List Of Cyberattacks
   HOME

TheInfoList



OR:

A
cyberattack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.


Indiscriminate attacks

These attacks are wide-ranging, global and do not seem to discriminate among governments and companies. * Operation Shady RAT * World of HELL * RED October, discovered in 2012, was reportedly operating worldwide for up to five years prior to discovery, transmitting information ranging from diplomatic secrets to personal information, including from mobile devices. *
WannaCry ransomware attack The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the form ...
on 12 May 2017 affected hundreds of thousands of computers in more than 150 countries. * 2017 Petya cyberattack


Destructive attacks

These attacks relate to inflicting damage on specific organizations. * Great Hacker War, and purported "gang war" in
cyberspace Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
* LulzRaft, a hacker group known for a low-impact attack in
Canada Canada is a country in North America. Its Provinces and territories of Canada, ten provinces and three territories extend from the Atlantic Ocean to the Pacific Ocean and northward into the Arctic Ocean, making it the world's List of coun ...
* Operation Ababil, conducted against American financial institutions * TV5Monde April 2015 cyberattack * Vulcanbot *
Shamoon Shamoon (), also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit architecture of Windows NT, NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature ...
, a modular computer virus, was used in 2012 in an attack on 30,000
Saudi Aramco Saudi Aramco ( ') or Aramco (formerly Arabian-American Oil Company), officially the Saudi Arabian Oil Company, is a majority state-owned petroleum and natural gas company that is the national oil company of Saudi Arabia. , it is the fourth- l ...
workstations, causing the company to spend a week restoring their services. * Wiper – In December 2011, the malware successfully erased information on hard disks at the Oil Ministry's headquarters. * Stuxnet, a malicious
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will ...
believed to be a jointly built American-
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
i cyber weapon. It was designed to sabotage Iran's nuclear program with what would seem like a long series of unfortunate accidents. * Viasat hack, a February 2022 attack on the KA-SAT network of Viasat


Cyberwarfare

These are politically motivated destructive attacks aimed at sabotage and espionage. * 2007 cyberattacks on Estonia, wide-ranging attacks targeting government and commercial institutions * 2008 Cyberattacks during the Russo-Georgian War, a series of cyberattacks that swamped and disabled websites of numerous South Ossetian, Georgian, Russian, and Azerbaijani organizations. The attacks were initiated three weeks before the shooting war began in what is regarded as "the first case in the history of a coordinated cyberspace domain attack synchronized with major combat actions in the other warfighting domains (consisting of Land, Air, Sea, and Space)." * 2009 DDoS attacks against South Korea, a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States. * July 2009 cyberattacks, against
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia. It constitutes the southern half of the Korea, Korean Peninsula and borders North Korea along the Korean Demilitarized Zone, with the Yellow Sea to the west and t ...
and the United States * 2009 Shadow Network, a China-based computer espionage operation that stole classified documents and emails from the Indian government, the office of the Dalai Lama, and other high-level government networks. * 2010 Australian cyberattacks, a series of denial-of-service attacks conducted by the Anonymous online community against the Australian government in response to proposed web censorship regulations. * 2010 cyberattacks on Burma, related to the 2010 Myanmar general election. * 2010 cyberattacks on Myanmar, distributed
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s (DDoS) ahead of the 2010 Myanmar general election, which is widely viewed as a
sham election An election is a formal group decision-making process whereby a population chooses an individual or multiple individuals to hold public office. Elections have been the usual mechanism by which modern representative democracy has operated ...
. * 2010
Operation Olympic Games Operation Olympic Games was an black operation, unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian Nuclear program of Iran, nuclear facilities by the United States and Israel. As reported, it is one of the first ...
, against Iranian nuclear facilities, allegedly conducted by the United States * 2010 Japan–South Korea cyberwarfare * 2011 Canadian government hackings, hackers using IP addresses from China infiltrated 3 departments within the government and exfiltrated classified data. The attacks resulted in the government cutting off internet access in the departments affected and various responses from both the Canadian government and the Chinese government. * 2012 Operation Ababil, a series of cyber attacks starting in 2012, targeting various American financial institutions and carried out by a group calling itself the Cyber fighters of Izz Ad-Din Al Qassam. * 2013 Singapore cyberattacks, attack by
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
"in response to web censorship regulations in the country, specifically on news outlets" * 2013 South Korea cyberattack, two major sets of cyberattacks on South Korean targets attributed to elements within North Korea. * Office of Personnel Management data breach * 2015 Ukraine power grid hack, took place during the
Russo-Ukrainian war The Russo-Ukrainian War began in February 2014 and is ongoing. Following Ukraine's Revolution of Dignity, Russia Russian occupation of Crimea, occupied and Annexation of Crimea by the Russian Federation, annexed Crimea from Ukraine. It then ...
and is attributed to a Russian advanced persistent threat group known as "Sandworm". It is the first publicly acknowledged successful cyberattack on a power grid. * 2016 Kyiv cyberattack, which caused another power outage * Democratic National Committee cyber attacks, against the
Democratic National Committee The Democratic National Committee (DNC) is the principal executive leadership board of the United States's Democratic Party (United States), Democratic Party. According to the party charter, it has "general responsibility for the affairs of the ...
by the
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
n-sponsored cyber-espionage groups Cozy Bear and Fancy Bear, possibly to assist Donald Trump's 2016 presidential campaign. * 2017 cyberattacks on Ukraine, A series of powerful cyberattacks using the Petya malware began on 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. Similar infections were reported in France, Germany, Italy, Poland, Russia, United Kingdom, the United States and Australia. * 2019 cyberattacks on Sri Lanka, The 2019 cyberattacks on Sri Lanka were a series of powerful cyberattacks on at least 10 Sri Lankan domestic websites with the public domains of .lk and .com. * 2020 cyberattacks on Sri Lanka, a series of cyberattacks on at least 5 Sri Lankan national websites with the top-level domains of .gov and .com. * 2021 Cyberattacks on Sri Lanka, series of cyberattacks on at least 10 Sri Lankan national websites including Google.lk domain * #OpIsrael, a broad " anti-Israel" attack * 2022 Ukraine cyberattacks, undertaken during the prelude to the
2022 Russian invasion of Ukraine On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...
* 2022 cyberattacks on Romania, which occurred after a visit of Romanian officials to Kyiv where more support against Russia was promised while the invasion was taking place * 2023 Cyberattack on Australia, under which the IRGC launched a cyberattack against an Australian organization to obtain data from an extortion and double extortion ransomware operation. Australia expressed deep concern over IRGC's interference, including online harassment of Australian citizens.


Government espionage

These attacks relate to stealing information from/about government organizations: * 2008 cyberattack on United States, cyber espionage targeting U.S. military computers * Cyber attack during the Paris G20 Summit, targeting G20-related documents including financial information * GhostNet * Moonlight Maze * Operation Newscaster, cyber espionage
covert operation A covert operation or undercover operation is a military or police operation involving a covert agent or troops acting under an assumed cover to conceal the identity of the party responsible. US law Under US law, the Central Intelligence A ...
allegedly conducted by Iran * Operation Cleaver,
cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
covert operation allegedly conducted by Iran * Shadow Network, attacks on
India India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
by
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
* Titan Rain, targeting defense contractors in the United States *
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
– in 2009, the Chinese hackers breached Google's corporate servers gained access to a
database In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and a ...
containing
classified information Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
about suspected spies, agents, and terrorists under surveillance by the US government. * Gauss trojan, discovered in 2012 is a state-sponsored computer espionage operation that uses state-of-the-art software to extract a wealth of sensitive data from thousands of machines located mostly in the Middle East. * Office of Personnel Management data breach – December 2014 breach of data on U.S. government employees. The attack originated in
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
. * A six-month-long cyberattack on the German parliament for which the Sofacy Group is suspected took place in December 2014. * Vestige is also suspected to be behind a spearphishing attack in August 2016 on members of the
Bundestag The Bundestag (, "Federal Diet (assembly), Diet") is the lower house of the Germany, German Federalism in Germany, federal parliament. It is the only constitutional body of the federation directly elected by the German people. The Bundestag wa ...
and multiple political parties such as Linken-faction leader Sahra Wagenknecht, Junge Union and the CDU of
Saarland Saarland (, ; ) is a state of Germany in the southwest of the country. With an area of and population of 990,509 in 2018, it is the smallest German state in area apart from the city-states of Berlin, Bremen, and Hamburg, and the smallest in ...
. Authorities fear that sensitive information could be gathered by hackers to later manipulate the public ahead of elections such as the
2017 German federal election The 2017 German federal election was held in Germany on 24 September 2017 to elect the List of members of the 19th Bundestag, members of the 19th Bundestag. At stake were at least 598 seats in the Bundestag, as well as 111 Overhang seat, overhan ...
. * Between 2019 and 2020, Israel was the target of a cyberattack believed to be originating in China and be part of a broader campaign against other countries, including Iran, Saudi Arabia, Ukraine, Uzbekistan and Thailand. * Between July 7, 2021, and July 14, 2021, the Indian government email infrastructure was compromised thrice with hackers accessing emails of several top officials including that of Ajay Prakash Sawhney, the secretary to the Ministry of Electronics and Information Technology


Corporate espionage

These attacks relate to stealing data of corporations related to proprietary methods or emerging products/services. * Operation Aurora * Operation Socialist, A
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
operation by the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
to obtain information from Belgian telecom company Belgacom on call information * Sony Pictures Entertainment hack * Nitro cyberattacks


Stolen e-mail addresses and login credentials

These attacks relate to stealing login information for specific web resources. * RockYou – in 2009, the company experienced a data breach resulting in the exposure of over 32 million user accounts. * Vestige (online store) – in 2010, a band of anonymous hackers has rooted the servers of the site and leaked half a gigabyte's worth of its private data. * 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally causing network disruption *
IEEE The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) organization, 501(c)(3) public charity professional organization for electrical engineering, electronics engineering, and other related disciplines. The IEEE ...
– in September 2012, it exposed user names, plaintext passwords, and website activity for almost 100,000 of its members. *
Yahoo! Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, and its a ...
– in 2012, hackers posted login credentials for more than 453,000 user accounts, doing so again in January 2013 and in January 2014. *
Adobe Adobe (from arabic: الطوب Attub ; ) is a building material made from earth and organic materials. is Spanish for mudbrick. In some English-speaking regions of Spanish heritage, such as the Southwestern United States, the term is use ...
– in 2013, hackers obtained access to Adobe's networks and stole user information and downloaded the
source code In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer. Since a computer, at base, only ...
for some of Adobe programs. It attacked 150 million customers. * LivingSocial – in 2013, the company suffered a security breach that has exposed names, e-mail addresses and password data for up to 50 million of its users. *
World Health Organization The World Health Organization (WHO) is a list of specialized agencies of the United Nations, specialized agency of the United Nations which coordinates responses to international public health issues and emergencies. It is headquartered in Gen ...
– in March 2020, hackers leaked information on login credentials from the staff members at WHO. In response to cyberattacks, they stated that “Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the
COVID-19 pandemic The COVID-19 pandemic (also known as the coronavirus pandemic and COVID pandemic), caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), began with an disease outbreak, outbreak of COVID-19 in Wuhan, China, in December ...
.”


Stolen credit card and financial data

* 2017 Equifax data breach – In 2017, Equifax Inc. announced that a cyber-security breach occurred between May and mid July of that year. Cyber criminals had accessed approximately 145.5 million U.S. Equifax consumers' personal data, including their full names,
Social Security number In the United States, a Social Security number (SSN) is a nine-digit number issued to United States nationality law, U.S. citizens, Permanent residence (United States), permanent residents, and temporary (working) residents under section 205(c)(2 ...
s, credit card information, birth dates,
address An address is a collection of information, presented in a mostly fixed format, used to give the location of a building, apartment, or other structure or a plot of land, generally using border, political boundaries and street names as references, ...
es, and, in some cases,
driver's license A driver's license, driving licence, or driving permit is a legal authorization, or the official document confirming such an authorization, for a specific individual to operate one or more types of motorized vehicles—such as motorcycles, ca ...
numbers. * 2016 Indian Banks data breach – It was estimated 3.2 million
debit card A debit card, also known as a check card or bank card, is a payment card that can be used in place of cash to make purchases. The card usually consists of the bank's name, a card number, the cardholder's name, and an expiration date, on either ...
s were compromised. Major Indian banks- SBI, HDFC Bank, ICICI, YES Bank and
Axis Bank Axis Bank Limited, formerly known as UTI Bank (1993–2007), is an Indian Multinational corporation, multinational banking and financial services company headquartered in Mumbai. It is India's third largest private sector bank by assets and fo ...
were among the worst hit. *
2014 JPMorgan Chase data breach The 2014 JPMorgan Chase data breach was a cyberattack against American bank JPMorgan Chase that is believed to have compromised data associated with over 83 million accounts—76 million households (approximately two out of three households in th ...
, allegedly conducted by a group of Russian hackers * Goodwill Industries – in September 2014, the company suffered from a credit card data breach that affected the charitable retailer's stores in at least 21 states. Another two retailers were affected. *
Home Depot The Home Depot, Inc., often referred to as Home Depot, is an American multinational corporation, multinational home improvement retail corporation that sells tools, construction products, appliances, and services, including fuel and transportat ...
– in September 2014, the cybercriminals that compromised Home Depot's network and installed malware on the home-supply company's point-of-sale systems likely stole information on 56 million
payment card Payment cards are part of a payment system issued by financial institutions, such as a bank, to a customer that enables its owner (the cardholder) to access the funds in the customer's designated bank accounts, or through a credit account and ...
s. * StarDust – in 2013, the
botnet A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, sp ...
compromised 20,000 cards in active campaign hitting US merchants. * Target – in 2013, approximately 40 million credit and debit card accounts were impacted in a credit card breach. According to another estimate, it compromised as many as 110 million Target customers. * Visa and Mastercard – in 2012, they warned card-issuing banks that a third-party payments processor suffered a security breach, affecting up to 10 million credit cards. * Subway – in 2012, two
Romania Romania is a country located at the crossroads of Central Europe, Central, Eastern Europe, Eastern and Southeast Europe. It borders Ukraine to the north and east, Hungary to the west, Serbia to the southwest, Bulgaria to the south, Moldova to ...
n men admitted to participating in an international conspiracy that hacked into credit-card payment terminals at more than 150 Subway
restaurant franchises A chain store or retail chain is a retail outlet in which several locations share a brand, central management and standardized business practices. They have come to dominate many retail markets, dining markets, and service categories in many pa ...
and stole data for more than 146,000 accounts. * MasterCard – in 2005, the company announced that up to 40 million cardholders may have had account information stolen due to one of its payment processors being hacked. * IRLeaks attack on Iranian banks


Blockchain and cryptocurrencies

* 2014 Mt. Gox exchange exploits * The DAO fork – in June 2016, users exploited a vulnerability in The DAO, a decentralized autonomous organization formed as a venture capital fund, to siphon a third of the fund's ether (about $50 million at the time of the hack). * Poly Network exploit – in August 2021, anonymous hackers transferred over $610 million in cryptocurrencies to external wallets. Although it was one of the largest DeFi hacks ever, all assets were eventually returned over the following two weeks. * Wormhole hack – in early February 2022, an unknown hacker exploited a vulnerability on the DeFi platform Wormhole, making off with $320 million in wrapped ether. * Ronin Network hack – in March 2022, North Korean state-sponsored Lazarus Group used hacked private keys to withdraw $625 million in ether and USDC from the Ronin bridge, an Ethereum sidechain built for the NFT-based video game Axie Infinity. * Nomad bridge hack – in early August 2022, hackers targeted a misconfigured
smart contract A smart contract is a computer program or a Transaction Protocol Data Unit, transaction protocol that is intended to automatically execute, control or document events and actions according to the terms of a contract or an agreement. The objective ...
in a "free-for-all" attack, withdrawing nearly $200 million in cryptocurrencies from the Nomad cross-chain bridge. * The Uncle Maker attack – an attack on Ethereum by the F2Pool mining pool, which lasted between 2020 and 2022, but was only discovered in 2022 by Aviv Yaish, Gilad Stern and Aviv Zohar. * BNB Chain hack – in early October 2022, about $570 million in cryptocurrency was stolen from a bridge for the BNB Chain, a blockchain operated by the
Binance Binance Holdings Ltd., branded Binance, is the largest cryptocurrency exchange in terms of daily trading volume of cryptocurrencies. Binance was founded in 2017 by Changpeng Zhao, a developer who had previously created high-frequency trading ...
exchange. Because a majority of the tokens could not be transferred off-chain, the hacker ultimately made off with about $100 million.


Stolen medical-related data

* By May, three healthcare payer organizations had been attacked in the United States in 2014 and 2015:
Anthem An anthem is a musical composition of celebration, usually used as a symbol for a distinct group, particularly the national anthems of countries. Originally, and in music theory and religious contexts, it also refers more particularly to sho ...
, Premera Blue Cross and CareFirst. The three attacks together netted information on more than 91 million people. * In January 2022, the
International Committee of the Red Cross The International Committee of the Red Cross (ICRC) is a humanitarian organization based in Geneva, Switzerland, and is a three-time Nobel Prize laureate. The organization has played an instrumental role in the development of rules of war and ...
made a public plea to hackers who had attacked the organisation.


Ransomware attacks

* 2017 –
WannaCry ransomware attack The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the form ...
* 2018 Atlanta cyberattack * 2019 ** 2019 Baltimore ransomware attack ** Luas cyberattack (Ireland) * 2021 ** Harris Federation attack (UK) ** Health Service Executive cyberattack (Ireland) ** Colonial Pipeline cyberattack (United States) ** Transnet ransomware attack (South Africa) ** JBS S.A. cyberattack ** Steamship Authority cyberattack ** Kaseya VSA ransomware attack * 2022 – Costa Rican ransomware attack * 2024 —
2024 cyberattack on Kadokawa and Niconico On the morning of June 8, 2024, Kadokawa Corporation, Kadokawa's website and the Japanese video-sharing platform Niconico suffered a ransomware cyberattack by a Russian-linked hacker group called Royal (cyber gang), BlackSuit, who claimed respons ...
* 2025 — Geodesy, Cartography and Cadastre Authority of the Slovak Republic cyberattack


Notable criminal ransomware hacker groups

* Vice Society * Conti (ransomware) * Hive (ransomware) * REvil


Hacktivism


See also

* Blended threat for list of attacks with physical consequences * Cyberwarfare and China * Cyberwarfare and the United States * List of cyber warfare forces *
List of data breaches This is a list of reports about data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30,000 or more ...
* List of phishing incidents * List of security hacking incidents


Further reading

* Maschmeyer, Lennart; Deibert, Ronald J.; Lindsay, Jon R. (2021). "A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society". ''Journal of Information Technology & Politics''. 18 (1): 1–20. * Oppenheimer, Harry (2024). " How the process of discovering cyberattacks biases our understanding of cybersecurity". ''Journal of Peace Research.''


References

{{DEFAULTSORT:cyberattacks, List of *