malware Attacks & Data Breaches

35 data breaches have involved malware as the primary attack method or incident type. Malware encompasses various malicious software including trojans, spyware, keyloggers, and backdoors designed to infiltrate systems, steal data, or enable persistent access.

Impact: Malware can lead to data theft, system compromise, credential harvesting, and serve as a foothold for more sophisticated attacks.

Prevention: Endpoint protection platforms, application whitelisting, network detection, and timely patching prevent most malware infections.

Understanding how malware attacks occur helps security teams prioritize defenses and incident response capabilities. Compare with other attack types like Ransomware, Phishing, or Supply Chain attacks. View the latest breaches across all incident types.

Classification: Incidents are categorized by the primary attack vector or root cause identified in breach disclosures and security research.
35
malware Incidents
Date Company Type Industry Country Severity Source
Jan 22, 2026 Prettier (eslint-config-prettier) malware Technology - 5/10 View
Dec 31, 2025 EmEditor Website malware - - 5/10 View
Dec 14, 2025 Microsoft malware Technology - 5/10 View
Nov 13, 2025 Operation Endgame 3.0 malware - - 8/10 View
Oct 27, 2025 DDoS malware - - 5/10 View
Oct 20, 2025 F5 Networks malware - China 5/10 View
Jul 4, 2025 Catwatchful Stalkerware malware Technology - 5/10 View
Mar 30, 2025 Samsung Germany Customer Tickets malware - - 6/10 View
Mar 23, 2025 ChatGPT malware - - 6/10 View
Mar 23, 2025 Microsoft malware - - 5/10 View
Mar 20, 2025 SpyX malware Financial Services - 8/10 View
Feb 14, 2025 Cocospy malware - - 7/10 View
Feb 14, 2025 Spyic malware - - 6/10 View
Jan 2, 2025 Cyberhaven malware - International/Global 6/10 View
Nov 8, 2024 SpyAgent malware - - 5/10 View
Sep 8, 2024 Google Maps malware - - 5/10 View
Jul 29, 2024 Spyware malware - - 5/10 View
Jul 18, 2024 Stealer Logs Posted to Telegram malware - - 9/10 View
Jun 24, 2024 SpyX malware - - 8/10 View
Jun 9, 2024 mSpy (2024) malware - - 7/10 View
Jun 4, 2024 Spytech malware - - 6/10 View
May 29, 2024 Justice AV Solutions (Viewer ) malware Technology - 5/10 View
May 25, 2024 pcTattletale malware - - 7/10 View
Apr 1, 2024 Vultur malware - - 5/10 View
Apr 1, 2024 Vulnerability malware - - 5/10 View
Mar 19, 2024 Fujitsu malware Government International/Global 5/10 View
Feb 22, 2024 Spyzie malware - - 6/10 View
Aug 29, 2023 Qakbot malware - - 8/10 View
Dec 5, 2021 RedLine Stealer malware - - 7/10 View
Nov 3, 2021 Docker (Desktop Community Edition) malware Technology - 5/10 View
Jan 1, 2020 Nameless Malware malware - - 7/10 View
Aug 16, 2018 SpyFone malware - - 6/10 View
Feb 21, 2016 Linux Mint malware - - 7/10 View
Nov 15, 2014 Malwarebytes malware - - 7/10 View
May 26, 2014 Avast malware - - 7/10 View

Unlock Full Breach Intelligence

Get complete access to our breach database with advanced search, API integration, threat actor attribution, and real-time monitoring for your security operations.

Full historical archive API access Real-time alerts Threat actor data Export to CSV/JSON

Contact access@breachsignal.com for enterprise pricing.