Anatomy of a Breach

Anatomy of a Breach: 2009 Year in Review — The Year Cyber Crime Grew Up

> series: anatomy_of_a_breach —— part: 012 —— year: 2009 —— verdict: the_year_cybercrime_grew_up<span class="cursor-blink">_</span>_

Hedgehog Security 31 December 2009 13 min read

2009: the year everything changed.

As 2009 draws to a close, we look back on a year that fundamentally reshaped the cyber security landscape. The scale, sophistication, and diversity of the breaches we have examined in this series — from the largest card theft in history to the first major cyber extortion, from cloud computing's biggest failure to the UK Government's data protection reckoning — demonstrate that cybercrime in 2009 crossed a threshold from opportunistic to industrial. The trends that emerged this year will define the threat landscape for the next decade and beyond.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Twelve months. Twelve lessons.

# Breach Key Lesson
001 HMRC Child Benefit Data minimisation and encryption are not optional — they are fundamental.
002 Heartland Payment Systems Legacy web applications are your most dangerous assets. SQL injection is preventable.
003 RBS WorldPay Organised cybercrime can coordinate simultaneous global operations with military precision.
004 MoD Laptop Theft Physical security is cyber security. Policy without enforcement is fiction.
005 TJX / TK Maxx A weak Wi-Fi password in a car park can compromise 94 million cards globally.
006 Virginia Prescription Ransom Cyber extortion is real. Backup integrity is existential. Ransomware's playbook was written in 2009.
007 T-Mobile UK Insider The attacker with a staff badge is harder to detect than the attacker with a zero-day.
008 The Gonzalez Indictment One man exploited the same known vulnerabilities across four corporations for 174 million cards.
009 Network Solutions Your hosting provider's breach is your breach. Supply chain security is not optional for SMEs.
010 Sidekick Cloud Data Loss Cloud does not mean safe. Backups that share a failure domain with primary data are not backups.
011 UK Government Data Loss Epidemic Systemic cultural failures cannot be fixed by individual incident responses. The epidemic changed UK data protection.
012 2009 Year in Review Cybercrime has industrialised. The organisations that test, monitor, and adapt will survive. The rest will be headlines.

What 2009 taught the world.

Cybercrime Industrialised
The Gonzalez indictment revealed an organised criminal enterprise with international coordination, custom tooling, operational security, and a supply chain of its own. The <a href="/blog/anatomy-of-a-breach-rbs-worldpay">RBS WorldPay heist</a> demonstrated military-grade coordination across 280 cities. Cybercrime in 2009 crossed the threshold from individual hacking to organised industry — a trend confirmed by the <a href="https://www.verizon.com/business/resources/reports/dbir/">Verizon Data Breach Investigations Report</a> and the <a href="https://www.identitytheft.org/">Identity Theft Resource Center's annual breach statistics</a>, which recorded a 47% increase in US data breaches in 2008 alone — and it has only become more industrialised since.
Cyber Extortion Was Born
The <a href="/blog/anatomy-of-a-breach-virginia-prescription-ransom">Virginia prescription ransom</a> was a precursor to the ransomware epidemic that would define the 2020s. The methodology — compromise, encrypt, destroy backups, demand payment — was manual in 2009. By 2017, WannaCry automated it at global scale. By 2025, ransomware-as-a-service has industrialised it. The playbook has not changed; only the automation has.
Cloud Computing's Trust Crisis
The <a href="/blog/anatomy-of-a-breach-sidekick-cloud-data-loss">Sidekick disaster</a> exposed the fragility of cloud-only architectures and the danger of assuming that cloud providers are infallible. The lesson — that cloud data requires independent backup and verified recovery procedures — remains as relevant today as it was when 800,000 users lost everything.
Insider Threats Emerged as a Primary Vector
The <a href="/blog/anatomy-of-a-breach-t-mobile-uk-insider">T-Mobile insider breach</a> demonstrated that the most damaging breaches do not always come from outside. An employee with legitimate access and illegitimate intent can exfiltrate millions of records without triggering a single security alert — unless monitoring and <a href="https://www.socinabox.co.uk/blog/data-loss-prevention-small-business">data loss prevention</a> are in place.
Data Protection Became a Governance Issue
The <a href="/blog/anatomy-of-a-breach-uk-government-data-loss-epidemic">UK Government data loss epidemic</a> transformed data protection from a technical concern to a board-level governance obligation. The ICO's new monetary penalty powers, mandatory encryption requirements, and structural accountability changes were direct consequences of the 2007–2009 epidemic.
Supply Chain Risk Was Validated
The <a href="/blog/anatomy-of-a-breach-network-solutions">Network Solutions breach</a> proved that a compromise at a hosting provider affects every business that depends on it. Supply chain attacks — targeting the weakest link to reach the ultimate target — were demonstrated at scale and would become the dominant attack model of the following decade.

The 2010s are coming.

As we close 2009, the threat landscape stands at an inflection point. The tools, techniques, and organisational structures that cybercriminals developed in 2009 will scale dramatically in the coming decade. The breaches of the 2010s — Sony PlayStation Network, Target, Ashley Madison, Yahoo, Equifax, Marriott, British Airways, and eventually WannaCry — will dwarf what we saw in 2009 in scale, but they will exploit the same fundamental failures: unpatched software, weak authentication, absent segmentation, inadequate monitoring, and the persistent gap between security policy and security practice.

The organisations that will survive the next decade are the ones that learn from 2009 — that test their defences proactively through penetration testing, certify their baseline controls through Cyber Essentials, monitor their environments continuously through services like SOC in a Box, and have incident response capabilities ready for when prevention fails. The Anatomy of a Breach series continues in 2010.


The threats of 2009 are the baseline for 2010. Are you ready?

Every breach we examined in 2009 was preventable with controls that exist today. <a href="/penetration-testing">Penetration testing</a> finds the vulnerabilities. <a href="/cyber-essentials">Cyber Essentials</a> certifies the baseline. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors continuously. And <a href="https://www.cyber-defence.io">UK Cyber Defence</a> responds when it matters most.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles