• In February 2002, Jeremiah Jacks discovered that Guess.com was vulnerable to an SQL injection attack, permitting anyone able to construct a properly-crafted URL to pull down 200,000+ names, credit card numbers and expiration dates in the site's customer database. • On November 1, 2005, a teenaged hacker used SQL injection to break into the site of a
Taiwanese information security magazine from the Tech Target group and steal customers' information. • On January 13, 2006,
Russian computer criminals broke into a
Rhode Island government website and allegedly stole credit card data from individuals who have done business online with state agencies. • On September 19, 2007 and January 26, 2009 the Turkish hacker group "m0sted" used SQL injection to exploit Microsoft's SQL Server to hack web servers belonging to
McAlester Army Ammunition Plant and the
US Army Corps of Engineers respectively. • On April 13, 2008, the
Sexual and Violent Offender Registry of
Oklahoma shut down its website for "
routine maintenance" after being informed that 10,597
Social Security numbers belonging to
sex offenders had been downloaded via an SQL injection attack. • On August 17, 2009, the
United States Department of Justice charged an American citizen,
Albert Gonzalez, and two unnamed Russians with the theft of 130 million credit card numbers using an SQL injection attack. In reportedly "the biggest case of
identity theft in American history", the man stole cards from a number of corporate victims after researching their
payment processing systems. Among the companies hit were credit card processor
Heartland Payment Systems, convenience store chain
7-Eleven, and supermarket chain
Hannaford Brothers. • In July 2010, a South American security researcher who goes by the
handle "Ch Russo" obtained sensitive user information from popular
BitTorrent site
The Pirate Bay. He gained access to the site's administrative control panel and exploited an SQL injection vulnerability that enabled him to collect user account information, including
IP addresses,
MD5 password hashes and records of which torrents individual users have uploaded. • From July 24 to 26, 2010, attackers from
Japan and
China used an SQL injection to gain access to customers' credit card data from Neo Beat, an
Osaka-based company that runs a large online supermarket site. The attack also affected seven business partners including supermarket chains Izumiya Co, Maruetsu Inc, and Ryukyu Jusco Co. The theft of data affected a reported 12,191 customers. As of August 14, 2010 it was reported that there have been more than 300 cases of credit card information being used by third parties to purchase goods and services in China. • On September 19 during the
2010 Swedish general election a voter attempted a code injection by hand writing SQL commands as part of a
write-in vote. • On November 8, 2010 the British
Royal Navy website was compromised by a Romanian hacker named
TinKode using SQL injection. • On April 11, 2011,
Barracuda Networks was compromised using an SQL injection flaw.
Email addresses and usernames of employees were among the information obtained. • Over a period of 4 hours on April 27, 2011, an automated SQL injection attack occurred on
Broadband Reports website that was able to extract 8% of the username/password pairs: 8,000 random accounts of the 9,000 active and 90,000 old or inactive accounts. • On June 1, 2011, "
hacktivists" of the group
LulzSec were accused of using SQL injection to steal
coupons, download keys, and passwords that were stored in plaintext on
Sony's website, accessing the personal information of a million users. • In June 2011,
PBS was hacked by LulzSec, most likely through use of SQL injection; the full process used by hackers to execute SQL injections was described in this Imperva blog. •
In July 2012 a hacker group was reported to have stolen 450,000 login credentials from
Yahoo!. The logins were stored in
plain text and were allegedly taken from a Yahoo
subdomain,
Yahoo! Voices. The group breached Yahoo's security by using a "
union-based SQL injection technique". • On October 1, 2012, a hacker group called "Team GhostShell" published the personal records of students, faculty, employees, and alumni from 53 universities, including
Harvard,
Princeton,
Stanford,
Cornell,
Johns Hopkins, and the
University of Zurich on
pastebin.com. The hackers claimed that they were trying to "raise awareness towards the changes made in today's education", bemoaning changing education laws in Europe and increases in
tuition in the United States. • On November 4, 2013, hacktivist group "RaptorSwag" allegedly compromised 71 Chinese government databases using an SQL injection attack on the Chinese Chamber of International Commerce. The leaked data was posted publicly in cooperation with
Anonymous. • In August 2014,
Milwaukee-based computer security company Hold Security disclosed that it uncovered
a theft of confidential information from nearly 420,000 websites through SQL injections.
The New York Times confirmed this finding by hiring a security expert to check the claim. • In October 2015, an SQL injection attack was used to steal the personal details of 156,959 customers from British telecommunications company
TalkTalk's servers, exploiting a vulnerability in a legacy web portal. • In early 2021, 70 gigabytes of data was
exfiltrated from the far-right website
Gab through an SQL injection attack. The vulnerability was introduced into the Gab codebase by Fosco Marotto, Gab's
CTO. A second attack against Gab was launched the next week using
OAuth2 tokens stolen during the first attack. • In May 2023, a widespread SQL injection attack targeted
MOVEit, a widely used
file-transfer service. The attacks, attributed to the Russian-speaking cybercrime group
Clop, compromised multiple global organizations, including payroll provider Zellis,
British Airways, the
BBC, and UK retailer
Boots. Attackers exploited a critical vulnerability, installing a custom webshell called "LemurLoot" to rapidly access and exfiltrate large volumes of data. • In 2024, a pair of security researchers discovered an SQL injection vulnerability in the FlyCASS system, used by the
Transportation Security Administration (TSA) to verify airline crew members. Exploiting this flaw provided unauthorized administrative access, potentially allowing the addition of false crew records. The TSA stated that its verification procedures did not solely depend on this database. ==In popular culture==