> series: anatomy_of_a_breach —— part: 072 —— year: 2014 —— verdict: vulnerabilities_broke_the_internet<span class="cursor-blink">_</span>_
2014 was the year the internet discovered that its foundations were cracked. Heartbleed — a two-year-old bug in OpenSSL — could silently bleed secrets from 17% of the internet's secure web servers. Shellshock — a 25-year-old bug in Bash — enabled remote code execution on billions of devices. As US-CERT warned, both vulnerabilities existed in foundational infrastructure that the entire internet depended on, both had been present for years before discovery, and both required emergency patching at internet scale. The lesson was unsettling: the software we trust most may be the software we have tested least.
Meanwhile, the breach headlines continued to escalate. eBay lost 145 million accounts through compromised employee credentials. JP Morgan Chase — with a $250 million security budget — was breached through a single server without MFA. Home Depot replayed the Target breach nine months later, losing 56 million cards via the same attack methodology. North Korea attacked Sony Pictures over a comedy film, combining destruction, data theft, and physical threats. And in the UK, the Morrison's insider breach established that employers can be held vicariously liable for employee data theft.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call| # | Breach | Key Lesson |
|---|---|---|
| 061 | Snapchat | 4.6M records scraped after researchers' warnings were dismissed as 'theoretical.' |
| 062 | Korea Credit Bureau | 20M records — 40% of South Korea — stolen by a temp with a USB stick. |
| 063 | Morrison's Insider | 100K employees' data leaked. Supreme Court establishes employer vicarious liability. |
| 064 | Heartbleed | Two-year-old OpenSSL bug. 17% of HTTPS servers. No trace left. The internet bled. |
| 065 | eBay | 145 million accounts via compromised employee credentials. MFA would have stopped it. |
| 066 | Operation Tovar | Gameover Zeus + CryptoLocker disrupted. NCA gives UK a two-week warning. Takedowns are temporary. |
| 067 | JP Morgan Chase | $250M budget. One server without MFA. 76 million households. Budget ≠ security. |
| 068 | iCloud Photo Leak | Phishing + password guessing + no MFA = deeply personal data weaponised. |
| 069 | Home Depot | 56M cards. Same attack as Target. Nine months later. The lessons were not learned. |
| 070 | Shellshock | 25-year-old Bash bug. Billions of devices. Remote code execution. The foundations cracked. |
| 071 | Sony Pictures | North Korea: destruction + data theft + physical threats. Nation-state attacks go personal. |
| 072 | 2014 Year in Review | Vulnerabilities broke the internet. Basics still not implemented. Six years of evidence. |
With 72 articles spanning six years, the Anatomy of a Breach series has documented the complete construction of the modern cyber threat landscape — from HMRC's lost CDs to North Korea's attack on Hollywood, from Gonzalez's SQL injections to Heartbleed's silent bleed, from the T-Mobile insider selling records for pennies to CryptoLocker demanding Bitcoin. Every major threat category that defines the 2020s landscape — ransomware, supply chain attacks, credential theft, nation-state warfare, insider threats, and regulatory enforcement — was established and documented across these 72 breaches.
The controls that would have prevented every single breach remain the same: penetration testing to find the vulnerabilities, Cyber Essentials certification to establish the baseline, SOC in a Box to monitor continuously, and UK Cyber Defence to respond when prevention fails. Six years. 72 breaches. One truth. The organisations that test, certify, monitor, and prepare survive. The rest become the next article.
<a href="/penetration-testing">Penetration testing</a>. <a href="/cyber-essentials">Cyber Essentials</a>. <a href="https://www.socinabox.co.uk">SOC in a Box</a>. <a href="https://www.cyber-defence.io">UK Cyber Defence</a>. The evidence is overwhelming. Start now.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call