Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

July 2012 Cyber Attacks Statistics

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Statistics/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:August 9, 2012

Here we are with the statistics from the Cyber Attack Timelines  for the first and the second half of July 2012. The…

Continue ReadingJuly 2012 Cyber Attacks Statistics

Another Massive Cyber Attack in Middle East

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:5 Comments
  • Reading time:3 mins read
  • Post published:August 16, 2012

Update August 17: More details about Shamoon, the malware targeting Saudi Aramco and other Middle East companies belonging to Energy Sector.…

Continue ReadingAnother Massive Cyber Attack in Middle East

Here’s Shamoon!

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:August 17, 2012

So, it looks like that the destructive impacts of the cyber attack targeting Aramco, where definitively true. In the same…

Continue ReadingHere’s Shamoon!

August 2012 Cyber Attacks Timeline (Part I)

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:August 20, 2012

The first half of August has seen a revamping of Hacktivism, encouraged by the takedown of the famous Torrent Tracker Demonoid (and the consequent OpDemonoid targeting most of all Ukrainian sites), but also encouraged by OpAustralia, the wave of attacks against Australian Web Sites carried on against the Australian Internet Surveillance Law (apparently the latter operation was successful since the controversial law has been put on standby).

But Hacktivism was not the only “trend topic” for this period. The Middle East continues to be the cradle for unexpected cyber weapons threats. In August, two new occurrences of allegedly state sponsored malware: Gauss, a cyber-espionage tool targeting bank transaction, and Shamoon , a destructive malware targeting energy companies.

These are probably the most remarkable Cyber Events of this period, which has also seen a purported giant breach targeting Pearl.fr, a French e-commerce website whose 729,000 accounts, together with over 1 million bank transaction details, have been subtracted by hackers.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

(more…)

Like this:

Like Loading...

Continue ReadingAugust 2012 Cyber Attacks Timeline (Part I)

The Psychosis of Targeted Attacks

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:2 mins read
  • Post published:August 24, 2012

Apparently the "Psychosis of Targeted Attacks" is plaguing not only the end users but even the security researchers, leading to…

Continue ReadingThe Psychosis of Targeted Attacks

Saudi Aramco Admits 30K workstations affected

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:August 27, 2012

Yesterday Saudi Aramco issued a public statement declaring to have fixed most damage and restored all its main internal network…

Continue ReadingSaudi Aramco Admits 30K workstations affected

The Cradle of Cyber War

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:August 31, 2012

Yesterday Bloomberg reported the news of a new cyber attack in Middle East targeting an Oil Company. The latest victim…

Continue ReadingThe Cradle of Cyber War

The Human Targeted Attack To Saudi Aramco

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:September 10, 2012

After nearly a month, the Cyber Attack to Saudi Aramco continues to attract the attentions of Infosec Professionals. If you…

Continue ReadingThe Human Targeted Attack To Saudi Aramco

New Waves of Cyber Attacks in Middle East

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:October 9, 2012

The infosec chronicle has offered many interesting events in this first part of October. Upon all, the massive leak against…

Continue ReadingNew Waves of Cyber Attacks in Middle East

The Middle East Flame is Far from Being Extinguished

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:October 15, 2012

Another day, another revelation inside the (in)visible Cyber War going on Middle East. Today Kaspersky Lab has announced the discovery…

Continue ReadingThe Middle East Flame is Far from Being Extinguished
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: