25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Titan Rain, targeting defense contractors in the United States<br />

• Google – in 2009, the Chinese hackers breached Google's corporate servers<br />

gained access to a database containing classified information about suspected<br />

spies, agents, and terrorists under surveillance by the US government.<br />

• Gauss trojan, discovered in 2012 is a state-sponsored computer espionage<br />

operation that uses state-of-the-art software to extract a wealth of sensitive data<br />

from thousands of machines located mostly in the Middle East.<br />

• Office of Personnel Management data breach—Dec 2014 breach of data on U.S.<br />

government employees. The attack originated in China.<br />

• A six-month-long cyberattack on the German parliament for which the Sofacy<br />

Group is suspected took place in December 2014.<br />

• Vestige is also suspected to be behind a spear-phishing attack in August 2016<br />

on members of the Bundestag and multiple political parties such as Linkenfaction<br />

leader Sahra Wagenknecht, Junge Union and<br />

the CDU of Saarland. Authorities fear that sensitive information could be<br />

gathered by hackers to later manipulate the public ahead of elections such as<br />

the 2017 German federal election.<br />

Corporate Espionage<br />

These attacks relate to stealing data from corporations related to proprietary methods or<br />

emerging products/services.<br />

• Operation Aurora<br />

• Operation Socialist, A GCHQ operation by the United Kingdom to obtain<br />

information from Belgian telecom company Belgacom on call information<br />

• Sony Pictures Entertainment hack<br />

Stolen E-Mail Addresses and Login Credentials<br />

These attacks relate to stealing login information for specific web resources.<br />

• 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and<br />

incidentally causing network disruption<br />

• Vestige – in 2010, a band of anonymous hackers has rooted the servers of the<br />

site and leaked half a gigabyte's worth of its private data.<br />

• IEEE – in September 2012, it exposed user names, plaintext passwords, and<br />

website activity for almost 100,000 of its members.<br />

• LivingSocial – in 2014, the company suffered a security breach that has exposed<br />

names, e-mail addresses and password data for up to 50 million of its users.<br />

• Adobe – in 2013, Hackers obtained access to Adobe's networks and stole user<br />

information and downloaded the source code for some of Adobe programs. It<br />

attacked 150 million customers.<br />

• RockYou – in 2009, the company experienced a data breach resulting in the<br />

exposure of over 32 million user accounts.<br />

• Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user<br />

accounts. Again in January 2013 and in January 2014<br />

Page 102 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!