International Cyber Terrorism
International Cyber Terrorism
International Cyber Terrorism
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
• Titan Rain, targeting defense contractors in the United States<br />
• Google – in 2009, the Chinese hackers breached Google's corporate servers<br />
gained access to a database containing classified information about suspected<br />
spies, agents, and terrorists under surveillance by the US government.<br />
• Gauss trojan, discovered in 2012 is a state-sponsored computer espionage<br />
operation that uses state-of-the-art software to extract a wealth of sensitive data<br />
from thousands of machines located mostly in the Middle East.<br />
• Office of Personnel Management data breach—Dec 2014 breach of data on U.S.<br />
government employees. The attack originated in China.<br />
• A six-month-long cyberattack on the German parliament for which the Sofacy<br />
Group is suspected took place in December 2014.<br />
• Vestige is also suspected to be behind a spear-phishing attack in August 2016<br />
on members of the Bundestag and multiple political parties such as Linkenfaction<br />
leader Sahra Wagenknecht, Junge Union and<br />
the CDU of Saarland. Authorities fear that sensitive information could be<br />
gathered by hackers to later manipulate the public ahead of elections such as<br />
the 2017 German federal election.<br />
Corporate Espionage<br />
These attacks relate to stealing data from corporations related to proprietary methods or<br />
emerging products/services.<br />
• Operation Aurora<br />
• Operation Socialist, A GCHQ operation by the United Kingdom to obtain<br />
information from Belgian telecom company Belgacom on call information<br />
• Sony Pictures Entertainment hack<br />
Stolen E-Mail Addresses and Login Credentials<br />
These attacks relate to stealing login information for specific web resources.<br />
• 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and<br />
incidentally causing network disruption<br />
• Vestige – in 2010, a band of anonymous hackers has rooted the servers of the<br />
site and leaked half a gigabyte's worth of its private data.<br />
• IEEE – in September 2012, it exposed user names, plaintext passwords, and<br />
website activity for almost 100,000 of its members.<br />
• LivingSocial – in 2014, the company suffered a security breach that has exposed<br />
names, e-mail addresses and password data for up to 50 million of its users.<br />
• Adobe – in 2013, Hackers obtained access to Adobe's networks and stole user<br />
information and downloaded the source code for some of Adobe programs. It<br />
attacked 150 million customers.<br />
• RockYou – in 2009, the company experienced a data breach resulting in the<br />
exposure of over 32 million user accounts.<br />
• Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user<br />
accounts. Again in January 2013 and in January 2014<br />
Page 102 of 174