Cyberattacks By Country
   HOME

TheInfoList



OR:

A cyberattack is any unauthorized effort against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.


Azerbaijan

Hackers from
Azerbaijan Azerbaijan, officially the Republic of Azerbaijan, is a Boundaries between the continents, transcontinental and landlocked country at the boundary of West Asia and Eastern Europe. It is a part of the South Caucasus region and is bounded by ...
and
Armenia Armenia, officially the Republic of Armenia, is a landlocked country in the Armenian Highlands of West Asia. It is a part of the Caucasus region and is bordered by Turkey to the west, Georgia (country), Georgia to the north and Azerbaijan to ...
have actively participated in cyber warfare as part of the Nagorno-Karabakh conflict cyber warfare over the disputed region of
Nagorno-Karabakh Nagorno-Karabakh (, ; ) is a region in Azerbaijan, covering the southeastern stretch of the Lesser Caucasus mountain range. Part of the greater region of Karabakh, it spans the area between Lower Karabakh and Syunik Province, Syunik. Its ter ...
, with Azerbaijani hackers targeting Armenian websites and posting
Ilham Aliyev Ilham Heydar Oghlu Aliyev (born 24 December 1961) is an Azerbaijani politician who has been the fourth president of Azerbaijan since 2003. He is also the leader of the New Azerbaijan Party since 2005. The son and second child of former Aze ...
's statements.


Canada

"Chinese state-sponsored actor" attacked a research facility in Canada in 2011. Unknown hackers attacked Canada's foreign ministry in 2022.


China

China's
People's Liberation Army The People's Liberation Army (PLA) is the military of the Chinese Communist Party (CCP) and the People's Republic of China (PRC). It consists of four Military branch, services—People's Liberation Army Ground Force, Ground Force, People's ...
(PLA) has developed a strategy called "Integrated Network Electronic Warfare" which guides computer network operations and
cyber warfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
tools. This strategy helps link together network warfare tools and electronic warfare weapons against an opponent's information systems during the conflict. They believe the fundamentals for achieving success is about seizing control of an opponent's information flow and establishing information dominance. ''The Science of Military'' and ''The Science of Campaigns'' both identify enemy logistics systems networks as the highest priority for cyberattacks and states that cyber warfare must mark the start of a campaign, used properly, can enable overall operational success.Krekel, Bryan. People's Republic of China. The US-China Economic and Security Review Commission.Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Virginia: Northrop Grumman, 2009. Web. Focusing on attacking the opponent's infrastructure to disrupt transmissions and processes of information that dictate decision-making operations, the PLA would secure cyber dominance over their adversary. The predominant techniques that would be utilized during a conflict to gain the upper hand are as follows, the PLA would strike with electronic jammers, electronic deception, and suppression techniques to interrupt the transfer processes of information. They would launch virus attacks or hacking techniques to sabotage information processes, all in the hopes of destroying enemy information platforms and facilities. The PLA's ''Science of Campaigns'' noted that one role for cyber warfare is to create windows of opportunity for other forces to operate without detection or with a lowered risk of counterattack by exploiting the enemy's periods of "blindness", "deafness" or "paralysis" created by cyberattacks. That is one of the main focal points of cyber warfare, to be able to weaken your enemy to the full extent possible so that your physical offensive will have a higher percentage of success. The PLA conducts regular training exercises in a variety of environments emphasizing the use of cyber warfare tactics and techniques in countering such tactics if it is employed against them. Faculty research has been focusing on designs for rootkit usage and detection for their Kylin Operating System which helps to further train these individuals' cyber warfare techniques. China perceives cyber warfare as a deterrent to nuclear weapons, possessing the ability for greater precision, leaving fewer casualties, and allowing for long-ranged attacks. On March 2, 2021, Microsoft released an emergency security update to patch four security vulnerabilities that had been used by Hafnium, a Chinese nation-state-sponsored hacking group that had compromised at least 30,000 public and private Microsoft exchange servers. In September 2022, China's National Computer Virus Emergency Response Center (CVERC) accused the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
of carrying out a series of cyberattacks against
Northwestern Polytechnical University Northwestern Polytechnical University (NWPU; ) is a public science and engineering university in Xi'an, Shaanxi, China. It is affiliated with the Ministry of Industry and Information Technology. The university is part of Project 211, Project 985 ...
as part of tens of thousands of “malicious network attacks” that it said the agency conducted against Chinese targets. The United States has said the university has conducted extensive military research and its department of Commerce has put the university on its entity list. In April 2025, CVERC said the information systems for the 2025 Asian Winter Games which it hosted were subjected to more than two hundred thousand foreign cyberattacks and accused the United States of being behind most of the attacks. CVERC said that the attacks did not cause significant damage, and condemned cyberattacks targeting major international events. The allegation were made in the midst of a trade war between the US and China and after the US accused Beijing of carrying out a cyberespionage campaign that targeted US-based critics of Beijing.


Estonia

The 2007 cyberattacks on Estonia were a series of cyberattacks that began on 27 April 2007 and targeted websites of
Estonia Estonia, officially the Republic of Estonia, is a country in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the Baltic Sea across from Sweden, to the south by Latvia, and to the east by Ru ...
n organizations, including Estonian parliament, banks, ministries, newspapers, and broadcasters, amid the country's disagreement with
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
about the relocation of the Bronze Soldier of Tallinn, an elaborate Soviet-era grave marker, as well as war graves in
Tallinn Tallinn is the capital city, capital and List of cities in Estonia, most populous city of Estonia. Situated on a Tallinn Bay, bay in north Estonia, on the shore of the Gulf of Finland of the Baltic Sea, it has a population of (as of 2025) and ...
. The attacks triggered a number of military organizations around the world to reconsider the importance of network security to modern military doctrine. The direct result of the cyberattacks was the creation of the NATO
Cooperative Cyber Defence Centre of Excellence NATO CCD COE, officially the NATO Cooperative Cyber Defence Centre of Excellence ( or ''NATO küberkaitsekoostöö keskus''), is one of NATO Centres of Excellence, located in Tallinn, Estonia. The centre was established on 14 May 2008, it recei ...
in Tallinn.


Ethiopia

In an extension of a bilateral dispute between
Ethiopia Ethiopia, officially the Federal Democratic Republic of Ethiopia, is a landlocked country located in the Horn of Africa region of East Africa. It shares borders with Eritrea to the north, Djibouti to the northeast, Somalia to the east, Ken ...
and
Egypt Egypt ( , ), officially the Arab Republic of Egypt, is a country spanning the Northeast Africa, northeast corner of Africa and Western Asia, southwest corner of Asia via the Sinai Peninsula. It is bordered by the Mediterranean Sea to northe ...
over the
Grand Ethiopian Renaissance Dam The Grand Ethiopian Renaissance Dam (GERD or TaIHiGe; , , ), formerly known as the Millennium Dam and sometimes referred to as the Hidase Dam (, ), is a gravity dam on the Blue Nile River in Ethiopia. The dam is in the Benishangul-Gumuz Region ...
, Ethiopian government websites have been hacked by the Egypt-based hackers in June 2020.


India and Pakistan

There were two such instances between India and Pakistan that involved cyberspace conflicts, starting in the 1990s. Earlier cyber attacks came to be known as early as 1999.Prichard, Janet, and Laurie MacDonald. "Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks." Journal of Information Technology Education. 3. (2004): n. page. Web. Since then, India and Pakistan were engaged in a long-term dispute over Kashmir which moved into
cyberspace Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
. Historical accounts indicated that each country's hackers have been repeatedly involved in attacking each other's computing database system. The number of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by the end of August 2001. In 2010, Indian hackers laid a cyber attack at least 36 government database websites going by the name "Indian Cyber Army". In 2013, Indian hackers hacked the official website of
Election Commission An election commission is a body charged with overseeing the implementation of electioneering process of any country. The formal names of election commissions vary from jurisdiction to jurisdiction, and may be styled an electoral commission, a c ...
of Pakistan in an attempt to retrieve sensitive database information. In retaliation, Pakistani hackers, calling themselves "True Cyber Army" hacked and defaced ~1,059 websites of Indian election bodies. In 2013,
India India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
's
Ministry of Electronics and Information Technology The Ministry of Electronics and Information Technology (MEITy) is an executive agency of the Government of India, Union Government of the India, Republic of India. It was carved out of the Ministry of Communications and Information Technology (I ...
(MeitY) which was then known as
Department of Electronics and Information Technology The Ministry of Electronics and Information Technology (MEITy) is an executive agency of the Union Government of the Republic of India. It was carved out of the Ministry of Communications and Information Technology on 19 July 2016 as a standal ...
(DeitY), unveiled a
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
policy framework called
National Cyber Security Policy 2013 National Cyber Security Policy is a policy framework by Department of Electronics and Information Technology (DeitY) It aims at protecting the public and private infrastructure from cyber attacks. The policy also intends to safeguard "information ...
which officially came into effect on July 1, 2013. According to the media, Pakistan's has been working on effective
cyber security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
systems, in a program called the "Cyber Secure Pakistan" (CSP). The program was launched in April 2013 by the Pakistan Information Security Association and the program has expanded to country's universities. In 2020, according to the Media reports, Pakistan Army confirms the series of Cyber Attacks that has been identified on Pakistani Government and private websites by the Indian Intelligence. ISPR also advised the government and private institutions to enhance cyber security measures.


Indonesia

Indonesia said it has started to recover data that had been encrypted in a major ransomware attack in June 2024 which affected more than 160 government agencies. The attackers identified as Brain Cipher asked for $8 million in ransom to unlock the data before later apologising and releasing the decryption key for free, according to Singapore-based cybersecurity firm StealthMole.


Iran

On 8 February 2020, the telecommunication network of
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
witnessed extensive disruptions at 11:44 a.m. local time, which lasted for about an hour. The
Ministry of Information and Communications Technology of Iran The Ministry of Information and Communications Technology, or Ministry of ICT () established in 1908, is responsible for Mail, postal services, telephones and information technology in the Islamic Republic of Iran. Laying out and implementin ...
confirmed it as a
Distributed Denial of Service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conne ...
. The Iranian authorities activated the "Digital Fortress" cyber-defense mechanism to repel. Also known as DZHAFA, it led to a drop of 75 percent in the national internet connectivity. On the noon of 26 October 2021, a cyberattack caused all 4,300 fuel stations in Iran to disrupt and disable government-issued cards for buying subsidized fuel. This cyber attack also caused
digital billboard A digital billboard is a billboard that displays digital images that are changed by a computer every few seconds. Digital billboards are primarily used for advertising, but they can also serve public service purposes. These are positioned on high ...
s to display messages against the Iranian government.


Ireland

On 14 May 2021, the
Health Service Executive The Health Service Executive (HSE) () is the publicly funded healthcare system in Ireland, responsible for the provision of health and personal social services. It came into operation on 1 January 2005. The current director-general is Berna ...
(HSE) of Ireland suffered a major
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
cyber attack which caused all of its
IT systems Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
nationwide to be shut down. It was the most significant cybercrime attack on an Irish state agency and the largest known attack against a health service computer system. The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Russia. The same group is believed to have attacked Ireland's
Department of Health A health department or health ministry is a part of government which focuses on issues related to the general health of the citizenry. Subnational entities, such as states, counties and cities, often also operate a health department of their o ...
with a similar cyber attack.


Israel

In April 2020, there were attempts to hack into
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
's water infrastructure of the Sharon central region by Iran, which was thwarted by Israeli cyber defenses. The cyberattack intended to introduce dangerous levels of
chlorine Chlorine is a chemical element; it has Symbol (chemistry), symbol Cl and atomic number 17. The second-lightest of the halogens, it appears between fluorine and bromine in the periodic table and its properties are mostly intermediate between ...
into the Israeli water supply.


North Korea

In February 2024 UN sanctions monitors were investigating claims that dozens of cyber attacks that
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and borders China and Russia to the north at the Yalu River, Yalu (Amnok) an ...
is suspected of carrying out has raised around $3 billion which is being used to fund and develop its nuclear weapons program.


Norway

In August 2020 the Norwegian parliament ''
Storting The Storting ( ; ) is the supreme legislature of Norway, established in 1814 by the Constitution of Norway. It is located in Oslo. The Unicameralism, unicameral parliament has 169 members and is elected every four years based on party-list propo ...
et'' suffered a cyberattack on the email system belonging to several officials. In December 2020, the
Norwegian Police Security Service The Norwegian Police Security Service (, ) is the police security agency of Norway. The agency was previously known as ''POT'' (' or Police Surveillance Agency), the name change was decided by the Parliament of Norway on 2 June 2001. History an ...
said the likely perpetrators were the Russian cyber espionage group
Fancy Bear Fancy Bear is a Russian cyber espionage group. American cybersecurity firm CrowdStrike has stated with a medium level of confidence that it is associated with the Russian military intelligence agency GRU. The UK's Foreign and Commonwealth Offic ...
.


Russia

During the
2018 FIFA World Cup The 2018 FIFA World Cup was the 21st FIFA World Cup, the quadrennial world championship for national association football, football teams organized by FIFA. It took place in Russia from 14 June to 15 July 2018, after the country was awarded t ...
, Russia countered and stopped around 25 million cyber-attacks on IT Infrastructure. In June 2019,
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
has conceded that it is "possible" its
electrical grid An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
is under cyber attack by the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. The ''New York Times'' reported that American hackers from the
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
planted malware potentially capable of disrupting the Russian electrical grid. On 19 October 2020, the US justice department charged six Russian military officers of a worldwide hacking campaign, which attacked targets like French election, the 2018
Winter Olympic Games The Winter Olympic Games (), also known as the Winter Olympics, is a major international multi-sport event held once every four years for sports practiced on snow and ice. The first Winter Olympic Games, the 1924 Winter Olympics, were held in ...
opening ceremony, US businesses and Ukraine's electricity grid. The campaign was believed to have cost billions of dollars for the mass disruption it caused.


Ukraine

A series of powerful cyber attacks began 27 June 2017, that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. In January 2022,
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
disclosed activity of a ransomware and DoS attack on various government agencies and organizations.


United Arab Emirates

In 2019,
Reuters Reuters ( ) is a news agency owned by Thomson Reuters. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide writing in 16 languages. Reuters is one of the largest news agencies in the world. The agency ...
reported that
United Arab Emirates The United Arab Emirates (UAE), or simply the Emirates, is a country in West Asia, in the Middle East, at the eastern end of the Arabian Peninsula. It is a Federal monarchy, federal elective monarchy made up of Emirates of the United Arab E ...
launched a series of cyberattacks on its political opponents, journalists, and human rights activists under
Project Raven DarkMatter Group is a computer security company founded in the United Arab Emirates (UAE) in 2014 or 2015. The company has described itself as a purely defensive company; however, in 2016, it became a contractor for Project Raven, helping the ...
, on an espionage platform namely Karma. The team included ex-US intelligence agents. Project Raven commenced in 2009 and was planned to be continued for the coming ten years. United Arab Emirates, used and asked for help from couple of countries providing their best calibres to overcome this crisis, and to confine the damage and consequences upon
Project Raven DarkMatter Group is a computer security company founded in the United Arab Emirates (UAE) in 2014 or 2015. The company has described itself as a purely defensive company; however, in 2016, it became a contractor for Project Raven, helping the ...
, and indeed big names did participate to help like the American master, Graham Dexter, and the Egyptian phenomenal name in cybersecurity, Elhamy El Sebaey.


United States of America

In 2015. the
Office of Personnel Management The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the United States federal civil service. The agency provides federal human resources policy, oversight, and support, a ...
(OPM) and the Interior Department were hacked, resulting in data breaches of government and security records. Numerous reports claim that Chinese hackers conducted these attacks, as the Chinese government has used hackers to attack and target U.S. military networks the year prior. In 2024, cyber-tensions remain between the United States and the People's Republic of China, as accusations of hacking the U.S. government continue to arise. Reuters claims that cyber-espionage operations have been attacking the U.S. infrastructure, including the electric grid, water plants, oil and gas pipelines, and transportation, placing an increased focus on civilian attacks. Government officials have expressed concern about these attacks, relating them to bombings that have no economic or political gain whatsoever. Though neither of the claims are confirmed by the Chinese government, U.S. officials continue to emphasize Chinese involvement in cyberattacks against their country. During the 2016 presidential election, an indictment of 12 Russian military intelligence officers revealed that Russian hackers conducted an attack against the Clinton administration that targeted staff and campaign email addresses, following her opponent's, Donald Trump's, discernment of missing emails from Democratic servers on the same day as the attack. Robert S. Mueller, a special counsel of the United States government, claimed that the Russian government was also guilty to laundering money and stealing voter information. Furthermore, he investigated a possible conspiracy between the Russian government and Trump's possible attempt to sway the 2016 election. In 2023, the United States Government was able to identify and stop an organized attack on numerous computers throughout the states. This attack was taken out by Volt Typhoon, a Chinese hacking group who used its ability to access computers with lowered cyber security to try and infiltrate different American systems. In April 2024, FBI Director Christopher Wray said Volt Typhoon's plan is to target the US civilian infrastructure through different cyber attacks in the future. Wray warned that China is developing the "ability to physically wreak havoc on our
critical infrastructure Critical infrastructure, or critical national infrastructure (CNI) in the UK, describes infrastructure considered essential by governments for the functioning of a society and economy and deserving of special protection for national security. ...
at a time of its choosing." In September 2024, under a court order, the FBI took control of a network of hundreds of thousands of internet routers and other devices that had been hacked by Chinese government-linked hackers who were using the massive web of hacked devices (known as
botnet A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, sp ...
) to pose a threat to critical infrastructure both in the United States and abroad.


References

{{reflist Cyberattacks