Doxxing Examples (2023): The 3 Worst Attacks of All Time
By Tibor Moes / Updated: June 2023
Doxxing Examples
Picture yourself on a stage, under the spotlight, your entire life laid bare to an audience of millions. A situation none of us would wish for, but is the harsh reality for victims of an online practice known as doxxing. Let’s set sail on this journey to understand the real-life drama that unfolds in the digital world.
Summary
Doxxing is the malicious online practice where personal, private information about an individual is publicly revealed without consent, often leading to harassment, public shaming, or even physical threats.
Example 1: Gamergate (2014). One of the earliest and most notable instances of doxxing, Gamergate involved the targeted harassment of female game developers and critics. Personal details including addresses, emails, and more were shared online, leading to widespread criticism of the gaming community’s toxicity.
Example 2: CNN Reddit User (2017). A Reddit user was involved in a controversy with CNN after creating a GIF of President Trump wrestling a figure with CNN’s logo. After CNN discovered his identity, there was widespread criticism and debate, with some claiming the network was ‘doxxing’ the Reddit user, potentially endangering his safety.
Example 3: Black Lives Matter Protests (2020). During the height of the Black Lives Matter protests, doxxing was used as a weapon by both supporters and detractors of the movement. Protesters’ personal details were revealed online, leading to harassment and threats. Conversely, police officers also faced doxxing, illustrating how the practice can impact people on all sides of an issue.
Don’t become a victim of cybercrime. Protect your devices with the best antivirus software and your privacy with the best VPN service.
Doxxing Examples In-Depth
Gamergate (2014)
Let’s hop into our virtual time machine and dial back to the year 2014. The world was spinning in the vibrant vortex of the digital age, and video gaming was blossoming as a mainstream culture. Little did we know, this same sphere was about to become the epicenter of an online controversy known as ‘Gamergate’.
The main actors in this unfolding drama were female game developers and critics. These were pioneers, stepping into a realm traditionally dominated by males, to break down gender barriers and bring in fresh perspectives. But, some saw these changes as a threat to the ‘status quo’. Cue the entrance of our invisible villain, ‘doxxing’.
Imagine being an actor on a stage, performing to an audience. Now imagine that same stage turning into a glass house, revealing all aspects of your private life to the onlooking crowd. That’s exactly what happened to these women. Private details such as their addresses, phone numbers, even the schools their kids attended were broadcasted to the online world.
But why would someone do this? In a nutshell, it was a tool to harass, to intimidate, to silence. The offenders hid behind their computer screens, dropping these ‘doxxing bombs’ in an attempt to scare these women into submission, to retreat back into the shadows and leave the gaming realm ‘as it was’.
However, the effects of Gamergate were far-reaching and controversial. Rather than quelling the voices of these women, it amplified them. The whole world turned its gaze onto this issue, shedding light on the dark corners of the gaming community and sparking a discourse about sexism in gaming that continues to this day.
While Gamergate revealed the ugly side of doxxing, it also served as a wake-up call. It was a stark reminder of the necessity to protect personal information online and to create safer digital spaces for everyone. The saga of Gamergate, a cautionary tale, exposed the cyber weapon of doxxing to the world, making us all more aware of the hidden dangers lurking in the digital shadows.
CNN Reddit User (2017)
Our next stop on this doxxing timeline whisks us away to 2017, where we find a world increasingly engulfed in social media and online discussions. In this whirlwind of digital activity, a single Reddit user accidentally kicked a hornet’s nest that came to be known as the ‘CNN Reddit User Incident’.
Picture a day in the life of an ordinary Reddit user. A bit of banter, a dash of humor, a sprinkling of internet culture – that was the recipe for the post that started it all. This user created and shared a GIF, a small animation, featuring President Trump wrestling a figure with CNN’s logo superimposed on its face. Little did he know, this lighthearted jest would turn into a storm.
CNN, the media giant, wasn’t laughing. They didn’t see the GIF as a harmless joke, but as a harmful taunt. So, they started digging. Using various clues, they managed to identify the Reddit user who was behind the post. Suddenly, the tables turned, and the hunter became the hunted.
Now, CNN had the user’s personal information. However, they decided not to publish it, but issued a statement saying they reserved the right to disclose his identity if he continued to create such content. The internet, known for its love of free speech, erupted in outrage. Was this a media giant threatening an ordinary person’s right to express themselves, or was it a justifiable action against potentially harmful content?
This incident stirred a hornet’s nest of debate about doxxing. Although CNN didn’t reveal the user’s identity, the mere fact they had the ability to do so was chilling. It showcased how even seemingly innocent online interactions could lead to personal information being dug up and potentially used as a weapon. This incident added a new layer to the doxxing discourse, highlighting the fine line between protecting reputation and suppressing free speech.
Black Lives Matter Protests (2020)
For our final trip in this doxxing exploration, we land in the fiery year of 2020. The world was on edge, grappling with a global pandemic, and the streets were pulsing with the energy of social change. It was during the height of the Black Lives Matter (BLM) protests that we saw doxxing flex its muscles in a new way.
The BLM protests were a roar for justice, an outcry against racial prejudice and police brutality. People from all walks of life gathered, armed with placards and voices loud with passion. Yet, in the shadows of this noble pursuit, the specter of doxxing was lurking.
Think of being a protester, rallying for a cause you believe in, only to find your personal information – your home, your family, your job – splayed out in the open for all to see. The motive? Intimidation. Harassment. Maybe even harm. This was the reality for some BLM protesters, as opposing factions used doxxing as a tool to attempt to silence them.
But the sword of doxxing is double-edged. During these same protests, some individuals turned this tool against police officers involved in violent incidents. Names, addresses, and personal details of officers were released into the wilds of the internet, a process known as ‘blue doxxing’. The intention behind this was to seek accountability, but it inevitably led to debates about privacy and personal safety.
The BLM protests were a powerful illustration of how doxxing can be a weapon wielded by all sides of an issue. It highlighted the dangers of a world where anyone with an internet connection can turn detective and judge, and privacy can be shattered in a click. Amid the echoes of the protests, the message is clear: the issue of doxxing is one we must all navigate with care and consideration.
Conclusion
As we disembark from our journey through the annals of doxxing, we are left with a stark understanding of the power this digital phenomenon holds. From the dark corridors of the Gamergate controversy, the tussle between an individual and a media giant in the CNN Reddit case, to the streets of the Black Lives Matter protests, doxxing has proven to be a formidable tool. It’s a weapon that can strip away privacy, amplify intimidation, and even threaten physical safety.
Yet, these tales also underscore the importance of awareness, privacy protection, and digital responsibility in our increasingly online world. While doxxing is a chilling manifestation of the internet’s darker side, it’s also a catalyst for conversations about respect, privacy, and safety in the digital sphere. And in these conversations, there’s hope for a safer, kinder online world.
How to stay safe online:
- Practice Strong Password Hygiene: Use a unique and complex password for each account. A password manager can help generate and store them. In addition, enable two-factor authentication (2FA) whenever available.
- Invest in Your Safety: Buying the best antivirus for Windows 11 is key for your online security. A high-quality antivirus like Norton, McAfee, or Bitdefender will safeguard your PC from various online threats, including malware, ransomware, and spyware.
- Be Wary of Phishing Attempts: Be cautious when receiving suspicious communications that ask for personal information. Legitimate businesses will never ask for sensitive details via email or text. Before clicking on any links, ensure the sender's authenticity.
- Stay Informed. We cover a wide range of cybersecurity topics on our blog. And there are several credible sources offering threat reports and recommendations, such as NIST, CISA, FBI, ENISA, Symantec, Verizon, Cisco, Crowdstrike, and many more.
Happy surfing!
Frequently Asked Questions
Below are the most frequently asked questions.
What can be done to prevent doxxing?
Protecting yourself from doxxing largely revolves around securing your online privacy. This includes using privacy settings on social media, being cautious about the personal information you share online, regularly updating your passwords, and considering a VPN for added security.
What to do if you've been doxxed?
If you’ve been doxxed, immediately report it to the relevant platform, social media site, or forum. It’s important to keep evidence of the doxxing, such as screenshots or saved messages. Reach out to local law enforcement and consider legal advice if the situation escalates.
Is doxxing illegal?
The legality of doxxing varies by jurisdiction and context. In many cases, doxxing could fall under harassment, stalking, or cyberbullying laws. It’s also against the rules on many social media platforms. However, it’s important to consult with legal experts to understand the specifics based on the region and the nature of the incident.

Author: Tibor Moes
Founder & Chief Editor at SoftwareLab
Tibor is a Dutch engineer and entrepreneur. He has tested security software since 2014.
Over the years, he has tested most of the best antivirus software for Windows, Mac, Android, and iOS, as well as many VPN providers.
He uses Norton to protect his devices, CyberGhost for his privacy, and Dashlane for his passwords.
This website is hosted on a Digital Ocean server via Cloudways and is built with DIVI on WordPress.
Security Software
Best Antivirus for Windows 11
Best Antivirus for Mac
Best Antivirus for Android
Best Antivirus for iOS
Best VPN for Windows 11
Cyber Threats
Advanced Persistent Threat (APT)
Adware
Adware Examples
Black Hat Hacker
Bloatware
Botnet
Botnet Examples
Brute Force Attack
Business Email Compromise (BEC)
Catfishing
Clickjacking
Computer Virus
Computer Virus Examples
Computer Worm
Computer Worm Examples
Credential Stuffing
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) Examples
Cross-Site Scripting (XSS) Types
Crypto Scam
Cyber Espionage
Cyber Risk
Cyber Squatting
Cyber Threat
Cyber Threat Examples
Cyber Threat Types
Cyberattack
Cyberbullying
Cyberbullying Examples
Cyberbullying Types
Cybercrime
Cybercrime Examples
Cybercrime Types
Cyberstalking
Cyberstalking Examples
Data Breach
Data Breach Examples
Data Breach Types
Data Leak
DDoS Attack
DDoS Attack Examples
Deepfake Examples
Doxxing
Doxxing Examples
Email Spoofing
Exploit
Exploit Examples
Exploit Types
Fileless Malware
Grey Hat Hacker
Hacking
Hacking Examples
Hacking Types
Hacktivism
Identity Theft
Identity Theft Examples
Identity Theft Types
Insider Threat
IP Spoofing
Keylogger
Keylogger Types
Malicious Code
Malicious Code Examples
Malvertising
Malware
Malware Examples
Malware Types
Man In The Middle Attack
Man in the Middle Attack Examples
Online Scam
Password Cracking
Password Spraying
Pharming
Phishing
Phishing Email
Phishing Email Examples
Phishing Examples
Phishing Types
Ransomware
Ransomware Examples
Ransomware Types
Robocalls
Rootkit
Rootkit Examples
Scareware
Security Breach
Session Hijacking
Smishing
Smurf Attack
Social Engineering
Social Engineering Examples
Social Engineering Types
Spam
Spam Examples
Spam Types
Spear Phishing
Spear Phishing Examples
Spoofing Examples
Spyware
Spyware Examples
SQL Injection
SQL Injection Examples
SQL Injection Types
Trojan Horse
Trojan Horse Examples
Vishing
Watering Hole Attack
Whale Phishing
Zero Day Exploit
Zero Day Exploit Examples