Share this article
The number of cyber attacks has grown up steadily during the last few years. In 2016, 758 million malicious attacks occurred according to KasperskyLab, (an attack launched every 40 seconds) and there is no doubt that 2017 will break the record. This summer, ransomware were under the spotlight with the WannaCry and NotPetya attacks whose paralyzed some large companies or structures for a moment. The types of cyber attacks are almost as numerous as the number of hackers. From individuals personal information to industrial products data, the field is vast and the consequences can be multiple: impersonation, banking data fraudulent use, blackmail, ransom demand, power cuts … Often, it is the exploitation of system and network vulnerabilities that is responsible for cyber attacks, but these can often be avoided. Indeed, many vulnerabilities are known and referenced. Below are a few examples of companies that have not been able to react in time and have paid a high price for it. The ranking was elaborated in increasing order of the people impacted by the attacks, the last one being the one that made the most victims.
Here is our Top 10 of the world's biggest cyberattacks
10. Adobe was going through hell
Adobe announced in October 2013 the massive hacking of its IT infrastructure. Personal information of 2.9 million accounts were stolen (logins, passwords, names, credit card numbers and expiration dates). Another file discovered on the internet later brought the number of accounts affected by the attack to 150 million (only 38 million active accounts). To get those information the hackers took advantage of the security breach of the publisher. Indeed, it did not respect certain practices of security of the passwords. The stolen passwords had been encrypted instead of being chopped as recommended. If the banking data were stolen, however, they were unusable because of a high-quality encryption of Adobe. The company was attacked not only for its customer information but also for its product data. Indeed, the most worrying problem for Adobe was the theft of over 40GB of source code. For instance, the entire source code for the ColdFusion product was stolen as well as parts of the sources Reader and Photoshop. If other attacks were to be feared, they did not finally take place.
9. Panic among Sony
In April 2011, the PlayStation Network, the multiplayer gaming service, online gaming purchasing and live content distribution of the Japanese brand was attacked. The personal data of 77 million users leaked. The banking details of tens of thousands of players were also compromised. After the intrusion discovery, the PSN, as well as Sony Online Entertainment and Qriocity, had been closed for a month. To calm the anger of users, Sony has to pay 15 million dollars in compensation plus a few other millions for the court fees and the refund of the people whose bank accounts have been illegally used. This cyber attack could have been largely avoided. Indeed, hackers have used a well-known network vulnerability that Sony did not pay attention to. The data was not encrypted and could easily be hijacked thanks to a very simple SQL injection.
Unfortunately, in November 2014...
... the subsidiary Sony Pictures Entertainment was attacked by a malware, and more precisely by a computer worm. The “Guardians of Peace” had stolen 100 terabytes of data including a lot of confidential information. Had been stolen for example, the future James Bond scenario, the personal data of 47,000 employees (names, addresses, e-mails, social insurance numbers, salaries...), or compromising emails. Amy Pascal had been ejected from her position because of the shocking content of her emails (judged insulting to then-President Barack Obama). In addition, the company canceled the broadcast of several movies and paid the equivalent of 8 million dollars in compensation to its employees and former employees. The cyber attack could have been once again avoided because SonyPictures had carried out an audit of its security system a few months before the incident. This last had revealed serious failures in the infrastructure management, including a firewall and several hundred terminals (routers and servers) that were not managed by the competent teams.
8. The South Korean nightmare
The South Koreans learned in January 2014 that data of 100 million credit cards have been stolen for several years. In addition, 20 million bank accounts have been also hacked. For fear of having their bank accounts emptied, more than 2 million South Koreans had their credit cards blocked or replaced. The data stealer was actually an employee of the Korea Credit Bureau (KCB), a solvency company. He stole personal information from customers of credit card companies when he worked for them as a consultant. He had simply copied the data to an external hard drive. Then he resold to a few people including a credit trader and telemarketing companies.
7. Target targeted
Target, the second-largest US discount retail chain, was the victim of a large-scale cyber attack in December 2013. Data from 110 million customers were hijacked between November 27 and December 15. If the banking data of 40 million customers were stolen, on the one hand, the personal data of another 70 million customers were stolen on the other hand (names, postal addresses, telephone numbers, and email addresses). And it was not Target which discovered the attack. The American secret services had detected abnormal bank movements and warned the brand. According to several US security services, the hacker group was located in Eastern Europe. It had installed malware in cash registers to read information from the credit card terminals. This technique is known as RAM Scraping. Once the data had been hijacked, the attackers had been resold them on the black market. Two Mexican were arrested in January 2014 in Texas for using the stolen data.
6. Alteryx Data Leak Exposes 123 Million Households
A marketing analytics firm, left an unsecured database online that publicly exposed sensitive information for about 123 million U.S. households. The data included 248 fields of information for each household. The information ranged from addresses and income to ethnicity and personal interests. Details included contact information, mortgage ownership, financial histories and whether a household contained a dog or cat enthusiast but not the names.
All of this was exposed on a publicly accessible AWS S3 storage cache.
5. Equifax: a tricky crisis management
A few days ago, Equifax, an American credit company, revealed that it suffered a cyber attack last July. The personal data (names, birthdates, social insurance numbers, driving license) of 143 million American, Canadian and British customers are affected as well as 200,000 credit card numbers. Complaints against the company as well as suspicions of insider dealing are accumulating. Indeed, on the one hand, the vulnerability of Apache Struts used by the hackers was well known and on the other hand, several executives of the company sold strongly actions a few days before the security breach was made public.
4. Adult Friend Finder exposed
In 2015, the dating libertines site was attacked for the first time. The information (pseudonyms, dates of birth, postal codes, IP addresses, and sexual preferences) of 4 million accounts were made public on a forum only accessible on Tor. Recovered by malicious people, the data could have been used for spam campaigns, identity theft or blackmail. However, no banking data had been hijacked.
But the following year...
...Adult Friend Finder faced a new attack, much more violent than the first one. This time it was not 4 million accounts pirated but more than 400 million. The stolen information was less sensitive but in total, 20 years of personal data were stolen. Attackers used a LFI (Local File Inclusion) breach, a technique that consists of introducing a local or remote file into an online resource. In addition, some former users had the unpleasant surprise to learn their personal information had not been deleted despite their accounts cancellations. This hacking record had largely dethroned the AshleyMadison site cyberattack. (In August 2015, the Ashley Madison extramarital dating site was hacked and personal data (names, email addresses, phones, sexual preferences ...) of more than 30 million users across more than 40 countries recovered)
3. Marriott hotels: privacy of 500 million customers compromised
Information from 500 million guests at the Marriott-owned Starwood hotel group has been compromised. Including banking data. The rift had been open since 2014 and was spotted last September. Even, if as Marriott says, the number of customers that suffered a breach of personal information is anywhere near 327 million, the implications are massive. Indeed, information accessed includes payment information, names, mailing addresses, phone numbers, email addresses, passport numbers, and even details about the Starwood Preferred Guest (SPG) account, a high-end card recently launched by the American Express credit card issuer for regular travelers.
"Marriott was first alerted to a potential breach in September, it said, when an internal security tool found someone was trying to access its database. It then found that people seemed to have been in the database since 2014, and they had copied information apparently with a view to taking it."
2. Theft of more than one billion passwords
In August 2014, the IT security company Hold Security revealed that Russian hackers had stolen 1.2 billion logins and passwords on 420,000 websites around the world. And this would have allowed the group of hackers "CyberVor" to access 500 million email accounts. Hackers used programmed botnets to visit sites and perform vulnerability tests. In order to exploit SQL injection vulnerabilities and access databases. If the attack is notifiable on a large scale, it has ultimately had no major consequences. According to the FBI, the information has only been used in a large spam campaign on social networks for instance but this hacking record remains a mystery for the organization.
1. Yahoo!: hackers favorite target?
Last year, Yahoo! announced it had suffered a cyber attack in 2014 that affected 500 million user accounts. It had constituted the largest massive hacking of individual data directed against a single company. Names, dates of birth, telephone numbers and passwords were stolen. If the company had assured that the banking data had not been affected, it recommended its users to be careful. Before that, in 2012, the hacker “Peace” had sold 200 million dollars of usernames and passwords for $1900.
Because bad things always come in threes...
... in March, Yahoo! has confessed to being hacked once again. This time, "only" 32 million accounts had been affected. This cyberattack relaunched the investigation of the 2014 hack, as the attackers used a stolen tool that year. So they created malicious cookies allowing them to log in without the passwords. As a result for Yahoo!, the firm was bought by Verizon in 2017 for $ 4.5 million instead of the $ 4.8 million announced in 2016. Update: Finally, Yahoo has just admitted that all the 3 billion user accounts had been hacked in 2013. This cyber-attack is the most important in the Internet history.
Will you be the next?
While the previous cyber attacks are impressive, many more are taking place every day in a different business sector or through different means. This summer the ransomware Wannacry and NotPetya have made a lot of talks. More recently, HBO lost 1.5 terabytes of data, TV show episodes, scripts, manager emails and some actors phone numbers of the flagship Game of Thrones. Finally, in another sector, dozens of US energy suppliers have been attacked and hackers can cut electricity anywhere in the United States at any time. < strong>How to protect against cyber attacks? Updating IT systems is the first step, but the best is to continuously detect vulnerabilities and fix them quickly to avoid attacks. This is why our full stack security solutions were developed: to allow our customers to better manage their vulnerabilities and give them the keys to improve the security of their systems.