The Top 15 Biggest Hacking Attacks Since 2000Last Updated by Valentine Milner on February 10, 2019
Cybercrime and online security have become one of the most significant social issues in the 21st century.
We’ve compiled a list of the 15 most significant cyber-attacks that remind us that online security and privacy should never go overlooked.
The 15 Biggest Hacking Attacks!
The online profile of so-called ransomware has grown tremendously within the last couple of years. Using phishing methods, it freezes or takes control of a system, and the perpetrators demand ransom in Bitcoin.
The WannaCry cyber-attack back in May 2017 was a ransomware cryptoworm, (viral software which can duplicate as it distributes itself). Wannacry spread fast, affecting vulnerable and old operating systems flagged by NSA but ignored years ago.
In days, thousands of organizations and business from 150 countries, including the UK’s National department of health services (NHS), were locked out their networks by the Wannacry encryption. The attackers demanded a hefty sum of money to unlock the set code.
2 The Bangladesh Bank Cyber Heist
Noted for the manner in which the hackers bypassed the IT systems of the Bangladesh Bank.
The attack caused concern for the way the culprits had infiltrated the SWIFT global financial cash transfer system, giving them the freedom to make any withdrawal under the supposed protection of the SWIFT system which before then was secure.
The criminal gang behind this had intended to withdraw close to $850 million before a simple spelling error aroused suspicion. The culprits still made away with approximately $81 million, of which only around $18 million has been recovered, and have previously been linked to attacks in other Asian Banks.
3 Mt Gox Bitcoin Exchange
There is a multitude of bitcoin exchanges or sites where you can purchase Bitcoin. In February 2014, the Mt Gox exchange, the largest in the world at the time, suddenly stopped trading.
The Exchange filed for bankruptcy when $460 million of Bitcoin was reported stolen when hackers gained access and altered the value of a bitcoin before transferring it.
French developer, Mark Kerpelẻs, who purchased Mt Gox in 2001, was later arrested for fraud and embezzlement, although not directly related to the bitcoin theft.
Spamhaus is one of the largest anti-spam apps in the world, keeping a block list of the servers known to be the source of malicious content.
When Spamhaus added Cyberbunker, a Dutch hosting service to this list, things took a dark path. It is alleged the Dutch company decided to retaliate and released a substantial DDoS attack which remains one of the largest ever seen.
5 PlayStation Network
In April 2011, the LulzSec syndicate of hackers breached the Sony PlayStation Network.
Gamers attempting to log in to play online were ‘hit’ with a message stating the systems were closed for maintenance. However, in actuality, hackers were systematically unlocking Sony’s security encryptions, gaining access to the personal information of more than 77 million users.
In 2011, this cyber-attack on the Citigroup financial services exposed the weak security in the organization’s online platforms. Hackers found a backdoor giving them access to valuable, private data.
All account information for 200,000 customers became exposed, including addresses, names, and financial details, with a total cash loss of around $2.7 million for the company. It’s widely considered the most catastrophic security failure and demonstrated how cyber-attacks target weaknesses in any online infrastructure.
There are several documented cases of malware used by the government for a specific military objective.
One example is the ‘logic bomb’ allegedly released by the CIA, and another is Stuxnet; a worm discovered in 2010. It was specially engineered to attack and infect the industrial controllers of Siemens, infecting 200,000 computers, destroying at least 1000 machines, and wiping out a fifth of the nuclear capabilities of Iran.
Conficker is an infamous and strange piece of malware. Uncovered in 2008, no one exactly knows where it came from or who designed it. Difficult to eliminate, it continued infecting and destroying systems worldwide.
As it spread it networked affected systems, forming a continually growing botnet, (botnets are typically used to carry out DDoS attacks, remove access to individual sites, and to steal data). Five versions of Conficker had been discovered, and it is one of the largest known worm infections.
Working as an IT consultant by day, Max Ray Butler was well respected in his field. However, by night, he acted as an infamous hacker known as ‘Iceman.’
Max was eventually arrested in 2007 and charged with stealing at least 2 million credit card numbers which he used to make purchases of around $86million. He was also found guilty of running an illegal digital forum which sold and bought contraband.
10 Operation Get Rich
Commonly, renowned retailers living in the US are targeted through a series of serious hacks, as perpetrators aim to steal customer debit and credit card details to sell on.
Such attacks run by Albert Gonzales, together with his criminal gang, used what we call ‘SQL injections’ to exploit the weaknesses of an unsecured public or company WiFi.
11 Operation Shady RAT
Operation Shady RAT is the name given to describe a series of ongoing cyber-attacks targeting 74 various organizations in 14 different countries. The World Anti-Doping Agency and IOC were targeted before the Olympic games of 2008, and although fingers were pointed towards China, no one knows who was really behind these attacks.
We do know they used the same remote access system approach to gain control of its victim’s computers.
12 Estonia DDoS
In Estonia, April and May 2007, digital espionage ‘spilled over’ and became open cyber warfare. In one week, waves of DDoS attacks went on to affected government servers, including those involved in education, media, and banking. Within days, it had crippled the entire economy, daily life, and distribution of public services.
These attacks prompted military organizations everywhere to revise the importance of their network security.
13 Sven Jaschan/ Delta Airlines
German student, Sven Jaschan, carried out one of the world’s most devastating hacks from the comfort of his bedroom. Aged 18 and still living in his parent’s home, he’s credited for developing the Sasser worm. It’s a self-distributing and replicating virus that destroyed vulnerable operating systems from Windows.
Delta Airlines was hugely hit and had to cancel a lot of its transatlantic flights. He was eventually caught after a mysterious tip-off, but by that time the virus had caused more than 500 million dollars’ worth of damage.
Another teenager led cyber-attack where a troubled genius decided to launch massive DDoS attacks. The perpetrator, Micheal Calce, was able to infiltrate Yahoo, Amazon, CNN, Fifa.com, and eBay.
Michael used malware to overload sites with user traffic to the point of collapse. After serving his eight months detention sentence, he insisted that he had instigated the attacks unknowingly.
15 Melissa Virus
In 1999, macro virus Melissa spread quite devastatingly. Disguised as an attached email world document, opening the file would go on to infect both your system as well as that of 50 people in your address book.
What is Hacking and Who is Behind It?
Hacking is the unauthorized access to a network or computer and is usually committed for financial gain, to extract data, or cause damage. From undercover government spies, naughty teens, disgruntled political entities, and petty crooks, anyone with the inclination and knowledge can hack a system.
From the mischievous youth with talent to waste to organized cyber terrorists looking to make a profit, the last ten years have seen a surge of hacking cases. These attacks cause damage to businesses and governments, eventually raising the standards of living. But how can you secure your device and online activities from such threats?
In addition, keep your system up-to-date, ensure that your anti-virus, firewalls, etc., are on, and be wary of suspicious websites and content.