Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

May 2012 Cyber Attacks Timeline (Part I)

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:May 17, 2012

Update June 4 2012: May 2012 Cyber Attacks Timeline (Part II)

As usual here it is the timeline of the Main Cyber Attacks occurred in May (at least according to my evaluation criteria).

This first half of the month has seen the arrival of a new hacking collective, “The Unknowns”, who has performed an impressive trail of attacks during the first days of May, targeting Space Agencies, Universities, and several other organizations. Although these events appear to be closer to cyber crime actions rather than hactivistim-driven attacks, they have not been the most remarkable ones of these days: as a matter of fact chronicles report of a massive breach at the Hangzhou Dianzi University, targeting approximately 150.000 acccounts.

As far as hacktivism is concerned, this first half of May has confirmed the constant trend of DDoS attacks targeting high profile websites such as SOCA and CIA (once again) and the Supreme Court in retaliation for the U.K. extradition laws.

Interesting to mention is also an alleged Cyber Espionage campaign targeting networks belonging to US natural gas pipeline companies.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

(more…)

Like this:

Like Loading...

Continue ReadingMay 2012 Cyber Attacks Timeline (Part I)

Botnets, ISPs, and The Role of The Cloud

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:May 24, 2012

One interesting comment on my previous post on Botnets, gave me a cue for another consideration concerning the role of…

Continue ReadingBotnets, ISPs, and The Role of The Cloud

The Flame Burning Inside Stuxnet

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:June 12, 2012

While the U.S. and Israel keep on mutually claiming the Stuxnet's paternity, Kaspersky Lab has unveiled further details about Flame…

Continue ReadingThe Flame Burning Inside Stuxnet

Here’s Shamoon!

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:August 17, 2012

So, it looks like that the destructive impacts of the cyber attack targeting Aramco, where definitively true. In the same…

Continue ReadingHere’s Shamoon!

August 2012 Cyber Attacks Timeline (Part I)

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:August 20, 2012

The first half of August has seen a revamping of Hacktivism, encouraged by the takedown of the famous Torrent Tracker Demonoid (and the consequent OpDemonoid targeting most of all Ukrainian sites), but also encouraged by OpAustralia, the wave of attacks against Australian Web Sites carried on against the Australian Internet Surveillance Law (apparently the latter operation was successful since the controversial law has been put on standby).

But Hacktivism was not the only “trend topic” for this period. The Middle East continues to be the cradle for unexpected cyber weapons threats. In August, two new occurrences of allegedly state sponsored malware: Gauss, a cyber-espionage tool targeting bank transaction, and Shamoon , a destructive malware targeting energy companies.

These are probably the most remarkable Cyber Events of this period, which has also seen a purported giant breach targeting Pearl.fr, a French e-commerce website whose 729,000 accounts, together with over 1 million bank transaction details, have been subtracted by hackers.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

(more…)

Like this:

Like Loading...

Continue ReadingAugust 2012 Cyber Attacks Timeline (Part I)

The Cradle of Cyber War

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:August 31, 2012

Yesterday Bloomberg reported the news of a new cyber attack in Middle East targeting an Oil Company. The latest victim…

Continue ReadingThe Cradle of Cyber War

Google Acquires VirusTotal

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:2 mins read
  • Post published:September 8, 2012

So Google has acquired Virus Total, the Spanish company which provides the well-known cloud-based free service that analyzes suspicious files…

Continue ReadingGoogle Acquires VirusTotal

The Botnet Factory

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:2 mins read
  • Post published:September 16, 2012

Probably there's something more in the Next Step Of Botnets besides BlackHole 2.0 and Tor C&C mentioned in my previous…

Continue ReadingThe Botnet Factory

A 0-Day Attack Lasts On Average 10 Months

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:October 19, 2012

(But in some cases may remain unknown for up to 2.5 years). A couple of days ago, two Symantec Researchers…

Continue ReadingA 0-Day Attack Lasts On Average 10 Months

Browsing Security Predictions for 2013

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:December 26, 2012

The period between November and December is particularly interesting for the Infosec community, since nearly all the main security vendors…

Continue ReadingBrowsing Security Predictions for 2013
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 8
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: