List of security hacking incidents
Wikimedia list article
This is a list of security hacking incidents.
1970s
change1971
change- A Vietnam War veteran named John Draper discovers that the give-away whistle in Cap'n Crunch cereal boxes perfectly reproduces a 2600 hertz tone. Draper builds a "blue box" that, when used with the whistle and sounded into a phone receiver, allows phreaks to make free calls. Shortly afterwards, Esquire magazine publishes "Secrets of the Little Blue Box" with instructions for making a blue box, and wire fraud in the United States escalates.
1978
change- Susan Thunder is one of the early "phone phreakers," part of Kevin Mitnick’s crew who break into phone lines.
1980s
change1982
change- 1982 — In Milwaukee a group of six teenagers hackers calling themselves the 414's (their area code) break into some 60 computer systems at institutions ranging from the Los Alamos Laboratories to Manhattan's Memorial Sloan-Kettering Cancer Center before being arrested.
1984
change- CULT OF THE DEAD COW forms in Lubbock, Texas and begins publishing its ezine.
1988
change- The Morris Worm: Robert T. Morris, Jr. (RTM), a graduate student at Cornell University and son of a chief scientist at a division of the National Security Agency, launches a self-replicating worm on the government's ARPAnet (precursor to the Internet) to test its effect on UNIX systems. The worm gets out of hand and spreads to some 6000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years' probation, and fined $10,000.
- Kevin Mitnick secretly monitors the e-mail of MCI Communications and Digital Equipment Corporation (DEC) security officials. Kevin Mitnick is convicted of violating computer network of DEC and sentenced to a year in jail.
- Kevin Poulsen — was indicted on phone-tampering charges. Kevin went on the run and avoided capture for 17 months.
- First National Bank of Chicago is the victim of $70-million computer theft.
1989
change- The Germans and the KGB: In the first cyberespionage case to make international headlines, hackers in West Germany (loosely affiliated with the Chaos Computer Club) are arrested for breaking into U.S. government and corporate computers and selling operating-system source code to the Soviet KGB. Three of them are turned in by two fellow hacker spies, and a fourth suspected hacker commits suicide when his possible role in the plan is publicized. Because the information stolen is not classified, the hackers are fined and sentenced to probation. In a separate incident,
- Arrest of a hacker who calls himself The Mentor. He publishes a now-famous treatise that comes to be known as the Hacker's Manifesto.
- Fry Guy is raided by law enforcement; police hunt for Legion of Doom hackers.
- Jude Milhon (aka St Jude) and R. U. Sirius launch Mondo 2000, a major '90s tech-lifestyle magazine, in Berkeley, California.
1990s
change1990
change- LOD and MOD engaged in almost two years of online warfare — jamming phone lines, monitoring calls, trespassing in each other's private computers. Then the Feds cracked down. For Phiber and friends, that meant jail.
1991
change- Rumors circulate about the "Michelangelo" virus, expected to crash computers on March 6, 1992, the artist's 517th birthday. Doomsday passes without incident.
- Kevin Poulsen is captured and indicted for stealing military documents.
- resulted in jail sentences for four members of the Masters of Deception. Phiber Optik spent a year in federal prison.
1992
change1993
change- During radio station call-in contests, hacker-fugitive Kevin Poulsen and two friends rig the stations' phone systems to let only their calls through, and "win" two Porsches, vacation trips, and $20,000. Poulsen, already wanted for breaking into phone-company systems, serves five years in prison for computer and wire fraud.
- Texas A&M University professor receives death threats because a hacker used his computer to send 20,000 racist e-mails.
1994
change- Russian crackers siphon $10 million from Citibank and transfer the money to bank accounts around the world. Vladimir Levin, the 30-year-old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.
- Hackers adapt to emergence of the World Wide Web quickly, moving all their how-to information and hacking programs from the old BBSs to new hacker Web sites.
1995
change- February: Kevin Mitnick was arrested again. This time the FBI accused him of stealing 20,000 credit card numbers. Kevin Mitnick is incarcerated on charges of "wire fraud and illegal possession of computer files stolen from such companies as Motorola and Sun Microsystems" He is held in prison for four years without a trial.
- United States Department of Defense computers sustained 250,000 attacks by hackers.
- Hackers deface federal web sites.
1996
change- Hackers alter Web sites of the United States Department of Justice (August), the CIA (October), and the U.S. Air Force (December).
- Canadian hacker group, Brotherhood, breaks into the Canadian Broadcasting Corporation.
- The U.S. General Accounting Office reports that hackers attempted to break into Defense Department computer files some 250,000 times in 1995 alone. About 65 percent of the attempts were successful, according to the report.
- The MP3 format gains popularity in the hacker world. Many hackers begin setting up sharing sites via FTP, Hotline, IRC and USEnet.
1997
change- AOHell is released, a freeware application that allows a burgeoning community of unskilled script kiddies to wreak havoc on America Online. For days, hundreds of thousands of AOL users find their mailboxes flooded with multi-megabyte mail bombs and their chat rooms disrupted with spam messages.
- A 15-year-old Croatian youth penetrates computers at a U.S. Air Force base in Guam.
- Hackers get into Microsoft's Windows NT operating system.
1998
change- January: Yahoo! notifies Internet users that anyone visiting its site in recent weeks might have downloaded a logic bomb and worm planted by hackers claiming a "logic bomb" will go off if Mitnick is not released from prison.
- During heightened tensions in the Persian Gulf, hackers touch off a string of break-ins Solar Sunrise, a series of attacks targeting unclassified Pentagon computers and steal software programs, leads to the establishment of round-the-clock, online guard duty at major military computer sites. Then-U.S. Deputy Defense Secretary John Hamre calls it "the most organized and systematic attack" on U.S. military systems to date. An investigation points to two American teens. A 19-year-old Israeli hacker who calls himself The Analyzer (aka Ehud Tenebaum) is eventually identified as their ringleader and arrested. Tenebaum is later made chief technology officer of a computer consulting firm.
- March: Timothy Lloyd is indicted for planting a logic bomb on the network of Omega Engineering. The logic bomb causes millions in damage.
- Hackers alter The New York Times Web site, renaming it HFG (Hacking for Girlies). The hackers express anger at the arrest and imprisonment of Kevin Mitnick, the subject of the book "Takedown" co-authored by Times reporter John Markoff.
- Two hackers are sentenced to death by a court in China for breaking into a bank computer network and stealing 260,000 yuan ($31,400).
- July: Hackers break into United Nations Children Fund Web site threathening "holocaust."
- August: The hacking group CULT OF THE DEAD COW releases its Trojan horse program, Back Orifice at DEF CON. Once a user installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine.
- December: L0pht testifies to the senate that it could shut down nationwide access to the Internet in less than 30 minutes.
1999
change- The Electronic Civil Disobedience project, an online political performance-art group, attacks the Pentagon calling it conceptual art. It said it was protesting U.S. support of the Mexican suppression of rebels in southern Mexico. Carmin Karasic, helped write FloodNet, the tool used by ECD to bombard its opponents with access requests in a symbolic, harmless version of the denial-of-service attacks that took down CNN and Yahoo.
- Classified computer systems at Kelly Air Force Base in San Antonio, Texas, come under attack from a number of locations around the world, but the attacks were detected and stopped by newly developed Defense Department systems.
- U.S. Information Agency Web site is hacked for the second time in six months. The hacker circumvented the agency's Internet security and damaged the hard drive, leaving behind the message "Crystal, I love you" and the signature "Zyklon."
- March: The Melissa worm is released and quickly becomes the most costly malware outbreak to date.
- July: CULT OF THE DEAD COW releases Back Orifice 2000 at DEF CON
- September: Level Seven hacks and places racist, anti-government slogans on embassy site in regards to 1998 U.S. embassy bombings
- "Unidentified hackers seized control of a British military communication satellite and demanded money in return for control of the satellite.
- December 29: the Legions of the Underground (LoU) declared cyberwar on Iraq and China with the intention of disrupting and disabling internet infrastructure.
2000s
change2000
change- January 7: an international coalition of hackers (including CULT OF THE DEAD COW, 2600 's staff, Phrack's staff, L0pht, and the Chaos Computer Club) issued a joint statement ([1]) condemning the LoU's declaration of war. The LoU responded by withdrawing its declaration.
- January — A Russian cracker attempts to extort $100,000 from online music retailer CD Universe, threatening to expose thousands of customers' credit card numbers. Posting them on a website after the attempt to extort money from the company failed. Barry Schlossberg (AKA Lou Cipher) is successful at extoring 1.4M from CD Universe for "services rendered", in an attempt to "catch the russian hacker".
- Second week of February — Canadian hacker MafiaBoy In the first and one of the biggest denial-of-service attacks to date, launches successful distributed denial-of-service (DDoS) attack taking down several high-profile Web sites, including Amazon, CNN and Yahoo!.
- Activists in Pakistan and the Middle East deface Web sites belonging to the Indian and Israeli governments to protest oppression in Kashmir and Palestine.
- Hackers break into Microsoft's corporate network and access source code for the latest versions of Microsoft Windows and Microsoft Office software. It is later released to several filesharing networks. The Register splashes with the immortal (and suppositional) headline: 'M$ hacked! Russian Mafia swipes WinME source'.
- The following sites were attacked by hackers using distributed denial of service: Yahoo!, eBay, CNN.com, Amazon.com, Buy.com, ZDNet, E*Trade, and Datek.
- March — President Clinton says he doesn't use e-mail to communicate with his daughter, Chelsea Clinton, at college because he doesn't think the medium is secure.
- April — The U.S. Department of Justice unveils a portal that notes the government's position on Internet security and privacy issues, tracks prosecution of cybercriminals and provides guidelines for cybercrime investigations.
- May — a new virus appeared that spread rapidly around the globe. The "I Love You" virus infected image and sound files and spread quickly by causing copies of itself to be sent to all individuals in an address book.
- May — The LoveLetter virus sweeps across the globe in hours, wreaking havoc on networks and causing millions in damage and lost productivity.
- June — President Clinton signs the "Electronic Signatures in Global and National Commerce" (E-Sign) into law, making digital signatures legally binding.
- June — The Honeynet Project, led by Lance Spitzner, launches, collecting hacking intelligence through a network of decoy servers.
- July — The SANS Institute releases its first "Top 10 Vulnerabilities" list, denoting the most prevalent problems exploited by hackers.
- A 19-year-old Midwestern law student who calls herself ViXen900 is a member of the HNC hackers’ group and advises them on legal issues.
- Kevin Mitnick is released from prison.
2006
change- January: One of the few worms to take after the old form of malware, destruction of data rather than the accumulation of zombie networks to launch attacks from, is discovered. It had various names, including Kama Sutra (used by most media reports), Black Worm, Mywife, Blackmal, Nyxem version D, Kapser, KillAV, Grew and CME-24. The worm would spread through e-mail client address books, and would search for documents and fill them with garbage, instead of deleting them to confuse the user. It would also hit a web page counter when it took control, allowing the programmer who created it as well as the world to track the progress of the worm. It would replace documents with random garbage on the third of every month. It was hyped by the media but actually affected relatively few computers, and was not a real threat for most users.
- February: Direct-to-video film The Net 2.0 is released, as a sequel to The Net, following the same plotline, but with updated technology used in the film, using different characters, and different complications. The director of The Net 2.0, Charles Winkler, is son of Irwin Winkler, the director of The Net.
- May: Jeanson James Ancheta receives a 57 month prison sentence, [2] Archived 2007-09-27 at the Wayback Machine and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer equipment [3] Archived 2007-09-27 at the Wayback Machine.
- May: Largest Defacement in Web History is performed by the Turkish hacker iSKORPiTX who successfully hacked 21,549 websites in one shot. [4]
- July: Robert Moore and Edwin Pena featured on Americas Most Wanted with Kevin Mitnick presenting their case commit the first VOIP crime ever seen in the USA. Robert Moore served 2 years in federal prison with a $152,000.00 restitution while Edwin Pena was sentenced to 10 years and a $1 million restitution.
- September: Viodentia releases FairUse4WM tool which would remove DRM information off WMA music downloaded from music services such as Yahoo Unlimited, Napster, Rhapsody Music and Urge.
2007
change- June 13: FBI Operation Bot Roast finds over 1 million botnet victims[2]
- June 21: A spear phishing incident at the Office of the Secretary of Defense steals sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD.[3][4]
- August 11: United Nations website hacked by Turkish Hacker Kerem125[5]
- October 7: Trend Micro website successfully hacked by Turkish hacker Janizary(a.k.a Utku)[6]
- November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments[7]
2008
change- January 18: Project Chanology Anonymous attacks Scientology website servers around the world. Private documents are stolen from Scientology computers and distributed over the Internet
- March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including The Pentagon. They operate from a bare apartment on a Chinese island.[8]
2009
change- April 1: Conficker worm infiltrated millions of PCs worldwide including many government-level top-security computer networks[9]
2001
change- Microsoft becomes the prominent victim of a new type of crack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.
- February — A Dutch cracker releases the Anna Kournikova virus, initiating a wave of viruses that tempts users to open the infected attachment by promising a sexy picture of the Russian tennis star.
- March — FBI agent Robert P. Hanssen is charged with using his computer skills and FBI access to spy for the Russians.
- March — The L10n worm is discovered in the wild attacking older versions of BIND DNS.
- April — FBI agents trick two Russian crackers into coming to the U.S. and revealing how they were cracking U.S. banks.
- May
- Spurred by elevated tensions in Sino-American diplomatic relations, U.S. and Chinese hackers engage in skirmishes of Web defacements that many dub "The Sixth Cyberwar".
- Crackers begin using "pulsing" zombies, a new DDoS method that has zombie machines send random pings to targets rather than flooding them, making it hard to stop attacks.
- AV experts identify Sadmind, a new cross-platform worm that uses compromised Sun Solaris boxes to attack Windows NT servers.
- July — Russian programmer Dmitry Sklyarov is arrested at the annual Def Con hacker convention. He is the first person criminally charged with violating the Digital Millennium Copyright Act (DMCA).
- August — Code Red, the first polymorphic worm, infects tens of thousands of machines.
- September — The World Trade Center and Pentagon terrorist attacks spark lawmakers to pass a barrage of anti terrorism laws many of which group Hackers as terrorists and remove many long standing personal freedoms in the name of safety.
- September — Nimda, a new memory-only worm, wreaks havoc on the Internet, quickly eclipsing Code Red's infection rate and recovery cost.
- November — Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines.
- November — The European Union adopts the controversial cybercrime treaty, which makes the possession and use of hacking tools illegal.
2002
change- January — Bill Gates decrees that Microsoft will secure its products and services, and kicks off a massive internal training and quality control campaign.
- February — As part of its Trustworthy Computing initiative, Microsoft shuts down all Windows development, sending more than 8,000 programmers to security training.
- April — The U.S. Army initiates the "Mannheim Project," an effort to better consolidate and secure the military's IT assets from cyber-warfare.
- May — Klez.H, a variant of the worm discovered in November 2001, becomes the biggest malware outbreak in terms of machines infected, but causes little monetary damage.
- June — The Bush administration files a bill to create the Department of Homeland Security, which, among other things, will be responsible for protecting the nation's critical IT infrastructure.
- July — An Information Security survey finds that most security practitioners favor full disclosure because it helps them defend against hacker exploits and puts pressure of software vendors to improve their products.
- August — Researcher Chris Paget publishes "shatter attacks," detailing how Windows' unauthenticated messaging system can be used to take over a machine. The paper raises questions about how securable Windows could ever be.
- September — The White House's Office of Homeland Security releases a draft of the "National Strategy to Secure Cyberspace," which many criticize as being too weak.
- October — The International Information Systems Security Certification Consortium--(ISC)2--confers its 10,000th CISSP certification.
2003
change- January 23 — Pittsburgh, Pennsylvania Man Convicted of Hacking a Judge's Personal E-Mail Account
- February 6 — Former Employee of Viewsonic Arrested on Charges of Hacking into Company's Computer, Destroying Data.
- February 13 — Ohio Man Attacked NASA Computer System Shutting Down Email Server.
- February 20 — Ex-employee of Airport Transportation Company Arrested for Allegedly Hacking Into Computer, Destroying Data.
- February 26 — U.S. Convicts Kazakhstan Cracker of Breaking into Bloomberg L.P.'s Computers and Attempting Extortion
- February 26 — Former Employee of American Eagle Outfitters Indicted on Charges of Password Trafficking and Computer Damage.
- February 28 — Los Angeles, California Man Sentenced to Prison for Role in International Computer Hacking and Internet Fraud Scheme.
- March — CULT OF THE DEAD COW and Hacktivismo are given permission by the United States Department of Commerce to export software utilizing strong encryption
- March 10 — California Woman Convicted for Unauthorized Computer Access to Customer Account Information in Credit Union Fraud Prosecution.
- March 13 — Computer Cracker Ples Guilty to Computer Intrusion and Credit Card Fraud.
- March 13 — St. Joseph, Missouri Man Pleas Guilty in District's First Computer Cracking Conviction.
- March 14 — Student Charged with Unauthorized Access to University of Texas Computer System.
- April 2 — San Jose, California Man Indicted for Theft of Trade Secrets and Computer Fraud.
- April 18 — Ex-employee of Airport Transportation Company Guilty of Hacking into Company's Computer.
- May 12 — Three Californians Indicted in Conspiracy to Commit Bank fraud and Identity Theft.
- June 12 — Computer Hacker Sentenced to One Year and One Day And Ordered to Pay More than $88,000 Restitution For Series of Computer Intrusions and Credit Card Fraud.
- June 12 — Southern California Man Who Hijacked Al Jazeera Website Agrees to Plead Guilty to Federal Charges.
- July 1 — Kazakhstan Hacker Sentenced to Four Years Prison for Breaking into Bloomberg Systems and Attempting Extortion
- July 11 — Queens, New York Man Pleads to Federal Charges of Computer Damage, Access Device Fraud and Software Piracy
- July 17 — FBI Employee Arrested and Charged in Three Federal indictments
- July 25 — Russian Man Sentenced for Cracking into Computers in the United States
- August 23 — Jesus Oquendo "sil" of AntiOffline releases "BRAT Archived 2008-07-25 at the Wayback Machine" Border Router Attack Tool as part of "Theories in Denials of Service in an effort to make administrators aware of the possibility of a worm attack tool capable of breaking backbone routes on the Internet
- August 25 — Former Computer Technician in Douglasville, Georgia Arrested for Hacking into Government Computer Systems in Southern California
- August 29 — Minneapolis, Minnesota 18 year old Arrested for Developing and Releasing B Variant of Blaster Computer Worm.
- September 9 — U.S. Charges Cracker with Illegally Accessing New York Times Computer Network.
- September 10 — Deputy Assistant Attorney General John G. Malcolm's Testimony before the United States House of Representatives Committee on Government Reform, Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census.
- September 26 — Juvenile Arrested for Releasing Variant of Blaster Computer Worm That Attacked Microsoft.
- September 29 — President of San Diego Computer Security Company Indicted in Conspiracy to Gain Unauthorized Access into Government Computers.
- October 6 — Former Employee of Viewsonic Pleas Guilty to Hacking into Company's Computer, Destroying Data
- October 7 — Disgruntled Philadelphia Phillies Fan Charged with Hacking into Computers Triggering spam E-mail Attacks.
- November 5 — Dallas, Texas FBI Employee Indicted for Public corruption.
- November 20 — Three Men Indicted for Hacking into Lowe's Companies' Computers with Intent to Steal Credit Card Information.
- November 20 — Two Alleged Computer Hackers Charged in Los Angeles as Part of Nationwide 'Operation Cyber Sweep'.
- December 5 — Former Hellmann Logistics Computer Programmer Sentenced for Unauthorized Computer Intrusion.
- December 18 — Milford Man pleas guilty to hacking.
2004
change- March - Myron Tereshchuk arrested for attempting to extort $17 million from Micropatent. FBI agents find explosives and biological weapons in the course of the raid.
- December — Brian Salcedo sentenced to 9 years in prison for his involvement in hacking into the corporate systems of Lowe's home improvement stores and attempting to steal customer credit card information. The sentence far exceeds the 5 1/2 years that hacker Kevin Mitnick spent behind bars. Prosecutors said the three men tapped into the wireless network of a Lowe's store in Southfield, Mich., used that connection to enter the chain's central computer system in North Wilkesboro, N.C., and installed a program to capture credit card information. No data was actually collected however.
- July 13 - Informationleak.com is born and encompasses the ideals held by many of the groups from the so called golden age of hacking.
2005
change- September 15 - An unnamed teenager is sentenced to 11 months for gaining access to T-Mobile USA's network and exploiting Paris Hilton's sidekick, it turns out this teen is also responsable for breaking in to data broker LexisNexus's system in January.
- November 4 - Jeanson James Ancheta, who prosecutors say was a member of the "Botmaster Underground", a group of script kiddies who are mostly noted for their excessive use of bot attacks and propogating vast amounts of spam on the internet, was taken into custody after being lured to FBI offices in Los Angeles.
2010s
change2010
change- January 12: Operation Aurora Google publicly reveals[10] that it has been on the receiving end of a "highly sophisticted and targetted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google"
- June: Stuxnet The Stuxnet worm is found by VirusBlokAda. Stuxnet affects Windows computers throughout the world. Later, it is learned that Stuxnet can also affect some Unix systems.
2011
change- The hacker group Lulz Security is formed.
- April 9: Bank of America website got hacked by a Turkish hacker named JeOPaRDY. An estimated 85,000 credit card numbers and accounts were reported to have been stolen due to the hack. Bank officials say no personal customer bank information is available on that web-page. Investigations are being conducted by the FBI to trace down the incriminated hacker.[11]
- April 17: An "external intrusion" sends the PlayStation Network offline, and compromises personally identifying information (possibly including credit card details) of its 77 million accounts, in what is claimed to be one of the five largest data breaches ever.[12]
- Computer hacker sl1nk releases information of his penetration in the servers of the Department of Defense (DoD), Pentagon, NASA, NSA, US Military, Department of the Navy, Space and Naval Warfare System Command and other UK/US government websites.[13]
- September: Bangladeshi hacker TiGER-M@TE made a world record in defacement history by hacking 700,000 websites in a single shot.[14]
- October 16: The YouTube channel of Sesame Street was hacked, streaming pornographic content for about 22 minutes.[15]
- November 1: The main phone and Internet networks of the Palestinian territories sustained a hacker attack from multiple locations worldwide.[16]
- November 7: The forums for Valve's Steam service were hacked. Redirects for a hacking website, Fkn0wned, appeared on the Steam users' forums, offering "hacking tutorials and tools, porn, free giveaways and much more."[17]
- December 14: Five members of the Norwegian hacker group, Noria, were arrested, allegedly suspected for hacking into the email account of the militant extremist Anders Behring Breivik (who perpetrated the 2011 attacks in the country).[18]
2012
change- A Saudi hacker, 0XOMAR, published over 400,000 credit cards online,[19] and threatened Israel to release 1 million credit cards in the future. In response to that incident, an Israeli hacker published over 200 Saudi's credit cards online.[20][21]
- January 7: "Team Appunity", a group of Norwegian hackers, were arrested for breaking into Norway's largest prostitution website then publishing the user database online.[22]
- February 3: Marriott was hacked by a New Age ideologist, Attila Nemeth who was resisting against the New World Order where he said that corporations are allegedly controlling the world. As a response Marriott reported him to the United States Secret Service.[23]
- February 8: Foxconn is hacked by a hacker group, "Swagg Security", releasing a massive amount of data including email and server logins, and even more alarming - bank account credentials of large companies like Apple and Microsoft. Swagg Security stages the attack just as a Foxconn protest ignites against terrible working conditions in southern China.[24]
- May 24: WHMCS is hacked by UGNazi, they claim that the reason for this is because of the illegal sites that are using their software.
- May 31: MyBB is hacked by newly founded hacker group, UGNazi, the website was defaced for about a day, they claim their reasoning for this was because they were upset that the forum board Hackforums.net uses their software.
- June 5: The social networking website LinkedIn has been hacked and the passwords for nearly 6.5 million user accounts are stolen by cybercriminals. As a result, a United States grand jury indicted Nikulin and three unnamed co-conspirators on charges of aggravated identity theft and computer intrusion.
- August 15: The most valuable company in the world Saudi Aramco is crippled by a cyber warfare attack for months by malware called Shamoon. Considered the biggest hack in history in terms of cost and destructiveness . Carried out by an Iranian attacker group called Cutting Sword of Justice.[25] Iranian hackers retaliated against Stuxnet by releasing Shamoon. The malware destroyed over 35,000 Saudi Aramco computers, affecting business operations for months.
- December 17: Computer hacker sl1nk announced that he has hacked a total of 9 countries' SCADA systems. The proof includes 6 countries: France, Norway, Russia, Spain, Sweden and the United States.[26]
2013
change- The social networking website Tumblr is attacked by hackers. Consequently, 65,469,298 unique emails and passwords were leaked from Tumblr. The data breach's legitimacy is confirmed by computer security researcher Troy Hunt.[27]
2014
change- February 7: The bitcoin exchange Mt.Gox filed for bankruptcy after $460 million was apparently stolen by hackers due to "weaknesses in [their] system" and another $27.4 million went missing from its bank accounts.[28]
- October: The White House computer system was hacked.[29] It was said that the FBI, the Secret Service, and other U.S. intelligence agencies categorized the attacks "among the most sophisticated attacks ever launched against U.S. government systems."[30]
- November 24: In response to the release of the film The Interview, the servers of Sony Pictures are hacked by a hacker group calling itself "Guardian of Peace".
- November 28: The website of the Philippine telecommunications company Globe Telecom was hacked in response to the poor internet service they are distributing.[31]
2015
change- June: the records of 21.5 million people, including social security numbers, dates of birth, addresses, fingerprints, and security-clearance-related information, are stolen from the United States Office of Personnel Management.[32] Most of the victims are employees of the United States government and unsuccessful applicants to it. The Wall Street Journal and the Washington Post report that government sources believe the hacker is the government of China.[33][34]
- July: The servers of extramaritial affairs website Ashley Madison were breached.
2016
change- February: The 2016 Bangladesh Bank heist attempted to steal US$951 million from a Bangladesh Bank, and succeeded in getting $101 million - although some of this was later recovered.
- July 22: WikiLeaks published the documents from the 2016 Democratic National Committee email leak.
- July 29: a group suspected coming from China launched hacker attacks on the website of Vietnam Airlines.
- August 13: The Shadow Brokers (TSB) started publishing several leaks containing hacking tools from the National Security Agency (NSA), including several zero-day exploits. Ongoing leaks until April 2017 (The Shadow Brokers)
- September: Hacker Ardit Ferizi is sentenced to 20 years in prison after being arrested for hacking U.S. servers and passing the leaked information to members of ISIL terrorist group back in 2015.[35]
- October: The 2016 Dyn cyberattack is being conducted with a botnet consisting of IOTs infected with Mirai by the hacktivist groups SpainSquad, Anonymous, and New World Hackers, reportedly in retaliation for Ecuador's rescinding Internet access to WikiLeaks founder Julian Assange at their embassy in London, where he has been granted asylum.[36]
- Late 2016: Hackers steal international personal user data from the company Uber, including phone numbers, email addresses, and names, of 57 million people and 600,000 driver's license numbers of drivers for the company. Uber's GitHub account was accessed through Amazon's cloud-based service. Uber paid the hackers $100,000 for assurances the data was destroyed.[37]
2017
change- February: The Cloudbleed bug was discovered by Google Project Zero team.
- April: A hacker group calling itself "The Dark Overlord" posted unreleased episodes of Orange Is the New Black TV series online after failing to extort the online entertainment company Netflix.[38]
- May: WannaCry ransomware attack started on Friday, 12 May 2017,[39] and has been described as unprecedented in scale, infecting more than 230,000 computers in over 150 countries.[40] A hacked unreleased Disney film is held for ransom, to be paid in Bitcoin. [41]
- May: 25,000 digital photos and ID scans relating to patients of the Grozio Chirurgija cosmetic surgery clinic in Lithuania were obtained and published without consent by an unknown group demanding ransoms.[42][43][44] Thousands of clients from more than 60 countries were affected.[42] The breach brought attention to weaknesses in Lithuania's information security.[42]
- June: 2017 Petya cyberattack.[45]
- June: TRITON (TRISIS), a malware framework designed to reprogram Triconex safety instrumented systems (SIS) of industrial control systems (ICS), discovered in Saudi Arabian Petrochemical plant.[46]
- August: Hackers demand $7.5 million in bitcoin to stop pre-releasing HBO shows and scripts, including Ballers, Room 104 and Game of Thrones.
- May–July 2017: The Equifax breach.[47]
- September 2017: Deloitte breach.[48]
- December: Mecklenburg County, North Carolina computer systems were hacked. They did not pay the ransom. [49]
2018
change- March: The city of Atlanta, Georgia USA computer systems are seized by hackers with ransomware. They did not pay the ransom, [50] and two Iranians were indicted by the FBI on cyber crime charges for the breach.[51]
- May: A speculative execution exploit named Speculative Store Bypass (sometimes referred to as "Variant 4") is disclosed by researchers.[52] The town of Wasaga Beach in Ontariao, Canada computer systems are seized by hackers with ransomware. [53]
- June: Lazy FP State Restore, a speculative execution exploit affecting Intel Core CPUs, is announced by Intel.[54]
- October: West Haven, Connecticut USA computer systems are seized by hackers with ransomware, they paid $2,000 in ransom. [55]
- November: The first U.S. indictment of individual people for ransomware attacks occurs. The U.S. Justice Department indicted two men Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri who allegedly used the SamSam ransomware for extortion, netting them more than $6 million in ransom payments. The companies infected with the ransomware. they used included Allscripts, Medstar Health, and Hollywood Presbyterian Medical Center. Altogether, the attacks caused victims to lose more than $30 million, in addition to the ransom payments. [56]
2019
change- March: Jackson County, Georgia USA computer systems are seized by hackers with ransomware, they paid $400,000 in ransom.[57] The city of Albany, New York USA experiences a ransomware cyber attack. [58][59]
- April: The city of Augusta, Maine USA computer systems are seized by hackers using ransomware.[60][61] The city of Greenville, North Carolina USA computer systems are seized by hackers using ransomware known as RobbinHood.[62] Imperial County, in California USA, computer systems are seized by hackers using Ryuk ransomware.[63]
- May: The city of Baltimore, Maryland USA computer systems are seized by hackers using ransomware known as RobbinHood that encrypts files with a “file-locking” virus, as well as the tool EternalBlue.[64][65][66][67]
- June: The city of Riviera Beach, Florida USA paid roughly $600,000 ransom in Bitcoin to hackers who seized their computers using ransomware.[68] Hackers steal 18 hours of unreleased music from the band Radiohead demanding $150,000 ransom. Radiohead released the music to the public anyway and did not pay the ransom.
- September: A security flaw in the TLS-handling code of the Exim mail transfer agent is disclosed, which could potentially allow for attackers to execute code remotely as the superuser on affected servers. It was reported that around 5 million servers were impacted at the time of public disclosure.
2020s
change2020
change- Anonymous announced cyber-attacks of at least five Malaysian websites including that of Johor and Sabah state governments as well as the International Trade and Industry Ministry. As a result, eleven individuals were nabbed as suspects.
- In February, an incident occurred where personal information belonging to over 10.6 million guests of MGM Resorts hotels was leaked on a hacking forum. The leaked data consisted of contact information of numerous former hotel guests, including well-known individuals such as Justin Bieber, Twitter CEO Jack Dorsey, and several government officials. [69]
- In June 2020, Wattpad, a user-generated stories website, experienced a significant data breach that resulted in the exposure of nearly 268.745.495 million records. This breach had severe consequences as the compromised data was initially sold in private sales for over $100,000. Eventually, it was made available on a public hacking forum, where it was widely shared without any cost. As a result, a vast amount of personal information, including names, usernames, email and IP addresses, genders, general geographic location, birth dates, and passwords stored as bcrypt hashes, were exposed in this incident. [70]
2021
change- On May 7, 2021, The Colonial Pipeline Cyberattack took place on May 7, 2021, when Colonial Pipeline had a ransomware attack.The cyberattack halted all of the pipelines operations.
- Brenntag Ransomware was attacked when a group of hackers extracted 150GB of data during the attack and threatened to leak it unless the company paid $7.5 million. [71]
- In the month of August, T-Mobile experienced a data breach. According to reports, the breach resulted in the compromise of customer information such as names, addresses, Social Security numbers, driver's licenses, IMEI and IMSI numbers, as well as ID information. It is estimated that around 50 million existing and potential customers may have been affected by this incident. Taking responsibility for the hack, a 21-year-old individual claimed to have successfully obtained almost 106GB of data from the renowned telecoms giant. [72]
- In the month of March, a group of hackers caused significant disruption to Australia's Channel 9 News live broadcast. This incident led to the channel being unable to air multiple shows and also impacted the production of 9 News' printed materials. The attack, which was confirmed to be a ransomware attack, not only successfully took shows off the air but also resulted in the staff being locked out of their email accounts, blocked from accessing the internet, and caused a halt in the production systems for printed materials. It is worth noting that this cyber-attack marked a significant milestone as it was the largest one ever experienced by an Australian media company. [73]
2022
change- Social media platform Twitter confirms that 5.4 million accounts was stolen
- Student loan data exposes 2.5 million social security numbers
- In January, Crypto.com made a statement regarding a security breach that occurred within its network. Hackers were able to gain unauthorized access and successfully stole over $30 million worth of cryptocurrency. This incident impacted nearly 500 customers. Crypto.com took immediate action and reassured its affected users by repaying them for any losses incurred due to the breach. It is worth noting that the hackers were able to bypass Crypto.com's two-factor authentication (2FA) protocols to carry out the attack. [74]
- Microsoft was hacked by a hacking group called Lapsus$
2023
changeReferences
change- ↑ "Estonia recovers from massive denial-of-service attack - Network World". Archived from the original on 2013-12-03. Retrieved 2022-12-28.
- ↑ "FBI: Operation Bot Roast finds over 1 million botnet victims |NetworkWorld.com Community". Archived from the original on 2013-12-03. Retrieved 2022-12-28.
- ↑ McMillan, Robert (June 21, 2007). "Pentagon shuts down systems after cyberattack". InfoWorld. IDG. Retrieved 2008-03-10.
- ↑ Aitoro, Jill R. (March 5, 2008). "Defense officials still concerned about data lost in 2007 network attack". Government Executive. National Journal Group. Retrieved 2008-03-10.[permanent dead link]
- ↑ "BM'nin sitesi hacklendi |Haber'in Doğru Adresi, Haber, Yerel Haber, Siyaset Haberleri, Sondakika Haberleri, Gazeteler, Haberler". Archived from the original on 2011-09-30. Retrieved 2022-12-28.
- ↑ "Trend Micro Victim Of Malicious Hack". Archived from the original on 2009-01-09. Retrieved 2022-12-28.
- ↑ "FBI 'Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments |NetworkWorld.com Community". Archived from the original on 2013-12-03. Retrieved 2022-12-28.
- ↑ "Chinese hackers: No site is safe". CNN. March 7, 2008. Archived from the original on 2008-03-09. Retrieved 2008-03-07.
- ↑ Markoff, John (2009-08-26). "Defying Experts, Rogue Computer Code Still Lurks". New York Times. Retrieved 2009-08-27.
- ↑ "A new approach to China". Google Inc. 2010-01-12. Retrieved 17 January 2010.
- ↑ Kumar, Mohit (26 March 2011). "Thousands of Bank of America Accounts Hacked !". The Hacker News - Biggest Information Security Channel. Retrieved 14 March 2015.
- ↑ Apr 27, 2011 10:56 AM ET (April 27, 2011). "PlayStation data breach deemed in 'top 5 ever' - Business - CBC News". Cbc.ca. Retrieved 2011-04-29.
{{cite news}}
: CS1 maint: numeric names: authors list (link) - ↑ Is Department of Defense (DoD), Pentagon, NASA, NSA secure?, TheHackerNews, May 14, 2011.
- ↑ Kovacs, Eduard (26 September 2011). "700,000 InMotion Websites Hacked by TiGER-M@TE". softpedia. Retrieved 14 March 2015.
- ↑ John P. Mello Jr. "Sesame Street Hacked, Porn Posted". PC World. Retrieved 2011-10-26.
- ↑ Ashkar, Alaa. "PA Telecommunications minister: Palestinian Internet Under Hacking Attacks". IMEMC. Retrieved 2011-11-02.
- ↑ Ashcraft, Brian. "Steam Forums Apparently Hacked". Kotaku.
- ↑ Jonas Sverrisson Rasch. "News article about the arrests of Noria". Dagbladet. Retrieved 2012-12-14.
- ↑ Flock, Elizabeth (January 3, 2012). "Saudi hackers say they published Israeli credit card information". The Washington Post.
- ↑ Saudi Hacker Threatens to Release 1 Million Israeli Credit Card Numbers, Curt Hopkins, 6 January 2012
- ↑ "Israeli hacker retaliates to credit card hacking". BBC News. January 12, 2012.
- ↑ Kripos. "(Norwegian) Tre personer siktet for datainnbrudd". Kripos. Archived from the original on 2013-07-28. Retrieved 2012-04-25.
- ↑ "Marriott,Hack,Extortion, Arrest and important websites hacked". Feb 3, 2012.
- ↑ Garside, Juliette (February 9, 2012). "Apple supplier Foxconn hacked in factory conditions protest". The Guardian. London.
- ↑ "Jose Pagliery: The inside story of the biggest hack in history". 5 August 2015. Retrieved 19 August 2012.
- ↑ "SCADA systems of 6 countries breached by Sl1nk". Archived from the original on 2016-03-04. Retrieved 2015-06-15.
- ↑ "Hackers Stole 65 Million Passwords From Tumblr, New Analysis Reveals - Motherboard". Motherboard.vice.com. 2016-05-30. Retrieved 2017-07-01.
- ↑ "The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster - WIRED". WIRED. 2014-03-03. Retrieved 14 March 2015.
- ↑ "White House computer network 'hacked' - BBC". BBC. 2014-10-29. Retrieved 6 November 2015.
- ↑ Evan Perez; Shimon Prokupecz (8 April 2015). "How the U.S. thinks Russians hacked the White House". CNN. Retrieved 17 December 2016.
Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
- ↑ Michael Angelo Santos. "Globe Website was Hacked by Blood Sec Hackers". Coorms.[permanent dead link]
- ↑ Zengerle, Patricia; Cassella, Megan (2015-07-09). "Estimate of Americans hit by government personnel data hack skyrockets". Reuters. Retrieved 2015-07-09.
- ↑ Barrett, Devlin (5 June 2015). "U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say". Wall Street Journal. Retrieved 5 June 2015.
- ↑ Sanders, Sam (4 June 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records At Risk". NPR. Retrieved 5 June 2015.
- ↑ "ISIL-Linked Kosovo Hacker Sentenced to 20 Years in Prison". Justice Department of the United States. 2016-09-23.
- ↑ Romm, Tony; Geller, Eric. "WikiLeaks supporters claim credit for massive U.S. cyberattack, but researchers skeptical". POLITICO. Retrieved 22 October 2016.
- ↑ Larson, Selena (2017-11-22). "Uber's massive hack: What we know". CNNMoney. Retrieved 2019-06-20.
- ↑ Mussa, Matthew (2017-04-30). "'The Dark Overlord', Netflix Hacker: 5 Fast Facts You Need to Know". Heavy.com. Retrieved 2017-07-01.
- ↑ Brenner, Bill (2017-05-16). "WannaCry: the ransomware worm that didn't arrive on a phishing hook". Naked Security. Retrieved 2017-05-18.
- ↑ "Cyber-attack: Europol says it was unprecedented in scale". BBC News. 2017-05-13. Retrieved 2017-05-18.
- ↑ "Hackers seize unreleased Disney film, demand 'huge' Bitcoin ransom – report". RT International. Retrieved 2019-06-20.
- ↑ 42.0 42.1 42.2 Hern, Alex (1970-01-01). "Hackers publish private photos from cosmetic surgery clinic | Technology". The Guardian. Retrieved 2017-05-31.
- ↑ "Plastic surgery clinics hacked; 25,000 photos, data online". The Seattle Times. Retrieved 2017-05-31.
- ↑ "Plastic surgery clinics hacked; 25,000 photos, data online". Abcnews.go.com. Archived from the original on 2017-05-31. Retrieved 2017-05-31.
- ↑ "Global ransomware attack causes chaos". BBC News. 27 June 2017. Retrieved 27 June 2017.
- ↑ Constantin, Lucian (2019-04-10). "Group behind TRITON industrial sabotage malware made more victims". CSO Online. Retrieved 2019-07-17.
- ↑ Haselton, Todd (2017-09-07). "Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers". cnbc.com. Retrieved 2017-10-16.
- ↑ Hopkins, Nick (25 September 2017). "Deloitte hit by cyber-attack revealing clients' secret emails". Theguardian.com. Retrieved 16 October 2017.
- ↑ Stack, Liam (2017-12-06). "North Carolina County Refuses to Pay $23,000 Ransom to Hackers". The New York Times. ISSN 0362-4331. Retrieved 2019-06-20.
- ↑ McWhirter, Joseph De Avila and Cameron. "Atlanta Hit With Cyberattack". WSJ. Retrieved 2019-06-20.
- ↑ Press, Associated. "Two Iranians Indicted in Atlanta on Cyber Crime Charges". WSJ. Retrieved 2019-06-20.
- ↑ Ubuntu Community (2018-05-21). "Variant4". Archived from the original on 2018-05-22. Retrieved 2018-05-21.
- ↑ Adams, Ian (2018-05-01). "Wasaga Beach town hall computers seized by hackers". Simcoe.com. Retrieved 2019-06-20.
- ↑ "Lazy FP state restore". Intel. 13 June 2018. Retrieved 18 June 2018.
- ↑ Rondinone, Nicholas. "Hackers Target Connecticut City, Force Officials To Pay $2,000 Ransom". courant.com. Retrieved 2019-06-20.
- ↑ "Feds indict ransomware hackers of Allscripts, others". Modern Healthcare. 2018-11-29. Retrieved 2019-06-20.
- ↑ Cimpanu, Catalin. "Georgia county pays a whopping $400,000 to get rid of a ransomware infection". ZDNet. Retrieved 2019-06-20.
- ↑ Staff, WRGB (2019-03-30). "City of Albany experiences cyber attack". WRGB. Retrieved 2019-06-20.
- ↑ Moench, Mallory (2019-03-31). "Albany cyber attack affecting records, police". Times Union. Retrieved 2019-06-20.
- ↑ "Augusta city offices hit by computer virus". WCSH. Retrieved 2019-06-20.
- ↑ "Hacker wanted more than $100K to restore Maine city's computers". Bangor Daily News. Retrieved 2019-06-20.
- ↑ WITN. "FBI now investigating "RobinHood" ransomware attack on Greenville computers". www.witn.com. Retrieved 2019-06-20.
- ↑ Shalby, Colleen (2019-04-18). "Ryuk malware hacked a county government website. It's been down for 6 days". latimes.com. Retrieved 2019-06-20.
- ↑ Chokshi, Niraj (2019-05-22). "Hackers Are Holding Baltimore Hostage: How They Struck and What's Next". The New York Times. ISSN 0362-4331. Retrieved 2019-06-20.
- ↑ Campbell, Ian Duncan, Colin. "Baltimore city government computer network hit by ransomware attack". baltimoresun.com. Retrieved 2019-06-20.
{{cite web}}
: CS1 maint: multiple names: authors list (link) - ↑ Zhang, Ian Duncan, Christine. "Analysis of ransomware used in Baltimore attack indicates hackers needed 'unfettered access' to city computers". baltimoresun.com. Retrieved 2019-06-20.
{{cite web}}
: CS1 maint: multiple names: authors list (link) - ↑ Kamp, Scott Calvert and Jon. "Hackers Won't Let Up in Their Attack on U.S. Cities". WSJ. Retrieved 2019-06-20.
- ↑ CNN, Faith Karimi. "Florida city to pay $600K ransom to hacker who seized computer systems weeks ago". CNN. Retrieved 2019-06-20.
{{cite web}}
:|last=
has generic name (help) - ↑ "Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum". ZDNET. Retrieved 2023-08-02.
- ↑ "Wattpad data breach exposes account info for millions of users". www.bleepingcomputer.com. Retrieved 2023-08-03.
- ↑ "Chemical distributor pays $4.4 million to DarkSide ransomware". www.bleepingcomputer.com. Retrieved 2023-07-26.
- ↑ "T-Mobile data breach 2021: Here's what it means for securing your data". CNET. Retrieved 2023-09-09.
- ↑ "Cyber attack forces live TV shows off-air on Australia's Channel 9". BitDefender.
- ↑ Ramaswamy, Anita (2022-01-20). "2FA compromise led to $34M Crypto.com hack". TechCrunch. Retrieved 2023-09-09.
- ↑ "CoinEx hack: Compromised private keys led to $70M theft". Cointelegraph. 2023-09-19. Retrieved 2023-12-12.
- ↑ Powell, Olivia (2023-09-18). "CoinEx loses $70 million in cyber attack". Cyber Security Hub. Retrieved 2023-12-12.
- ↑ Haaster, Dirk van (2023-10-17). "Navigating Challenges: CoinEx's Resilient Response to a $70 Million Hack and Lessons for the Crypto World". BeInCrypto. Retrieved 2023-12-12.