A History of Cyber Security Attacks 1980 to Present a History of Cyber Security Attacks 1980 to Present
Total Page:16
File Type:pdf, Size:1020Kb
A History of Cyber Security Attacks 1980 to Present http://taylorandfrancis.com A History of Cyber Security Attacks 1980 to Present Bruce Middleton CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2017 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper International Standard Book Number-13: 978-1-4987-8586-0 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans- mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright .com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents P REFACE ix A BOUT THE AUTHOR xiii PART I THE 1980 S C HA P TER 1 K EVIN M ITNIC K 3 C HA P TER 2 THE 414 S 11 C HA P TER 3 L EGION OF D OO M 15 C HA P TER 4 C HAOS C O mp UTER C LUB 19 C HA P TER 5 FRY G UY 25 C HA P TER 6 FRE D C OHEN 29 C HA P TER 7 M ORRIS WOR M (I NTERNET WOR M) 33 PART II THE 1990 S C HA P TER 8 N AHSHON EVEN -C HAI M 39 C HA P TER 9 M ASTERS OF D ECE P TION 43 C HA P TER 10 O P E R ATI O N S UN D EVI L 47 C HA P TER 11 G RIFFISS AFB AN D THE KOREAN ATO M IC RESEARCH I NSTITUTE 51 V VI CONTENTS C HA P TER 12 E HU D TENENBAU M 61 C HA P TER 13 THE B ROTHERHOO D OF WAREZ 65 PART III THE 2000 S C HA P TER 14 M AFIABOY 69 C HA P TER 15 O P E R ATI O N S HA DY RAT—2006 71 C HA P TER 16 N IGHT D RAGON —2006 81 C HA P TER 17 Z EUS —2007 85 C HA P TER 18 O P E R ATI O N AURORA—2009 95 C HA P TER 19 STUXNET —2010 99 C HA P TER 20 O P E R ATI O N P OTAO E X P RESS —2011 105 C HA P TER 21 SAU D I A RA M CO —2012 113 C HA P TER 22 TARGET DATA B REACH —2013 119 C HA P TER 23 N EI M AN M ARCUS —2013 125 C HA P TER 24 M ICHAE L S AT TAC K—2013 129 C HA P TER 25 P.F. C HANG —2013 133 C HA P TER 26 H AV E X—2014 135 C HA P TER 27 S HE ll SHOC K—2014 139 C HA P TER 28 H EARTB L EE D —2014 143 C HA P TER 29 U NICORN B UG —2014 151 C HA P TER 30 H O M E D E P OT —2014 155 C HA P TER 31 SA llY B EAUTY B REACH —2014 159 C HA P TER 32 G OO dw I ll—2014 163 C HA P TER 33 S U P E RVA LU —2014 167 C HA P TER 34 UPS —2014 171 C HA P TER 35 J I mm Y J OHN’S —2014 175 C HA P TER 36 DAIRY Q UEEN —2014 179 C HA P TER 37 STA pl ES —2014 183 C HA P TER 38 K M ART —2014 185 CONTENTS VII C HA P TER 39 S ONY P ICTURES —2014 187 C HA P TER 40 JPM ORGAN C HASE —2014 191 C HA P TER 41 A NTHE M H EA LTHCARE AT TAC K—2015 195 C HA P TER 42 A SH L EY M A D ISON DATA B REACH —2015 201 C HA P TER 43 B L AC KE NERGY—2015 207 C HA P TER 44 SAN dwOR M —2015 215 C HA P TER 45 HSBC O N LINE C YBER-AT TAC K—2016 219 C HA P TER 46 PANA M A PA P ERS —2016 221 A pp EN D IX 225 I N D EX 235 http://taylorandfrancis.com Preface The past 45 years has seen a phenomenal growth in the area of data communications, to say the least. During the Vietnam War, one of my duty stations was on an island out in the China Sea. I was part of a Signal Intelligence group, intercepting and decoding wartime com- munications traffic. We did our best to decode and analyze the infor- mation we intercepted, but there were many times when we required the help of a high-end (at that time) mainframe computer system. Did we have a communication network in place to just upload the data to the mainframe, let it do the processing, and then download them back to us? Not a chance! We had to take the large magnetic tapes, give them to the pilots on the SR-71 Blackbird, and fly them to the United States for processing on the mainframe computer system. Once the results were obtained, we would receive a telephone call informing us of any critical information that was found. It’s hard to believe now that 45 years ago that’s the way things were done. Fast forward to today. Now we have data networks in place that allow us to transmit information to/from virtually any location on earth (and even in the outer space to a degree) in a timely and efficient manner. But what did this tremendous enhancement in communica- tions technology bring us? Another place for criminal and terrorist activity to take place. Who are these criminals and terrorists in cyber- space? You could start with organized crime such as the Mafia and IX X PREFACE others. What is their major focus here? Financial activity of course; they have found a new way to “mismanage” the financial resources (among other things) of others. We also have foreign espionage activi- ties making good use of our enhanced communication systems. They routinely break into government, military, and commercial computer networked systems and steal trade secrets, new designs, new formu- las, and so on. Even the data on your home computer are not safe. If you bring your work home or handle your finances on your computer system, both your personal data and your employers’ data could eas- ily be at risk. I could go on, but I’m sure you get the picture. And of course we have terrorists making use of our data networks for a vari- ety of activities such as training malicious personnel globally to build home-made bombs and other malicious devices, using the Internet to convince others to follow their way of life (propaganda), using social media (Twitter, Facebook, and various others) for planning purposes, and so on. Why is it like this? Why can’t we make these communication sys- tems fully secure? Think about it. Banks and homes and businesses have been in existence as far back as we can remember. Despite all the security precautions put in place for banks, homes, aircraft, and businesses, we haven’t been able to fully secure them. There are still bank robberies, aircraft hijackings, and businesses and homes being broken into. Almost nothing in the physical world is really secure. If people want to focus and target something, more than likely they will obtain what they want (if they have the time, patience, and other sufficient resources behind them). We shouldn’t expect it to be any different in cyberspace. Just like in the physical world, where we have to be constantly alert and on guard against attacks on our govern- ment, military, corporations, and homes, in cyberspace, we have to be even more alert. Why? Because now people can come into your homes, your business, your secured government, and military facili- ties without being physically seen. They can wreak havoc, change your formulas, change your designs, alter your financial data, and obtain copies of documents…all without you ever knowing they were there.