Last Updated on August 22, 2017
Here we go with the second timeline of July (first part here) covering the main cyber attacks occurred between July 16 and 31. A fortnight so rich of events, that I really do not know where to start from…
So, it looks like cryptocurrency is the new frontier for cybercriminals since this fortnight has recorded three attacks directed towards cryptocurrency exchange organizations (or their users): CoinDash, Veritaseum and the users of Parity’s Ethereum will remember this July for a long time.
But despite all this attention towards cryptocurrency, the megabreaches are not over… This fortnight has revealed the occurrence of a massive breach against the Kansas Department of Commerce and the discovery of over 40 million US voter records from nine states in an underground market called RaidForums.
And while the level of attention towards the Russian activity in the cyber space is always high (Reuters have revealed that Russian intelligence agents attempted to spy on President Emmanuel Macron’s election campaign earlier this year by creating phony Facebook personas), new and all threat actors emerge (like DarkHotel, an old acquaintance; SpringDragon, targeting some high-profile organizations around the South China Sea; CopyKittens, targeting several countries including Israel, Saudi Arabia, the United States, Germany, Jordan and Turkey; CobaltGipsy (a group allegedly linked to Iran); and FIN7, targeting a US-based restaurant chain.
Other interesting events include: the discovery of two attacks against Unicredit, the main Italian bank (400,000 records compromised), an attack against a FireEye analyst, the leak of an episode of Game of Thrones, part of a trove of 1.5 TB of data stolen from HBO, and an endless trail of campaigns against Android users: GhostCTRL, Stantinko, Lipizzan, a version of Triada “bundled” with some cheap Chinese devices, and Svpeng.
As usual scroll down the whole list for all the events happened in this fortnight. And if you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013, 2014, 2015 and 2016 (regularly updated). You may also want to have a look at the Cyber Attack Statistics that are regularly published, and follow @paulsparrows on Twitter for the latest updates.