CASE FILE // PC-2026-04
Status: Open


Filing 04.00.00Field 27 APR 2026Classification PublicStatus Open

Phishing Breach Case Files

Verified incidents with publicly-cited dollar figures. Source primary documents are SEC filings (10-K, 10-Q, 8-K), state attorney-general settlements, OCR resolutions, and DOJ indictments. We do not list speculative or unsourced loss figures.

Exhibit A

Case file index

ON FILE

CaseSubjectYearDisclosed costInitial vector
CF-001Change Healthcare2024$872M+Compromised credentials at Citrix portal (no MFA)
CF-002MGM Resorts International2023$100MVishing helpdesk impersonation
CF-003Clorox2023$49MPhishing-driven account takeover
CF-004Caesars Entertainment2023$15M (paid)Vishing on third-party IT vendor
CF-005Ubiquiti Networks2021$46.7MSpear-phish + insider escalation
CF-006Twitter (X)2020$280M+Vishing helpdesk ("phone spear-phish")
CF-007Toyota Boshoku (subsidiary)2019$37MBEC wire-fraud
CF-008Facebook + Google2013-2015$122MBEC vendor-impersonation
CF-009Sony Pictures2014$100M+Spear-phish + supply-chain escalation
CF-010Anthem (Elevance Health)2015$179MSpear-phish
CF-011Target2013$292MSpear-phish on HVAC vendor
CF-012RSA Security2011$66MSpear-phish (Excel attachment, zero-day)
CF-013Mattel2015$3M (recovered)BEC, recovered via Bank of China
CF-014Cencora (AmerisourceBergen)2024Disclosure pendingPhishing-derived credential theft
CF-015Activision Blizzard2022Disclosure pendingSMS phishing of HR personnel

Cost figures are taken verbatim from primary public filings. Where a settlement is published, the cited figure is the settlement total, not the alleged loss.[SEC EDGAR, OCR, DOJ, state AG offices]

CF-001

Change Healthcare (2024)

MATERIAL

Disclosed cost
$872M+
Initial vector

Compromised credentials at Citrix portal (no MFA)

Primary source

UnitedHealth SEC 10-Q (2024-Q2)

UnitedHealth's pharmacy-claim subsidiary halted. Pharmacies could not process claims for weeks. Direct financial impact $872M per UnitedHealth Group SEC 10-Q. Patient-data exposure for an estimated 100M individuals triggered regulatory and litigation exposure that continues to grow.

CF-002

MGM Resorts International (2023)


Disclosed cost
$100M
Initial vector

Vishing helpdesk impersonation

Primary source

MGM Resorts 8-K filing

Attacker called MGM IT helpdesk, impersonated an employee, secured an MFA reset, and pivoted to ransomware deployment across the property estate. Slot machines, hotel keys, and reservations offline for ten days. Cost disclosed in MGM 8-K (Form 8-K, October 2023).

CF-003

Clorox (2023)


Disclosed cost
$49M
Initial vector

Phishing-driven account takeover

Primary source

Clorox 10-K (FY24)

Production disruption, IT cleanup, and lost sales. Disclosed in Clorox FY24 10-K. Production normalised over the following two quarters, but customer relationships took longer to restore.

CF-004

Caesars Entertainment (2023)


Disclosed cost
$15M (paid)
Initial vector

Vishing on third-party IT vendor

Primary source

Caesars 8-K filing

Same threat-actor cluster as the MGM incident, executed the week prior. Caesars paid roughly $15M of a reported $30M demand to avoid public exposure. Disclosed in Caesars 8-K.

CF-005

Ubiquiti Networks (2021)


Disclosed cost
$46.7M
Initial vector

Spear-phish + insider escalation

Primary source

Ubiquiti 10-K and DOJ indictment (Sharp, 2021)

Initial access via spear-phish, escalated by an insider who later attempted extortion. Stock dropped roughly 20 percent on disclosure. Ubiquiti restated breach scope in subsequent SEC filings.

CF-006

Twitter (X) (2020)

MATERIAL

Disclosed cost
$280M+
Initial vector

Vishing helpdesk ("phone spear-phish")

Primary source

NYDFS report (October 2020)

Attackers called Twitter staff posing as IT, secured admin-tool access, and posted a Bitcoin scam from verified accounts. Direct fraud receipts low (~$120K), but stock-price impact, FTC consent-order penalty exposure, and remediation costs ran into the hundreds of millions.

CF-007

Toyota Boshoku (subsidiary) (2019)


Disclosed cost
$37M
Initial vector

BEC wire-fraud

Primary source

Toyota Boshoku public disclosure

Single fraudulent wire-transfer instruction, accepted by a finance team that bypassed second-factor approval. Reported by Toyota in subsequent disclosure. Recovery efforts largely unsuccessful.

CF-008

Facebook + Google (2013-2015)


Disclosed cost
$122M
Initial vector

BEC vendor-impersonation

Primary source

DOJ press release (March 2019)

Lithuanian actor (Evaldas Rimasauskas) impersonated a Taiwanese hardware supplier across two years. DOJ indictment recovered most funds; the attack remains the canonical BEC case study. Settled at sentencing in 2019.

CF-009

Sony Pictures (2014)

MATERIAL

Disclosed cost
$100M+
Initial vector

Spear-phish + supply-chain escalation

Primary source

Sony Pictures internal disclosures, SEC filings

Spear-phishing emails to executives delivered initial access. Attackers exfiltrated 100TB+ over months and released it publicly. Direct cost included production halts, IT rebuild, and litigation. Regulatory follow-on lighter than expected.

CF-010

Anthem (Elevance Health) (2015)


Disclosed cost
$179M
Initial vector

Spear-phish

Primary source

OCR resolution agreement, Anthem 10-K

78.8M records exposed. $115M class-action settlement plus $39.5M state AG settlement plus $16M HIPAA settlement to OCR. Largest healthcare breach settlement at the time.

CF-011

Target (2013)


Disclosed cost
$292M
Initial vector

Spear-phish on HVAC vendor

Primary source

Target 10-K, multi-state AG settlement

Vendor compromise pivoted into Target POS network. 40M cards exposed. Settlements with banks, card networks, and state AGs aggregated above $290M. Catalysed mainstream third-party-risk practice.

CF-012

RSA Security (2011)


Disclosed cost
$66M
Initial vector

Spear-phish (Excel attachment, zero-day)

Primary source

EMC quarterly filings

Compromise of SecurID seed values. EMC absorbed the cost of replacing tokens for affected customers. The first widely-cited spear-phish-by-attachment case file.

CF-013

Mattel (2015)


Disclosed cost
$3M (recovered)
Initial vector

BEC, recovered via Bank of China

Primary source

AP wire reporting (2016)

Wire instruction issued in line with apparent CEO authorisation. Funds traced to Wenzhou and recovered via Chinese banking-holiday timing. The exception that proves the BEC rule.

CF-014

Cencora (AmerisourceBergen) (2024)


Disclosed cost
Disclosure pending
Initial vector

Phishing-derived credential theft

Primary source

Cencora 8-K (February 2024)

SEC 8-K filed February 2024. Personal data exposure across multiple subsidiaries. Material costs still being booked. Listed here as an active filing.

CF-015

Activision Blizzard (2022)


Disclosed cost
Disclosure pending
Initial vector

SMS phishing of HR personnel

Primary source

Activision public statement

Smishing of an HR staffer led to internal-systems access and game-content exfiltration. Direct cost not disclosed. Cited as an early high-profile smishing case.

Updated 2026-04-27