Last Updated on May 24, 2015

This month of August will be probably remembered for the massive cache of 1.2 million of password scooped up by the Russian gang Cyber Vor, undoubtedly the most important event that overshadowed all the other activity recorded in these dog days.

Besides this remarkable fact, the Cyber Crime chronicles report, among others, an unprecedented attack technique, aimed to hijack ISP traffic to steal bitcoins, the breach to SuperValu, and the compromising of 60,000 staffers who participated in Tennessee health screening program.

Cyber Espionage is still in the spotlight, with the breach to USIS (United States Investigation Services), the discovery of the Turla campaign, and also of a similar campaign targeted specifically to Ukraine.

Turning the attention to hacktivism: Ukraine, Israel and the US (following the events of St. Louis) have been the hottest frontlines, even if the most important event is perhaps the attack against Gamma International, the company behind of the infamous FinFinsher spyware.

If you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013 and now 2014 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

1-15 August 2014 Cyber Attacks Timeline

  1. http://siph0n.net/exploits.php?id=1827
  2. http://siph0n.net/exploits.php?id=1828
  3. http://www.scmagazine.com/payment-cards-used-on-wireless-emporium-website-compromised-by-malware/article/364686/
  4. http://hackread.com/opsavegaza-anonymous-iran-hacks-israel/
  5. http://hackread.com/armenia-azerbaijan-cyberwar-ddos/
  6. http://www.databreaches.net/omeganet-reports-breach-affecting-business-clients/
  7. http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html?_r=0
  8. http://www.wired.com/2014/08/isp-bitcoin-theft/
  9. http://arstechnica.com/tech-policy/2014/08/leaked-docs-show-spyware-used-to-snoop-on-us-computers/
  10. http://www.washingtonpost.com/world/national-security/dhs-contractor-suffers-major-computer-breach-officials-say/2014/08/06/8ed131b4-1d89-11e4-ae54-0cfe1f974f8a_story.html
  11. http://www.databreaches.net/vibrams-hosting-provider-hacked-customers-credit-card-numbers-compromised/
  12. http://news.softpedia.com/news/Paw-Security-Hackers-Attack-Chinese-Websites-453979.shtml
  13. http://news.softpedia.com/news/US-Plextor-Website-Hacked-by-CoMoDo-Islamic-Hackers-453960.shtml
  14. http://siph0n.net/exploits.php?id=1831
  15. http://arstechnica.com/security/2014/08/espionage-programs-linked-to-spying-on-former-soviet-targets/
  16. http://www.cnbc.com/id/101905588
  17. http://www.cyber-berkut.org/en/
  18. https://www.chicagoyachtclub.org/default.aspx?p=v35ArticleView&itemID=312033
  19. http://hackread.com/moroccan-hackers-hack-saratoga-county/
  20. http://buyingbusinesstravel.com/news/1222943-acte-members%E2%80%99-data-stolen-hackers
  21. http://www.scmagazine.com/vitamin-seller-website-attacked-payment-cards-and-other-info-compromised/article/366314/
  22. http://www.abc.net.au/news/2014-08-12/hacking-suspected-city-to-bay-fun-run-website/5664132
  23. http://siph0n.net/exploits.php?id=1834
  24. http://www.cnet.com/news/anonymous-hacks-into-ferguson-police-site-for-dispatch-tapes/
  25. http://www.scmagazine.com/subcontractor-breach-impacts-more-than-60k-tennessee-workers/article/366142/
  26. http://mashable.com/2014/08/14/russias-prime-minister-twitter-account-gets-hacked/
  27. http://www.cnet.com/news/st-louis-police-website-suffers-ddos-attack/
  28. http://www.cyber-berkut.org/en/
  29. http://siph0n.net/exploits.php?id=3531
  30. http://arstechnica.com/security/2014/08/grocery-shoppers-nationwide-probably-had-credit-card-data-stolen/

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.