List of security hacking incidents

Wikimedia list article

This is a list of security hacking incidents.

  • 1982 — In Milwaukee a group of six teenagers hackers calling themselves the 414's (their area code) break into some 60 computer systems at institutions ranging from the Los Alamos Laboratories to Manhattan's Memorial Sloan-Kettering Cancer Center before being arrested.
  • The Germans and the KGB: In the first cyberespionage case to make international headlines, hackers in West Germany (loosely affiliated with the Chaos Computer Club) are arrested for breaking into U.S. government and corporate computers and selling operating-system source code to the Soviet KGB. Three of them are turned in by two fellow hacker spies, and a fourth suspected hacker commits suicide when his possible role in the plan is publicized. Because the information stolen is not classified, the hackers are fined and sentenced to probation. In a separate incident,
  • Arrest of a hacker who calls himself The Mentor. He publishes a now-famous treatise that comes to be known as the Hacker's Manifesto.
  • Fry Guy is raided by law enforcement; police hunt for Legion of Doom hackers.
  • Jude Milhon (aka St Jude) and R. U. Sirius launch Mondo 2000, a major '90s tech-lifestyle magazine, in Berkeley, California.
  • LOD and MOD engaged in almost two years of online warfare — jamming phone lines, monitoring calls, trespassing in each other's private computers. Then the Feds cracked down. For Phiber and friends, that meant jail.
  • Rumors circulate about the "Michelangelo" virus, expected to crash computers on March 6, 1992, the artist's 517th birthday. Doomsday passes without incident.
  • Kevin Poulsen is captured and indicted for stealing military documents.
  • resulted in jail sentences for four members of the Masters of Deception. Phiber Optik spent a year in federal prison.
  • During radio station call-in contests, hacker-fugitive Kevin Poulsen and two friends rig the stations' phone systems to let only their calls through, and "win" two Porsches, vacation trips, and $20,000. Poulsen, already wanted for breaking into phone-company systems, serves five years in prison for computer and wire fraud.
  • Texas A&M University professor receives death threats because a hacker used his computer to send 20,000 racist e-mails.
  • Russian crackers siphon $10 million from Citibank and transfer the money to bank accounts around the world. Vladimir Levin, the 30-year-old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.
  • Hackers adapt to emergence of the World Wide Web quickly, moving all their how-to information and hacking programs from the old BBSs to new hacker Web sites.
  • February: Kevin Mitnick was arrested again. This time the FBI accused him of stealing 20,000 credit card numbers. Kevin Mitnick is incarcerated on charges of "wire fraud and illegal possession of computer files stolen from such companies as Motorola and Sun Microsystems" He is held in prison for four years without a trial.
  • United States Department of Defense computers sustained 250,000 attacks by hackers.
  • Hackers deface federal web sites.
  • January: Yahoo! notifies Internet users that anyone visiting its site in recent weeks might have downloaded a logic bomb and worm planted by hackers claiming a "logic bomb" will go off if Mitnick is not released from prison.
  • During heightened tensions in the Persian Gulf, hackers touch off a string of break-ins Solar Sunrise, a series of attacks targeting unclassified Pentagon computers and steal software programs, leads to the establishment of round-the-clock, online guard duty at major military computer sites. Then-U.S. Deputy Defense Secretary John Hamre calls it "the most organized and systematic attack" on U.S. military systems to date. An investigation points to two American teens. A 19-year-old Israeli hacker who calls himself The Analyzer (aka Ehud Tenebaum) is eventually identified as their ringleader and arrested. Tenebaum is later made chief technology officer of a computer consulting firm.
  • March: Timothy Lloyd is indicted for planting a logic bomb on the network of Omega Engineering. The logic bomb causes millions in damage.
  • Hackers alter The New York Times Web site, renaming it HFG (Hacking for Girlies). The hackers express anger at the arrest and imprisonment of Kevin Mitnick, the subject of the book "Takedown" co-authored by Times reporter John Markoff.
  • Two hackers are sentenced to death by a court in China for breaking into a bank computer network and stealing 260,000 yuan ($31,400).
  • July: Hackers break into United Nations Children Fund Web site threathening "holocaust."
  • August: The hacking group CULT OF THE DEAD COW releases its Trojan horse program, Back Orifice at DEF CON. Once a user installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine.
  • December: L0pht testifies to the senate that it could shut down nationwide access to the Internet in less than 30 minutes.
  • A 19-year-old Midwestern law student who calls herself ViXen900 is a member of the HNC hackers’ group and advises them on legal issues.
  • Kevin Mitnick is released from prison.
  • January: One of the few worms to take after the old form of malware, destruction of data rather than the accumulation of zombie networks to launch attacks from, is discovered. It had various names, including Kama Sutra (used by most media reports), Black Worm, Mywife, Blackmal, Nyxem version D, Kapser, KillAV, Grew and CME-24. The worm would spread through e-mail client address books, and would search for documents and fill them with garbage, instead of deleting them to confuse the user. It would also hit a web page counter when it took control, allowing the programmer who created it as well as the world to track the progress of the worm. It would replace documents with random garbage on the third of every month. It was hyped by the media but actually affected relatively few computers, and was not a real threat for most users.
  • February: Direct-to-video film The Net 2.0 is released, as a sequel to The Net, following the same plotline, but with updated technology used in the film, using different characters, and different complications. The director of The Net 2.0, Charles Winkler, is son of Irwin Winkler, the director of The Net.
  • May: Jeanson James Ancheta receives a 57 month prison sentence, [2] Archived 2007-09-27 at the Wayback Machine and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer equipment [3] Archived 2007-09-27 at the Wayback Machine.
  • May: Largest Defacement in Web History is performed by the Turkish hacker iSKORPiTX who successfully hacked 21,549 websites in one shot. [4]
  • July: Robert Moore and Edwin Pena featured on Americas Most Wanted with Kevin Mitnick presenting their case commit the first VOIP crime ever seen in the USA. Robert Moore served 2 years in federal prison with a $152,000.00 restitution while Edwin Pena was sentenced to 10 years and a $1 million restitution.
  • September: Viodentia releases FairUse4WM tool which would remove DRM information off WMA music downloaded from music services such as Yahoo Unlimited, Napster, Rhapsody Music and Urge.
  • May 17: Estonia recovers from massive denial-of-service attack[1]
  • June 13: FBI Operation Bot Roast finds over 1 million botnet victims[2]
  • October 7: Trend Micro website successfully hacked by Turkish hacker Janizary(a.k.a Utku)[6]
  • November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments[7]
  • January 18: Project Chanology Anonymous attacks Scientology website servers around the world. Private documents are stolen from Scientology computers and distributed over the Internet
  • March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including The Pentagon. They operate from a bare apartment on a Chinese island.[8]
  • April 1: Conficker worm infiltrated millions of PCs worldwide including many government-level top-security computer networks[9]
  • Microsoft becomes the prominent victim of a new type of crack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.
  • February — A Dutch cracker releases the Anna Kournikova virus, initiating a wave of viruses that tempts users to open the infected attachment by promising a sexy picture of the Russian tennis star.
  • March — FBI agent Robert P. Hanssen is charged with using his computer skills and FBI access to spy for the Russians.
  • March — The L10n worm is discovered in the wild attacking older versions of BIND DNS.
  • April — FBI agents trick two Russian crackers into coming to the U.S. and revealing how they were cracking U.S. banks.
  • May
    • Spurred by elevated tensions in Sino-American diplomatic relations, U.S. and Chinese hackers engage in skirmishes of Web defacements that many dub "The Sixth Cyberwar".
    • Crackers begin using "pulsing" zombies, a new DDoS method that has zombie machines send random pings to targets rather than flooding them, making it hard to stop attacks.
    • AV experts identify Sadmind, a new cross-platform worm that uses compromised Sun Solaris boxes to attack Windows NT servers.
  • July — Russian programmer Dmitry Sklyarov is arrested at the annual Def Con hacker convention. He is the first person criminally charged with violating the Digital Millennium Copyright Act (DMCA).
  • August — Code Red, the first polymorphic worm, infects tens of thousands of machines.
  • September — The World Trade Center and Pentagon terrorist attacks spark lawmakers to pass a barrage of anti terrorism laws many of which group Hackers as terrorists and remove many long standing personal freedoms in the name of safety.
  • September — Nimda, a new memory-only worm, wreaks havoc on the Internet, quickly eclipsing Code Red's infection rate and recovery cost.
  • November — Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines.
  • November — The European Union adopts the controversial cybercrime treaty, which makes the possession and use of hacking tools illegal.
  • March - Myron Tereshchuk arrested for attempting to extort $17 million from Micropatent. FBI agents find explosives and biological weapons in the course of the raid.
  • December — Brian Salcedo sentenced to 9 years in prison for his involvement in hacking into the corporate systems of Lowe's home improvement stores and attempting to steal customer credit card information. The sentence far exceeds the 5 1/2 years that hacker Kevin Mitnick spent behind bars. Prosecutors said the three men tapped into the wireless network of a Lowe's store in Southfield, Mich., used that connection to enter the chain's central computer system in North Wilkesboro, N.C., and installed a program to capture credit card information. No data was actually collected however.
  • July 13 - Informationleak.com is born and encompasses the ideals held by many of the groups from the so called golden age of hacking.
  • September 15 - An unnamed teenager is sentenced to 11 months for gaining access to T-Mobile USA's network and exploiting Paris Hilton's sidekick, it turns out this teen is also responsable for breaking in to data broker LexisNexus's system in January.
  • November 4 - Jeanson James Ancheta, who prosecutors say was a member of the "Botmaster Underground", a group of script kiddies who are mostly noted for their excessive use of bot attacks and propogating vast amounts of spam on the internet, was taken into custody after being lured to FBI offices in Los Angeles.
  • January 12: Operation Aurora Google publicly reveals[10] that it has been on the receiving end of a "highly sophisticted and targetted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google"
  • June: Stuxnet The Stuxnet worm is found by VirusBlokAda. Stuxnet affects Windows computers throughout the world. Later, it is learned that Stuxnet can also affect some Unix systems.
  • The hacker group Lulz Security is formed.
  • April 9: Bank of America website got hacked by a Turkish hacker named JeOPaRDY. An estimated 85,000 credit card numbers and accounts were reported to have been stolen due to the hack. Bank officials say no personal customer bank information is available on that web-page. Investigations are being conducted by the FBI to trace down the incriminated hacker.[11]
  • April 17: An "external intrusion" sends the PlayStation Network offline, and compromises personally identifying information (possibly including credit card details) of its 77 million accounts, in what is claimed to be one of the five largest data breaches ever.[12]
  • Computer hacker sl1nk releases information of his penetration in the servers of the Department of Defense (DoD), Pentagon, NASA, NSA, US Military, Department of the Navy, Space and Naval Warfare System Command and other UK/US government websites.[13]
  • September: Bangladeshi hacker TiGER-M@TE made a world record in defacement history by hacking 700,000 websites in a single shot.[14]
  • October 16: The YouTube channel of Sesame Street was hacked, streaming pornographic content for about 22 minutes.[15]
  • November 1: The main phone and Internet networks of the Palestinian territories sustained a hacker attack from multiple locations worldwide.[16]
  • November 7: The forums for Valve's Steam service were hacked. Redirects for a hacking website, Fkn0wned, appeared on the Steam users' forums, offering "hacking tutorials and tools, porn, free giveaways and much more."[17]
  • December 14: Five members of the Norwegian hacker group, Noria, were arrested, allegedly suspected for hacking into the email account of the militant extremist Anders Behring Breivik (who perpetrated the 2011 attacks in the country).[18]
  • A Saudi hacker, 0XOMAR, published over 400,000 credit cards online,[19] and threatened Israel to release 1 million credit cards in the future. In response to that incident, an Israeli hacker published over 200 Saudi's credit cards online.[20][21]
  • January 7: "Team Appunity", a group of Norwegian hackers, were arrested for breaking into Norway's largest prostitution website then publishing the user database online.[22]
  • February 3: Marriott was hacked by a New Age ideologist, Attila Nemeth who was resisting against the New World Order where he said that corporations are allegedly controlling the world. As a response Marriott reported him to the United States Secret Service.[23]
  • February 8: Foxconn is hacked by a hacker group, "Swagg Security", releasing a massive amount of data including email and server logins, and even more alarming - bank account credentials of large companies like Apple and Microsoft. Swagg Security stages the attack just as a Foxconn protest ignites against terrible working conditions in southern China.[24]
  • May 24: WHMCS is hacked by UGNazi, they claim that the reason for this is because of the illegal sites that are using their software.
  • May 31: MyBB is hacked by newly founded hacker group, UGNazi, the website was defaced for about a day, they claim their reasoning for this was because they were upset that the forum board Hackforums.net uses their software.
  • June 5: The social networking website LinkedIn has been hacked and the passwords for nearly 6.5 million user accounts are stolen by cybercriminals. As a result, a United States grand jury indicted Nikulin and three unnamed co-conspirators on charges of aggravated identity theft and computer intrusion.
  • August 15: The most valuable company in the world Saudi Aramco is crippled by a cyber warfare attack for months by malware called Shamoon. Considered the biggest hack in history in terms of cost and destructiveness . Carried out by an Iranian attacker group called Cutting Sword of Justice.[25] Iranian hackers retaliated against Stuxnet by releasing Shamoon. The malware destroyed over 35,000 Saudi Aramco computers, affecting business operations for months.
  • December 17: Computer hacker sl1nk announced that he has hacked a total of 9 countries' SCADA systems. The proof includes 6 countries: France, Norway, Russia, Spain, Sweden and the United States.[26]
  • The social networking website Tumblr is attacked by hackers. Consequently, 65,469,298 unique emails and passwords were leaked from Tumblr. The data breach's legitimacy is confirmed by computer security researcher Troy Hunt.[27]
  • February 7: The bitcoin exchange Mt.Gox filed for bankruptcy after $460 million was apparently stolen by hackers due to "weaknesses in [their] system" and another $27.4 million went missing from its bank accounts.[28]
  • October: The White House computer system was hacked.[29] It was said that the FBI, the Secret Service, and other U.S. intelligence agencies categorized the attacks "among the most sophisticated attacks ever launched against U.S. government systems."[30]
  • November 24: In response to the release of the film The Interview, the servers of Sony Pictures are hacked by a hacker group calling itself "Guardian of Peace".
  • November 28: The website of the Philippine telecommunications company Globe Telecom was hacked in response to the poor internet service they are distributing.[31]
  • Anonymous announced cyber-attacks of at least five Malaysian websites including that of Johor and Sabah state governments as well as the International Trade and Industry Ministry. As a result, eleven individuals were nabbed as suspects.
  • In February, an incident occurred where personal information belonging to over 10.6 million guests of MGM Resorts hotels was leaked on a hacking forum. The leaked data consisted of contact information of numerous former hotel guests, including well-known individuals such as Justin Bieber, Twitter CEO Jack Dorsey, and several government officials. [69]
  • In June 2020, Wattpad, a user-generated stories website, experienced a significant data breach that resulted in the exposure of nearly 268.745.495 million records. This breach had severe consequences as the compromised data was initially sold in private sales for over $100,000. Eventually, it was made available on a public hacking forum, where it was widely shared without any cost. As a result, a vast amount of personal information, including names, usernames, email and IP addresses, genders, general geographic location, birth dates, and passwords stored as bcrypt hashes, were exposed in this incident. [70]
  • On May 7, 2021, The Colonial Pipeline Cyberattack took place on May 7, 2021, when Colonial Pipeline had a ransomware attack.The cyberattack halted all of the pipelines operations.
  • Brenntag Ransomware was attacked when a group of hackers extracted 150GB of data during the attack and threatened to leak it unless the company paid $7.5 million. [71]
  • In the month of August, T-Mobile experienced a data breach. According to reports, the breach resulted in the compromise of customer information such as names, addresses, Social Security numbers, driver's licenses, IMEI and IMSI numbers, as well as ID information. It is estimated that around 50 million existing and potential customers may have been affected by this incident. Taking responsibility for the hack, a 21-year-old individual claimed to have successfully obtained almost 106GB of data from the renowned telecoms giant. [72]
  • In the month of March, a group of hackers caused significant disruption to Australia's Channel 9 News live broadcast. This incident led to the channel being unable to air multiple shows and also impacted the production of 9 News' printed materials. The attack, which was confirmed to be a ransomware attack, not only successfully took shows off the air but also resulted in the staff being locked out of their email accounts, blocked from accessing the internet, and caused a halt in the production systems for printed materials. It is worth noting that this cyber-attack marked a significant milestone as it was the largest one ever experienced by an Australian media company. [73]
  • Social media platform Twitter confirms that 5.4 million accounts was stolen
  • Student loan data exposes 2.5 million social security numbers
  • In January, Crypto.com made a statement regarding a security breach that occurred within its network. Hackers were able to gain unauthorized access and successfully stole over $30 million worth of cryptocurrency. This incident impacted nearly 500 customers. Crypto.com took immediate action and reassured its affected users by repaying them for any losses incurred due to the breach. It is worth noting that the hackers were able to bypass Crypto.com's two-factor authentication (2FA) protocols to carry out the attack. [74]
  • Microsoft was hacked by a hacking group called Lapsus$
  • On September 12, 2023, "CoinEx" a Hong Kong-based cryptocurrency exchange platform loses $70 million leading to CoinEx suspending its withdrawal service in order to avoid losing anymore money. They also announced that the affected users will be repayed entirely for any lost funds. [75][76][77]

References

change
  1. "Estonia recovers from massive denial-of-service attack - Network World". Archived from the original on 2013-12-03. Retrieved 2022-12-28.
  2. "FBI: Operation Bot Roast finds over 1 million botnet victims |NetworkWorld.com Community". Archived from the original on 2013-12-03. Retrieved 2022-12-28.
  3. McMillan, Robert (June 21, 2007). "Pentagon shuts down systems after cyberattack". InfoWorld. IDG. Retrieved 2008-03-10.
  4. Aitoro, Jill R. (March 5, 2008). "Defense officials still concerned about data lost in 2007 network attack". Government Executive. National Journal Group. Retrieved 2008-03-10.[permanent dead link]
  5. "BM'nin sitesi hacklendi |Haber'in Doğru Adresi, Haber, Yerel Haber, Siyaset Haberleri, Sondakika Haberleri, Gazeteler, Haberler". Archived from the original on 2011-09-30. Retrieved 2022-12-28.
  6. "Trend Micro Victim Of Malicious Hack". Archived from the original on 2009-01-09. Retrieved 2022-12-28.
  7. "FBI 'Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments |NetworkWorld.com Community". Archived from the original on 2013-12-03. Retrieved 2022-12-28.
  8. "Chinese hackers: No site is safe". CNN. March 7, 2008. Archived from the original on 2008-03-09. Retrieved 2008-03-07.
  9. Markoff, John (2009-08-26). "Defying Experts, Rogue Computer Code Still Lurks". New York Times. Retrieved 2009-08-27.
  10. "A new approach to China". Google Inc. 2010-01-12. Retrieved 17 January 2010.
  11. Kumar, Mohit (26 March 2011). "Thousands of Bank of America Accounts Hacked !". The Hacker News - Biggest Information Security Channel. Retrieved 14 March 2015.
  12. Apr 27, 2011 10:56 AM ET (April 27, 2011). "PlayStation data breach deemed in 'top 5 ever' - Business - CBC News". Cbc.ca. Retrieved 2011-04-29.{{cite news}}: CS1 maint: numeric names: authors list (link)
  13. Is Department of Defense (DoD), Pentagon, NASA, NSA secure?, TheHackerNews, May 14, 2011.
  14. Kovacs, Eduard (26 September 2011). "700,000 InMotion Websites Hacked by TiGER-M@TE". softpedia. Retrieved 14 March 2015.
  15. John P. Mello Jr. "Sesame Street Hacked, Porn Posted". PC World. Retrieved 2011-10-26.
  16. Ashkar, Alaa. "PA Telecommunications minister: Palestinian Internet Under Hacking Attacks". IMEMC. Retrieved 2011-11-02.
  17. Ashcraft, Brian. "Steam Forums Apparently Hacked". Kotaku.
  18. Jonas Sverrisson Rasch. "News article about the arrests of Noria". Dagbladet. Retrieved 2012-12-14.
  19. Flock, Elizabeth (January 3, 2012). "Saudi hackers say they published Israeli credit card information". The Washington Post.
  20. Saudi Hacker Threatens to Release 1 Million Israeli Credit Card Numbers, Curt Hopkins, 6 January 2012
  21. "Israeli hacker retaliates to credit card hacking". BBC News. January 12, 2012.
  22. Kripos. "(Norwegian) Tre personer siktet for datainnbrudd". Kripos. Archived from the original on 2013-07-28. Retrieved 2012-04-25.
  23. "Marriott,Hack,Extortion, Arrest and important websites hacked". Feb 3, 2012.
  24. Garside, Juliette (February 9, 2012). "Apple supplier Foxconn hacked in factory conditions protest". The Guardian. London.
  25. "Jose Pagliery: The inside story of the biggest hack in history". 5 August 2015. Retrieved 19 August 2012.
  26. "SCADA systems of 6 countries breached by Sl1nk". Archived from the original on 2016-03-04. Retrieved 2015-06-15.
  27. "Hackers Stole 65 Million Passwords From Tumblr, New Analysis Reveals - Motherboard". Motherboard.vice.com. 2016-05-30. Retrieved 2017-07-01.
  28. "The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster - WIRED". WIRED. 2014-03-03. Retrieved 14 March 2015.
  29. "White House computer network 'hacked' - BBC". BBC. 2014-10-29. Retrieved 6 November 2015.
  30. Evan Perez; Shimon Prokupecz (8 April 2015). "How the U.S. thinks Russians hacked the White House". CNN. Retrieved 17 December 2016. Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
  31. Michael Angelo Santos. "Globe Website was Hacked by Blood Sec Hackers". Coorms.[permanent dead link]
  32. Zengerle, Patricia; Cassella, Megan (2015-07-09). "Estimate of Americans hit by government personnel data hack skyrockets". Reuters. Retrieved 2015-07-09.
  33. Barrett, Devlin (5 June 2015). "U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say". Wall Street Journal. Retrieved 5 June 2015.
  34. Sanders, Sam (4 June 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records At Risk". NPR. Retrieved 5 June 2015.
  35. "ISIL-Linked Kosovo Hacker Sentenced to 20 Years in Prison". Justice Department of the United States. 2016-09-23.
  36. Romm, Tony; Geller, Eric. "WikiLeaks supporters claim credit for massive U.S. cyberattack, but researchers skeptical". POLITICO. Retrieved 22 October 2016.
  37. Larson, Selena (2017-11-22). "Uber's massive hack: What we know". CNNMoney. Retrieved 2019-06-20.
  38. Mussa, Matthew (2017-04-30). "'The Dark Overlord', Netflix Hacker: 5 Fast Facts You Need to Know". Heavy.com. Retrieved 2017-07-01.
  39. Brenner, Bill (2017-05-16). "WannaCry: the ransomware worm that didn't arrive on a phishing hook". Naked Security. Retrieved 2017-05-18.
  40. "Cyber-attack: Europol says it was unprecedented in scale". BBC News. 2017-05-13. Retrieved 2017-05-18.
  41. "Hackers seize unreleased Disney film, demand 'huge' Bitcoin ransom – report". RT International. Retrieved 2019-06-20.
  42. 42.0 42.1 42.2 Hern, Alex (1970-01-01). "Hackers publish private photos from cosmetic surgery clinic | Technology". The Guardian. Retrieved 2017-05-31.
  43. "Plastic surgery clinics hacked; 25,000 photos, data online". The Seattle Times. Retrieved 2017-05-31.
  44. "Plastic surgery clinics hacked; 25,000 photos, data online". Abcnews.go.com. Archived from the original on 2017-05-31. Retrieved 2017-05-31.
  45. "Global ransomware attack causes chaos". BBC News. 27 June 2017. Retrieved 27 June 2017.
  46. Constantin, Lucian (2019-04-10). "Group behind TRITON industrial sabotage malware made more victims". CSO Online. Retrieved 2019-07-17.
  47. Haselton, Todd (2017-09-07). "Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers". cnbc.com. Retrieved 2017-10-16.
  48. Hopkins, Nick (25 September 2017). "Deloitte hit by cyber-attack revealing clients' secret emails". Theguardian.com. Retrieved 16 October 2017.
  49. Stack, Liam (2017-12-06). "North Carolina County Refuses to Pay $23,000 Ransom to Hackers". The New York Times. ISSN 0362-4331. Retrieved 2019-06-20.
  50. McWhirter, Joseph De Avila and Cameron. "Atlanta Hit With Cyberattack". WSJ. Retrieved 2019-06-20.
  51. Press, Associated. "Two Iranians Indicted in Atlanta on Cyber Crime Charges". WSJ. Retrieved 2019-06-20.
  52. Ubuntu Community (2018-05-21). "Variant4". Archived from the original on 2018-05-22. Retrieved 2018-05-21.
  53. Adams, Ian (2018-05-01). "Wasaga Beach town hall computers seized by hackers". Simcoe.com. Retrieved 2019-06-20.
  54. "Lazy FP state restore". Intel. 13 June 2018. Retrieved 18 June 2018.
  55. Rondinone, Nicholas. "Hackers Target Connecticut City, Force Officials To Pay $2,000 Ransom". courant.com. Retrieved 2019-06-20.
  56. "Feds indict ransomware hackers of Allscripts, others". Modern Healthcare. 2018-11-29. Retrieved 2019-06-20.
  57. Cimpanu, Catalin. "Georgia county pays a whopping $400,000 to get rid of a ransomware infection". ZDNet. Retrieved 2019-06-20.
  58. Staff, WRGB (2019-03-30). "City of Albany experiences cyber attack". WRGB. Retrieved 2019-06-20.
  59. Moench, Mallory (2019-03-31). "Albany cyber attack affecting records, police". Times Union. Retrieved 2019-06-20.
  60. "Augusta city offices hit by computer virus". WCSH. Retrieved 2019-06-20.
  61. "Hacker wanted more than $100K to restore Maine city's computers". Bangor Daily News. Retrieved 2019-06-20.
  62. WITN. "FBI now investigating "RobinHood" ransomware attack on Greenville computers". www.witn.com. Retrieved 2019-06-20.
  63. Shalby, Colleen (2019-04-18). "Ryuk malware hacked a county government website. It's been down for 6 days". latimes.com. Retrieved 2019-06-20.
  64. Chokshi, Niraj (2019-05-22). "Hackers Are Holding Baltimore Hostage: How They Struck and What's Next". The New York Times. ISSN 0362-4331. Retrieved 2019-06-20.
  65. Campbell, Ian Duncan, Colin. "Baltimore city government computer network hit by ransomware attack". baltimoresun.com. Retrieved 2019-06-20.{{cite web}}: CS1 maint: multiple names: authors list (link)
  66. Zhang, Ian Duncan, Christine. "Analysis of ransomware used in Baltimore attack indicates hackers needed 'unfettered access' to city computers". baltimoresun.com. Retrieved 2019-06-20.{{cite web}}: CS1 maint: multiple names: authors list (link)
  67. Kamp, Scott Calvert and Jon. "Hackers Won't Let Up in Their Attack on U.S. Cities". WSJ. Retrieved 2019-06-20.
  68. CNN, Faith Karimi. "Florida city to pay $600K ransom to hacker who seized computer systems weeks ago". CNN. Retrieved 2019-06-20. {{cite web}}: |last= has generic name (help)
  69. "Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum". ZDNET. Retrieved 2023-08-02.
  70. "Wattpad data breach exposes account info for millions of users". www.bleepingcomputer.com. Retrieved 2023-08-03.
  71. "Chemical distributor pays $4.4 million to DarkSide ransomware". www.bleepingcomputer.com. Retrieved 2023-07-26.
  72. "T-Mobile data breach 2021: Here's what it means for securing your data". CNET. Retrieved 2023-09-09.
  73. "Cyber attack forces live TV shows off-air on Australia's Channel 9". BitDefender.
  74. Ramaswamy, Anita (2022-01-20). "2FA compromise led to $34M Crypto.com hack". TechCrunch. Retrieved 2023-09-09.
  75. "CoinEx hack: Compromised private keys led to $70M theft". Cointelegraph. 2023-09-19. Retrieved 2023-12-12.
  76. Powell, Olivia (2023-09-18). "CoinEx loses $70 million in cyber attack". Cyber Security Hub. Retrieved 2023-12-12.
  77. Haaster, Dirk van (2023-10-17). "Navigating Challenges: CoinEx's Resilient Response to a $70 Million Hack and Lessons for the Crypto World". BeInCrypto. Retrieved 2023-12-12.