malware Attacks & Data Breaches
35 data breaches have involved malware as the primary attack method or incident type. Malware encompasses various malicious software including trojans, spyware, keyloggers, and backdoors designed to infiltrate systems, steal data, or enable persistent access.
Impact: Malware can lead to data theft, system compromise, credential harvesting, and serve as a foothold for more sophisticated attacks.
Prevention: Endpoint protection platforms, application whitelisting, network detection, and timely patching prevent most malware infections.
Understanding how malware attacks occur helps security teams prioritize defenses and incident response capabilities. Compare with other attack types like Ransomware, Phishing, or Supply Chain attacks. View the latest breaches across all incident types.
| Date | Company | Type | Industry | Country | Severity | Source |
|---|---|---|---|---|---|---|
| Jan 22, 2026 | Prettier (eslint-config-prettier) | malware | Technology | - | 5/10 | View |
| Dec 31, 2025 | EmEditor Website | malware | - | - | 5/10 | View |
| Dec 14, 2025 | Microsoft | malware | Technology | - | 5/10 | View |
| Nov 13, 2025 | Operation Endgame 3.0 | malware | - | - | 8/10 | View |
| Oct 27, 2025 | DDoS | malware | - | - | 5/10 | View |
| Oct 20, 2025 | F5 Networks | malware | - | China | 5/10 | View |
| Jul 4, 2025 | Catwatchful Stalkerware | malware | Technology | - | 5/10 | View |
| Mar 30, 2025 | Samsung Germany Customer Tickets | malware | - | - | 6/10 | View |
| Mar 23, 2025 | ChatGPT | malware | - | - | 6/10 | View |
| Mar 23, 2025 | Microsoft | malware | - | - | 5/10 | View |
| Mar 20, 2025 | SpyX | malware | Financial Services | - | 8/10 | View |
| Feb 14, 2025 | Cocospy | malware | - | - | 7/10 | View |
| Feb 14, 2025 | Spyic | malware | - | - | 6/10 | View |
| Jan 2, 2025 | Cyberhaven | malware | - | International/Global | 6/10 | View |
| Nov 8, 2024 | SpyAgent | malware | - | - | 5/10 | View |
| Sep 8, 2024 | Google Maps | malware | - | - | 5/10 | View |
| Jul 29, 2024 | Spyware | malware | - | - | 5/10 | View |
| Jul 18, 2024 | Stealer Logs Posted to Telegram | malware | - | - | 9/10 | View |
| Jun 24, 2024 | SpyX | malware | - | - | 8/10 | View |
| Jun 9, 2024 | mSpy (2024) | malware | - | - | 7/10 | View |
| Jun 4, 2024 | Spytech | malware | - | - | 6/10 | View |
| May 29, 2024 | Justice AV Solutions (Viewer ) | malware | Technology | - | 5/10 | View |
| May 25, 2024 | pcTattletale | malware | - | - | 7/10 | View |
| Apr 1, 2024 | Vultur | malware | - | - | 5/10 | View |
| Apr 1, 2024 | Vulnerability | malware | - | - | 5/10 | View |
| Mar 19, 2024 | Fujitsu | malware | Government | International/Global | 5/10 | View |
| Feb 22, 2024 | Spyzie | malware | - | - | 6/10 | View |
| Aug 29, 2023 | Qakbot | malware | - | - | 8/10 | View |
| Dec 5, 2021 | RedLine Stealer | malware | - | - | 7/10 | View |
| Nov 3, 2021 | Docker (Desktop Community Edition) | malware | Technology | - | 5/10 | View |
| Jan 1, 2020 | Nameless Malware | malware | - | - | 7/10 | View |
| Aug 16, 2018 | SpyFone | malware | - | - | 6/10 | View |
| Feb 21, 2016 | Linux Mint | malware | - | - | 7/10 | View |
| Nov 15, 2014 | Malwarebytes | malware | - | - | 7/10 | View |
| May 26, 2014 | Avast | malware | - | - | 7/10 | View |
Unlock Full Breach Intelligence
Get complete access to our breach database with advanced search, API integration, threat actor attribution, and real-time monitoring for your security operations.
Contact access@breachsignal.com for enterprise pricing.