You can edit almost every page by Creating an account. Otherwise, see the FAQ.

List of security hacking incidents

From EverybodyWiki Bios & Wiki


This is a list of security hacking incidents.

1970s[edit]

1980s[edit]

1990s[edit]

  • A woman who goes by the handle Natasha Grigori started out in the early starts running a bulletin-board system for software pirates. Now, at age “40-plus,” she’s the founder of antichildporn.org, a group of hackers who use their skills to track kiddie-porn distributors and pass the information on to law enforcement.
  • 1990Operation Sundevil introduced. After a prolonged sting investigation, Secret Service agents swoop down on organizers and prominent members of BBSs in 14 U.S. cities including the Legion of Doom, conducting early-morning raids and arrests. The arrests involve and are aimed at cracking down on credit-card theft and telephone and wire fraud. The result is a breakdown in the hacking community, with members informing on each other in exchange for immunity. The offices of Steve Jackson Games are also raided, and the role-playing sourcebook GURPS Cyberpunk is confiscated, possibly because the government fears it is a "handbook for computer crime". Legal battles arise that prompt the formation of the Electronic Frontier Foundation.
  • 1990 — LOD and MOD engaged in almost two years of online warfare — jamming phone lines, monitoring calls, trespassing in each other's private computers. Then the Feds cracked down. For Phiber and friends, that meant jail.
  • 1991
    • Rumors circulate about the "Michelangelo" virus, expected to crash computers on March 6, 1992, the artist's 517th birthday. Doomsday passes without incident.
    • Kevin Poulsen is captured and indicted for stealing military documents.
    • resulted in jail sentences for four members of the Masters of Deception. Phiber Optik spent a year in federal prison.
  • 1992 — Release of the movie Sneakers, in which security experts are blackmailed into stealing a universal decoder for encryption systems.
  • 1992 — Hackers break into GAFB, NASA and KARI.
  • 1993
    • During radio station call-in contests, hacker-fugitive Kevin Poulsen and two friends rig the stations' phone systems to let only their calls through, and "win" two Porsches, vacation trips, and $20,000. Poulsen, already wanted for breaking into phone-company systems, serves five years in prison for computer and wire fraud.
    • Texas A&M University professor receives death threats because a hacker used his computer to send 20,000 racist e-mails.
    • The first DEF CON hacking conference takes place in Las Vegas. The conference is meant to be a one-time party to say good-bye to BBSs (now replaced by the Web), but the gathering is so popular it becomes an annual event.
  • 1994 summer — Russian crackers siphon $10 million from Citibank and transfer the money to bank accounts around the world. Vladimir Levin, the 30-year-old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.
  • 1994 — Hackers adapt to emergence of the World Wide Web quickly, moving all their how-to information and hacking programs from the old BBSs to new hacker Web sites.
  • 1995
  • 1996
  • 1997
  • 1998
  • 1999
    • Software Security Goes Mainstream In the wake of Microsoft's Windows 98 release, 1999 becomes a banner year for security (and hacking). Hundreds of advisories and patches are released in response to newfound (and widely publicized) bugs in Windows and other commercial software products. A host of security software vendors release anti-hacking products for use on home computers.
    • The Electronic Civil Disobedience project, an online political performance-art group, attacks the Pentagon calling it conceptual art. It said it was protesting U.S. support of the Mexican suppression of rebels in southern Mexico. Carmin Karasic, helped write FloodNet, the tool used by ECD to bombard its opponents with access requests in a symbolic, harmless version of the denial-of-service attacks that took down CNN and Yahoo.
    • Classified computer systems at Kelly Air Force Base in San Antonio, Texas, come under attack from a number of locations around the world, but the attacks were detected and stopped by newly developed Defense Department systems.
    • U.S. Information Agency Web site is hacked for the second time in six months. The hacker circumvented the agency's Internet security and damaged the hard drive, leaving behind the message "Crystal, I love you" and the signature "Zyklon."
    • Rep. Curt Weldon, R-Pennsylvania, says Defense Department computers are under a "coordinated, organized" attack from hackers. "You can basically say we are at war," he said.
    • U.S. President Bill Clinton announces a $1.46 billion initiative to improve government computer security. The plan would establish a network of intrusion detection monitors for certain federal agencies and encourage the private sector to do the same.
    • Kevin Mitnick, detained since 1995 on charges of computer fraud, signs plea agreement.
    • March: The Melissa worm is released and quickly becomes the most costly malware outbreak to date.
    • April: The U.S. Justice Department declines to prosecute former CIA Director John Deutch for keeping 31 secret files on his home computer after he left office in 1996.
    • July: CULT OF THE DEAD COW releases Back Orifice 2000 at DEF CON
    • September: Level Seven hacks The US Embassy in China's Website Archived 1999-10-03 at the Wayback Machine and places racist, anti-government slogans on embassy site in regards to 1998 U.S. embassy bombings
    • October: American Express introduces the "Blue" smart card, the industry's first chip-based credit card in the US.
    • "Unidentified hackers seized control of a British military communication satellite and demanded money in return for control of the satellite.
    • December: David L. Smith pleads guilty to creating and releasing the Melissa virus. It's one of the first times a person is prosecuted for writing a virus.
    • December 29: the Legions of the Underground (LoU) declared cyberwar on Iraq and China with the intention of disrupting and disabling internet infrastructure.

2000s[edit]

2000[edit]

Jennifer Grannick is an in-demand lawyer who explains hackers’ rights to them at conventions.

  • A 19-year-old Midwestern law student who calls herself ViXen900 is a member of the HNC hackers’ group and advises them on legal issues.
  • Kevin Mitnick is released from prison.

2006[edit]

  • January: One of the few worms to take after the old form of malware, destruction of data rather than the accumulation of zombie networks to launch attacks from, is discovered. It had various names, including Kama Sutra (used by most media reports), Black Worm, Mywife, Blackmal, Nyxem version D, Kapser, KillAV, Grew and CME-24. The worm would spread through e-mail client address books, and would search for documents and fill them with garbage, instead of deleting them to confuse the user. It would also hit a web page counter when it took control, allowing the programmer who created it as well as the world to track the progress of the worm. It would replace documents with random garbage on the third of every month. It was hyped by the media but actually affected relatively few computers, and was not a real threat for most users.
  • February: Direct-to-video film The Net 2.0 is released, as a sequel to The Net, following the same plotline, but with updated technology used in the film, using different characters, and different complications. The director of The Net 2.0, Charles Winkler, is son of Irwin Winkler, the director of The Net.
  • May: Jeanson James Ancheta receives a 57 month prison sentence, [2] Archived 2007-09-27 at the Wayback Machine and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer equipment [3] Archived 2007-09-27 at the Wayback Machine.
  • May: Largest Defacement in Web History is performed by the Turkish hacker iSKORPiTX who successfully hacked 21,549 websites in one shot. [4]
  • July: Robert Moore and Edwin Pena featured on Americas Most Wanted with Kevin Mitnick presenting their case commit the first VOIP crime ever seen in the USA. Robert Moore served 2 years in federal prison with a $152,000.00 restitution while Edwin Pena was sentenced to 10 years and a $1 million restitution.
  • September: Viodentia releases FairUse4WM tool which would remove DRM information off WMA music downloaded from music services such as Yahoo Unlimited, Napster, Rhapsody Music and Urge.

2007[edit]

  • May 17: Estonia recovers from massive denial-of-service attack[1]
  • June 13: FBI Operation Bot Roast finds over 1 million botnet victims[2]
  • October 7: Trend Micro website successfully hacked by Turkish hacker Janizary(a.k.a Utku)[6]
  • November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments[7]

2008[edit]

  • January 18: Project Chanology Anonymous attacks Scientology website servers around the world. Private documents are stolen from Scientology computers and distributed over the Internet
  • March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including The Pentagon. They operate from a bare apartment on a Chinese island.[8]

2009[edit]

  • April 1: Conficker worm infiltrated millions of PCs worldwide including many government-level top-security computer networks[9]

2001[edit]

  • Microsoft becomes the prominent victim of a new type of crack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.
  • February — A Dutch cracker releases the Anna Kournikova virus, initiating a wave of viruses that tempts users to open the infected attachment by promising a sexy picture of the Russian tennis star.
  • March — FBI agent Robert P. Hanssen is charged with using his computer skills and FBI access to spy for the Russians.
  • March — The L10n worm is discovered in the wild attacking older versions of BIND DNS.
  • April — FBI agents trick two Russian crackers into coming to the U.S. and revealing how they were cracking U.S. banks.
  • May
    • Spurred by elevated tensions in Sino-American diplomatic relations, U.S. and Chinese hackers engage in skirmishes of Web defacements that many dub "The Sixth Cyberwar".
    • Crackers begin using "pulsing" zombies, a new DDoS method that has zombie machines send random pings to targets rather than flooding them, making it hard to stop attacks.
    • AV experts identify Sadmind, a new cross-platform worm that uses compromised Sun Solaris boxes to attack Windows NT servers.
  • July — Russian programmer Dmitry Sklyarov is arrested at the annual Def Con hacker convention. He is the first person criminally charged with violating the Digital Millennium Copyright Act (DMCA).
  • August — Code Red, the first polymorphic worm, infects tens of thousands of machines.
  • September — The World Trade Center and Pentagon terrorist attacks spark lawmakers to pass a barrage of anti terrorism laws many of which group Hackers as terrorists and remove many long standing personal freedoms in the name of safety.
  • September — Nimda, a new memory-only worm, wreaks havoc on the Internet, quickly eclipsing Code Red's infection rate and recovery cost.
  • November — Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines.
  • November — The European Union adopts the controversial cybercrime treaty, which makes the possession and use of hacking tools illegal.

l/skl

2002[edit]

2003[edit]

2004[edit]

  • March - Myron Tereshchuk arrested for attempting to extort $17 million from Micropatent. FBI agents find explosives and biological weapons in the course of the raid.
  • December — Brian Salcedo sentenced to 9 years in prison for his involvement in hacking into the corporate systems of Lowe's home improvement stores and attempting to steal customer credit card information. The sentence far exceeds the 5 1/2 years that hacker Kevin Mitnick spent behind bars. Prosecutors said the three men tapped into the wireless network of a Lowe's store in Southfield, Mich., used that connection to enter the chain's central computer system in North Wilkesboro, N.C., and installed a program to capture credit card information. No data was actually collected however.
  • July 13 - Informationleak.com is born and encompasses the ideals held by many of the groups from the so called golden age of hacking.

2005[edit]

  • September 15 - An unnamed teenager is sentenced to 11 months for gaining access to T-Mobile USA's network and exploiting Paris Hilton's sidekick, it turns out this teen is also responsable for breaking in to data broker LexisNexus's system in January.
  • November 4 - Jeanson James Ancheta, who prosecutors say was a member of the "Botmaster Underground", a group of script kiddies who are mostly noted for their excessive use of bot attacks and propogating vast amounts of spam on the internet, was taken into custody after being lured to FBI offices in Los Angeles.

2010s[edit]

2010[edit]

  • January 12: Operation Aurora Google publicly reveals[10] that it has been on the receiving end of a "highly sophisticted and targetted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google"
  • June: Stuxnet The Stuxnet worm is found by VirusBlokAda. Stuxnet affects Windows computers throughout the world. Later, it is learned that Stuxnet can also affect some Unix systems.

2011[edit]

  • The hacker group Lulz Security is formed.
  • April 9: Bank of America website got hacked by a Turkish hacker named JeOPaRDY. An estimated 85,000 credit card numbers and accounts were reported to have been stolen due to the hack. Bank officials say no personal customer bank information is available on that web-page. Investigations are being conducted by the FBI to trace down the incriminated hacker.[11]
  • April 17: An "external intrusion" sends the PlayStation Network offline, and compromises personally identifying information (possibly including credit card details) of its 77 million accounts, in what is claimed to be one of the five largest data breaches ever.[12]
  • Computer hacker sl1nk releases information of his penetration in the servers of the Department of Defense (DoD), Pentagon, NASA, NSA, US Military, Department of the Navy, Space and Naval Warfare System Command and other UK/US government websites.[13]
  • September: Bangladeshi hacker TiGER-M@TE made a world record in defacement history by hacking 700,000 websites in a single shot.[14]
  • October 16: The YouTube channel of Sesame Street was hacked, streaming pornographic content for about 22 minutes.[15]
  • November 1: The main phone and Internet networks of the Palestinian territories sustained a hacker attack from multiple locations worldwide.[16]
  • November 7: The forums for Valve's Steam service were hacked. Redirects for a hacking website, Fkn0wned, appeared on the Steam users' forums, offering "hacking tutorials and tools, porn, free giveaways and much more."[17]
  • December 14: Five members of the Norwegian hacker group, Noria, were arrested, allegedly suspected for hacking into the email account of the militant extremist Anders Behring Breivik (who perpetrated the 2011 attacks in the country).[18]

2012[edit]

  • A Saudi hacker, 0XOMAR, published over 400,000 credit cards online,[19] and threatened Israel to release 1 million credit cards in the future. In response to that incident, an Israeli hacker published over 200 Saudi's credit cards online.[20][21]
  • January 7: "Team Appunity", a group of Norwegian hackers, were arrested for breaking into Norway's largest prostitution website then publishing the user database online.[22]
  • February 3: Marriott was hacked by a New Age ideologist, Attila Nemeth who was resisting against the New World Order where he said that corporations are allegedly controlling the world. As a response Marriott reported him to the United States Secret Service.[23]
  • February 8: Foxconn is hacked by a hacker group, "Swagg Security", releasing a massive amount of data including email and server logins, and even more alarming - bank account credentials of large companies like Apple and Microsoft. Swagg Security stages the attack just as a Foxconn protest ignites against terrible working conditions in southern China.[24]
  • May 24: WHMCS is hacked by UGNazi, they claim that the reason for this is because of the illegal sites that are using their software.
  • May 31: MyBB is hacked by newly founded hacker group, UGNazi, the website was defaced for about a day, they claim their reasoning for this was because they were upset that the forum board Hackforums.net uses their software.
  • June 5: The social networking website LinkedIn has been hacked and the passwords for nearly 6.5 million user accounts are stolen by cybercriminals. As a result, a United States grand jury indicted Nikulin and three unnamed co-conspirators on charges of aggravated identity theft and computer intrusion.
  • August 15: The most valuable company in the world Saudi Aramco is crippled by a cyber warfare attack for months by malware called Shamoon. Considered the biggest hack in history in terms of cost and destructiveness . Carried out by an Iranian attacker group called Cutting Sword of Justice.[25] Iranian hackers retaliated against Stuxnet by releasing Shamoon. The malware destroyed over 35,000 Saudi Aramco computers, affecting business operations for months.
  • December 17: Computer hacker sl1nk announced that he has hacked a total of 9 countries' SCADA systems. The proof includes 6 countries: France, Norway, Russia, Spain, Sweden and the United States.[26]

2013[edit]

  • The social networking website Tumblr is attacked by hackers. Consequently, 65,469,298 unique emails and passwords were leaked from Tumblr. The data breach's legitimacy is confirmed by computer security researcher Troy Hunt.[27]

2014[edit]

  • February 7: The bitcoin exchange Mt.Gox filed for bankruptcy after $460 million was apparently stolen by hackers due to "weaknesses in [their] system" and another $27.4 million went missing from its bank accounts.[28]
  • October: The White House computer system was hacked.[29] It was said that the FBI, the Secret Service, and other U.S. intelligence agencies categorized the attacks "among the most sophisticated attacks ever launched against U.S. government systems."[30]
  • November 24: In response to the release of the film The Interview, the servers of Sony Pictures are hacked by a hacker group calling itself "Guardian of Peace".
  • November 28: The website of the Philippine telecommunications company Globe Telecom was hacked in response to the poor internet service they are distributing.[31]

2015[edit]

2016[edit]

2017[edit]

2018[edit]

2019[edit]

2020s[edit]

2020[edit]

  • Anonymous announced cyber-attacks of at least five Malaysian websites including that of Johor and Sabah state governments as well as the International Trade and Industry Ministry. As a result, eleven individuals were nabbed as suspects.
  • In February, an incident occurred where personal information belonging to over 10.6 million guests of MGM Resorts hotels was leaked on a hacking forum. The leaked data consisted of contact information of numerous former hotel guests, including well-known individuals such as Justin Bieber, Twitter CEO Jack Dorsey, and several government officials. [69]
  • In June 2020, Wattpad, a user-generated stories website, experienced a significant data breach that resulted in the exposure of nearly 268.745.495 million records. This breach had severe consequences as the compromised data was initially sold in private sales for over $100,000. Eventually, it was made available on a public hacking forum, where it was widely shared without any cost. As a result, a vast amount of personal information, including names, usernames, email and IP addresses, genders, general geographic location, birth dates, and passwords stored as bcrypt hashes, were exposed in this incident. [70]

2021[edit]

  • On May 7, 2021, The Colonial Pipeline Cyberattack took place on May 7, 2021, when Colonial Pipeline had a ransomware attack.The cyberattack halted all of the pipelines operations.
  • Brenntag Ransomware was attacked when a group of hackers extracted 150GB of data during the attack and threatened to leak it unless the company paid $7.5 million. [71]
  • From December 2021 to April 2022, a series of unauthorized intrusions occurred when an unidentified hacker gained access to numerous Gmail accounts. These accounts were then exploited to send deceptive emails, disguised as messages from the individuals that were hacked into and sent to specific targets. These emails reportedly contained death threats, efforts to sabotage relationships, and even made it appear as though the impersonated individuals were engaging in bullying behavior.
  • In the month of August, T-Mobile experienced a data breach. According to reports, the breach resulted in the compromise of customer information such as names, addresses, Social Security numbers, driver's licenses, IMEI and IMSI numbers, as well as ID information. It is estimated that around 50 million existing and potential customers may have been affected by this incident. Taking responsibility for the hack, a 21-year-old individual claimed to have successfully obtained almost 106GB of data from the renowned telecoms giant. [72]
  • In the month of March, a group of hackers caused significant disruption to Australia's Channel 9 News live broadcast. This incident led to the channel being unable to air multiple shows and also impacted the production of 9 News' printed materials. The attack, which was confirmed to be a ransomware attack, not only successfully took shows off the air but also resulted in the staff being locked out of their email accounts, blocked from accessing the internet, and caused a halt in the production systems for printed materials. It is worth noting that this cyber-attack marked a significant milestone as it was the largest one ever experienced by an Australian media company. [73]

2022[edit]

  • Social media platform Twitter confirms that 5.4 million accounts was stolen
  • Student loan data exposes 2.5 million social security numbers
  • In January, Crypto.com made a statement regarding a security breach that occurred within its network. Hackers were able to gain unauthorized access and successfully stole over $30 million worth of cryptocurrency. This incident impacted nearly 500 customers. Crypto.com took immediate action and reassured its affected users by repaying them for any losses incurred due to the breach. It is worth noting that the hackers were able to bypass Crypto.com's two-factor authentication (2FA) protocols to carry out the attack. [74]
  • Microsoft was hacked by a hacking group called Lapsus$


References[edit]

  1. "Estonia recovers from massive denial-of-service attack - Network World". Archived from the original on 2013-12-03. Retrieved 2022-12-28. Unknown parameter |url-status= ignored (help)
  2. FBI: Operation Bot Roast finds over 1 million botnet victims |NetworkWorld.com Community
  3. McMillan, Robert (June 21, 2007). "Pentagon shuts down systems after cyberattack". InfoWorld. IDG. Retrieved 2008-03-10.
  4. Aitoro, Jill R. (March 5, 2008). "Defense officials still concerned about data lost in 2007 network attack". Government Executive. National Journal Group. Retrieved 2008-03-10.[permanent dead link]
  5. "BM'nin sitesi hacklendi |Haber'in Doğru Adresi, Haber, Yerel Haber, Siyaset Haberleri, Sondakika Haberleri, Gazeteler, Haberler". Archived from the original on 2011-09-30. Retrieved 2022-12-28. Unknown parameter |url-status= ignored (help)
  6. Trend Micro Victim Of Malicious Hack
  7. FBI 'Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments |NetworkWorld.com Community
  8. "Chinese hackers: No site is safe". CNN. March 7, 2008. Retrieved 2008-03-07.
  9. Markoff, John (2009-08-26). "Defying Experts, Rogue Computer Code Still Lurks". New York Times. Retrieved 2009-08-27.
  10. "A new approach to China". Google Inc. 2010-01-12. Retrieved 17 January 2010.
  11. Kumar, Mohit (26 March 2011). "Thousands of Bank of America Accounts Hacked !". The Hacker News - Biggest Information Security Channel. Retrieved 14 March 2015.
  12. Apr 27, 2011 10:56 AM ET (April 27, 2011). "PlayStation data breach deemed in 'top 5 ever' - Business - CBC News". Cbc.ca. Retrieved 2011-04-29.
  13. Is Department of Defense (DoD), Pentagon, NASA, NSA secure?, TheHackerNews, May 14, 2011.
  14. Kovacs, Eduard (26 September 2011). "700,000 InMotion Websites Hacked by TiGER-M@TE". softpedia. Retrieved 14 March 2015.
  15. John P. Mello Jr. "Sesame Street Hacked, Porn Posted". PC World. Retrieved 2011-10-26.
  16. Ashkar, Alaa. "PA Telecommunications minister: Palestinian Internet Under Hacking Attacks". IMEMC. Retrieved 2011-11-02.
  17. Ashcraft, Brian. "Steam Forums Apparently Hacked". Kotaku.
  18. Jonas Sverrisson Rasch. "News article about the arrests of Noria". Dagbladet. Retrieved 2012-12-14.
  19. Flock, Elizabeth (January 3, 2012). "Saudi hackers say they published Israeli credit card information". The Washington Post.
  20. Saudi Hacker Threatens to Release 1 Million Israeli Credit Card Numbers, Curt Hopkins, 6 January 2012
  21. "Israeli hacker retaliates to credit card hacking". BBC News. January 12, 2012.
  22. Kripos. "(Norwegian) Tre personer siktet for datainnbrudd". Kripos. Archived from the original on 2013-07-28. Retrieved 2012-04-25. Unknown parameter |url-status= ignored (help)
  23. "Marriott,Hack,Extortion, Arrest and important websites hacked". Feb 3, 2012.
  24. Garside, Juliette (February 9, 2012). "Apple supplier Foxconn hacked in factory conditions protest". The Guardian. London.
  25. "Jose Pagliery: The inside story of the biggest hack in history". 5 August 2015. Retrieved 19 August 2012.
  26. "SCADA systems of 6 countries breached by Sl1nk". Archived from the original on 2016-03-04. Retrieved 2015-06-15. Unknown parameter |url-status= ignored (help)
  27. "Hackers Stole 65 Million Passwords From Tumblr, New Analysis Reveals - Motherboard". Motherboard.vice.com. 2016-05-30. Retrieved 2017-07-01.
  28. "The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster - WIRED". WIRED. 2014-03-03. Retrieved 14 March 2015.
  29. "White House computer network 'hacked' - BBC". BBC. 2014-10-29. Retrieved 6 November 2015.
  30. Evan Perez; Shimon Prokupecz (8 April 2015). "How the U.S. thinks Russians hacked the White House". CNN. Retrieved 17 December 2016. Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
  31. Michael Angelo Santos. "Globe Website was Hacked by Blood Sec Hackers". Coorms.
  32. Zengerle, Patricia; Cassella, Megan (2015-07-09). "Estimate of Americans hit by government personnel data hack skyrockets". Reuters. Retrieved 2015-07-09.
  33. Barrett, Devlin (5 June 2015). "U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say". Wall Street Journal. Retrieved 5 June 2015.
  34. Sanders, Sam (4 June 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records At Risk". NPR. Retrieved 5 June 2015.
  35. "ISIL-Linked Kosovo Hacker Sentenced to 20 Years in Prison". Justice Department of the United States. 2016-09-23.
  36. Romm, Tony; Geller, Eric. "WikiLeaks supporters claim credit for massive U.S. cyberattack, but researchers skeptical". POLITICO. Retrieved 22 October 2016.
  37. Larson, Selena (2017-11-22). "Uber's massive hack: What we know". CNNMoney. Retrieved 2019-06-20.
  38. Mussa, Matthew (2017-04-30). "'The Dark Overlord', Netflix Hacker: 5 Fast Facts You Need to Know". Heavy.com. Retrieved 2017-07-01.
  39. Brenner, Bill (2017-05-16). "WannaCry: the ransomware worm that didn't arrive on a phishing hook". Naked Security. Retrieved 2017-05-18.
  40. "Cyber-attack: Europol says it was unprecedented in scale". BBC News. 2017-05-13. Retrieved 2017-05-18.
  41. "Hackers seize unreleased Disney film, demand 'huge' Bitcoin ransom – report". RT International. Retrieved 2019-06-20.
  42. 42.0 42.1 42.2 Hern, Alex (1970-01-01). "Hackers publish private photos from cosmetic surgery clinic | Technology". The Guardian. Retrieved 2017-05-31.
  43. "Plastic surgery clinics hacked; 25,000 photos, data online". The Seattle Times. Retrieved 2017-05-31.
  44. "Plastic surgery clinics hacked; 25,000 photos, data online". Abcnews.go.com. Archived from the original on 2017-05-31. Retrieved 2017-05-31. Unknown parameter |url-status= ignored (help)
  45. "Global ransomware attack causes chaos". BBC News. 27 June 2017. Retrieved 27 June 2017.
  46. Constantin, Lucian (2019-04-10). "Group behind TRITON industrial sabotage malware made more victims". CSO Online. Retrieved 2019-07-17.
  47. Haselton, Todd (2017-09-07). "Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers". cnbc.com. Retrieved 2017-10-16.
  48. Hopkins, Nick (25 September 2017). "Deloitte hit by cyber-attack revealing clients' secret emails". Theguardian.com. Retrieved 16 October 2017.
  49. Stack, Liam (2017-12-06). "North Carolina County Refuses to Pay $23,000 Ransom to Hackers". The New York Times. ISSN 0362-4331. Retrieved 2019-06-20.
  50. McWhirter, Joseph De Avila and Cameron. "Atlanta Hit With Cyberattack". WSJ. Retrieved 2019-06-20.
  51. Press, Associated. "Two Iranians Indicted in Atlanta on Cyber Crime Charges". WSJ. Retrieved 2019-06-20.
  52. Ubuntu Community (2018-05-21). "Variant4". Archived from the original on 2018-05-22. Retrieved 2018-05-21. Unknown parameter |url-status= ignored (help)
  53. Adams, Ian (2018-05-01). "Wasaga Beach town hall computers seized by hackers". Simcoe.com. Retrieved 2019-06-20.
  54. "Lazy FP state restore". Intel. 13 June 2018. Retrieved 18 June 2018.
  55. Rondinone, Nicholas. "Hackers Target Connecticut City, Force Officials To Pay $2,000 Ransom". courant.com. Retrieved 2019-06-20.
  56. "Feds indict ransomware hackers of Allscripts, others". Modern Healthcare. 2018-11-29. Retrieved 2019-06-20.
  57. Cimpanu, Catalin. "Georgia county pays a whopping $400,000 to get rid of a ransomware infection". ZDNet. Retrieved 2019-06-20.
  58. Staff, WRGB (2019-03-30). "City of Albany experiences cyber attack". WRGB. Retrieved 2019-06-20.
  59. Moench, Mallory (2019-03-31). "Albany cyber attack affecting records, police". Times Union. Retrieved 2019-06-20.
  60. "Augusta city offices hit by computer virus". WCSH. Retrieved 2019-06-20.
  61. "Hacker wanted more than $100K to restore Maine city's computers". Bangor Daily News. Retrieved 2019-06-20.
  62. WITN. "FBI now investigating "RobinHood" ransomware attack on Greenville computers". www.witn.com. Retrieved 2019-06-20.
  63. Shalby, Colleen (2019-04-18). "Ryuk malware hacked a county government website. It's been down for 6 days". latimes.com. Retrieved 2019-06-20.
  64. Chokshi, Niraj (2019-05-22). "Hackers Are Holding Baltimore Hostage: How They Struck and What's Next". The New York Times. ISSN 0362-4331. Retrieved 2019-06-20.
  65. Campbell, Ian Duncan, Colin. "Baltimore city government computer network hit by ransomware attack". baltimoresun.com. Retrieved 2019-06-20.
  66. Zhang, Ian Duncan, Christine. "Analysis of ransomware used in Baltimore attack indicates hackers needed 'unfettered access' to city computers". baltimoresun.com. Retrieved 2019-06-20.
  67. Kamp, Scott Calvert and Jon. "Hackers Won't Let Up in Their Attack on U.S. Cities". WSJ. Retrieved 2019-06-20.
  68. CNN, Faith Karimi. "Florida city to pay $600K ransom to hacker who seized computer systems weeks ago". CNN. Retrieved 2019-06-20.
  69. "Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum". ZDNET. Retrieved 2023-08-02.
  70. "Wattpad data breach exposes account info for millions of users". www.bleepingcomputer.com. Retrieved 2023-08-03.
  71. "Chemical distributor pays $4.4 million to DarkSide ransomware". www.bleepingcomputer.com. Retrieved 2023-07-26.
  72. "T-Mobile data breach 2021: Here's what it means for securing your data". CNET. Retrieved 2023-09-09.
  73. "Cyber attack forces live TV shows off-air on Australia's Channel 9". BitDefender.
  74. Ramaswamy, Anita (2022-01-20). "2FA compromise led to $34M Crypto.com hack". TechCrunch. Retrieved 2023-09-09.


This article "List of security hacking incidents" is from Simple English Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:List of security hacking incidents.

Page kept on Wikipedia This page exists already on Wikipedia.