Trusted advisors to support with strategy and transformation
Understand and improve the capability of your SOC
Secure, structured, and value-led migration services
Your roadmap to increase performance and value of your SIEM
Optimised security operations, engineered for you
Define, measure and improve your security posture
Gain visibility of exposure and reduce risk of exploitation
Stress-test your organisation’s cyber response capability
Advance your cyber threat intelligence capabilities
We safeguard operations, IP and human safety
We defend customer trust and keep your systems resilient
We build resilience in high-stakes environments
We help you stay secure, compliant and ahead of threats
We protect customer data and safeguard your reputation
We help reduce cyber risk and stay compliant
Discover the latest threat intelligence
Strengthening cyber defences with MDR, EDR and CTI
Complex SIEM migration and service transition
24/7 threat detection and response on Microsoft
Ransomware incident response and SOC transformation
Optimised SIEM platform and MITRE ATT&CK coverage
Cloud migration and SOC transformation
Securing 300+ applications with custom SIEM and SOC services
Maturing security operations with a comprehensive MSOC
Migration and optimisation of multiple Splunk deployments
Award-winning threat-led managed SOC services
Integrated SOC and OT Security for enhanced visibility
Your partner for effective cyber threat management
Enabling a safer and more sustainable digital future
Working in partnership to make the world a safer place
Become a Cyber Defender
Discover all the latest insights
Read all the latest news from our experts
Listen to our Cyber Insiders podcast and read the magazine
Connect with our experts
Maximise the value of your security investments
Critical steps to minimise the impact of a cyber incident
Staying adaptable and agile in the face of change
Threat Advisory: Israel-Iran Conflict Rising Hacktivism and UK Exposure
We safeguard operations, IP and human safety
We defend customer trust and keep your systems resilient
We build resilience in high-stakes environments
We help you stay secure, compliant and ahead of threats
We protect customer data and safeguard your reputation
We help reduce cyber risk and stay compliant
Discover the latest threat intelligence
Strengthening cyber defences with MDR, EDR and CTI
Complex SIEM migration and service transition
24/7 threat detection and response on Microsoft
Ransomware incident response and SOC transformation
Optimised SIEM platform and MITRE ATT&CK coverage
Cloud migration and SOC transformation
Securing 300+ applications with custom SIEM and SOC services
Maturing security operations with a comprehensive MSOC
Migration and optimisation of multiple Splunk deployments
Award-winning threat-led managed SOC services
Integrated SOC and OT Security for enhanced visibility
Your partner for effective cyber threat management
Enabling a safer and more sustainable digital future
Working in partnership to make the world a safer place
Become a Cyber Defender
Discover all the latest insights
Read all the latest news from our experts
Listen to our Cyber Insiders podcast and read the magazine
Connect with our experts
Maximise the value of your security investments
Critical steps to minimise the impact of a cyber incident
Staying adaptable and agile in the face of change
For decades, cyber attacks have been taking down businesses and causing disruption of catastrophic proportions. In the true spirit of Halloween, we share with you some of the most gruesome…
In 2000, Michael Calce under the name MafiaBoy caused $1 billion dollars in damages by unleashing a DDoS attack on a number of high profile commercial websites including Amazon, CNN, eBay and Yahoo! At the time, Yahoo! was a multibillion-dollar web company and the top search engine. Mafiaboy’s Rivolta managed to shut down Yahoo! for almost an hour. Today, Calce is a white hat hacker. Companies hire him to help identify security flaws in their systems and design better security features. He says the internet is a far scarier place today than it was back in 2000. For one, there is more and more at stake as we rely ever more on online systems for our daily lives.
The Melissa virus in 1999 targeted Microsoft Word, it was an e-mail attachment that would once open, forward the virus onto the first 50 users on Microsoft Outlook by Office’s native share function. This virus shut down multiple e-mail servers due to the wide spread attack, it cost $80 million in damages due to the virus acting like a Denial of Service attack to e-mail clients. Many people in the IT industry said that the situation could have been much worse, as what the virus really did was email itself. The Virus has multiple Simpson’s jokes hidden inside it.
WannaCry was a ransomware attack in 2017 that had widespread success, hacking into organisations from the NHS to Telefonica and FedEx. It uses the EternalBlue exploit the US National Security Agency reportedly found, in order to do its damage. It asked the user to pay fee of $300 in BitCoin to unlock the files. The ransom note indicated that the payment amount would be doubled after three days. If payment was not made after seven days it claimed the encrypted files would be deleted. It’s estimated that WannaCry caused $4 billion in damages so far and earned up to $49,000 through BitCoin so far.
The TalkTalk hack in 2015 was sparked off by a 17 year old boy and performed by two friends Matthew Hanley, 22, and Connor Allsopp, 20. The data breach was severe with customer sort codes and account numbers being made available. The firm said 4% of TalkTalk customers have sensitive data at risk. The attack cost the company £42 million and further had to pay £400,000 as they failed to have a secure system in place to avoid customer data breach.
In July 2015, “The Impact Team” stole user data of Ashley Madison, a commercial website billed as enabling extramarital affairs. On 18 and 20 August, the group leaked more than 25 gigabytes of company data, including user details. The site’s policy of not deleting users’ personal information caused distress to many users as they feared being publicly shamed. This was the largest security breach of Consumer information in history. Impact Team wanted the owners of Ashley Madison (Avid Life Media) to remove the site due to the sites nature of encouraging affairs.
In 2004, Sven Jaschan developed and released two damaging worms called NetSky and Sasser. At the time, they were responsible for over 25% of all virus reports in the first half of 2005. Sasser instead of attacking computer’s by e-mail, would use a script to forward to an at risk computer and instruct it to download the script. Forwarding on and on. The system would also be difficult to shut down without unplugging manually. NetSky utilised e-mail to send files that would cause a Denial of Service attack as systems would collapse while trying to handle the data and traffic. These viruses caused over 20 billion dollars in damages.
Sony suffered a massive blow to its Playstation Network in April 2011 after it was hacked by Anonymous via DDoS attacks. They attacked again on the 21st April 2011, and Sony kept the Network offline for 3 whole weeks. They were quiet about the reason for 5 whole days, when they announced that 77 million users personal information was compromised. Sony couldn’t rule out the possibility that Credit Card data was taken either. After apologising and reimbursing customers with free games, subscriptions and anti-fraud protection, Sony was left with a loss of £171 million.
Prior to the internet, computers were being used for coding and creating different software. This was the case for a Canadian pipeline company in 1982. The CIA suspected the KGB might steal the software so they planted a logic bomb in the code, and a few months later, the Soviet pipeline exploded producing the most monumental non-nuclear explosion and fire ever seen from space. This is an instance of a Trojan horse before the widespread use of this method of virus occurred in the Personal Computing industry. Due to this attack, they only trust IBM an American manufacturer of computer chips to develop them.
Albert Gonzalez was sentenced to 20 years in prison after hacking TJX the parent company of TJ Maxx (TK Maxx in the UK). He obtained 130 million records of personal information, including credit card information. He utilised backdoors on several systems to obtain the information. Once arrested the police seized multiple items he paid for with the information, such as $1.6 million ($1.1 million of which was in plastic bags buried in a three foot drum under his parents backyard.), multiple top of the range laptops, and a compact Glock pistol.
The Shamoon virus targeted computers and workstations of energy suppliers. It was developed in 2012 by a hacker group by the name “Cutting Swords of Justice” with the aim of destabilising the Saudi Amarco Company. They were successful and managed to infect more than 30,000 workstations, this prevented machines from connecting to the network that gave workstations access of communicating with each other and the web. The virus even infected Qatari RasGas Company and LNG Company.
All of these were big and newsworthy cyber attacks, but thousands of smaller attacks, both in scale and target, happen every day. If you want to find out more about how to protect yourself, get in touch with cybersecurity specialists Adarma today.
References:
1. a) https://en.wikipedia.org/wiki/MafiaBoy & Davis, Wall. Crime and the Internet. New York: Routledge, 2001.
2. a) http://www.pandasecurity.com/mediacenter/malware/most-famous-virus-history-melissa/
2. b) https://nakedsecurity.sophos.com/2009/03/26/memories-melissa-virus/
3. a) https://www.symantec.com/connect/blogs/wannacry-3
3. b) http://uk.businessinsider.com/wannacry-ransomware-attack-49000-3-bitcoin-wallets-2017-5
4. a) http://www.bbc.co.uk/news/business-34743185
6. a) https://www.sophos.com/en-us/press-office/press-releases/2005/07/va_sasserfree.aspx
6. b) http://virus.wikia.com/wiki/Sasser
6. c) http://virus.wikia.com/wiki/Netsky
7. a) http://www.eurogamer.net/articles/2016-04-26-sony-admitted-the-great-psn-hack-five-years-ago-today
7. b) https://www.theregister.co.uk/2011/05/24/sony_playstation_breach_costs/
8. b) http://www.nytimes.com/2009/10/27/science/27trojan.html?_r=1&ref=science&pagewanted=all
An error has occurred, please try again later.An error has occurred, please try again later.