Last Updated on May 24, 2015

It’s time for the second timeline of October (Part I here) covering the main cyber attacks between the 16th and 31st: yet another consistent list confirming the growing trend of the last period.

In particular, in these two weeks the most important events have been spotted inside Cyber Espionage, whose chronicles report, among other, a state-sponsored attack to an unclassified network of the White House, a relevant number of operations (APT 28, Operation Pawn Storm, Operation SMN, Operation DeathClick, a tail of the infamous Sandworm), and even a man-in-the-middle attack against Chinese iCloud users.

Cybercrime is also on a roll: the trail of attacks against retailers seems unstoppable (Staples is the latest victim), but chronicles also report a massive breach in South Korea, involving Pandora TV and a gigantic SQL Injection attack, driven by CVE-2014-3704, against every unpatched website running Drupal, existing on this desperate planet. There is also space for a little bit of irony, as in case of Sourcebooks, the publisher hacked few days before releasing the latest book of Brian Krebs.

Israel and Ukraine keep on being two hot fronts for Hacktivism, whereas India is again the cradle of  cyberwar, many events event in this months (despite limited to skirmishes involving defacements of governmental and military websites).

If you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013 and now 2014 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

16-31 October 2014 Cyber Attacks Timeline

  1. http://www.phiprivacy.net/penn-highlands-brookville-provides-public-notice-of-data-security-incident/
  2. http://www.bna.com/south-korean-internet-n17179910652/
  3. http://news.softpedia.com/news/National-Domestic-Workers-Alliance-Suffers-Email-System-Breach-462646.shtml
  4. http://pastebin.com/5aZ2YHie
  5. http://pastebin.com/rt1n1Nkc
  6. http://www.techworm.net/2014/10/serbian-hackers-deface-rtsh.html
  7. http://hackread.com/arab-warriors-team-announces-operation-kashmir/
  8. http://pastebin.com/zkvgCmTR
  9. http://hackread.com/pakistani-hacker-hacked-india-police-website/
  10. http://arstechnica.com/security/2014/10/staples-likely-breached-retailer-defenses-back-in-spotlight/
  11. http://www.infosecurity-magazine.com/news/operation-deathclick-targets-us/
  12. http://arstechnica.com/security/2014/10/chinese-government-launches-man-in-middle-attack-against-icloud/
  13. http://oag.ca.gov/system/files/Data%20Security%20Breach%20Oct%2023%2C%202014_0.pdf
  14. http://hackread.com/azerbaijani-embassies-hacked-by-armenian-hackers/
  15. http://www.darkreading.com/attacks-breaches/us-military-officials-defense-firms-targeted-in-operation-pawn-storm/d/d-id/1316927
  16. http://www.theguardian.com/technology/2014/oct/23/china-cyber-attacks-taiwan-windows-microsoft
  17. http://krebsonsecurity.com/2014/10/spam-nation-publisher-discloses-card-breach/
  18. http://www.scmagazine.com/breyer-horses-website-compromised-payment-cards-at-risk/article/379137/
  19. http://news.softpedia.com/news/Sinclair-Institute-Suffers-Breach-Customer-Info-Exposed-463077.shtml
  20. http://www.keyc.com/story/26884387/big-deals-media-affected-by-data-breach
  21. http://www.scmagazine.com/about-60k-transactions-possibly-affected-in-cape-may-lewes-ferry-breach/article/380206/
  22. http://hackread.com/anonymous-india-customs-excise-narcotics-website/
  23. http://www.techworm.net/2014/10/warsaw-stock-exchange-hacked-isis-cyber-criminals.html
  24. http://hackread.com/ddos-attack-ukraine-election-commission-website/
  25. http://news.softpedia.com/news/Instagram-Profile-For-Australian-Charitable-Event-Hijacked-for-Ransom-463501.shtml
  26. http://hackread.com/anonymous-hackers-orwah-hammad-israel-idf/
  27. http://pastebin.com/LdsxHpr3
  28. http://www.scmagazine.com/fidelity-national-financial-employees-targeted-in-phishing-attack/article/379527/
  29. http://hackread.com/israeli-credit-card-details-leaked-saudi-hacker/
  30. http://www.databreaches.net/bay-area-bioscience-association-baybio-notifies-online-customers-of-breach/
  31. http://www.washingtonpost.com/world/national-security/hackers-breach-some-white-house-computers/2014/10/28/2ddf2fa0-5ef7-11e4-91f7-5d89b5e8c251_story.html
  32. http://www.net-security.org/secworld.php?id=17540
  33. http://community.websense.com/blogs/securitylabs/archive/2014/10/28/official-website-of-popular-science-is-compromised.aspx
  34. http://news.softpedia.com/news/City-of-Phoenix-Computers-Under-DDoS-Attack-463286.shtml
  35. http://hackread.com/bjp-website-hacked-by-z-company-hacking-crew/
  36. http://arstechnica.com/security/2014/10/drupal-sites-had-hours-to-patch-before-attacks-started/
  37. http://www.ibtimes.co.uk/north-korea-tried-hack-smartphones-south-korea-malware-infested-games-1472210
  38. http://www.theregister.co.uk/2014/10/29/blackenergy_crimeware_pwning_us_control_systems_cert_warns/
  39. http://www.databreaches.net/backcountrygear-com-notifies-consumers-of-second-malware-breach-in-three-months/
  40. http://www.techrepublic.com/article/apple-pay-competitor-currentc-hacked-before-service-launch/
  41. https://ghostbin.com/paste/8e8pq

This Post Has 4 Comments

  1. Colin

    This is awesome. Was talking to a IT forensics Prof. in Australia and we’re working together to visualize all this geographically too.

    Anyway, guys should use Tableau public for your site…..vizs are so much more interactive and definitely takes less time to build.

    I like this one anyway..
    http://www.tableausoftware.com/public/gallery/which-country-uses-most-oil

    Cheers!

    1. Paolo Passeri

      Hi Colin, thanks for the advise and, yes… You are not the first one suggesting to use Tableau. I think I will have a look (very) sooner or later…

  2. Daljit

    from where these timelines of attacks has been prepared… I mean what is the source of data

    1. Paolo Passeri

      The sources are on bottom of each timeline (if you do not sse them, click on the more link)

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.