Skip to content
HACKMAGEDDON

Information Security Timelines and Statistics

  • About
  • Submit An Attack
  • Cyber Attacks Timeline
    • 2011 Cyber Attacks Timeline Master Index
    • 2012 Cyber Attacks Timeline Master Index
    • 2013 Cyber Attacks Timeline Master Index
    • 2014 Cyber Attacks Timeline Master Index
    • 2015 Cyber Attacks Timelines Master Index
    • 2017 Master Table
    • 2018 Master Table
  • Cyber Attacks Statistics
Menu Close
  • About
  • Submit An Attack
  • Cyber Attacks Timeline
    • 2011 Cyber Attacks Timeline Master Index
    • 2012 Cyber Attacks Timeline Master Index
    • 2013 Cyber Attacks Timeline Master Index
    • 2014 Cyber Attacks Timeline Master Index
    • 2015 Cyber Attacks Timelines Master Index
    • 2017 Master Table
    • 2018 Master Table
  • Cyber Attacks Statistics

August 2012 Cyber Attacks Timeline (Part I)

  • Post author:Paolo Passeri
  • Post published:August 20, 2012
  • Post category:Cyber Attacks Timeline/Security
  • Post comments:4 Comments
  • Reading time:3 mins read

The first half of August has seen a revamping of Hacktivism, encouraged by the takedown of the famous Torrent Tracker Demonoid (and the consequent OpDemonoid targeting most of all Ukrainian sites), but also encouraged by OpAustralia, the wave of attacks against Australian Web Sites carried on against the Australian Internet Surveillance Law (apparently the latter operation was successful since the controversial law has been put on standby).

But Hacktivism was not the only “trend topic” for this period. The Middle East continues to be the cradle for unexpected cyber weapons threats. In August, two new occurrences of allegedly state sponsored malware: Gauss, a cyber-espionage tool targeting bank transaction, and Shamoon , a destructive malware targeting energy companies.

These are probably the most remarkable Cyber Events of this period, which has also seen a purported giant breach targeting Pearl.fr, a French e-commerce website whose 729,000 accounts, together with over 1 million bank transaction details, have been subtracted by hackers.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

(more…)

Continue Reading August 2012 Cyber Attacks Timeline (Part I)
Copyright 2021 - HACKMAGEDDON.COM
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok