation Army on February 10, 2020, with orchestrating one of the largest data breaches in history. The defendants allegedly exploited a vulnerability in Equifax's systems to steal sensitive information from approximately 145 million Americans over a two-month period in 2017.

Data breachIdentity theftCrypto+29
A laptop screen displaying lines of code and visible API tokens, surrounded by notes and diagrams illustrating a data scraping scheme related to LinkedIn profiles, in a cluttered tech workspace.
CaseJune 6, 2025

700 Million LinkedIn Users' Data Sold on Dark Web Forum

In June 2021, a hacker using the username TomLiner posted personal data from approximately 700 million LinkedIn users—roughly 93% of the platform's membership—for sale on the dark web forum RaidForums. LinkedIn disputed the characterization as a breach, arguing the data came from public profiles and external sources rather than a direct hack of its systems.

Data breachCybercrimeHacking+16
A Starwood-branded server room with tangled Ethernet cables and a laptop displaying a web shell interface, symbolizing the vulnerability exploited in Marriott's data breach affecting 500 million guests
CaseJune 6, 2025

Marriott's Massive Breach: 383 Million Guests Exposed

Marriott International disclosed on November 30, 2018, that hackers had accessed its Starwood guest reservation database for approximately four years, affecting up to 383 million guests. The breach exposed sensitive personal information including names, addresses, passport numbers, and encrypted payment data—making it one of the largest data compromises in history.

Data breachIdentity theftEspionage+21
A safe with the Mt. Gox logo stands open in a dimly lit Tokyo office. Papers are strewn across the desk, and a monitor displays declining Bitcoin values, symbolizing the collapse and chaos of 2014.
CaseJune 6, 2025

The Mt. Gox Collapse: How Bitcoin's Largest Exchange Lost $450M

In February 2014, Mt. Gox—once the world's largest Bitcoin exchange—abruptly suspended trading and went offline, revealing the theft of over 744,000 Bitcoins worth approximately $450 million. The collapse exposed critical vulnerabilities in early cryptocurrency infrastructure and led to the arrest of CEO Mark Karpelès, a French businessman who had acquired the exchange just three years earlier.

Economic crimeCryptoHacking+22
A compromised Microsoft Exchange server displays a terminal screen filled with cryptic code, cables snaking out as a technician in the background examines the setup, symbolizing the widespread impact of the 2021 Hafnium cyberattack.
CaseJune 6, 2025

Chinese State Hackers Breached Thousands via Microsoft Exchange

A state-sponsored Chinese threat actor known as HAFNIUM launched a sophisticated cyberattack against Microsoft Exchange servers beginning January 6, 2021, remaining undetected for two months before Microsoft's March disclosure revealed the breach had compromised thousands of organizations worldwide.

CybercrimeEspionageData breach+21
A computer screen displays the Robinhood logo alongside an alert notification icon, symbolizing the massive user data breach and subsequent cybersecurity scandal.
CaseJune 6, 2025

7 Million Robinhood Users Hit in November 2021 Data Breach

Robinhood, the popular investment app, suffered a significant data breach on November 3, 2021, exposing personal information belonging to approximately 7 million users. The unauthorized access occurred through social engineering of a customer support employee.

Data breachEconomic crimeHacking+16
A computer screen displays the Poly Network logo in an office setting, with multiple open browser tabs showing cryptocurrency transactions detailing the return of $600 million dollars.
CaseJune 6, 2025

Hacker Steals $610M in Crypto, Then Returns It All

An unidentified hacker breached Poly Network, a decentralized finance platform, and stole $610 million in cryptocurrencies across multiple blockchain networks in August 2021. Within days, the attacker returned nearly all the funds, leaving investigators puzzled about the motive.

CryptoEconomic crimeFraud+10
A computer screen displaying a terminal with lines of code, a reflection showing a faint Amazon logo, symbolizing the Twitch 2021 leak exposé of streamers' earnings and Amazon's unreleased projects.
CaseJune 6, 2025

Twitch Breach Exposed Top Streamers' Million-Dollar Payouts

A hacker breached Twitch's internal systems in early October 2021, leaking source code, passwords, and payout data for thousands of streamers. The leaked information exposed two years of earnings data, revealing that top creators earned millions from subscriptions, ad revenue, and Bits donations.

Data breachHackingInternet+17
A computer screen displaying the WannaCry ransomware message, with Bitcoin symbols and a countdown timer, amid a chaotic office with disorganized NHS documents under flickering fluorescent lights.
CaseJune 6, 2025

WannaCry: The Ransomware Attack That Crippled the NHS

On May 12, 2017, the WannaCry ransomware attack struck more than 300,000 computers across 150 countries, but its impact on Britain's National Health Service proved particularly devastating. The attack infected at least 80 NHS trusts and over 600 primary care organizations, forcing hospitals to cancel thousands of procedures and revert to pen-and-paper record-keeping.

CybercrimeRansomData breach+24
A figure resembling Joe Sullivan sits at a wooden desk, an open laptop in front of him displaying a swirling Bitcoin transaction graphic, symbolizing the controversial payment to hackers during the 2016 Uber data breach cover-up.
CaseJune 6, 2025

Dutch Regulator Fines Uber €290M for Illegal Data Transfers

The Dutch Data Protection Authority (DPA) issued a €290 million fine to Uber Technologies and Uber B.V. on August 26, 2024, for transferring personal data of European drivers to the United States without implementing mandatory legal safeguards required under GDPR.

Data breachHigh-profile caseBribery+13
A computer screen displaying a Yahoo login page with a small sticky note that reads "Password Breach" placed nearby, suggesting a breach into user accounts.
CaseJune 6, 2025

Yahoo's 3 Billion Account Breach: History's Largest Hack

Yahoo suffered the largest data breach in history when hackers compromised 3 billion user accounts in August 2013, followed by a second breach affecting 500 million accounts in late 2014. The company didn't publicly disclose either incident until 2016, triggering investigations, lawsuits, and a $300 million reduction in its acquisition price.

Data breachEspionageHacking+19
The Lazarus Heist: exposing the global cyber threat
PodcastMay 26, 2025

Inside Lazarus: North Korea's $2 Billion Cyber Empire

The Lazarus Group, a North Korean state-sponsored hacking operation active since at least 2009, has stolen billions in cryptocurrency and launched devastating attacks on governments and corporations worldwide. The FBI confirms the group serves as a financial engine for Kim Jong-un's regime, circumventing international sanctions.

CybercrimeHackingConspiracy theory+16