Reference: Historical Incidents · Updated April 2026

The Most Expensive IT Incidents in History

A consolidated reference table of the most costly cyber incidents and IT outages on record. Costs are drawn from earnings filings, legal settlements, insurance analyses, and regulatory disclosures. Where an organisation has not disclosed a cost, independent estimates are noted.

Note: "Cost" figures vary by source and what is included (direct costs only vs. total economic impact including market cap loss). Where possible, direct company-disclosed costs are cited.

Master Incident Table

OrganisationYearTypeEst. Total CostRoot Cause (Summary)Primary Source
Change Healthcare (UHG)2024Ransomware$2.87B+AlphV/BlackCat ransomware; UHG subsidiaryUHG 10-K filings, Congressional testimony
MOVEit (Cl0p campaign)2023Supply chain / SQL injection$10B+ (industry-wide)Zero-day in MOVEit file transfer software; 2,600+ victim orgsKonBriefing research; legal filings
CrowdStrike Windows BSODJul 2024Software update outage$5.4B+ (Fortune 500 impact)Faulty Falcon content update; 8.5M Windows devices offlineParametrix insurance analysis; earnings reports
Equifax breach2017Data breach$1.4B+Unpatched Apache Struts vulnerability; 147M recordsEquifax legal settlement; FTC filing
Merck NotPetya2017Destructive malware / outage$870MNotPetya wiper malware; attributed to Russian GRUMerck 10-K 2018
Clorox ransomware2023Ransomware$356MManufacturing disruption; 13 weeks of system outagesClorox 10-K FY2024
Maersk NotPetya2017Destructive malware / outage$300MNotPetya wiper; global shipping operations haltedMaersk annual report 2017
Target breach2013Data breach$292MHVAC vendor credential theft; 40M credit cards, 70M recordsTarget 10-K; legal settlements
Capital One breach2019Data breach (cloud misconfiguration)$190M+SSRF attack on misconfigured AWS WAF; 106M recordsCapital One SEC disclosures
MGM Resorts ransomware2023Ransomware (social engineering)$100M+Scattered Spider vishing + BlackCat ransomware; 9 days downtimeMGM 8-K filings
Uber breach + coverup2016/2022Data breach / coverup$148M+ (settlement)GitHub credentials; 57M records; coverup paid $100K ransom to hideFTC consent order; legal filings
AT&T breach2024Data breachOngoing (est. $200M+)Snowflake-connected data theft; 73M+ records + call records of 109MAT&T SEC disclosures; Reuters
SolarWinds supply chain2020Supply chain compromise$100M+ (industry-wide)Nation-state (SVR); Orion update backdoor; 18,000+ orgs affectedSolarWinds 10-K; SEC enforcement
Colonial Pipeline2021Ransomware$4.4M ransom + weeks disruptionDarkSide ransomware; 5,600-mile fuel pipeline offline 6 daysDarkSide ransom payment; DOJ recovery disclosure
Caesars Entertainment2023Ransomware (social engineering)$15M ransom paidScattered Spider; chose to pay vs disclose (unlike MGM)Caesars SEC 8-K filing
23andMe breach2023Credential stuffing + data breach$30M+ settlementReused passwords; 6.9M user genetic profiles affected23andMe class action settlement
Sony Pictures hack2014Data theft + destructive malware$35M+Lazarus Group (North Korea); employee data, emails, films leakedSony SEC disclosures; FBI attribution
British Airways breach2018Data breach£20M (GDPR fine) + £23M operationalCard skimming script (Magecart) on booking page; 500K customersICO fine decision; BA filings
Okta breach (Lapsus$)2022Identity provider compromise$6B market cap impact (est.)Support contractor laptop compromise; Okta customers at riskOkta disclosures; Lapsus$ claims

Costs from public filings, legal settlements, insurance analyses, and regulatory disclosures. Updated April 2026. Some figures are estimates where direct disclosure is unavailable.

Incident Spotlights

Change Healthcare (2024): $2.87B and Counting
$2.87B+

The AlphV/BlackCat ransomware affiliate attack on Change Healthcare in February 2024 became the largest healthcare cyber incident in US history. UnitedHealth Group (Change's parent) disclosed $2.87B in direct costs by mid-2025, including the ransom payment (reportedly $22M in Bitcoin, later stolen from AlphV by a sub-affiliate). The attack disrupted prescription processing across the United States for weeks, forcing thousands of pharmacies to process prescriptions manually. Congressional hearings highlighted the systemic risk of healthcare IT concentration: Change Healthcare processed 50% of US medical claims.

CrowdStrike Windows BSOD (July 2024): The Largest IT Outage in History
$5.4B+

On July 19, 2024, a faulty CrowdStrike Falcon content update caused 8.5 million Windows devices globally to enter a boot loop and display the Blue Screen of Death. Airlines, hospitals, banks, broadcasters, and emergency services were disrupted simultaneously. Parametrix estimated Fortune 500 companies suffered $5.4 billion in direct losses. Delta Air Lines alone claimed $500M in damages and filed a lawsuit against CrowdStrike. This was not a cyberattack, but an operational incident caused by insufficient testing of a production content update - a reminder that availability incidents from software providers can exceed the cost of targeted attacks.

MOVEit (2023): Supply Chain Ransomware at Scale
$10B+ (industry-wide)

The Cl0p ransomware group exploited a zero-day SQL injection vulnerability in Progress Software's MOVEit Transfer product in May 2023. Because MOVEit is a widely-used file transfer tool in regulated industries, over 2,600 organisations were affected including government agencies, banks, insurance companies, universities, and healthcare providers. KonBriefing Research estimated total industry-wide costs exceeded $10 billion. Notable victims included Shell, British Airways, the BBC, Aon, and multiple US federal agencies. This remains the most impactful supply chain ransomware campaign on record by number of organisations affected.

Methodology Note

Cost figures on this page represent the best available estimate from primary sources (SEC filings, earnings calls, 10-K annual reports, court filings, regulatory decisions). Where an organisation has not formally disclosed costs, independent analyses from insurance firms, research organisations, or news investigations are noted as estimates. Industry-wide costs (MOVEit, NotPetya) aggregate disclosed and estimated costs across all affected organisations and should be treated as rough orders of magnitude rather than precise figures.

IncidentCost.com is an independent educational resource. All cost figures are drawn from published industry research including IBM's Cost of a Data Breach Report, Ponemon Institute Cost of Insider Risks Report, Verizon Data Breach Investigations Report, Atlassian incident management research, and PagerDuty incident surveys. This site is not affiliated with IBM, Ponemon Institute, Verizon, Atlassian, PagerDuty, or any security vendor. Figures are for educational and planning purposes only.