Data Breach Roundup (Jan 9 – Jan 15, 2026)

Spiderman pointing at Spiderman meme

Welcome to Data Breach Roundups, our new weekly series where we highlight notable data breaches we encounter. They're more common than you might think! If you want this weekly digest delivered to your inbox in the future, edit your newsletter settings to subscribe to the new 'Data Breach Roundups' mailing list.

Edit Newsletter Subscriptions

BreachForums hacking forum database leaked, exposing 324,000 accounts

From the "highly ironic" department, this breach contains display names, registration dates, IP addresses, and other internal information. Only about 70,000 of the records appear to have useful information (specifically non-local IP addresses). It also appears to include the administrator's private key.

BreachForums hacking forum database leaked, exposing 324,000 accounts
The latest incarnation of the notorious BreachForums hacking forum has suffered a data breach, with its user database table leaked online.

Spanish energy giant Endesa discloses data breach affecting customers

"Endesa is the largest electric utility company in Spain that distributes gas and electricity to more than 10 million customers in Spain and Portugal. In total, the company says it has about 22 million clients." Data impacted includes "basic identification details," contact information, national identity numbers (DNI), contract details, and payment details, including IBANs. The threat actors are already claiming to have 20 million records - about 1 TB - for sale.

Spanish energy giant Endesa discloses data breach affecting customers
Spanish energy provider Endesa and its Energía XXI operator are notifying customers that hackers accessed the company’s systems and accessed contract-related information, which includes personal details.

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users

Betterment is an "automated investment platform." Attackers have been abusing the push notification system to try to scam users, promising to "triple the value of their crypto by sending $10,000 to a wallet controlled by the attacker." They also compromised names, email & mailing address, phone numbers, and dates of birth. The especially disappointing part:

Betterment’s security incident web page contains a hidden “noindex” tag in its source code, which tells search engines to ignore the page, making it more difficult for anyone searching the web to discover information about the data breach.

Be sure to help spread the word since Betterment is doing everything they can to hide it. Very hostile behavior toward users.

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch
Hackers gained access to some Betterment customers’ personal information through a social engineering attack, then targeted some of them with a crypto-related phishing message.

University of Hawaii Cancer Center hit by ransomware attack

The attack occurred in August 2025, stealing data of study participants as far back as the 1990s. The impact appears limited to a single study and mostly research data, except Social Security Numbers of participants. (The university has switched to different ID methods.) The university paid the ransom and will alert impacted individuals once the investigation is complete.

University of Hawaii Cancer Center hit by ransomware attack
​University of Hawaii says a ransomware gang breached its Cancer Center in August 2025, stealing data of study participants, including documents from the 1990s containing Social Security numbers.

Central Maine Healthcare breach exposed data of over 145,000 people

CMH has over 400,00 patients and manages some regionally-significant locations like Central Maine Medical Center (CMMC), Bridgton Hospital, and Rumford Hospital. The breach took place between March and June 2025 and exposed full names, dates of birth, treatment information, dates of service, provider names, health insurance information, and social security numbers.

Central Maine Healthcare breach exposed data of over 145,000 people
A data breach last year at Central Maine Healthcare (CMH) exposed sensitive information of more than 145,000 individuals.

Monroe University says 2024 data breach affects 320,000 people

Data impacted includes name, date of birth, Social Security number, driver's license number, passport number, government identification number, medical information, health insurance information, electronic account or email username and password, financial account information, and/or student data. The school finished their investigation in September. It's unclear why it took so long or why it took even longer to notify people.

Monroe University says 2024 data breach affects 320,000 people
Monroe University revealed that threat actors stole the personal, financial, and health information of over 320,000 people after breaching its systems in a December 2024 cyberattack.

Victorian Department of Education says hackers stole students’ data

Exposed data includes names, school names, year levels, school-issued email addresses, and encrypted passwords. Number of impacted students was not disclosed. Dates of birth, home address, and phone numbers were not exposed.

Victorian Department of Education says hackers stole students’ data
The Department of Education in Victoria, Australia, notified parents that attackers gained access to a database containing the personal information of current and former students.

US cargo tech company publicly exposed its shipping systems and customer data to the web

In a now-published blog post, Zveare said he submitted details of the five flaws in Bluspark’s platform to the Maritime Hacking Village, a nonprofit that works to secure maritime space and helps researchers to notify companies working in the maritime industry of active security flaws.
Weeks later, and following multiple emails, voicemails, and LinkedIn messages, the company had not responded to Zveare. All the while, the flaws could still be exploited by anyone on the internet.
On the third time TechCrunch emailed Bluspark’s CEO, we included a partial copy of his password to demonstrate the seriousness of the security lapse. A couple of hours later, TechCrunch received a response — from a law firm representing Bluspark.

🤦‍♂️

Long story short, a horribly-configured API allowed for phishing emails, plaintext password extraction, and more. Baffling that a company could build such a complex portal and invest basically nothing into security.

Exclusive: US cargo tech company publicly exposed its shipping systems and customer data to the web
Shipping tech company Bluspark left internal plaintext passwords, including those of executives, exposed to the internet, at a time when hacks in the shipping industry are on the rise.

Community Discussion