> series: anatomy_of_a_breach —— part: 065 —— target: ebay —— accounts: 145,000,000 —— entry: employee_credentials<span class="cursor-blink">_</span>_
On 21 May 2014, eBay disclosed that attackers had compromised a small number of employee login credentials between late February and early March 2014 and used them to access a corporate database containing the personal information of approximately 145 million registered users. The stolen data included names, email addresses, physical addresses, phone numbers, dates of birth, and encrypted passwords. Financial data (credit card numbers) was stored separately on PayPal's systems and was not compromised.
eBay advised all 145 million users to change their passwords — one of the largest forced password reset operations in internet history at the time. The company faced criticism for the delay between discovering the breach (early May) and disclosing it (21 May), and for the lack of clarity about how the employee credentials were initially compromised. The breach reinforced a pattern documented throughout this series: compromised employee credentials provide the most reliable path to mass data theft, and multi-factor authentication is the most effective defence.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe eBay breach followed the same attack chain as the Target breach six months earlier: compromised credentials (whether through phishing, credential stuffing, or another method) provided access to internal systems, and from those internal systems, the attackers reached a database containing the organisation's most valuable data. The gap between the employee access point and the customer database — the absence of segmentation, monitoring, and additional authentication — was the vulnerability that turned a credential compromise into a 145-million-record breach.
The eBay breach, like Target before it, demonstrated that compromised credentials are the master key — and that the only reliable defence is layered: MFA to prevent credential reuse (Cyber Essentials), segmentation to limit what compromised credentials can reach (infrastructure testing), and monitoring to detect when compromised credentials are being used anomalously (SOC in a Box). Every major breach in 2013-2014 — Target, eBay, JP Morgan — started with compromised credentials. The defence is the same every time.
<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA. <a href="/penetration-testing/infrastructure">Penetration testing</a> validates segmentation. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects anomalous credential use.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call