<<

The most dangerous cyber nightmares in recent years Halloween is the time of year for dressing up, watching scary movies, and telling hair-raising tales. Events in recent years have kept companies on high alert. Every day we are seeing an increase in carried out by organized organizations.

In a matter of seconds, these threats can destabilize large corporations, stealing large quantities of money and personal data, as well shake the very foundations of entire world powers.

Have a look at some of the most terrifying attacks of recent years. 2010 2011 2012

Operation Aurora RSA SecurID A series of cyberattacks carried out RSA suffered a security as a Publication and dissemination of worldwide, targeting 34 companies, result of a that sought internal exchanged between including . The attack was details about its SecureID system. personnel of the private intelligence perpetrated by a group of Chinese espionage agency Stratfor, as well as . PlayStation Network emails exchanged with clients of the firm. 77 million accounts were Australian Government compromised and blocked PS3 and DDoS attacks, carried out by the PlayStation Portable users from Linkedin online community , accessing the service for 23 hours. The of nearly 6.5 million against the Australian Government. user accounts were stolen by Russian cybercriminals. An attack coordinated jointly against opponents of piracy. 2013 2014

Cyberattack in Celebrity photos Cyber networks of major South 500 private photographs of several Korean banks and television celebrities, mostly women, were networks were shut down in an placed on and subsequently alleged act of cyber warfare. spread by other users on social networks. 4.6 million usernames and phone numbers were leaked in A group of hackers known as #GOP “SnapchatDB.info". leaked confidential data from the film studio Sony Pictures in the biggest attack the film industry has Yahoo! ever witnessed. The attack is Between 2013-2014, personal data believed to have been linked to the associated with 1 billion accounts release of the movie "." was stolen. Russian hacker theft This attack resulted in the theft of more than 1.2 trillion usernames and passwords associated with more than 500 million e-mail addresses. 420,000 websites were affected. 2015

Anthem medical Ashley Madison This medical insurer, the second largest A group of hackers stole data on the in the , was robbed of 80 site's user base and threatened to million records containing sensitive disclose user names and personal client data, including Social Security information if Ashley Madison did not numbers. close immediately.

US Office of Personnel VTech Management Fell victim to a that The largest breach in government data exposed the personal information of ever recorded in the history of the US. millions, including children. Affected 21.5 million. SWIFT Series of cyberattacks perpetrated by The leak provided evidence that the "Lazarus" using the SWIFT banking company was selling network, resulting in the successful software to governments in 35 countries, theft of millions of dollars including , the United States, Switzerland, , Italy, , and , sparking a global discussion on the legal use of these tools. Celebrity photos 500 private photographs of several celebrities, mostly women, were placed on 4chan and subsequently spread by other users on social networks.

Sony Pictures A group of hackers known as #GOP leaked confidential data from the film studio Sony Pictures in the biggest attack the film industry has ever witnessed. The attack is believed to have been linked to the release of the movie "The Interview."

Russian hacker password theft This attack resulted in the theft of more than 1.2 trillion usernames and passwords associated with more than 500 million e-mail addresses. 420,000 websites were affected.

2016

Bangladesh Bank A group of attackers managed to Multiple DDoS attacks on systems infect the system with and operated by Dyn Domain Name attempted to make fraudulent Service (DNS) left large platforms transfers amounting to $951 million. and Internet services inaccessible to In the end, “only” $81 million was users in Europe and North America. stolen. Russian interference in U.S. Hollywood Presbyterian Medical election Center The US Intelligence Community reported that there was Russian The hospital's system was interference in the US presidential hijacked by . They ended elections of 2016. up paying a 40 ransom to the hackers (US $17,000) to regain access to their system.

Democratic National Committe WikiLeaks published 19,252 emails and 8,034 attachments belonging to the internal governing body of the US Democratic Party. 2017

WannaCry Equifax Attack targeting the Windows Cyberattack that allowed access to the . WannaCry has been sensitive information of at least 143 described as an attack unprecedented million Americans. The biggest personal in size. It infected 230,000 in data theft in history. more than 150 countries.

Westminster Cyberattack which aimed to gain access to the e-mail accounts of a large number of politicians in the UK parliament.

Petya On June 27, 2017, yet another global ransomware attack began, paralyzing companies around the world. Known as , NotPetya and GoldenEye, its creators succeeded in installing it in some of the most important Ukrainian institutions, such as the National Bank and the Kiev subway system. Hackers and Organized Groups

Organized Groups Hackers

Anonymous New World Hackers NullCrew NSO Group Hector Monsegur CyberBerkut PayPal 14 PLA Unit 61398 PLATINUM Kristoffer von Hassel Pranknet Mustafa Al-Bassam GNAA RedHack LT Ryan Ackroyd Guccifer 2.0 Hacking Team The Jesterweev Iranian Cyber TeaMp0isoN Army Tailored Access Operations UGNazi LulzRaft Cyber Army LulzSec Spookiest Vulnerabilities

2010 2013 2014 2015 2016 2017

Evercookie iSeeYou JASBUG DROWN Shellshock Broadcom Wi-Fi POODLE Dirty COW EternalBlue Rootpipe DoublePulsar Silent Bob is Silent

Diabolic Malware

The Mask 2.0 NSA ANT CryptoLocker FinFisher Metulji Stars virus WannaCry R2D2 X-Agent Duqu Gameover The Solution: Adaptive Defense 360 Protect your business year-round and enjoy a bone-chilling Halloween

The solution consists of protection The platform uses contextual logic to against advanced threats and targeted reveal malicious behavior patterns and attacks, and that can even detect generate advanced cyber-defense unusual or suspicious behavior. A actions against known and unknown system that can safeguard data threats. confidentiality, information privacy, and the assets and reputation of a company. It analyzes, categorizes and correlates all the data gathered on cyber-threats, An intelligent platform that can help in order to carry out Prevention, security personnel on critical networks Detection, Response and Remediation react rapidly to threats and guarantee tasks. that they have the information they need to formulate an adequate It determines how data has been response. accessed and by whom and controls data leakage, whether due to malware or This is Adaptive Defense 360, the only employees. advanced cybersecurity system to combine latest generation protection It discovers and resolves system and the latest detection and vulnerabilities and those on installed remediation technology with the ability programs and prevents the use of to classify 100% of running processes. unwanted applications (toolbars, , add-ons, etc.). Adaptive Defense 360 classifies absolutely all active processes on endpoints, guaranteeing protection against known malware as well as zero-day attacks, advanced persistent threats and targeted attacks.

Limitless visibility, absolute control More information: pandasecurity.com/enterprise/solutions/adaptive-defense-360