Last Updated on January 23, 2016

It’s time for the second timeline of February (first timeline here) covering the main cyber attacks occurred between 16 and 28 February 2015 (including also several few attacks that actually happened in the first 15 days).

With only 13 days available, this is normally the timeline with less activity. Not this year actually, since despite the shorter period, the number of reported attacks is undoubtedly remarkable.

If you look at the targeted attacks, you’ll be spoiled for choice: several remarkable operations (The Equation Group setting new standards in term of sophistication, Operation Rapid Viper against Israel and Operation Desert Falcons against several companies and individuals in Middle East), and a cyber attack, purportedly originating from China against the Dutch Chip Manufacturer ASML.

Even looking at Cyber Crime, you’ll be spoiled for choice as well. The Lizard Squad is back with an original retaliation against Lenovo, in the wake of the Superfish affair: they hacked the registrar that procured the Lenovo address, using that illegitimate access to hijack, shortly after, the lenovo.com domain. Other remarkable events include the admission of a breach by TalkTalk, involving potentially 4 million customers, a breach to Uber, putting at risk 50,000 past and present drivers, and other two cases of Bitcoin Exchange sites hacked (in particular Canada based Cavirtex is forced to shut down, whereas the losses for the Chinese Bter amount to $1.75 million.

Last but not least, nothing particular meaningful to mention for what concerns hacktivism: several sparse operation with no significant impact.

If you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013 and now 2014 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

16-28 Feb 2015 Cyber Attacks Timelines

  1. http://www.net-security.org/secworld.php?id=17964
  2. http://thenextweb.com/insider/2015/02/16/chinese-bitcoin-exchange-bter-hacked-1-75-million-worth-cryptocurrency-stolen/
  3. https://www.hackread.com/uae-al-ittihad-newspaper-website-hacked-by-isis-hackers/
  4. http://www.techworm.net/2015/02/everything-fair-love-hacking-twitter-account-nissan-say-love-just-much.html
  5. http://www.tripwire.com/state-of-security/latest-security-news/haskell-confirms-security-breach-in-debian-builds/
  6. http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage
  7. http://www.forbes.com/sites/thomasbrewster/2015/02/16/nsa-equation-cyber-tool-treasure-chest/
  8. https://nakedsecurity.sophos.com/2015/02/17/lizard-squad-returns-claims-attack-on-xbox-live-and-daybreak-games/
  9. http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-arid-viper-bypassing-the-iron-dome
  10. https://twitter.com/gren_siahaan/status/567561518867574785
  11. http://pastebin.com/W0AFixVw
  12. https://www.hackread.com/opsaudi-hackers-shutdown-saudi-bank-site/
  13. http://www.hackread.com/pro-isis-group-hacked-isle-wight-virginia-website/
  14. http://www.hackread.com/wwe-superstar-cesaros-twitter-account-hacked/
  15. http://www.scmagazine.com/bulk-reef-supply-website-compromised-credit-cards-at-risk/article/400727/
  16. https://blog.malwarebytes.org/exploits-2/2015/02/celebrity-chef-jamie-olivers-website-hacked-redirects-to-exploit-kit/
  17. http://www.net-security.org/secworld.php?id=17962
  18. http://www.infosecurity-magazine.com/news/redtube-porn-site-to-serve-malware/
  19. http://grahamcluley.com/2015/02/bitcoin-exchange-shuts-down/
  20. http://www.tmz.com/2015/02/21/kris-jenner-nude-video-stolen-icloud-hacked-phone/
  21. http://pastebin.com/i6JQX5QJ
  22. https://twitter.com/data_siph0n/status/569287862195265536
  23. http://www.ibtimes.co.uk/google-vietnam-domain-name-briefly-hacked-hijacked-by-lizard-squad-1489293
  24. http://threatpost.com/komodia-website-under-ddos-attack/111195
  25. https://www.hackread.com/isis-supporters-hack-chiles-ministry-defense-website/
  26. https://www.hackread.com/opsaudi-hackers-shutdown-saudi-arab-national-bank-website/
  27. http://www.dnainfo.com/new-york/20150225/civic-center/email-hacking-attack-hits-city-government
  28. http://www.dnainfo.com/new-york/20150226/civic-center/hack-attack-that-hit-city-emails-may-have-come-from-russia-sources
  29. http://www.scmagazine.com/malware-on-lime-crime-website-payment-cards-compromised/article/400192/
  30. http://thehill.com/policy/cybersecurity/233641-prominent-dc-think-tank-hacked
  31. https://mega.nz/#F!aZohDAZY!6qXfu2r474LWqSymo_LsaQ
  32. http://pastebin.com/mWNSa1mt
  33. http://nypost.com/2015/02/27/cyber-hacking-si-student-changed-grades-from-his-smartphone-cops/
  34. http://www.techworm.net/2015/02/rapper-griminals-twitter-hacked-hackers-post-suicidal-tweets.html
  35. http://krebsonsecurity.com/2015/02/webnic-registrar-blamed-for-hijack-of-lenovo-google-domains/
  36. http://arstechnica.com/security/2015/02/attackers-take-control-of-lenovo-com-hijacking-e-mail-and-web-servers/
  37. http://webcache.googleusercontent.com/search?q=cache:OUWrRVCdO40J:pastebin.com/bypLKQRi+&cd=1&hl=en&ct=clnk&gl=uk
  38. http://thehill.com/policy/cybersecurity/233825-national-archives-hit-with-data-breach
  39. http://pastebin.com/L5YZ6py1
  40. http://www.theregister.co.uk/2015/02/27/talktalk_admits_massive_data_breach/
  41. http://cyberwarzone.com/asml-hack-global-chip-machine-producer-in-the-netherlands-and-france-has-been-hacked/
  42. http://www.zdnet.com/article/uber-admits-database-breach-putting-driver-data-at-risk/
  43. http://www.cyber-berkut.org/en/
  44. http://cyberwarzone.com/anonymous-hacked-lisbon-university-published-the-passwords/
  45. http://pastebin.com/zuiNjfL8
  46. http://networksecurityreport.siteblogs.net/2015/02/28/play-com-compromised-and-security-breach-admitted/
  47. http://siph0n.net/exploits.php?id=3729

This Post Has 3 Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.