SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Target          Attack
 Date     Author      Target   Description                                                       Attack
                                                                                                           Category        Category
                               The Consumerist representatives notify their readers that
                               the site outages experienced in the previous days were
                               caused by a security breach. They do not provide many
Jul 15       ?                                                                                  Unknown   E-Commerce Cyber Crime
                               details regarding the security issue, but as a precaution turn
                               off commenting on all articles and plan to reset all user
                                           1
                               passwords.
                                                                                                            Financial
                               Security researchers from Kasperky Lab and Seculert
                                                                                                          institutions,
                               announce to have discovered a new cyber-espionage
                                                                                                            students,       Cyber
July 17      ?                 campaign targeting victims in the Middle East: more than           APT
                                                                                                             various      Espionage
                               800 victims located in Iran, Israel, Afghanistan and
                                                                     2                                    government
                               elsewhere over the last eight months.
                                                                                                            agencies
                               MapleSoft, makers of mathematical and analytical software
                               such as Maple, reports that they have been investigating a
                                                   3
                               database breach. The breach resulted in the attackers
                               obtaining customer information such as email addresses,
                               first and last names, as well as company and institution
                               names. MapleSoft states that no financial information was                     Industry:
July 17      ?                                                                                  Unknown                   Cyber Crime
                               compromised in this breach. Few days later MapleSoft                          Software
                               customers begin to receive emails pretending to be from
                               the “MapleSoft Security Update Team” that claimed Maple
                               software was vulnerable to attack and a patch was
                               available, redirecting them to websites hosting Blackhole
                                            4
                               Exploit Kit.
                               NullCrew returns with another major data breach. Hackers
                               claimed to have access to the database belong to the South
July 17                                                                                         Unknown Online Services   Cyber Crime
                               Africa's Leading ISP Directory and Community Portal
                                                    5
                               (ispdirectory.co.za)
                               Anonymous’ OpGodFather continues. This time, the
July 17                        hacktivists publish details from the Internet filtering systems  Unknown     Government    Hacktivism
                                                                    6
                               instated by Yemen’s government.
                               An unknown group of hackers breaches a server managed
                               by Proserve, a Dutch hosting services provider. The
                               databases of websites such as Q-Music, The Telegraaf,
Jul 18       ?                                                                                  Unknown       Hosting     Cyber Crime
                               Stedin, and various online stores were accessed and the
                               details of around 800,000 users were stolen as a result of
                                          7
                               the hack.
                                NullCrew turn their attention to Yale University and obtain
                               details of around 1,200 students and members of the staff
                               from the databases of the educational institution and claim
July 18                        that the database they’ve gained access to contains even           SQLi?      Education    Cyber Crime
                               more sensitive information such as social security numbers,
                               names, addresses and phone numbers, although they only
                                                                                         8
                               published usernames, passwords and email addresses.
                               @MidasBank            from      @TeamGhostShell           hacks
                                                                                                             Industry:
July 18                        ITWallStreet.com, an online job source, and dumps around           SQLi?                   Cyber Crime
                                                 9                                                           Recruting
                               50,000 accounts.
                               A hacker called @SirLeakAlot hacks The Himalayan Times
          @SirLeak             (thehimalayantimes.com) and dumps 23,453 accounts (plus
July 18    Alot
                                                                                                   SQLi        News       Cyber Crime
                               9 administrators) including username, phone number and
                                                      10
                               clear text password.
                               Anonymous declares what they call the "iWot", meaning
                               "Internet War On Terror" and hacks Dahabshiil", an
                               international funds transfer company dumping several
July 19                        accounts and threating to publish everything in two months        Finance       SQLi?      Hacktivism
                               if Dahabshill will not come completely clean on its terrorist
                                           11
                               activities. However Dahabshill denies the Anonymous
                                                                 12
                               were responsible for the attack.
                               Catherine Venusto, a former secretary, successfully changed
                               her daughter's grade from an F to an M and her son's grade
          Catherine                                                                            Unlegitimate
July 19 Venusto                from a 98 to a 99 for a total of 110 times between 2011 and                   Education    Cyber Crime
                                                                                                 Access
                               2012. She used the Northwestern Lehigh School District's
                                                                                   3
                               superintendent's password to make the changes
#DoktorBass from Anonymous Australia hacks the Women’s
                       Land Link Africa website (wllaweb.org) and dumps over
                                                                                                    Organization:
July 19                50,000 emails and passwords many of which appear to also       Unknown                       Hacktivism
                                         13                                                          Civil Rights
                       be duplicates. Curiously, after the attack the author
                                                       14
                       apologize for what he made.
                       ZDNET reveals that last year, 25-year-old Brad Stephenson
                       found a loophole in one of Nike's websites and decided to
             Brad                                                                    Vulnerability    Industry:
July 19   Stephenson   take advantage. Over the span of five months, he used                                       Cyber Crime
                                                                                     in Web Site       Clothing
                       accounts meant for professional athletes to steal Nike
                                                            15
                       merchandise worth over $80,000.
                       Nullcrew hacks Netcom, an U.K. ISP and dumps 70 accounts
July 19                with emails, usernames, encrypted passwords, user address         SQLi             ISP      Cyber Crime
                                                                      16
                       and phone numbers and other information.
                       The Japan Finance Ministry announces to have found that
                       some of its computers were infected with a Trojan malware                                      Cyber
July 20       ?                                                                         Trojan      Government
                       from 2010 to 2011 and admitted information may have                                          Espionage
                                      17
                       been leaked.
                       Another cyber attack carried on by @SirLeakAlot. This time
          @SirLeak     the victim is cichlid-forum.com, whose 67,000 accounts are                   Organization:
Jul 21     Alot
                                                                                         SQLi                      Cyber Crime
                       leaked. The leaked data contains usernames, emails and                           Forum
                                                 18
                       encrypted passwords.
                       The official 2012 big dance website (bigdance2012.com) is
                                                                                                    Organization:
Jul 21 5NiP3R          hacked by a hacker called 5NiP3R and as a result                  SQLi                      Cyber Crime
                                                                   19                              Entertainment
                       approximately 7,000 accounts are leaked.
                       Another attack by 5NiP3R. This time the target is
                       london2012rentals.com, a website related to rental services
Jul 21 5NiP3R                                                                            SQLi      Online Services Cyber Crime
                       for the upcoming London 2012 Olympic Games which has
                                                   20
                       5,000 accounts leaked.
                       #Op_Australia goes on and the latest victim is a website
Jul 21                 belonging         to       the     Queensland      government Defacement Government Hacktivism
                                                                                21
                       (workliveplay.qld.gov.au) which is hacked and defaced.
                       A hacker using the twitter handle @lulz_much_lulz
                                                                                                      Industry:
                       (Anonymous – BR) announces a leak of source code (77 Mb)
Jul 22                                                                                Unknown            Adult     Cyber Crime
                       that belongs to a well-known cams website
                                             22                                                    Entertainment
                       (cam4bucks.com).
                       @SirLeakAlot hacks elevatemagazine.com, an e-commerce
          @SirLeak     website dedicated to anti-age products, and dumps nearly
Jul 22     Alot
                                                                                         SQLi      Online Services Cyber Crime
                       700 accounts with emails, usernames and hashed
                                   23
                       passwords.
                       As many as 11 million passwords are posted online more
                       than four months after hackers penetrated the defenses of
July 23       ?                                                                       Unknown      Online Games Cyber Crime
                       Gamigo, a free gaming website based in Germany, according
                                                24
                       to published reports.
                       A purported Iran scientist working for the Atomic Energy
                       Organization of Iran e-mailed an SOS to F-Secure Chief
                       Research Officer Mikko Hypponen, saying the AEOI was
                                                                                     Unspecified                      Cyber
July 23       ?        under a cyber attack capable to shut down the AEOI                           Government
                                                                                       Malware                      Warfare?
                       “automation network” in its Natanz and Fordo facilities and
                       to turn on computer’s volumes to high blasting what
                                                                    25
                       appeared to be ‘Thunderstruck’ by AC/DC.
           Black       A hacker group called Black Tiger Security hacks the website
July 24    Tiger       torontohomestaysearch.com and dumps over 14,000                   SQLi      Online Services Cyber Crime
                                          26
          Security     account details.
                       As part of the so-called #opfuckuganda, #DoktorBass of
                       Anonymous Australia hacks several websites in Uganda,
July 24                                                                                  SQLi           News        Hacktivism
                       among which ntvuganda.co.ug from whom he dumps nearly
                                          27
                       1,500 accounts.
                       After the DDoS to her site, during the previous half, Carly
                       Rae Jepsen has lodged a complaint to the Vancouver Police                      Industry:
July 25       ?                                                                       Unknown                      Cyber Crime
                       Department after allegedly having naked photos stolen from                  Entertainment
                                                    28
                       her personal computer.
                       AAPT, an Australian ISP, confirms the breach claimed by the
                                                                       29
                       Anonymous collective the day before. The hackers
July 26                                                                               Unknown             ISP       Hackivism
                       allegedly stole 40GB of data from AAPT in protest against
                                                                             30
                       proposed new surveillance and data retention laws.
Bloomberg reveals that Chinese hackers, on July 18 last
                            year, were able to harvest the e-mails of the president of
                            the European Union Council, Herman Van Rompuy. Over 10
                            days last July, the hackers returned to the council’s
                                                                                                                          Cyber
July 27                     computers        four    times,     accessing the   internal     Unknown    Government
                                                                                                                        Espionage
                            communications of 11 of the EU’s economic, security and
                            foreign affairs officials. The breach, unreported until now,
                            potentially gave the intruders an unvarnished view of the
                                                              31
                            financial crisis gripping Europe.
                                                                                                        Industry: Oil
                            The same hackers targeted other victims: from oilfield
                                                                                                       Industry: Law
                            services leader Halliburton Co. to Washington law firm
                                                                                                           Firm
                            Wiley Rein LLP; from a Canadian magistrate involved in a                                      Cyber
July 27                                                                                      Unknown
                            sensitive China extradition case to Kolkata-based tobacco                   Government      Espionage
                            and technology conglomerate ITC Ltd. For a total of 20
                                     31                                                                  Industry:
                            victims.
                                                                                                        Technology
                            Korean Police arrest two people for allegedly hacking into
            “Choi”          the network system of KT Corp., Korea's No.2 mobile carrier,
             plus           and selling the data. The 40-year-old suspect, identified only
July 29   unnamed
                                                                                             Unknown   Mobile Carrier Cyber Crime
                            by his family name Choi, and another were accused of
           suspect
                            leaking personal information of about 8.7 million mobile
                                                                             32
                            phone subscribers from February until recently.
                            #DoktorBass hacks luxuryhomesaustralia.com.au and dumps
July 29                     nearly 800 records containing usernames, hashed                   SQLi     Online Services Cyber Crime
                                                                          33
                            passwords and encrypted Credit Card Details.
                            In an explanatory blog post, Dropbox declares that a stolen
                            password was "used to access an employee Dropbox
                            account containing a project document with user email
                            addresses." Hackers apparently started spamming those
July 31      ?                                                                               Unknown   Online Services Cyber Crime
                            addresses, although there’s no indication that user
                            passwords were revealed as well. Some Dropbox customer
                            accounts were hacked too, but this was apparently an
                                              34
                            unrelated matter.




1 http://news.softpedia.com/news/Security-Breach-The-Consumerist-Resets-Passwords-Turns-Off-Commenting-282087.shtml
2 http://packetstormsecurity.org/news/view/21252/New-Madi-Cyber-Espionage-Campaign-Targets-Iran-And-Israel.html
3 http://www.maplesoft.com/security/
4 http://www.zdnet.com/mom-accessed-school-system-110-times-to-change-kids-grades-7000001230/
5 http://www.ehackingnews.com/2012/07/south-africas-leading-isp-directory.html
6 http://news.softpedia.com/news/Anonymous-Hackers-Publish-Details-of-Yemen-s-Internet-Filtering-Systems-281745.shtml
7 http://news.softpedia.com/news/User-Details-of-800-000-Stolen-in-Dutch-ISP-Server-Breach-282083.shtml
8 http://news.softpedia.com/news/1-200-Usernames-Passwords-Leaked-from-Yale-University-281841.shtml
9 http://www.cyberwarnews.info/2012/07/18/50000-accounts-leaked-from-itwallstreet-com-by-midasbank/
10 http://www.cyberwarnews.info/2012/07/18/20000-clear-text-account-details-leaked-from-the-himalayan-times-by-sirleakalot/
11 http://slashdot.org/submission/2166657/anonymousiwot-somaleaks
12 http://www.news.com.au/technology/war-on-terror-anonymous-hacks-middle-eastern-bank/story-e6frfro0-1226430985426
13 http://www.cyberwarnews.info/2012/07/19/womens-land-link-africa-hacked-50000-accounts-leaked-by-doktorbass/
14 http://pastebin.com/5iBwZzn3
15 http://www.zdnet.com/nike-hacker-steals-over-80000-7000001177/
16 http://www.cyberwarnews.info/2012/07/19/uk-isp-netcom-hacked-data-leaked-after-refused-help-by-nullcrew/
17 http://www.japantimes.co.jp/text/nn20120721b7.html
18 http://www.cyberwarnews.info/2012/07/21/67000-accounts-leaked-from-cichlids-forums-by-sirleakalot/
19 http://www.cyberwarnews.info/2012/07/21/big-dance-2012-hacked-7k-accounts-leaked-by-5nip3r/
20 http://www.cyberwarnews.info/2012/07/21/london2012rentals-com-hacked-5000-accounts-leaked-by-5nip3r/
21 http://www.cyberwarnews.info/2012/07/21/another-australian-government-website-hacked-and-defaced-by-op_australia/
22 http://www.cyberwarnews.info/2012/07/22/cam4bucks-hacked-source-leaked-by-lulz_much_lulz/
23 http://ozdc.net/archives.php?aid=2760
24 http://www.forbes.com/sites/andygreenberg/2012/07/23/eight-million-passwords-spilled-from-gaming-site-gamigo-months-

after-breach/
25 http://venturebeat.com/2012/07/23/iran-atomic-organization-malware/
26 http://www.cyberwarnews.info/2012/07/25/toronto-homestay-search-hacked-14000-accounts-leaked/
27 http://www.cyberwarnews.info/2012/07/25/uganda-kaabong-district-website-hacked-accounts-leaked-by-doktorbass/
28 http://nakedsecurity.sophos.com/2012/07/26/carly-rae-jepsen-nude-photos/
29 http://www.theregister.co.uk/2012/07/25/anonymous_names_au_target/
30 http://www.theregister.co.uk/2012/07/26/aapt_confirms_anonymous_hack/
31 http://www.bloomberg.com/news/2012-07-26/china-hackers-hit-eu-point-man-and-d-c-with-byzantine-candor.html
32 http://www.koreatimes.co.kr/www/news/biz/2012/07/113_116143.html
33 http://ozdc.net/archives.php?aid=2824
34 http://blog.dropbox.com/index.php/security-update-new-features/

Mais conteúdo relacionado

Mais procurados

Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
IbuSrikandi
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
 

Mais procurados (15)

Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Testing Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTesting Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche Exposed
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Bi
BiBi
Bi
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Insecure mag-33
Insecure mag-33Insecure mag-33
Insecure mag-33
 

Destaque

IEEE GLOBECOM'14 Industry Program
IEEE GLOBECOM'14 Industry ProgramIEEE GLOBECOM'14 Industry Program
IEEE GLOBECOM'14 Industry Program
IEEE Communications Society
 
Narration test
Narration testNarration test
Narration test
pacinad
 
Teaching presentation rubric
Teaching presentation rubricTeaching presentation rubric
Teaching presentation rubric
carolbillingcwi
 
Flow Drinks, product information
Flow Drinks, product informationFlow Drinks, product information
Flow Drinks, product information
Flow Drinks Oy
 
Toan pt.de085.2011
Toan pt.de085.2011Toan pt.de085.2011
Toan pt.de085.2011
BẢO Hí
 

Destaque (20)

The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
 
Water / Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
Water /  Environmental Engineering Senior Design _ USF 2013 _ Wastewater TeamWater /  Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
Water / Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
 
IEEE GLOBECOM'14 Industry Program
IEEE GLOBECOM'14 Industry ProgramIEEE GLOBECOM'14 Industry Program
IEEE GLOBECOM'14 Industry Program
 
Narration test
Narration testNarration test
Narration test
 
Teaching presentation rubric
Teaching presentation rubricTeaching presentation rubric
Teaching presentation rubric
 
Flow Drinks, product information
Flow Drinks, product informationFlow Drinks, product information
Flow Drinks, product information
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
 
Humanitarian reporting journalists handbook_nepal
Humanitarian reporting journalists handbook_nepalHumanitarian reporting journalists handbook_nepal
Humanitarian reporting journalists handbook_nepal
 
IMPro user experience
IMPro user experienceIMPro user experience
IMPro user experience
 
Unit 1 - The Friendship Page READING
Unit 1 - The Friendship Page READINGUnit 1 - The Friendship Page READING
Unit 1 - The Friendship Page READING
 
456
456456
456
 
Manual diskgen
Manual diskgenManual diskgen
Manual diskgen
 
Aim global clearbook
Aim global clearbookAim global clearbook
Aim global clearbook
 
Toan pt.de085.2011
Toan pt.de085.2011Toan pt.de085.2011
Toan pt.de085.2011
 
2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...
2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...
2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...
 
The Voicemail Script Part 2
The Voicemail Script Part 2The Voicemail Script Part 2
The Voicemail Script Part 2
 
Events in our changing world
Events in our changing worldEvents in our changing world
Events in our changing world
 
Primary EFL Reading Competition
Primary EFL Reading CompetitionPrimary EFL Reading Competition
Primary EFL Reading Competition
 
My friend past simple
My friend past simpleMy friend past simple
My friend past simple
 
Ledivani edition1.0
Ledivani edition1.0Ledivani edition1.0
Ledivani edition1.0
 

Semelhante a July 2012 cyber attacks timeline part II

Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
tidwellveronique
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
jmiham
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
shericehewat
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
arri2009av
 

Semelhante a July 2012 cyber attacks timeline part II (20)

Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
Cybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfCybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdf
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
 
Final Assignment.pptx
Final Assignment.pptxFinal Assignment.pptx
Final Assignment.pptx
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptx
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

July 2012 cyber attacks timeline part II

  • 1. Target Attack Date Author Target Description Attack Category Category The Consumerist representatives notify their readers that the site outages experienced in the previous days were caused by a security breach. They do not provide many Jul 15 ? Unknown E-Commerce Cyber Crime details regarding the security issue, but as a precaution turn off commenting on all articles and plan to reset all user 1 passwords. Financial Security researchers from Kasperky Lab and Seculert institutions, announce to have discovered a new cyber-espionage students, Cyber July 17 ? campaign targeting victims in the Middle East: more than APT various Espionage 800 victims located in Iran, Israel, Afghanistan and 2 government elsewhere over the last eight months. agencies MapleSoft, makers of mathematical and analytical software such as Maple, reports that they have been investigating a 3 database breach. The breach resulted in the attackers obtaining customer information such as email addresses, first and last names, as well as company and institution names. MapleSoft states that no financial information was Industry: July 17 ? Unknown Cyber Crime compromised in this breach. Few days later MapleSoft Software customers begin to receive emails pretending to be from the “MapleSoft Security Update Team” that claimed Maple software was vulnerable to attack and a patch was available, redirecting them to websites hosting Blackhole 4 Exploit Kit. NullCrew returns with another major data breach. Hackers claimed to have access to the database belong to the South July 17 Unknown Online Services Cyber Crime Africa's Leading ISP Directory and Community Portal 5 (ispdirectory.co.za) Anonymous’ OpGodFather continues. This time, the July 17 hacktivists publish details from the Internet filtering systems Unknown Government Hacktivism 6 instated by Yemen’s government. An unknown group of hackers breaches a server managed by Proserve, a Dutch hosting services provider. The databases of websites such as Q-Music, The Telegraaf, Jul 18 ? Unknown Hosting Cyber Crime Stedin, and various online stores were accessed and the details of around 800,000 users were stolen as a result of 7 the hack. NullCrew turn their attention to Yale University and obtain details of around 1,200 students and members of the staff from the databases of the educational institution and claim July 18 that the database they’ve gained access to contains even SQLi? Education Cyber Crime more sensitive information such as social security numbers, names, addresses and phone numbers, although they only 8 published usernames, passwords and email addresses. @MidasBank from @TeamGhostShell hacks Industry: July 18 ITWallStreet.com, an online job source, and dumps around SQLi? Cyber Crime 9 Recruting 50,000 accounts. A hacker called @SirLeakAlot hacks The Himalayan Times @SirLeak (thehimalayantimes.com) and dumps 23,453 accounts (plus July 18 Alot SQLi News Cyber Crime 9 administrators) including username, phone number and 10 clear text password. Anonymous declares what they call the "iWot", meaning "Internet War On Terror" and hacks Dahabshiil", an international funds transfer company dumping several July 19 accounts and threating to publish everything in two months Finance SQLi? Hacktivism if Dahabshill will not come completely clean on its terrorist 11 activities. However Dahabshill denies the Anonymous 12 were responsible for the attack. Catherine Venusto, a former secretary, successfully changed her daughter's grade from an F to an M and her son's grade Catherine Unlegitimate July 19 Venusto from a 98 to a 99 for a total of 110 times between 2011 and Education Cyber Crime Access 2012. She used the Northwestern Lehigh School District's 3 superintendent's password to make the changes
  • 2. #DoktorBass from Anonymous Australia hacks the Women’s Land Link Africa website (wllaweb.org) and dumps over Organization: July 19 50,000 emails and passwords many of which appear to also Unknown Hacktivism 13 Civil Rights be duplicates. Curiously, after the attack the author 14 apologize for what he made. ZDNET reveals that last year, 25-year-old Brad Stephenson found a loophole in one of Nike's websites and decided to Brad Vulnerability Industry: July 19 Stephenson take advantage. Over the span of five months, he used Cyber Crime in Web Site Clothing accounts meant for professional athletes to steal Nike 15 merchandise worth over $80,000. Nullcrew hacks Netcom, an U.K. ISP and dumps 70 accounts July 19 with emails, usernames, encrypted passwords, user address SQLi ISP Cyber Crime 16 and phone numbers and other information. The Japan Finance Ministry announces to have found that some of its computers were infected with a Trojan malware Cyber July 20 ? Trojan Government from 2010 to 2011 and admitted information may have Espionage 17 been leaked. Another cyber attack carried on by @SirLeakAlot. This time @SirLeak the victim is cichlid-forum.com, whose 67,000 accounts are Organization: Jul 21 Alot SQLi Cyber Crime leaked. The leaked data contains usernames, emails and Forum 18 encrypted passwords. The official 2012 big dance website (bigdance2012.com) is Organization: Jul 21 5NiP3R hacked by a hacker called 5NiP3R and as a result SQLi Cyber Crime 19 Entertainment approximately 7,000 accounts are leaked. Another attack by 5NiP3R. This time the target is london2012rentals.com, a website related to rental services Jul 21 5NiP3R SQLi Online Services Cyber Crime for the upcoming London 2012 Olympic Games which has 20 5,000 accounts leaked. #Op_Australia goes on and the latest victim is a website Jul 21 belonging to the Queensland government Defacement Government Hacktivism 21 (workliveplay.qld.gov.au) which is hacked and defaced. A hacker using the twitter handle @lulz_much_lulz Industry: (Anonymous – BR) announces a leak of source code (77 Mb) Jul 22 Unknown Adult Cyber Crime that belongs to a well-known cams website 22 Entertainment (cam4bucks.com). @SirLeakAlot hacks elevatemagazine.com, an e-commerce @SirLeak website dedicated to anti-age products, and dumps nearly Jul 22 Alot SQLi Online Services Cyber Crime 700 accounts with emails, usernames and hashed 23 passwords. As many as 11 million passwords are posted online more than four months after hackers penetrated the defenses of July 23 ? Unknown Online Games Cyber Crime Gamigo, a free gaming website based in Germany, according 24 to published reports. A purported Iran scientist working for the Atomic Energy Organization of Iran e-mailed an SOS to F-Secure Chief Research Officer Mikko Hypponen, saying the AEOI was Unspecified Cyber July 23 ? under a cyber attack capable to shut down the AEOI Government Malware Warfare? “automation network” in its Natanz and Fordo facilities and to turn on computer’s volumes to high blasting what 25 appeared to be ‘Thunderstruck’ by AC/DC. Black A hacker group called Black Tiger Security hacks the website July 24 Tiger torontohomestaysearch.com and dumps over 14,000 SQLi Online Services Cyber Crime 26 Security account details. As part of the so-called #opfuckuganda, #DoktorBass of Anonymous Australia hacks several websites in Uganda, July 24 SQLi News Hacktivism among which ntvuganda.co.ug from whom he dumps nearly 27 1,500 accounts. After the DDoS to her site, during the previous half, Carly Rae Jepsen has lodged a complaint to the Vancouver Police Industry: July 25 ? Unknown Cyber Crime Department after allegedly having naked photos stolen from Entertainment 28 her personal computer. AAPT, an Australian ISP, confirms the breach claimed by the 29 Anonymous collective the day before. The hackers July 26 Unknown ISP Hackivism allegedly stole 40GB of data from AAPT in protest against 30 proposed new surveillance and data retention laws.
  • 3. Bloomberg reveals that Chinese hackers, on July 18 last year, were able to harvest the e-mails of the president of the European Union Council, Herman Van Rompuy. Over 10 days last July, the hackers returned to the council’s Cyber July 27 computers four times, accessing the internal Unknown Government Espionage communications of 11 of the EU’s economic, security and foreign affairs officials. The breach, unreported until now, potentially gave the intruders an unvarnished view of the 31 financial crisis gripping Europe. Industry: Oil The same hackers targeted other victims: from oilfield Industry: Law services leader Halliburton Co. to Washington law firm Firm Wiley Rein LLP; from a Canadian magistrate involved in a Cyber July 27 Unknown sensitive China extradition case to Kolkata-based tobacco Government Espionage and technology conglomerate ITC Ltd. For a total of 20 31 Industry: victims. Technology Korean Police arrest two people for allegedly hacking into “Choi” the network system of KT Corp., Korea's No.2 mobile carrier, plus and selling the data. The 40-year-old suspect, identified only July 29 unnamed Unknown Mobile Carrier Cyber Crime by his family name Choi, and another were accused of suspect leaking personal information of about 8.7 million mobile 32 phone subscribers from February until recently. #DoktorBass hacks luxuryhomesaustralia.com.au and dumps July 29 nearly 800 records containing usernames, hashed SQLi Online Services Cyber Crime 33 passwords and encrypted Credit Card Details. In an explanatory blog post, Dropbox declares that a stolen password was "used to access an employee Dropbox account containing a project document with user email addresses." Hackers apparently started spamming those July 31 ? Unknown Online Services Cyber Crime addresses, although there’s no indication that user passwords were revealed as well. Some Dropbox customer accounts were hacked too, but this was apparently an 34 unrelated matter. 1 http://news.softpedia.com/news/Security-Breach-The-Consumerist-Resets-Passwords-Turns-Off-Commenting-282087.shtml 2 http://packetstormsecurity.org/news/view/21252/New-Madi-Cyber-Espionage-Campaign-Targets-Iran-And-Israel.html 3 http://www.maplesoft.com/security/ 4 http://www.zdnet.com/mom-accessed-school-system-110-times-to-change-kids-grades-7000001230/ 5 http://www.ehackingnews.com/2012/07/south-africas-leading-isp-directory.html 6 http://news.softpedia.com/news/Anonymous-Hackers-Publish-Details-of-Yemen-s-Internet-Filtering-Systems-281745.shtml 7 http://news.softpedia.com/news/User-Details-of-800-000-Stolen-in-Dutch-ISP-Server-Breach-282083.shtml 8 http://news.softpedia.com/news/1-200-Usernames-Passwords-Leaked-from-Yale-University-281841.shtml 9 http://www.cyberwarnews.info/2012/07/18/50000-accounts-leaked-from-itwallstreet-com-by-midasbank/ 10 http://www.cyberwarnews.info/2012/07/18/20000-clear-text-account-details-leaked-from-the-himalayan-times-by-sirleakalot/ 11 http://slashdot.org/submission/2166657/anonymousiwot-somaleaks 12 http://www.news.com.au/technology/war-on-terror-anonymous-hacks-middle-eastern-bank/story-e6frfro0-1226430985426 13 http://www.cyberwarnews.info/2012/07/19/womens-land-link-africa-hacked-50000-accounts-leaked-by-doktorbass/ 14 http://pastebin.com/5iBwZzn3 15 http://www.zdnet.com/nike-hacker-steals-over-80000-7000001177/ 16 http://www.cyberwarnews.info/2012/07/19/uk-isp-netcom-hacked-data-leaked-after-refused-help-by-nullcrew/ 17 http://www.japantimes.co.jp/text/nn20120721b7.html 18 http://www.cyberwarnews.info/2012/07/21/67000-accounts-leaked-from-cichlids-forums-by-sirleakalot/ 19 http://www.cyberwarnews.info/2012/07/21/big-dance-2012-hacked-7k-accounts-leaked-by-5nip3r/ 20 http://www.cyberwarnews.info/2012/07/21/london2012rentals-com-hacked-5000-accounts-leaked-by-5nip3r/ 21 http://www.cyberwarnews.info/2012/07/21/another-australian-government-website-hacked-and-defaced-by-op_australia/ 22 http://www.cyberwarnews.info/2012/07/22/cam4bucks-hacked-source-leaked-by-lulz_much_lulz/ 23 http://ozdc.net/archives.php?aid=2760 24 http://www.forbes.com/sites/andygreenberg/2012/07/23/eight-million-passwords-spilled-from-gaming-site-gamigo-months- after-breach/ 25 http://venturebeat.com/2012/07/23/iran-atomic-organization-malware/ 26 http://www.cyberwarnews.info/2012/07/25/toronto-homestay-search-hacked-14000-accounts-leaked/
  • 4. 27 http://www.cyberwarnews.info/2012/07/25/uganda-kaabong-district-website-hacked-accounts-leaked-by-doktorbass/ 28 http://nakedsecurity.sophos.com/2012/07/26/carly-rae-jepsen-nude-photos/ 29 http://www.theregister.co.uk/2012/07/25/anonymous_names_au_target/ 30 http://www.theregister.co.uk/2012/07/26/aapt_confirms_anonymous_hack/ 31 http://www.bloomberg.com/news/2012-07-26/china-hackers-hit-eu-point-man-and-d-c-with-byzantine-candor.html 32 http://www.koreatimes.co.kr/www/news/biz/2012/07/113_116143.html 33 http://ozdc.net/archives.php?aid=2824 34 http://blog.dropbox.com/index.php/security-update-new-features/