AI Icon

X-PHY AI Assistant

Online

Try the X-PHY Deepfake Detector — free for 30 days (No credit card required).

Try X-PHY Deepfake Detector

2024’s Data Breach Tsunami Lessons from Snowflake, Telekom Malaysia, and Others

Did you know that in 2023, the average cost of a data breach reached a staggering USD 4.45 million globally? What is more alarming is that this is projected to surpass USD 5 million by the end of 2024 . As we stand halfway through 2024, cybersecurity resembles a battlefield, with organizations worldwide falling victim to increasingly sophisticated attacks. Imagine waking up to find your most sensitive information—from your bank details to your medical history—exposed on the dark web. This nightmare became a reality for millions of individuals and countless businesses in the first half of 2024. In fact, recent reports suggest that a cyberattack occurs every 39 seconds , with an estimated 30,000 websites hacked daily . These are not just numbers; they are real people, businesses, and consequences.

No entity is immune to the relentless onslaught of cyber threats, from tech giants to government institutions. Let’s examine some recent incidents and the critical lessons they offer.

Snowflake’s Chilling Revelation

In June 2024, cloud data warehousing giant Snowflake disclosed a significant breach affecting 165 of its customers. The attack, attributed to a group called UNC5537, exploited stolen customer credentials to compromise Snowflake instances systematically. The hackers then tried to extort victims and sell their data on the dark web and shady forums. This breach proves the importance of solid credential management. Many of the credentials were obtained through information-stealing malware on contractor systems used for work and personal activities. This shows the dangers of mixing personal and professional device usage, especially when it involves downloading pirated software—a common vector for malware distribution.

Telekom Malaysia’s Customer Data Exposed

In another concerning development, a hacker claimed in January 2024 to have stolen Telekom Malaysia’s entire customer database . The alleged breach reportedly contains nearly 20 million user records, including highly sensitive personal information such as MyKad (national ID) numbers, addresses, and even details about religious beliefs and marital status. While the full extent of this breach is still under investigation, it is a stark reminder of the vast amounts of personal data that telecom companies hold. This incident proves the need for robust data encryption and continuous monitoring of database activities to detect and prevent unauthorized access or exfiltration attempts.

UK Ministry of Defense Personnel Data Compromised

In May 2024, the UK Ministry of Defense (MoD) was affected by a significant data breach affecting an unknown number of current and former military personnel. The hack targeted an externally managed payroll system, potentially exposing names, bank details, and, in some cases, personal addresses of service members. This breach highlights the vulnerabilities that can arise when sensitive data is entrusted to third-party contractors.

Twilio’s Authy App: A Breach of Trust

In July 2024, Twilio, a cloud communications platform, reported a significant data breach affecting its Authy two-factor authentication app . The incident exposed millions of phone numbers associated with Authy user accounts. While Twilio assured that no 2FA tokens were compromised, the breach raised severe concerns about the security of authentication services. This breach is particularly ironic, given Authy’s role in providing additional security. It shows that even security-focused applications can become targets and highlights the need for continuous security assessments and improvements, even in tools designed to enhance protection.

The Wake-Up Call

These incidents reveal several common factors that organizations must address:

  1. Human Error Remains a Major Vulnerability: From falling for phishing attacks to mishandling sensitive data, human error continues to be a significant factor in many breaches. Regular training and awareness programs are essential.
  2. Zero Day Threats Evade Traditional Defenses: Sophisticated attackers often use previously unknown vulnerabilities. Relying solely on signature-based security solutions has never been effective.
  3. Comprehensive, Real-Time Monitoring is a Must: Many breaches go undetected for extended periods. Implementing continuous, AI-driven monitoring can help identify and respond to threats more quickly.
  4. Third-Party Risk Management is Essential: As the MoD breach demonstrates, organizations must extend their security practices to encompass their entire supply chain and partner ecosystem.
  5. Even Security Tools Can Be Compromised: The Twilio incident reminds us that no tool or service is inherently immune to attacks. A layered security approach is necessary.

Fortifying Your Defenses with X-PHY

In light of these persistent and evolving threats, organizations need innovative solutions that address the root causes of data breaches. Our suite of AI-embedded cybersecurity solutions offers a powerful approach to tackling these challenges head-on. Our hardware-based security technology provides real-time threat detection and prevention even against zero-day attacks, closing the gaps left by traditional software-based approaches.

X-PHY’s solutions are designed to:

  1. Mitigate human error through automated threat response
  2. Proactively detect and prevent zero-day attacks using AI-driven anomaly detection
  3. Provide continuous, real-time monitoring without impacting system performance
  4. Offer an essential layer of security from the physical infrastructure to complement existing cybersecurity stacks

Request a Demo

Don’t wait for you or your organization to become the next victim. Reach out to our team today to learn about how our solutions can secure your operations around-the-clock without straining your security teams.

About the Author

Irene Yeo is Flexxon’s Sales Director, responsible for developing and leading Flexxon’s global sales strategy, targets and activities. Her role involves leading and motivating the sales team, building strong relationships with customers, and identifying new business opportunities. Within the team, Irene is affectionately known as “Auntie Irene”, a fun-loving, caring and humorous people person who brightens up every conversation – whether you’re in a meeting or waiting for the lift.


Cost of a Data Breach Report 2023
https://www.ibm.com/reports/data-breach
Study: Hackers Attack Every 39 Seconds
https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds
How Many Cyber Attacks Happen Per Day in 2024?

https://techjury.net/blog/how-many-cyber-attacks-per-day/
Snowflake Breach Exposes 165 Customers’ Data in Ongoing Extortion Campaign
https://thehackernews.com/2024/06/snowflake-breach-exposes-165-customers.html
Hacker alleges to have stolen Telekom Malaysia’s customer database with ‘nearly 20 million effective user data’ (Updated with TM’s statement)
https://www.thestar.com.my/tech/tech-news/2024/01/26/hacker-alleges-to-have-stolen-telekom-malaysias-customer-database-with-nearly-20-million-effective-user-data

MoD data breach: UK armed forces’ personal details accessed in hack
https://www.bbc.com/news/uk-68966497
Twilio Confirms Data Breach After Hackers Leak 33M Authy User Phone Numbers
https://www.securityweek.com/twilio-confirms-data-breach-after-hackers-leak-33m-authy-user-phone-numbers/

More Posts

In the modernization of technology, Edge Computing has unfolded a newer experience for data sharing other than cloud computing. This brings out the processing power and data storage closer to […]

Melissa, Zeus, Aurora. These seemingly innocuous names share a common, ominous thread – they are infamous cyber threats that have left indelible marks on and impacted the path of cybersecurity. […]

World Backup Day 2024 has technology leaders calling for organizations to go beyond basic backup strategies and overhaul their cybersecurity posture. In comments to Data Centre News, our CEO Camellia […]

Try X-PHY Deepfake Detector — Free for 30 days

(No credit card required).