请输入您要查询的百科知识:

 

词条 List of cyberattacks
释义

  1. Indiscriminate attacks

  2. Destructive attacks

  3. Cyberwarfare

  4. Government espionage

  5. Corporate espionage

  6. Stolen e-mail addresses and login credentials

  7. Stolen credit card and financial data

  8. Stolen medical-related data

  9. Hacktivism

  10. See also

  11. References

A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.

This article contains a list of cyberattacks.

Indiscriminate attacks

These attacks are wide-ranging, global and do not seem to discriminate among governments and companies.

  • Operation Shady RAT
  • World of Hell
  • Red October, discovered in 2012, was reportedly operating worldwide for up to five years prior to discovery, transmitting information ranging from diplomatic secrets to personal information, including from mobile devices.[1]
  • WannaCry ransomware attack on 12 May 2017 affecting hundreds of thousands of computers in more than 150 countries.[2]
  • 2017 Petya cyberattack

Destructive attacks

These attacks relate to inflicting damage on specific organizations.

  • Great Hacker War, and purported "gang war" in cyberspace
  • LulzRaft, hacker group known for a low impact attack in Canada
  • Operation Ababil, conducted against American financial institutions
  • TV5Monde April 2015 cyberattack
  • Vulcanbot
  • Shamoon, a modular computer virus, was used in 2012 in an attack on 30,000 Saudi Aramco workstations, causing the company to spend a week restoring their services.[3][4]
  • Wiper – in December 2011, the malware successfully erased information on hard disks at the Oil Ministry's headquarters.[5][6]
  • Stuxnet - A malicious computer worm believed to be a jointly built American-Israeli cyber weapon. Designed to sabotage Iran's nuclear program with what would seem like a long series of unfortunate accidents .

Cyberwarfare

{{further information|Cyberwarfare}}

These are politically motivated destructive attacks aimed at sabotage and espionage.

  • 2007 cyberattacks on Estonia, wide-ranging attack targeting government and commercial institutions
  • 2010 cyberattacks on Burma, related to the 2010 Myanmar general election
  • 2010 Japan–South Korea cyberwarfare
  • 2013 Singapore cyberattacks, attack by Anonymous "in response to web censorship regulations in the country, specifically on news outlets"
  • #OpIsrael, a broad "anti-Israel" attack
  • Cyberattacks during the Russo-Georgian War
  • July 2009 cyberattacks, against South Korea and the United States
  • Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States
  • Democratic National Committee cyber attacks, against the Democratic National Committee by the Russian-sponsored cyber-espionage groups Cozy Bear and Fancy Bear, possibly to assist Donald Trump's 2016 presidential campaign.[7]

Government espionage

These attacks relate to stealing information from/about government organizations.

  • 2008 cyberattack on United States, cyber espionage targeting U.S. military computers
  • Cyber attack during the Paris G20 Summit, targeting G20-related documents including financial information
  • GhostNet
  • Moonlight Maze
  • Operation Newscaster, cyber espionage covert operation allegedly conducted by Iran
  • Operation Cleaver, cyberwarfare covert operation allegedly conducted by Iran
  • Shadow Network, attacks on India by China
  • Titan Rain, targeting defense contractors in the United States
  • Google – in 2009, the Chinese hackers breached Google's corporate servers gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government.[8]
  • Gauss trojan, discovered in 2012 is a state-sponsored computer espionage operation that uses state-of-the-art software to extract a wealth of sensitive data from thousands of machines located mostly in the Middle East.[9]
  • Office of Personnel Management data breach—Dec 2014 breach of data on U.S. government employees
  • A six-month-long cyberattack on the German parliament for which the Sofacy Group is suspected took place in December 2014.[10]
  • Vestige is also suspected to be behind a spearphishing attack in August 2016 on members of the Bundestag and multiple political parties such as Linken-faction leader Sahra Wagenknecht, Junge Union and the CDU of Saarland.[11][12][13][14] Authorities fear that sensitive information could be gathered by hackers to later manipulate the public ahead of elections such as the 2017 German federal election.[11]

Corporate espionage

These attacks relate to stealing data from corporations related to proprietary methods or emerging products/services.

  • Operation Aurora
  • Operation Socialist, A GCHQ operation by the United Kingdom to obtain information from Belgian telecom company Belgacom on call information
  • Sony Pictures Entertainment hack

Stolen e-mail addresses and login credentials

These attacks relate to stealing login information for specific web resources.

  • 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally causing network disruption
  • Vestige – in 2010, a band of anonymous hackers has rooted the servers of the site and leaked half a gigabyte's worth of its private data.[15]
  • IEEE – in September 2012, it exposed user names, plaintext passwords, and website activity for almost 100,000 of its members.[16]
  • LivingSocial – in 2014, the company suffered a security breach that has exposed names, e-mail addresses and password data for up to 50 million of its users.[17]
  • Adobe – in 2013, Hackers obtained access to Adobe's networks and stole user information and downloaded the source code for some of Adobe programs.[18] It attacked 150 million customers.[18]
  • RockYou – in 2009, the company experienced a data breach resulting in the exposure of over 32 million user accounts.
  • Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user accounts.[19] Again in January 2013[20] and in January 2014[21]

Stolen credit card and financial data

  • 2017 Equifax data breach- In 2017, Equifax Inc. announced that a cyber-security breach occurred between May to mid July of that year. Cyber criminals had accessed approximately 145.5 million U.S. Equifax consumers' personal data, including their full names, Social Security numbers, credit card information, birth dates, addresses, and, in some cases, driver's license numbers.[22]
  • 2016 Indian Banks data breach - It was estimated 3.2 million debit cards were compromised. Major Indian banks- SBI, HDFC Bank, ICICI, YES Bank and Axis Bank were among the worst hit.[23]
  • 2014 JPMorgan Chase data breach, allegedly conducted by a group of Russian hackers
  • Goodwill Industries – in September 2014, the company suffered from a credit card data breach that affected the charitable retailer's stores in at least 21 states. Another two retailers were affected.[24][25]
  • Home Depot – in September 2014, the cybercriminals that compromised Home Depot's network and installed malware on the home-supply company's point-of-sale systems likely stole information on 56 million payment cards.[26]
  • StarDust – in 2013, the botnet compromised 20,000 cards in active campaign hitting US merchants.[27]
  • Target – in 2013, approximately 40 million credit and debit card accounts were impacted in a credit card breach.[28][29][30] According to another estimate, it compromised as many as 110 million Target customers.[31]
  • VISA and MasterCard – in 2012, they warned card-issuing banks that a third-party payments processor suffered a security breach, affecting up to 10 million credit cards.[32][33]
  • Subway – in 2012, two Romanian men admitted to participating in an international conspiracy that hacked into credit-card payment terminals at more than 150 Subway restaurant franchises and stole data for more than 146,000 accounts.[34]
  • MasterCard – in 2005, the company announced that up to 40 million cardholders may have had account information stolen due to one of its payment processors being hacked.[35][36][37][38]

Stolen medical-related data

  • By May, three healthcare payer organizations had been attacked in the United States in 2014 and 2015: Anthem, Premera Blue Cross and CareFirst. The three attacks together netted information on more than 91 million people.[39]

Hacktivism

{{main article|Hacktivism#Notable hacktivist events}}{{see also|Timeline of events associated with Anonymous}}

See also

  • List of data breaches
  • Timeline of computer security hacker history

References

1. ^{{cite web |url=https://arstechnica.com/security/2013/01/red-october-computer-espionage-network-may-have-stolen-terabytes-of-data/ |title=Massive espionage malware targeting governments undetected for 5 years |newspaper=Ars Technica |date= January 14, 2013 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
2. ^{{Cite news|url=https://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday|title=WannaCry Ransomware: What We Know Monday|work=NPR.org|access-date=2017-05-15|language=en}}
3. ^{{cite news|title=Cyberattack On Saudi Firm Disquiets U.S.|date=October 24, 2012|newspaper=New York Times|accessdate=October 24, 2012 |last=Perloth |first=Nicole|pages=A1 |url=https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html}}
4. ^{{cite web |url=https://arstechnica.com/security/2012/08/shamoon-malware-attack/ |title=Mystery malware wreaks havoc on energy sector computers |newspaper=Ars Technica |date= August 16, 2012 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
5. ^{{cite web |url=https://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html |title=Iranian Oil Sites Go Offline Amid Cyberattack |newspaper=The New York Times |date= April 23, 2012 |author= |accessdate=November 8, 2014}}
6. ^{{cite web |url=https://arstechnica.com/security/2012/08/wiper-malware-stuxnet-duqu/ |title=The perfect crime: Is Wiper malware connected to Stuxnet, Duqu? |newspaper=Ars Technica |date= August 29, 2012 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
7. ^{{Cite web|url=https://www.washingtonpost.com/world/national-security/obama-orders-review-of-russian-hacking-during-presidential-campaign/2016/12/09/31d6b300-be2a-11e6-94ac-3d324840106c_story.html|title=Secret CIA assessment says Russia was trying to help Trump win White House|last=https://www.facebook.com/ellennakashimapost|last2=https://www.facebook.com/profile.php?id=729171040|website=Washington Post|language=en|access-date=2019-04-01}}
8. ^{{cite web |url=https://arstechnica.com/security/2013/05/chinese-hackers-who-breached-google-reportedly-targeted-classified-data/ |title=Chinese hackers who breached Google reportedly targeted classified data |newspaper=Ars Technica |date= May 21, 2013 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
9. ^{{cite web |url=https://arstechnica.com/security/2012/08/nation-sponsored-malware-has-mystery-warhead/ |title=Nation-sponsored malware with Stuxnet ties has mystery warhead |newspaper=Ars Technica |date= August 9, 2012 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
10. ^{{cite news|title=Russian Hackers Suspected In Cyberattack On German Parliament|url=http://www.lse.co.uk/AllNews.asp?code=kwdwehme&headline=Russian_Hackers_Suspected_In_Cyberattack_On_German_Parliament|work=London South East|publisher=Alliance News|date=June 19, 2015}}
11. ^{{cite web|title=Hackers lurking, parliamentarians told|url=http://www.dw.com/en/hackers-lurking-parliamentarians-told/a-19564630|publisher=Deutsche Welle|accessdate=21 September 2016}}
12. ^{{cite web|title=Hackerangriff auf deutsche Parteien|url=http://www.sueddeutsche.de/politik/bundesregierung-ist-alarmiert-hackerangriff-aufdeutsche-parteien-1.3170347|publisher=Süddeutsche Zeitung|accessdate=21 September 2016}}
13. ^{{cite web|last1=Holland|first1=Martin|title=Angeblich versuchter Hackerangriff auf Bundestag und Parteien|url=https://www.heise.de/newsticker/meldung/Angeblich-versuchter-Hackerangriff-auf-Bundestag-und-Parteien-3328265.html|publisher=Heise|accessdate=21 September 2016}}
14. ^{{cite web|title="Wir haben Fingerabdrücke"|url=http://www.faz.net/aktuell/politik/inland/hackerangriffe-auf-politiker-wir-haben-fingerabdruecke-14445655.html|publisher=Frankfurter Allgemeine|accessdate=21 September 2016}}
15. ^[https://www.theregister.co.uk/2010/12/13/gawker_hacked/ Gawker rooted by anonymous hackers], December 13, 2010, Dan Goodin, The Register, retrieved at 2014-11-08
16. ^{{cite web |url=https://arstechnica.com/security/2012/09/ieee-trade-group-exposes-100000-password-for-google-apple-engineers/ |title=Trade group exposes 100,000 passwords for Google, Apple engineers |newspaper=Ars Technica |date= September 25, 2012 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
17. ^{{cite web |url=https://arstechnica.com/security/2013/04/why-livingsocials-50-million-password-breach-is-graver-than-you-may-think/ |title=Why LivingSocial's 50-million password breach is graver than you may think |newspaper=Ars Technica |date= April 27, 2013 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
18. ^{{cite web |url=https://www.yahoo.com/tech/7-biggest-computer-hacks-152744364.html |title=7 biggest hacks |last=Howley |first=Daniel |date=July 1, 2016 |website=Yahoo Tech |access-date=1 July 2016}}
19. ^{{cite web |url=https://arstechnica.com/security/2012/07/yahoo-service-hacked/ |title=Hackers expose 453,000 credentials allegedly taken from Yahoo service (Updated) |newspaper=Ars Technica |date= July 12, 2012 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
20. ^{{cite web |url=https://arstechnica.com/security/2013/01/how-yahoo-allowed-hackers-to-hijack-my-neighbors-e-mail-account/ |title=How Yahoo allowed hackers to hijack my neighbor's e-mail account (Updated) |newspaper=Ars Technica |date= January 31, 2013 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
21. ^{{cite web |url=https://arstechnica.com/security/2014/01/mass-hack-attack-on-yahoo-mail-accounts-prompts-password-reset/ |title=Mass hack attack on Yahoo Mail accounts prompts password reset |newspaper=Ars Technica |date= January 31, 2014 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
22. ^{{cite web|title=Equifax data breach|url=https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do|website=Federal Trade Commission|accessdate=December 10, 2017}}
23. ^{{cite web | url=http://economictimes.indiatimes.com/industry/banking/finance/banking/3-2-million-debit-cards-compromised-sbi-hdfc-bank-icici-yes-bank-and-axis-worst-hit/articleshow/54945561.cms | title=3.2 million debit cards compromised; SBI, HDFC Bank, ICICI, YES Bank and Axis worst hit | publisher=The Economic Times | date=20 October 2016 | accessdate=20 October 2016}}
24. ^{{cite web|url=https://arstechnica.com/security/2014/09/credit-card-data-theft-hit-at-least-three-retailers-lasted-18-months/|title=Credit card data theft hit at least three retailers, lasted 18 months|last=Gallagher|first=Sean|date=September 18, 2014|accessdate=November 8, 2014|newspaper=Ars Technica}}
25. ^http://krebsonsecurity.com/2014/07/banks-card-breach-at-goodwill-industries/
26. ^{{cite web|url=https://arstechnica.com/security/2014/09/home-depot-estimates-data-on-56-million-cards-stolen-by-cybercrimnals/|title=Home Depot estimates data on 56 million cards stolen by cybercriminals|last=Lemos|first=Robert|date=September 19, 2014|accessdate=November 30, 2014|newspaper=Ars Technica}}
27. ^{{cite web |url=https://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/ |title=Credit card fraud comes of age with advances in point-of-sale botnets |newspaper=Ars Technica |date= December 4, 2013 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
28. ^{{cite web |url=https://arstechnica.com/security/2013/12/secret-service-investigating-alleged-credit-card-breach-at-target/ |title=Secret Service investigating massive credit card breach at Target (Updated) |newspaper=Ars Technica |date= December 19, 2013 |first=Cyrus|last=Farivar |accessdate=November 8, 2014}}
29. ^{{cite web |url=https://arstechnica.com/tech-policy/2013/12/cards-stolen-in-massive-target-breach-flood-underground-card-shops/ |title=Cards stolen in massive Target breach flood underground "card shops" |newspaper=Ars Technica |date= December 20, 2013 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
30. ^{{cite web |url=https://arstechnica.com/security/2014/02/target-hackers-reportedly-used-credentials-stolen-from-ventilation-contractor/ |title=Target hackers reportedly used credentials stolen from ventilation contractor |newspaper=Ars Technica |date= February 5, 2014 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
31. ^{{cite web |url=https://arstechnica.com/security/2014/01/point-of-sale-malware-infecting-target-found-hiding-in-plain-sight/ |title=Point-of-sale malware infecting Target found hiding in plain sight |newspaper=Ars Technica |date= January 16, 2014 |first=Dan|last=Goodin |accessdate=November 8, 2014}}
32. ^{{cite web|url=https://arstechnica.com/business/2012/04/frequently-asked-questions-about-a-hack-that-may-affect-10-million-credit-cards/|title=After the hack: FAQ for breach affecting up to 10 million credit cards|last=Goodin|first=Dan|date=April 1, 2012|accessdate=November 8, 2014|newspaper=Ars Technica}}
33. ^{{cite web|url=https://arstechnica.com/business/2012/03/massive-credit-card-breach-reportedly-hits-visa-mastercard/|title="Major" credit-card breach hits Visa, MasterCard (Updated)|last=Goodin|first=Dan|date=March 30, 2012|accessdate=November 8, 2014|newspaper=Ars Technica}}
34. ^{{cite web|url=https://arstechnica.com/security/2012/09/romanians-cop-to-10-million-hacking-spree/|title=Two men admit to $10 million hacking spree on Subway sandwich shops|last=Goodin|first=Dan|date=September 18, 2012|accessdate=November 8, 2014|newspaper=Ars Technica}}
35. ^{{cite web|url=https://arstechnica.com/uncategorized/2005/06/5015-2/|title=CardSystems should not have retained stolen customer data|last=Bangeman|first=Eric|date=June 20, 2005|accessdate=November 8, 2014|newspaper=Ars Technica}}
36. ^{{cite web|url=https://www.nytimes.com/2005/06/20/technology/20credit.html?_r=0|title=Lost Credit Data Improperly Kept, Company Admits|author=|date=June 20, 2005|accessdate=November 8, 2014|newspaper=The New York Times}}
37. ^{{cite web|url=https://arstechnica.com/uncategorized/2005/06/5031-2/|title=Scope of CardSystems-caused credit card data theft broadens|last=Bangeman|first=Eric|date=June 23, 2005|accessdate=November 8, 2014|newspaper=Ars Technica}}
38. ^{{cite web|url=https://arstechnica.com/uncategorized/2005/07/5129-2/|title=Visa bars CardSystems from handling any more transactions.|author=Jonathan M. Gitlin|date=July 22, 2005|accessdate=November 8, 2014|newspaper=Ars Technica}}
39. ^{{cite news |title=Cyberattack affects 1.1 million CareFirst customers |date=20 May 2015 |author=Dance, Scott |work=Baltim. Sun |url=http://www.baltimoresun.com/health/bs-bz-carefirst-data-breach-20150520-story.html }}
{{DEFAULTSORT:cyberattacks, List of}}

1 : Cyberattacks

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/22 13:42:19