1-15 December 2022 Cyber Attack Timeline
In the first timeline of December, I have collected 147 events (corresponding to 9.8 events/day), a result slightly...
In the first timeline of December, I have collected 147 events (corresponding to 9.8 events/day), a result slightly...
The Autumn has begun, and I can finally publish the first timeline of September 2021. Despite we are still far from the highest peaks of activity of this year, in this timeline...
Here's the first timeline of July! This fortnight I have collected 89 events (including 6 that occurred in the previous month), a number in line with the previous timeline (84 events) that confirms a certain stabilization of the trend after the peaks of the first quarter, likely due to the impact of COVID-themed attack.
I am trying to catch up with the backlog, so it's now time to publish the first timeline of June (I know we are in August) where I have collected a total of 96 events. The level of activity continues to be quite high and characterized by...
Time to publish the second timeline of August, covering the main cyber attacks occurred between the 16th and the 31st. In this period, I have collected a total of...
Here's the first timeline of April covering the main cyber attacks occurred between April 1st and 15th. The main events…
The Office of Personal Management, the independent agency of the United States that manages the civil service of the federal…
What is a Cyber Weapon? At first glance this seems an immediate question to answer, but should anyone try to…
The first half of November is gone, so it’s time for the list of the main cyber attacks occurred during these fifteen days.
Confirming the trend of the last months, the activity has been quite sustained. For sure, the most remarkable attack has targeted the Turkish branch of HSBC, and has affected 2.7 million customers, whose credit cards have been compromised (and apparently the bank has decided not to issue new cards for the impacted users).
Again the operations related to cyber espionage have played an important role: some new campaigns have come to light (for instance Darkhotel), and also several noticeable attacks have been discovered, like the one against the United States Postal Service (600,000 users affected) or the one against the National Oceanographic and Atmospheric Administration.
Even hacktivists have been quite active: the RedHack collective has reemerged from several months in stealth mode (they claim to have deleted 650,000 USD worth 0f electricity power debt), and some hackers claiming to be affiliated to the Anonymous collective have performed similar operations in Italy (in parallel with the delicate social and economical period) and the Philippines.
If you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013 and now 2014 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.
Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).
And finally we can complete the September 2014 Cyber Attacks Timeline (Part I here), with the second part covering the most important events between the 16th and the 30th.
A very fruitful month for Cyber Criminals, since there are several events that will be remembered. For sure the Shellshock vulnerability will spoil the troubled sleeps of many System Administrators. In any case this is not the only remarkable event, the chronicles report of an (un)expected tail of the Celebrity Leak scandal (the so-called Fappening), with other two rounds of leaked pictures occurred on the 20th and the 26th, and a couple of massive breaches against TripAdvisor subsidiary Viator (1.4 million users affected) and Japan Airlines (750,000 users affected). Last but not least, it is also worthwhile to mention the group of teen hackers charged for hacking into Microsoft, the US Army and several game companies, stealing $100 million in Intellectual Property, and the so-called Operation Harkonnen, the longest cyber crime campaign ever.
Regarding the Cyber Espionage, the timeline reports the discovery of yet another Chinese Operation against US contractors, and a coordinated state-sponsored mobile malware aimed to intercept protesters in Hong Kong.
At least for once… Nothing particular interesting for Hacktivism…
If you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013 and now 2014 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.
Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).