It’s time to publish the first Cyber Attack Timeline of September.... Read More
Great news! With this article, I have decided to change the timeline, moving from a static infographic-style format, to a tabular format, which allows to sort, filter and search for specific items inside the timeline.... Read More
It’s time for the first timeline of May, reporting the main cyber attacks occurred between 1 and 15 May 2015.
The Summer is at the gates, but apparently the nice weather is not stopping the attackers from their intentions: I have recorded 52 attacks, a dramatic turnaround in comparison with April, and a strong indication that the slowing trend of the past couple of months has suffered a sudden stop.
It’ s time to publish the timeline with the main cyber attacks occurred in April 2015 (Part I here).
Despite the number of attacks has shown a decreasing trend, this second part of April will be probably remembered for the Cyber Espionage campaigns, which, in a couple of cases, have successfully hit the White House, a coveted target for Russian hackers. Other remarkable events in this space include the return of APT 28 (Operation Russian Doll) and an operation carried on by Arabic-speaking attackers, targeting Israeli military networks.
Spring is sprung, but unfortunately the nice season is not enough to keep the crooks’ hands off their keyboard, as the growing trend continues, and this first half of April has shown a sustained number of attacks.
The most illustrious victim is Lufthansa, whose frequent-flyers website has been hacked, with the attackers able to harvest miles from the unaware victims. Other noticeable events, always related to cyber crime, include the compromise of Linux Australia, and the discovery of Operation Buhtrap, a campaign targeting Russian banks.
It’s time for the first Cyber Attacks Timeline of December (and the last for 2014).
Of course the attention of the infosec professionals is still concentrated on the devastating cyber attack against Sony happened in November (and the world as we know it, won’t be the same again), nonetheless this first 15 days have shown some remarkable events, not least the news of a breach happened earlier this year to Sony (once again), which went unreported.
Here we are with the second part of the timeline of May (first part here).
Summer is coming here, and looks like attackers prefer to spend more time in the beach rather than in front of their keyboards. In fact the number of reported attack is confirming its decreasing trend, at least for this part of the year.