Phishing Examples (2023): The 12 Worst Attacks of All Time

By Tibor Moes / Updated: May 2023

Phishing Examples (2023): The 12 Worst Attacks of All Time

Phishing Examples

Imagine you’re at a bustling farmers’ market. Among the stands filled with fresh fruits and local honey, there’s one that’s not quite right. Their sign promises incredible deals, but it’s a trick – a scam to nab your money and run. This, in essence, is phishing in the digital world. It’s crafty, it’s deceptive, and it’s more common than you might think.

Stick with us as we explore the most notorious phishing examples that have ever taken place, to help you avoid getting hooked.


Phishing is an attempt to steal someone’s personal information by deceptive means. Hackers use phishing emails and fake websites to access your login credentials and banking data.

  1. Estonian Cyber War (2007): Estonia experienced a massive cyber attack that disrupted key online services for weeks. The attack, suspected to be from Russian hackers, highlighted the destructive potential of cyber warfare.
  2. HBGary Federal Attack (2011): US security firm HBGary Federal was hit by the hacker group Anonymous after a threat to expose its members. The hack exposed sensitive company data, causing financial and reputational harm.
  3. RSA Security Breach (2011): RSA, a leading cybersecurity firm, was the victim of a major phishing attack. This breach put the data of millions of RSA’s global clients at risk.
  4. Operation Aurora (2009-2010): This cyber attack traced back to China targeted big corporations, stealing valuable data and user accounts. The operation underlined the importance of robust cybersecurity measures.
  5. AP Twitter Hack (2013): The Syrian Electronic Army hijacked the Associated Press’ Twitter account, causing a brief stock market crash by spreading false news, showcasing the financial impact of misinformation.
  6. Google and Facebook Phishing Attack (2013-2015): Evaldas Rimasauskas tricked Google and Facebook into paying over $100 million in fraudulent invoices. His prison sentence marked a rare legal victory in cybercrime.
  7. Sony Pictures Hack (2014): Sony Pictures suffered a major hack, allegedly by North Korean hackers, leading to significant financial damage and the leak of sensitive data. This incident emphasized the need for strong cybersecurity.
  8. Hillary Clinton Presidential Campaign Attack (2016): Russian hackers known as Fancy Bear targeted Hillary Clinton’s campaign, intending to influence the US election. This breach led to the release of private emails and sensitive campaign information.
  9. WannaCry Ransomware Attack (2017): The WannaCry cyber attack in 2017 locked people out of their computers globally, asking for ransom. The attack affected everyone from individuals to government agencies, costing billions of dollars.
  10. The NotPetya Attack (2017): The NotPetya ransomware attack in 2017 affected numerous organizations worldwide, causing estimated losses of over $10 billion. Notably, the attack offered no decryption method, even if a ransom was paid.
  11. Marriott Data Breach (2018): Marriott disclosed a massive data breach in 2018 that had compromised guest data since 2014. This breach, believed to be linked to China, affected around 500 million guests.
  12. Twitter VIP Attack (2020): In 2020, a significant Twitter breach saw high-profile accounts being hacked. The attack, traced back to a 17-year-old from Florida, had a global impact due to the international influence of the targeted accounts.

Don’t become a victim of phishing. Protect your devices with one of the best antivirus software and your privacy with the best VPN service.

Phishing Examples In-Depth

1. The Estonian Cyber War (2007)

It was a spring day in 2007 when digital life in Estonia came to a grinding halt. For nearly three weeks, a wave of relentless phishing and DDoS attacks targeted government, banking, and media websites, rendering them virtually inaccessible. This is known as the Estonian Cyber War.

The culprits? A group of hackers suspected to have ties with Russia, angered by the relocation of a Soviet-era statue in Estonia’s capital, Tallinn. The attack was felt across the country, marking it as one of the most extensive cyber-attacks a single nation had endured up to that point. It was a clear demonstration of how cyber warfare could effectively destabilize an entire country’s digital infrastructure.

The financial damage was significant, though an exact figure remains undisclosed. Thousands of Estonians found themselves unable to access online services, underscoring the deeply personal impact of this digital onslaught.

The nature of data compromised was wide-ranging, impacting government operations and potentially exposing sensitive citizen information. In the aftermath, Estonia took significant steps to bolster its cyber-defenses, becoming a leading figure in global cybersecurity. This resilience has turned a dark chapter in Estonia’s digital history into a springboard for becoming a cybersecurity powerhouse.

Despite international tension following the attack, direct legal consequences for the perpetrators have been elusive, primarily due to the challenges of attribution in cyber warfare.

2. The HBGary Federal Attack (2011)

In the early days of 2011, security firm HBGary Federal was in the crosshairs of a serious digital assault. The attack lasted just a few days but had devastating effects.

The hackers were none other than the infamous collective known as Anonymous. This shadowy group retaliated after HBGary Federal’s CEO, Aaron Barr, claimed to have identified key members of the Anonymous network and threatened to expose them.

The targets were primarily the employees of HBGary Federal, but the repercussions extended into the broader cybersecurity industry. The effects were felt more nationally than internationally, as HBGary Federal was a U.S-based company.

The financial damage was considerable, with HBGary Federal essentially dissolving in the aftermath. The number of people directly affected was relatively small but still significant given the sensitive nature of HBGary Federal’s business.

The stolen data was a veritable treasure trove for the hackers – a mix of personal employee data and sensitive company emails. These were promptly published online, leading to significant embarrassment for the company.

In terms of aftermath and countermeasures, the event served as a wake-up call to companies about the importance of robust security practices. The event was a black mark on HBGary Federal’s reputation, leading to the company’s eventual dissolution.

As for legal consequences, they were minimal. Despite the high-profile nature of the attack, the perpetrators, hidden behind the veil of Anonymous, largely escaped legal retribution. This served as a sobering reminder of the challenges in bringing cybercriminals to justice.

3. The RSA Security Breach (2011)

March 2011 marked a black day in the history of RSA, one of the world’s leading cybersecurity firms. Over the course of just a few days, a cunning phishing attack unfolded, causing a significant breach in RSA’s security systems.

The attack was launched by unidentified hackers, though some reports later suggested links to a nation-state entity due to the sophistication of the attack. The hackers cleverly crafted an email that seemed innocent enough – just a recruitment plan – that was sent to several RSA employees. One click was all it took for the attackers to gain a foothold in RSA’s systems.

The primary victim was RSA itself, but the ripple effects of the breach were felt by its many clients worldwide, who relied on RSA’s SecurID authentication tokens for their own security.

The financial damage was hard to calculate, but in terms of reputation, it was a significant blow for a company that specialized in security. It was a stark reminder that even those tasked with securing the digital world weren’t immune to these kinds of threats.

The compromised data related to RSA’s SecurID two-factor authentication products, potentially putting at risk the data of millions of users globally. Following the attack, RSA undertook a massive effort to replace the tokens of its customers, demonstrating a commitment to their security despite the breach.

Though the event was a setback, RSA learned valuable lessons, improving their security measures and protocols. In terms of legal consequences, the covert nature of the attack made it difficult to apprehend the perpetrators, underscoring the challenges law enforcement face in the digital realm.

4. Operation Aurora (2009-2010)

In mid-December 2009, a series of cyber attacks began, lasting until February 2010. The campaign, later dubbed “Operation Aurora,” was an onslaught that targeted several major corporations, including tech giant Google.

This sophisticated phishing operation was traced back to China, with some suggesting the involvement of state-sponsored hackers. They targeted several high-profile tech and security companies, including Adobe, Juniper Networks, and Symantec, aiming to steal intellectual property and gain access to user accounts.

The scope of the attack was international, with the targeted companies being based in the United States but having global operations and users.

Although the exact financial damage remains undisclosed, the potential loss in intellectual property and the costs associated with damage control could be enormous. This incident affected not just the companies involved, but potentially millions of users worldwide, who might have had their personal data compromised.

Google announced that intellectual property had been stolen and that a separate attack had targeted the Gmail accounts of Chinese human rights activists. In response, Google made significant changes to its operations in China.

The aftermath of Operation Aurora led to an increased focus on cybersecurity across the tech industry, prompting companies to bolster their defenses and cooperate to a greater extent in response to shared threats.

The legal consequences were minimal. Despite identifying the origin of the attack, the complexities of international law and issues surrounding attribution in cybercrime made it challenging to bring the culprits to justice.

5. The AP Twitter Hack (2013)

On April 23, 2013, the Twitter account of one of the world’s leading news agencies, The Associated Press (AP), fell victim to a chilling phishing attack. The incident lasted only a few minutes but had a staggering impact.

The Syrian Electronic Army, a group of hackers loyal to Syrian President Bashar al-Assad, claimed responsibility for the attack. They had one goal in mind: to spread disinformation.

The tweet sent from AP’s compromised account claimed that there had been an explosion at the White House and that then-President Barack Obama was injured. Although AP quickly rectified the situation, the damage was done. The false news sent the U.S. stock market into a brief but dramatic plunge, illustrating the massive financial impact misinformation can have.

The nature of the attack was international in scope, affecting not just the American public but also global financial markets and international perception of U.S. stability.

Fortunately, no personal data was compromised during the attack, but the incident did highlight the potential for harm when trusted sources are hijacked. In the aftermath, Twitter implemented several security measures, including two-factor authentication, to prevent such breaches.

Although the Syrian Electronic Army claimed responsibility, the complexities of international law and the ongoing Syrian conflict made it virtually impossible to bring the perpetrators to justice.

6. Google and Facebook Phishing Attack (2013-2015)

Between 2013 and 2015, tech giants Google and Facebook found themselves in the crosshairs of an audacious phishing attack.

The perpetrator, a Lithuanian man named Evaldas Rimasauskas, proved that sometimes all you need is a little audacity and a lot of deception. Posing as a reputable hardware vendor, Rimasauskas sent fraudulent invoices to the two companies, exploiting their trust and a lack of internal checks.

This attack targeted businesses rather than individuals, specifically two of the biggest tech companies in the world. Given the international operations of both Google and Facebook, the impact of the attack had a global resonance.

The financial damage was immense, with Rimasauskas managing to swindle over $100 million before his scheme was uncovered. The funds were spread across multiple bank accounts, complicating the recovery process.

The data compromised was financial rather than personal, but the incident highlighted the potential for significant financial loss even when user data isn’t directly targeted.

Both Google and Facebook ramped up their internal controls and verification processes in response to the attack, demonstrating the importance of robust checks in preventing such incidents.

The legal consequences were significant for Rimasauskas. He was arrested in 2017, extradited to the United States, and later sentenced to five years in prison, a powerful reminder that such cybercrime does not go unpunished.

7. Sony Pictures Hack (2014)

In late November 2014, Sony Pictures Entertainment fell prey to a crippling cyber attack that would last for weeks. The attack was a potent cocktail of destructive malware and phishing techniques.

The U.S. government later attributed the attack to North Korea, marking it as one of the most high-profile instances of alleged state-sponsored cybercrime. The attackers, calling themselves the “Guardians of Peace,” claimed they were retaliating against the planned release of “The Interview,” a Sony film that depicted the fictional assassination of North Korea’s leader.

The attack was felt globally due to Sony’s international presence, and the financial damage was severe. Sony initially estimated the cost at $15 million, but the total cost, including lost business and reputation damage, was likely far greater.

The hack compromised a massive amount of data, including personal employee information, unreleased films, and sensitive company emails. These were later leaked online, causing significant embarrassment for the company.

Sony reacted by pulling “The Interview” from its planned wide release, a move that drew criticism from many, including then-President Obama. Sony later decided to release the film online and in select theaters.

Despite the U.S. formally accusing North Korea, the international complexities made it difficult to pursue legal consequences. The event, however, served as a wake-up call for many businesses about the potential severity of cyber attacks and the importance of strong cybersecurity measures.

8. Hillary Clinton Presidential Campaign Attack (2016)

In the spring of 2016, amidst the heated U.S. presidential election, a phishing attack shocked the nation. John Podesta, the chairman of Hillary Clinton’s presidential campaign, fell victim to a deceptive email that seemed to be from Google, warning him of a potential security breach.

The attack was later traced back to a group of Russian hackers known as Fancy Bear, which has alleged ties to the Russian government. Their objective was clear: to influence the U.S. elections.

The primary target was the Clinton campaign, but the ripple effects of the breach had national and international implications. The release of Podesta’s emails fueled political debates and shaped public opinion during a crucial period of the election.

The financial damage was hard to quantify, but the political and reputational damage was significant. The breach didn’t only affect the individuals involved in the campaign but also millions of Americans who were indirectly influenced by the manipulated public discourse.

The compromised data included personal emails and sensitive campaign information, all of which were later released by WikiLeaks. The attack illustrated the potential for harm when personal communications are exposed, especially in the context of a high-stakes political event.

In the aftermath, there was an increased focus on cybersecurity in political campaigns, and significant steps were taken to safeguard against future attacks. As for legal consequences, while several Russian nationals were indicted by the U.S. Department of Justice, the geopolitical complexities make it unlikely that they will ever face trial.

9. WannaCry Ransomware Attack (2017)

In May 2017, the world faced one of the most widespread and destructive cyber attacks to date, named “WannaCry.” The attack, which utilized phishing emails to spread a malicious software known as ransomware, locked users out of their computers until a ransom was paid.

The perpetrators remain unknown, but some have suggested links to North Korea. The attack didn’t discriminate in its targets, affecting individuals, businesses, and government agencies alike, making it a truly global threat.

The financial damage was massive, with estimates of the total cost ranging into billions of dollars. The attack affected hundreds of thousands of computers in over 150 countries, locking users out of critical systems and data.

The compromised data ranged from personal files to critical health systems data, as the attack notably affected the UK’s National Health Service, causing significant disruption.

The countermeasures and aftermath of WannaCry marked a turning point in global responses to cyber threats. A young cybersecurity researcher, Marcus Hutchins, found a “kill switch” that helped mitigate the attack, and tech companies, cybersecurity firms, and governments collaborated closely to manage the crisis.

Although charges were brought against North Korean hacker Park Jin Hyok for his alleged role in the creation of the WannaCry ransomware, the broader legal consequences of this international incident remain complex and unresolved.

10. The NotPetya Attack (2017)

June 2017 brought with it a cyber storm that would go down in history. The attack, dubbed “NotPetya,” was a powerful and destructive strain of ransomware that masqueraded as the previously known Petya ransomware, but with a more destructive intent.

Suspected to be state-sponsored, the attack was traced back to Russia by several cybersecurity firms and governments. It initially targeted Ukraine, affecting businesses, banks, and government systems, but soon spread globally, wreaking havoc in its path.

The financial damage was staggering, with estimated losses amounting to over $10 billion. Thousands of organizations, from Danish shipping giant Maersk to American pharmaceutical Merck, found themselves grappling with paralyzed systems, affecting their operations on a global scale.

The data compromised was varied, ranging from personal data to critical business operations. NotPetya encrypted the victims’ files, making them inaccessible, but unlike typical ransomware, it had no mechanism for decryption, even if a ransom was paid.

In response to the attack, cybersecurity firms, tech companies, and governments scrambled to contain the spread and aid recovery. The event led to an increased awareness about the importance of regular system updates and backups.

Despite the attribution of the attack to Russia by several nations, concrete legal consequences have been elusive, underscoring the challenges in dealing with state-sponsored cybercrime.

11. Marriott Data Breach (2018)

In late 2018, international hotel chain Marriott disclosed a data breach of unprecedented scale. The attack, which began as early as 2014 and remained undetected for four years, was a stark reminder of the persistence of cybercriminals.

The cybercriminals behind the attack are believed to be state-sponsored, linked to China’s intelligence agency. They targeted Marriott’s Starwood guest reservation database, a rich trove of personal data.

The impact was international, given Marriott’s global customer base. The financial damage is hard to quantify, but the hit to Marriott’s reputation was significant. The attack affected approximately 500 million guests, making it one of the largest breaches of personal data ever.

The data compromised included contact information, passport numbers, and even encrypted credit card information. The sheer extent of the breach underscored the severity of the threat posed by cyber attacks to personal privacy.

Marriott responded by notifying affected customers, offering them free subscription to a personal information monitoring service, and enhancing their security measures. The company also phased out the compromised Starwood systems.

As for legal consequences, Marriott faced several lawsuits and was fined £99.2 million by the UK’s Information Commissioner’s Office for violations of the General Data Protection Regulation (GDPR). The case highlighted the increasing regulatory measures countries are taking to protect personal data.

12. Twitter VIP Attack (2020)

In July 2020, Twitter faced a significant breach where a number of high-profile accounts, including those of Barack Obama, Elon Musk, and Jeff Bezos, were compromised.

The attack was traced back to a 17-year-old from Florida named Graham Ivan Clark, who, alongside other accomplices, manipulated Twitter employees via a phone spear-phishing attack. The attackers successfully gained access to Twitter’s internal systems and targeted 130 accounts, tweeting a Bitcoin scam from 45 of them.

This attack, while targeting individuals, had a global scope due to the international influence of the targeted accounts. The tweets reached millions of followers, and the attackers managed to amass over $100,000 in Bitcoin before the scam was shut down.

The nature of the compromised data was varied, including personal direct messages for up to 36 of the targeted accounts. The attack highlighted the potential damage and misuse when social media accounts are compromised.

Twitter responded swiftly to the attack, locking down affected accounts and limiting functionality on other verified accounts while it secured its systems. The incident led to increased scrutiny of Twitter’s security measures and a commitment to improved safeguards.

In terms of legal consequences, Clark was arrested and charged with over 30 felonies, including organized fraud and fraudulent use of personal information. His accomplices also faced charges, reinforcing the message that such cybercrimes carry heavy penalties.


In conclusion, these real-world examples of phishing attacks highlight just how important it is to remain vigilant and proactive in our digital lives. Cybercrime is an ever-evolving threat, and it’s up to each of us to stay a step ahead.

Remember, it starts with keeping your devices up to date. Software updates often include patches for security vulnerabilities that hackers could exploit.

Investing in a robust antivirus software, like Norton, Bitdefender, McAfee, Panda or Kaspersky, is another layer of defense that can help protect your devices from malware and other threats. However, remember that no security tool can replace cautious behavior.

Be wary of unsolicited emails or messages, especially those that ask for personal or financial information. Before clicking on a link or downloading an attachment, make sure you verify the source. When in doubt, it’s always better to be safe than sorry.

If you want to learn more about cybersecurity and how to protect yourself, here are a few trusted resources:

  1. The U.S. Federal Trade Commission’s Consumer Information on Phishing:
  2. The UK Government’s Advice on Phishing:
  3. The Australian Government’s eSafety Guide:
  4. The Internet Crime Complaint Center (IC3):

Official reports and analyses from cybersecurity firms can also provide valuable insights:

  1. Symantec’s Internet Security Threat Report:
  2. McAfee’s Threat Center:
  3. Kaspersky’s Cyberthreat Real-time Map:

By staying informed and adopting safe online habits, we can all contribute to a safer cyber world. Remember, cybersecurity isn’t just a tech issue—it’s a human one, too.

Author: Tibor Moes

Author: Tibor Moes

Founder & Chief Editor at SoftwareLab

Tibor is a Dutch engineer and entrepreneur. He has tested security software since 2014.

Over the years, he has tested most of the best antivirus software for Windows, Mac, Android, and iOS, as well as many VPN providers.

He uses Norton to protect his devices, CyberGhost for his privacy, and Dashlane for his passwords.

This website is hosted on a Digital Ocean server via Cloudways and is built with DIVI on WordPress.

You can find him on LinkedIn or contact him here.

Security Software

Best Antivirus for Windows 11
Best Antivirus for Mac
Best Antivirus for Android
Best Antivirus for iOS
Best VPN for Windows 11

Cyber Threats

Advanced Persistent Threat (APT)
Adware Examples
Black Hat Hacker
Botnet Examples
Brute Force Attack
Business Email Compromise (BEC)
Computer Virus
Computer Virus Examples
Computer Worm
Computer Worm Examples
Credential Stuffing
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) Examples
Cross-Site Scripting (XSS) Types
Crypto Scam
Cyber Espionage
Cyber Risk
Cyber Squatting
Cyber Threat
Cyber Threat Examples
Cyber Threat Types
Cyberbullying Examples
Cyberbullying Types
Cybercrime Examples
Cybercrime Types
Cyberstalking Examples
Data Breach
Data Breach Examples
Data Breach Types
Data Leak
DDoS Attack
DDoS Attack Examples
Deepfake Examples
Doxxing Examples
Email Spoofing
Exploit Examples
Exploit Types
Fileless Malware
Grey Hat Hacker
Hacking Examples
Hacking Phone
Hacking iPhone
Hacking Types
Identity Theft
Identity Theft Examples
Identity Theft Types
Insider Threat
IP Spoofing
Keylogger Types
Malicious Code
Malicious Code Examples
Malware Examples
Malware Types
Man In The Middle Attack
Man in the Middle Attack Examples
Online Scam
Password Cracking
Password Spraying
Phishing Email
Phishing Email Examples
Phishing Examples
Phishing Types
Ransomware Examples
Ransomware Types
Rootkit Examples
Security Breach
Session Hijacking
Smurf Attack
Social Engineering
Social Engineering Examples
Social Engineering Types
Spam Examples
Spam Types
Spear Phishing
Spear Phishing Examples
Spoofing Examples
Spyware Examples
SQL Injection
SQL Injection Examples
SQL Injection Types
Trojan Horse
Trojan Horse Examples
Watering Hole Attack
Whale Phishing
Zero Day Exploit
Zero Day Exploit Examples