By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Start Your Business Magazine
  • Store
    Merchandise
    Subscribe
  • Features

    Grow, expand and leverage your business..

    Grow your start up business with our experts and industry insiders…

    Get Started

    Quick Links

    • Agenda
    • Business Books
    • Marketing
    • Technology
    • Wellbeing
    • Finance
    Reading: Inside a hacker’s target list — Which sectors are most at risk

    Our Newsletters

    Our website stores cookies on your computer. They allow us to remember you and help personalise your experience with our site..

    Read our privacy policy for more information.
  • Book
  • Trending
    Technology

    Inside a hacker’s target list — Which sectors are most at risk

    The technology, education, and e-commerce sectors were the hardest hit by data…

    Making Tax Digital for Income Tax in 2026: what sole traders, freelancers and landlords need to know and do

    With the 2026 self-assessment tax return deadline now passed, the transition to…

    agenda

    Backroom Engine

    Prompt Engineers and Skills Architects: Meet the jobs people think are fake,…

  • Topics

    Topics

    • Agenda
    • Blogs
    • Book Review
    • Business Advice
    • eCommerce
    • SME Update
    Reading: Inside a hacker’s target list — Which sectors are most at risk
    • Events
    • Business Experts
    • Featured
    • Franchise
    • Growing Business
    • Health
    Reading: Inside a hacker’s target list — Which sectors are most at risk
    • Finance
    • Franchise Experts
    • How To
    • Interviews
    • Just for fun
    Reading: Inside a hacker’s target list — Which sectors are most at risk
    • Lifestyle
    • Making money
    • Manufacturing
    • Marketing
    • Money
    • Property
    Reading: Inside a hacker’s target list — Which sectors are most at risk
    • Starting Up
    • Taxation
    • Technology
    • Wellbeing
    • Women in Business
    Reading: Inside a hacker’s target list — Which sectors are most at risk
Reading: Inside a hacker’s target list — Which sectors are most at risk
Connect
Start Your Business MagazineStart Your Business Magazine
Aa
  • Magazine
  • SEO – Backlinks
  • Book: Start Your Business
Search
  • Agenda
  • Book Review
  • Blogs
  • Finance
  • Growing Business
  • How To
  • Interviews
  • Marketing
  • SME Update
  • Starting Up
  • Technology
  • Wellness
  • Contact
Have an existing account? Sign In
Follow US
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO
Copyright © 2014-2023 Ruby Theme Ltd. All Rights Reserved.

Inside a hacker’s target list — Which sectors are most at risk

Start Your Business
Technology
Share
6 Min Read

The technology, education, and e-commerce sectors were the hardest hit by data leaks over a three-year period that saw more than 7.8 billion email records exposed across nearly 10,000 major incidents.

An analysis of the breaches found that 90% contained email addresses, 32% exposed credentials, and 12.3% sensitive government-issued identifiers like SSNs.

“The technology, education, and e-commerce sectors are attractive targets because they serve large numbers of users and store vast amounts of personal data, making them both valuable and vulnerable to attack. These industries must prioritize security investments and robust employee training to protect the data they hold,” says Karolis Arbaciauskas, head of product at NordPass.

Other frequently targeted sectors included retail, finance, hospitality, media, and manufacturing. While the financial sector saw fewer incidents compared to the top three industries and retail, those that did occur were often more severe, exposing a much higher average number of emails per leak, research shows.

Hackers shift strategy

Across nearly all classified industries, leak volume declined in 2025. However researchers caution that a lower number of leaks does not mean lower risk.

“Leak activity continues to focus on highly digital industries that collect large volumes of valuable user credentials and personal data. A lower number of leaks does not mean lower risk because several industries recorded higher average leak sizes, increasing potential impact despite lower incident counts. Continued investment in sector‑specific controls, including third‑party risk management, credential protection, and monitoring of underground markets, is critical to reducing exposure,” says Arbaciauskas.

Mantas Sabeckis, the senior threat intelligence researcher at Nord Security who headed the research, adds that this reduction may also partially reflect threat actors’ shifting strategy. According to him, the cybercriminal underground’s shift toward infostealer malware enables near real‑time credential harvesting and direct access to targeted services without relying on large‑scale leaked database dumps.

The decrease may also be attributed to disruptions within the leak database ecosystem itself, including the takedown of several leak forums and marketplaces in 2025. These actions by law enforcement reduced the public visibility of leaked databases, further decentralizing the market into smaller channels or private groups.

Private vs. public sector

Researchers also looked into government versus private sector exposure trends. Data shows that private sector organizations accounted for the majority (53%) of identified exposures — 1,632 leaks compared to just 10% (317 leaks) impacting government entities. This reflects both the larger private sector attack surface (there are more private companies than governmental institutions) and the higher monetization value of commercial datasets.

Private‑sector leaks not only occur more often but also expose significantly larger datasets, increasing risk to individuals through phishing, fraud, and credential‑based attacks. Government leaks, while less frequent in publicly observed datasets, remain high impact due to the sensitive nature of the information involved and the potential for geopolitical or intelligence exploitation.

How to protect yourself

According to Arbaciauskas, reducing impact requires action from both organizations and individuals.

For organizations:

  • Minimize the volume of personal data stored and segment critical systems to limit breach scope.
  • Strengthen credential protection with hardware-backed authentication and protect endpoints against infostealer malware.
  • Monitor for leaked credentials and act quickly to contain incidents before they scale.

For individuals:

  • Employ a password manager, use unique passwords, and enable multi-factor authentication to prevent stolen credentials from being reused across services.
  • After major breach disclosures, stay alert for phishing and targeted scams.
  • If you notice suspicious activity on an account, reset your credentials immediately and review connected accounts.

Research methodology

This report is the result of a joint effort between NordPass and NordStellar. The dataset includes publicly available leaked databases detected by NordStellar between 2023 and 2025. Each entry was processed through an AI-assisted classification pipeline (nexos.ai), which analyzed available leak metadata, including origin domains, top-level domains, descriptions, referenced organizations, and dataset contents, to determine sector, geographic attribution, and organization type (public or private).

Leaks were categorized as “country specific” when available metadata indicated a primary country association. Otherwise, they were marked as “global” or “unknown.” From the 3,031 leaks recorded in 2025, NordStellar extracted reported email counts and recorded the presence of additional data types, including phone numbers, credentials (plaintext or hashed passwords, API keys), government identifiers, and financial records. Email totals reflect aggregated account records and may include mixed account types (e.g., customer, employee, administrative, or user accounts) because precise differentiation was not feasible. No personal data was acquired or purchased for this research.

 

 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Start Your Business March 6, 2026
Share this Article
Twitter LinkedIn Reddit Email Copy Link
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO

Get the latest from us delivered straight to your inbox

Start Your Business Magazine: The Ultimate Business Start Up Guide provides information advice and guidance for entrepreneurs and new business start ups. Get the latest from us delivered directly to your inbox.

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site..

Read our privacy policy for more information.

Copyright 2023 Gambit Interactive Media Limited – All Rights Reserved.

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Cookies are used for ads personalisation We do this to improve browsing experience as well as show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?