Keep Factually independent

Whether you agree or disagree with our analysis, these conversations matter for democracy. We don't take money from political groups - even a $5 donation helps us keep it that way.

Loading...Goal: 1,000 supporters
Loading...

How do data breaches lead to stolen credit card numbers and which companies had breaches in 2023-2025?

Checked on November 12, 2025
Disclaimer: Factually can make mistakes. Please verify important info or breaking news. Learn more.

Executive Summary

Data breaches expose cardholder data predominantly when attackers access company databases, payment processors, or point-of-sale systems and extract stored or intercepted payment data; breaches in 2023–2025 include high-profile incidents that exposed millions to potential fraud, such as a 1.7 million–card compromise and a December 2023 leak of 1.5 billion records. This analysis pulls together the key mechanisms that turn breaches into stolen credit card numbers, lists companies named in contemporary reports, and contrasts reporting gaps and potential agendas across sources [1] [2] [3].

1. How attackers turn a breach into cash: the technical and human shortcuts that matter

Data breaches convert into stolen credit card numbers through a handful of repeatable technical paths: direct database compromise of stored card data, malware on payment terminals that scrapes track data, interception via unsecured networks, and account takeovers that exploit auxiliary personal data to access payment credentials. Industry explainers emphasize phishing, ransomware, weak authentication, and endpoint malware as root causes—each enabling attackers to either exfiltrate card PANs (Primary Account Numbers) or steal tokens and credentials used to authorize transactions [1] [4]. These explanations align on one point: the easiest route is often not the most sophisticated—social engineering and misconfigured systems remain highly effective. Data also show that breaches at payment service providers or gateway vendors create outsized risk because a single compromise can yield massively scaled card dumps affecting many merchants [1] [2].

2. Who was named in 2023–2025 reporting, and what was exposed?

Contemporary datasets and reporting name a range of affected organizations between 2023 and 2025, from media outlets to banks and niche service providers. Notable entries in aggregated lists and news include Nikkei and The Washington Post being reported as affected in 2025-related summaries, Habib Bank, Askul, Qantas, and Red Hat listed in mid‑2020s breach roundups, and an especially large December 2023 event attributed to a Real Estate Wealth Network leak that reportedly exposed 1.5 billion records [5] [6] [3]. Separately, a payment-gateway–linked incident publicly reported in 2024–2025 disclosed nearly 1.7 million credit card numbers tied to activity between August 2023 and June 2024, demonstrating how merchant-adjacent providers can yield concentrated card theft [2].

3. What the sources agree on — clear facts across different reports

The analyses cohere on several concrete points: breaches often involve unauthorized access to systems containing financial or identity data, stolen records frequently include dates of birth and SSNs that enable fraud beyond simple card cloning, and remediation typically includes investigation, customer notifications, and identity-monitoring offers. Multiple entries note that ransomware and exploitation of vulnerabilities are common vectors in the 2023–2025 period, a continuity from prior years’ trends [4] [6] [7]. These shared elements underline a steady pattern: attackers exploit both technical holes and human error, and once card data are exfiltrated they surface quickly on criminal markets where they’re monetized through card-not-present fraud and counterfeit card production [1] [2].

4. Where the reports diverge or leave gaps — dates, scale, and attribution problems

The available analyses diverge on precision and sourcing. Some lists lack publication dates or original reporting timestamps, complicating chronology and verification; for example, several aggregated lists in the dataset are undated or summarized without primary-document links [5] [3]. Reported magnitudes vary; one source highlights a 1.5 billion–record December 2023 exposure while others compile breaches stretching back earlier, mixing 2021–2024 incidents in a 2025 roundup, which can inflate perceived recency [3] [7]. Attribution also varies: some entries name corporate victims explicitly, while others reference aggregated “lists” without primary confirmation, creating ambiguity about whether incidents are confirmed breaches, data aggregations, or scraping events [6] [3].

5. What to read between the lines — potential agendas and reporting incentives

Coverage patterns suggest distinct incentives shaping how breaches are presented. Aggregators and security firms often emphasize scale and headline numbers to capture attention, potentially amplifying outlier figures such as multi‑billion record counts without clarifying duplication or overlap across datasets [3]. Corporate disclosures commonly couple breach announcements with offers of identity protection, which can serve both remediation and reputational management motives; identity-protection vendors also produce statistics that naturally promote their services [8]. Journalistic outlets may name high‑profile victims like Nikkei or large infrastructure providers to highlight systemic risk, while vendor reports focus on technical vectors—both perspectives are necessary but reflect differing audiences and agendas [5] [6] [8].

6. Bottom line for consumers and organizations — actionable context from the evidence

The combined analyses show that credit card theft from breaches is a systemic, ongoing risk when attackers access merchant databases, gateways, or payment terminals; major incidents in 2023–2025 demonstrate both the scale (millions to billions of records in some reports) and the recurring vectors (ransomware, malware, phishing). Consumers should monitor statements and use two‑factor authentication where possible; organizations must prioritize secure payment architectures, tokenization, and vendor risk management to reduce blast radius. The quality of public reporting varies—verify breach notices and prefer sources that provide clear dates and primary documentation rather than aggregated lists alone [1] [2] [3].

Want to dive deeper?
What are the most common types of data breaches targeting payment information?
How do companies notify customers after a data breach involving credit cards?
Which retail companies suffered major data breaches in 2023?
What legal consequences do companies face for data breaches in 2024?
How has AI changed the methods of data breaches in 2025?