Top Qs
Timeline
Chat
Perspective

List of cyberattacks

From Wikipedia, the free encyclopedia

Remove ads

A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.

Indiscriminate attacks

These attacks are wide-ranging, global and do not seem to discriminate among governments and companies.

Remove ads

Destructive attacks

These attacks relate to inflicting damage on specific organizations.

Remove ads

Cyberwarfare

Summarize
Perspective

These are politically motivated destructive attacks aimed at sabotage and espionage.

Remove ads

Government espionage

Summarize
Perspective

These attacks relate to stealing information from/about government organizations:

Remove ads

Corporate espionage

These attacks relate to stealing data of corporations related to proprietary methods or emerging products/services.

Stolen e-mail addresses and login credentials

Summarize
Perspective

These attacks relate to stealing login information for specific web resources.

  • RockYou – in 2009, the company experienced a data breach resulting in the exposure of over 32 million user accounts.
  • Vestige (online store) – in 2010, a band of anonymous hackers has rooted the servers of the site and leaked half a gigabyte's worth of its private data.[19]
  • 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally causing network disruption
  • IEEE – in September 2012, it exposed user names, plaintext passwords, and website activity for almost 100,000 of its members.[20]
  • Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user accounts,[21] doing so again in January 2013[22] and in January 2014.[23]
  • Adobe – in 2013, hackers obtained access to Adobe's networks and stole user information and downloaded the source code for some of Adobe programs.[24] It attacked 150 million customers.[24]
  • LivingSocial – in 2013, the company suffered a security breach that has exposed names, e-mail addresses and password data for up to 50 million of its users.[25]
  • World Health Organization – in March 2020, hackers leaked information on login credentials from the staff members at WHO.[26] In response to cyberattacks, they stated that “Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the COVID-19 pandemic.”[27]
Remove ads

Stolen credit card and financial data

Remove ads

Blockchain and cryptocurrencies

  • 2014 Mt. Gox exchange exploits
  • The DAO fork – in June 2016, users exploited a vulnerability in The DAO, a decentralized autonomous organization formed as a venture capital fund, to siphon a third of the fund's ether (about $50 million at the time of the hack).[45]
  • Poly Network exploit – in August 2021, anonymous hackers transferred over $610 million in cryptocurrencies to external wallets. Although it was one of the largest DeFi hacks ever, all assets were eventually returned over the following two weeks.[46]
  • Wormhole hack – in early February 2022, an unknown hacker exploited a vulnerability on the DeFi platform Wormhole, making off with $320 million in wrapped ether.[47][48]
  • Ronin Network hack – in March 2022, North Korean state-sponsored Lazarus Group used hacked private keys to withdraw $625 million in ether and USDC from the Ronin bridge,[49][50] an Ethereum sidechain built for the NFT-based video game Axie Infinity.
  • Nomad bridge hack – in early August 2022, hackers targeted a misconfigured smart contract in a "free-for-all" attack,[51] withdrawing nearly $200 million in cryptocurrencies from the Nomad cross-chain bridge.[52]
  • The Uncle Maker attack – an attack on Ethereum by the F2Pool mining pool, which lasted between 2020 and 2022, but was only discovered in 2022 by Aviv Yaish, Gilad Stern and Aviv Zohar.[53][54]
  • BNB Chain hack – in early October 2022, about $570 million in cryptocurrency was stolen from a bridge for the BNB Chain, a blockchain operated by the Binance exchange.[55] Because a majority of the tokens could not be transferred off-chain, the hacker ultimately made off with about $100 million.[56]
Remove ads

Ransomware attacks

Remove ads

Notable criminal ransomware hacker groups

Hacktivism

See also

Further reading

References

Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads