SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Target          Attack
 Date     Author      Target   Description                                                       Attack
                                                                                                           Category        Category
                               The Consumerist representatives notify their readers that
                               the site outages experienced in the previous days were
                               caused by a security breach. They do not provide many
Jul 15       ?                                                                                  Unknown   E-Commerce Cyber Crime
                               details regarding the security issue, but as a precaution turn
                               off commenting on all articles and plan to reset all user
                                           1
                               passwords.
                                                                                                            Financial
                               Security researchers from Kasperky Lab and Seculert
                                                                                                          institutions,
                               announce to have discovered a new cyber-espionage
                                                                                                            students,       Cyber
July 17      ?                 campaign targeting victims in the Middle East: more than           APT
                                                                                                             various      Espionage
                               800 victims located in Iran, Israel, Afghanistan and
                                                                     2                                    government
                               elsewhere over the last eight months.
                                                                                                            agencies
                               MapleSoft, makers of mathematical and analytical software
                               such as Maple, reports that they have been investigating a
                                                   3
                               database breach. The breach resulted in the attackers
                               obtaining customer information such as email addresses,
                               first and last names, as well as company and institution
                               names. MapleSoft states that no financial information was                     Industry:
July 17      ?                                                                                  Unknown                   Cyber Crime
                               compromised in this breach. Few days later MapleSoft                          Software
                               customers begin to receive emails pretending to be from
                               the “MapleSoft Security Update Team” that claimed Maple
                               software was vulnerable to attack and a patch was
                               available, redirecting them to websites hosting Blackhole
                                            4
                               Exploit Kit.
                               NullCrew returns with another major data breach. Hackers
                               claimed to have access to the database belong to the South
July 17                                                                                         Unknown Online Services   Cyber Crime
                               Africa's Leading ISP Directory and Community Portal
                                                    5
                               (ispdirectory.co.za)
                               Anonymous’ OpGodFather continues. This time, the
July 17                        hacktivists publish details from the Internet filtering systems  Unknown     Government    Hacktivism
                                                                    6
                               instated by Yemen’s government.
                               An unknown group of hackers breaches a server managed
                               by Proserve, a Dutch hosting services provider. The
                               databases of websites such as Q-Music, The Telegraaf,
Jul 18       ?                                                                                  Unknown       Hosting     Cyber Crime
                               Stedin, and various online stores were accessed and the
                               details of around 800,000 users were stolen as a result of
                                          7
                               the hack.
                                NullCrew turn their attention to Yale University and obtain
                               details of around 1,200 students and members of the staff
                               from the databases of the educational institution and claim
July 18                        that the database they’ve gained access to contains even           SQLi?      Education    Cyber Crime
                               more sensitive information such as social security numbers,
                               names, addresses and phone numbers, although they only
                                                                                         8
                               published usernames, passwords and email addresses.
                               @MidasBank            from      @TeamGhostShell           hacks
                                                                                                             Industry:
July 18                        ITWallStreet.com, an online job source, and dumps around           SQLi?                   Cyber Crime
                                                 9                                                           Recruting
                               50,000 accounts.
                               A hacker called @SirLeakAlot hacks The Himalayan Times
          @SirLeak             (thehimalayantimes.com) and dumps 23,453 accounts (plus
July 18    Alot
                                                                                                   SQLi        News       Cyber Crime
                               9 administrators) including username, phone number and
                                                      10
                               clear text password.
                               Anonymous declares what they call the "iWot", meaning
                               "Internet War On Terror" and hacks Dahabshiil", an
                               international funds transfer company dumping several
July 19                        accounts and threating to publish everything in two months        Finance       SQLi?      Hacktivism
                               if Dahabshill will not come completely clean on its terrorist
                                           11
                               activities. However Dahabshill denies the Anonymous
                                                                 12
                               were responsible for the attack.
                               Catherine Venusto, a former secretary, successfully changed
                               her daughter's grade from an F to an M and her son's grade
          Catherine                                                                            Unlegitimate
July 19 Venusto                from a 98 to a 99 for a total of 110 times between 2011 and                   Education    Cyber Crime
                                                                                                 Access
                               2012. She used the Northwestern Lehigh School District's
                                                                                   3
                               superintendent's password to make the changes
#DoktorBass from Anonymous Australia hacks the Women’s
                       Land Link Africa website (wllaweb.org) and dumps over
                                                                                                    Organization:
July 19                50,000 emails and passwords many of which appear to also       Unknown                       Hacktivism
                                         13                                                          Civil Rights
                       be duplicates. Curiously, after the attack the author
                                                       14
                       apologize for what he made.
                       ZDNET reveals that last year, 25-year-old Brad Stephenson
                       found a loophole in one of Nike's websites and decided to
             Brad                                                                    Vulnerability    Industry:
July 19   Stephenson   take advantage. Over the span of five months, he used                                       Cyber Crime
                                                                                     in Web Site       Clothing
                       accounts meant for professional athletes to steal Nike
                                                            15
                       merchandise worth over $80,000.
                       Nullcrew hacks Netcom, an U.K. ISP and dumps 70 accounts
July 19                with emails, usernames, encrypted passwords, user address         SQLi             ISP      Cyber Crime
                                                                      16
                       and phone numbers and other information.
                       The Japan Finance Ministry announces to have found that
                       some of its computers were infected with a Trojan malware                                      Cyber
July 20       ?                                                                         Trojan      Government
                       from 2010 to 2011 and admitted information may have                                          Espionage
                                      17
                       been leaked.
                       Another cyber attack carried on by @SirLeakAlot. This time
          @SirLeak     the victim is cichlid-forum.com, whose 67,000 accounts are                   Organization:
Jul 21     Alot
                                                                                         SQLi                      Cyber Crime
                       leaked. The leaked data contains usernames, emails and                           Forum
                                                 18
                       encrypted passwords.
                       The official 2012 big dance website (bigdance2012.com) is
                                                                                                    Organization:
Jul 21 5NiP3R          hacked by a hacker called 5NiP3R and as a result                  SQLi                      Cyber Crime
                                                                   19                              Entertainment
                       approximately 7,000 accounts are leaked.
                       Another attack by 5NiP3R. This time the target is
                       london2012rentals.com, a website related to rental services
Jul 21 5NiP3R                                                                            SQLi      Online Services Cyber Crime
                       for the upcoming London 2012 Olympic Games which has
                                                   20
                       5,000 accounts leaked.
                       #Op_Australia goes on and the latest victim is a website
Jul 21                 belonging         to       the     Queensland      government Defacement Government Hacktivism
                                                                                21
                       (workliveplay.qld.gov.au) which is hacked and defaced.
                       A hacker using the twitter handle @lulz_much_lulz
                                                                                                      Industry:
                       (Anonymous – BR) announces a leak of source code (77 Mb)
Jul 22                                                                                Unknown            Adult     Cyber Crime
                       that belongs to a well-known cams website
                                             22                                                    Entertainment
                       (cam4bucks.com).
                       @SirLeakAlot hacks elevatemagazine.com, an e-commerce
          @SirLeak     website dedicated to anti-age products, and dumps nearly
Jul 22     Alot
                                                                                         SQLi      Online Services Cyber Crime
                       700 accounts with emails, usernames and hashed
                                   23
                       passwords.
                       As many as 11 million passwords are posted online more
                       than four months after hackers penetrated the defenses of
July 23       ?                                                                       Unknown      Online Games Cyber Crime
                       Gamigo, a free gaming website based in Germany, according
                                                24
                       to published reports.
                       A purported Iran scientist working for the Atomic Energy
                       Organization of Iran e-mailed an SOS to F-Secure Chief
                       Research Officer Mikko Hypponen, saying the AEOI was
                                                                                     Unspecified                      Cyber
July 23       ?        under a cyber attack capable to shut down the AEOI                           Government
                                                                                       Malware                      Warfare?
                       “automation network” in its Natanz and Fordo facilities and
                       to turn on computer’s volumes to high blasting what
                                                                    25
                       appeared to be ‘Thunderstruck’ by AC/DC.
           Black       A hacker group called Black Tiger Security hacks the website
July 24    Tiger       torontohomestaysearch.com and dumps over 14,000                   SQLi      Online Services Cyber Crime
                                          26
          Security     account details.
                       As part of the so-called #opfuckuganda, #DoktorBass of
                       Anonymous Australia hacks several websites in Uganda,
July 24                                                                                  SQLi           News        Hacktivism
                       among which ntvuganda.co.ug from whom he dumps nearly
                                          27
                       1,500 accounts.
                       After the DDoS to her site, during the previous half, Carly
                       Rae Jepsen has lodged a complaint to the Vancouver Police                      Industry:
July 25       ?                                                                       Unknown                      Cyber Crime
                       Department after allegedly having naked photos stolen from                  Entertainment
                                                    28
                       her personal computer.
                       AAPT, an Australian ISP, confirms the breach claimed by the
                                                                       29
                       Anonymous collective the day before. The hackers
July 26                                                                               Unknown             ISP       Hackivism
                       allegedly stole 40GB of data from AAPT in protest against
                                                                             30
                       proposed new surveillance and data retention laws.
Bloomberg reveals that Chinese hackers, on July 18 last
                            year, were able to harvest the e-mails of the president of
                            the European Union Council, Herman Van Rompuy. Over 10
                            days last July, the hackers returned to the council’s
                                                                                                                          Cyber
July 27                     computers        four    times,     accessing the   internal     Unknown    Government
                                                                                                                        Espionage
                            communications of 11 of the EU’s economic, security and
                            foreign affairs officials. The breach, unreported until now,
                            potentially gave the intruders an unvarnished view of the
                                                              31
                            financial crisis gripping Europe.
                                                                                                        Industry: Oil
                            The same hackers targeted other victims: from oilfield
                                                                                                       Industry: Law
                            services leader Halliburton Co. to Washington law firm
                                                                                                           Firm
                            Wiley Rein LLP; from a Canadian magistrate involved in a                                      Cyber
July 27                                                                                      Unknown
                            sensitive China extradition case to Kolkata-based tobacco                   Government      Espionage
                            and technology conglomerate ITC Ltd. For a total of 20
                                     31                                                                  Industry:
                            victims.
                                                                                                        Technology
                            Korean Police arrest two people for allegedly hacking into
            “Choi”          the network system of KT Corp., Korea's No.2 mobile carrier,
             plus           and selling the data. The 40-year-old suspect, identified only
July 29   unnamed
                                                                                             Unknown   Mobile Carrier Cyber Crime
                            by his family name Choi, and another were accused of
           suspect
                            leaking personal information of about 8.7 million mobile
                                                                             32
                            phone subscribers from February until recently.
                            #DoktorBass hacks luxuryhomesaustralia.com.au and dumps
July 29                     nearly 800 records containing usernames, hashed                   SQLi     Online Services Cyber Crime
                                                                          33
                            passwords and encrypted Credit Card Details.
                            In an explanatory blog post, Dropbox declares that a stolen
                            password was "used to access an employee Dropbox
                            account containing a project document with user email
                            addresses." Hackers apparently started spamming those
July 31      ?                                                                               Unknown   Online Services Cyber Crime
                            addresses, although there’s no indication that user
                            passwords were revealed as well. Some Dropbox customer
                            accounts were hacked too, but this was apparently an
                                              34
                            unrelated matter.




1 http://news.softpedia.com/news/Security-Breach-The-Consumerist-Resets-Passwords-Turns-Off-Commenting-282087.shtml
2 http://packetstormsecurity.org/news/view/21252/New-Madi-Cyber-Espionage-Campaign-Targets-Iran-And-Israel.html
3 http://www.maplesoft.com/security/
4 http://www.zdnet.com/mom-accessed-school-system-110-times-to-change-kids-grades-7000001230/
5 http://www.ehackingnews.com/2012/07/south-africas-leading-isp-directory.html
6 http://news.softpedia.com/news/Anonymous-Hackers-Publish-Details-of-Yemen-s-Internet-Filtering-Systems-281745.shtml
7 http://news.softpedia.com/news/User-Details-of-800-000-Stolen-in-Dutch-ISP-Server-Breach-282083.shtml
8 http://news.softpedia.com/news/1-200-Usernames-Passwords-Leaked-from-Yale-University-281841.shtml
9 http://www.cyberwarnews.info/2012/07/18/50000-accounts-leaked-from-itwallstreet-com-by-midasbank/
10 http://www.cyberwarnews.info/2012/07/18/20000-clear-text-account-details-leaked-from-the-himalayan-times-by-sirleakalot/
11 http://slashdot.org/submission/2166657/anonymousiwot-somaleaks
12 http://www.news.com.au/technology/war-on-terror-anonymous-hacks-middle-eastern-bank/story-e6frfro0-1226430985426
13 http://www.cyberwarnews.info/2012/07/19/womens-land-link-africa-hacked-50000-accounts-leaked-by-doktorbass/
14 http://pastebin.com/5iBwZzn3
15 http://www.zdnet.com/nike-hacker-steals-over-80000-7000001177/
16 http://www.cyberwarnews.info/2012/07/19/uk-isp-netcom-hacked-data-leaked-after-refused-help-by-nullcrew/
17 http://www.japantimes.co.jp/text/nn20120721b7.html
18 http://www.cyberwarnews.info/2012/07/21/67000-accounts-leaked-from-cichlids-forums-by-sirleakalot/
19 http://www.cyberwarnews.info/2012/07/21/big-dance-2012-hacked-7k-accounts-leaked-by-5nip3r/
20 http://www.cyberwarnews.info/2012/07/21/london2012rentals-com-hacked-5000-accounts-leaked-by-5nip3r/
21 http://www.cyberwarnews.info/2012/07/21/another-australian-government-website-hacked-and-defaced-by-op_australia/
22 http://www.cyberwarnews.info/2012/07/22/cam4bucks-hacked-source-leaked-by-lulz_much_lulz/
23 http://ozdc.net/archives.php?aid=2760
24 http://www.forbes.com/sites/andygreenberg/2012/07/23/eight-million-passwords-spilled-from-gaming-site-gamigo-months-

after-breach/
25 http://venturebeat.com/2012/07/23/iran-atomic-organization-malware/
26 http://www.cyberwarnews.info/2012/07/25/toronto-homestay-search-hacked-14000-accounts-leaked/
27 http://www.cyberwarnews.info/2012/07/25/uganda-kaabong-district-website-hacked-accounts-leaked-by-doktorbass/
28 http://nakedsecurity.sophos.com/2012/07/26/carly-rae-jepsen-nude-photos/
29 http://www.theregister.co.uk/2012/07/25/anonymous_names_au_target/
30 http://www.theregister.co.uk/2012/07/26/aapt_confirms_anonymous_hack/
31 http://www.bloomberg.com/news/2012-07-26/china-hackers-hit-eu-point-man-and-d-c-with-byzantine-candor.html
32 http://www.koreatimes.co.kr/www/news/biz/2012/07/113_116143.html
33 http://ozdc.net/archives.php?aid=2824
34 http://blog.dropbox.com/index.php/security-update-new-features/

Más contenido relacionado

La actualidad más candente

Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Reportcheinyeanlim
 
Testing Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTesting Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTechWell
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 

La actualidad más candente (15)

Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Testing Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTesting Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche Exposed
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Bi
BiBi
Bi
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Insecure mag-33
Insecure mag-33Insecure mag-33
Insecure mag-33
 

Destacado

The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...Ikenna Anyadike
 
Water / Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
Water /  Environmental Engineering Senior Design _ USF 2013 _ Wastewater TeamWater /  Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
Water / Environmental Engineering Senior Design _ USF 2013 _ Wastewater TeamMelButcher
 
Narration test
Narration testNarration test
Narration testpacinad
 
Teaching presentation rubric
Teaching presentation rubricTeaching presentation rubric
Teaching presentation rubriccarolbillingcwi
 
Flow Drinks, product information
Flow Drinks, product informationFlow Drinks, product information
Flow Drinks, product informationFlow Drinks Oy
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...Helen Tsipliareles-Pryor
 
Humanitarian reporting journalists handbook_nepal
Humanitarian reporting journalists handbook_nepalHumanitarian reporting journalists handbook_nepal
Humanitarian reporting journalists handbook_nepalMadhu Acharya
 
Unit 1 - The Friendship Page READING
Unit 1 - The Friendship Page READINGUnit 1 - The Friendship Page READING
Unit 1 - The Friendship Page READINGMai Nguyễn
 
Toan pt.de085.2011
Toan pt.de085.2011Toan pt.de085.2011
Toan pt.de085.2011BẢO Hí
 
The Voicemail Script Part 2
The Voicemail Script Part 2The Voicemail Script Part 2
The Voicemail Script Part 2maryashtona2
 
Events in our changing world
Events in our changing worldEvents in our changing world
Events in our changing worldNicole Ferdinand
 
Ledivani edition1.0
Ledivani edition1.0Ledivani edition1.0
Ledivani edition1.0Samule Wang
 

Destacado (20)

The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
The #LOL! Teen Development Initiative Manifesto: In Pursuit of Teenage Develo...
 
Water / Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
Water /  Environmental Engineering Senior Design _ USF 2013 _ Wastewater TeamWater /  Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
Water / Environmental Engineering Senior Design _ USF 2013 _ Wastewater Team
 
IEEE GLOBECOM'14 Industry Program
IEEE GLOBECOM'14 Industry ProgramIEEE GLOBECOM'14 Industry Program
IEEE GLOBECOM'14 Industry Program
 
Narration test
Narration testNarration test
Narration test
 
Teaching presentation rubric
Teaching presentation rubricTeaching presentation rubric
Teaching presentation rubric
 
Flow Drinks, product information
Flow Drinks, product informationFlow Drinks, product information
Flow Drinks, product information
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
 
Humanitarian reporting journalists handbook_nepal
Humanitarian reporting journalists handbook_nepalHumanitarian reporting journalists handbook_nepal
Humanitarian reporting journalists handbook_nepal
 
IMPro user experience
IMPro user experienceIMPro user experience
IMPro user experience
 
Unit 1 - The Friendship Page READING
Unit 1 - The Friendship Page READINGUnit 1 - The Friendship Page READING
Unit 1 - The Friendship Page READING
 
456
456456
456
 
Manual diskgen
Manual diskgenManual diskgen
Manual diskgen
 
Aim global clearbook
Aim global clearbookAim global clearbook
Aim global clearbook
 
Toan pt.de085.2011
Toan pt.de085.2011Toan pt.de085.2011
Toan pt.de085.2011
 
2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...
2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...
2014 PV Performance Modeling Workshop: SolarAnywhere: WebWeb-Accessible Irrad...
 
The Voicemail Script Part 2
The Voicemail Script Part 2The Voicemail Script Part 2
The Voicemail Script Part 2
 
Events in our changing world
Events in our changing worldEvents in our changing world
Events in our changing world
 
Primary EFL Reading Competition
Primary EFL Reading CompetitionPrimary EFL Reading Competition
Primary EFL Reading Competition
 
My friend past simple
My friend past simpleMy friend past simple
My friend past simple
 
Ledivani edition1.0
Ledivani edition1.0Ledivani edition1.0
Ledivani edition1.0
 

Similar a July 2012 cyber attacks timeline part II

Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsLinkurious
 
Cybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfCybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfHamzaAfzal61
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxjmiham
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxshericehewat
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]AngelGomezRomero
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptxMhndHTaani
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsSBWebinars
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfarri2009av
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreInMobi Technology
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 

Similar a July 2012 cyber attacks timeline part II (20)

Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
Cybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfCybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdf
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
 
Final Assignment.pptx
Final Assignment.pptxFinal Assignment.pptx
Final Assignment.pptx
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptx
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

July 2012 cyber attacks timeline part II

  • 1. Target Attack Date Author Target Description Attack Category Category The Consumerist representatives notify their readers that the site outages experienced in the previous days were caused by a security breach. They do not provide many Jul 15 ? Unknown E-Commerce Cyber Crime details regarding the security issue, but as a precaution turn off commenting on all articles and plan to reset all user 1 passwords. Financial Security researchers from Kasperky Lab and Seculert institutions, announce to have discovered a new cyber-espionage students, Cyber July 17 ? campaign targeting victims in the Middle East: more than APT various Espionage 800 victims located in Iran, Israel, Afghanistan and 2 government elsewhere over the last eight months. agencies MapleSoft, makers of mathematical and analytical software such as Maple, reports that they have been investigating a 3 database breach. The breach resulted in the attackers obtaining customer information such as email addresses, first and last names, as well as company and institution names. MapleSoft states that no financial information was Industry: July 17 ? Unknown Cyber Crime compromised in this breach. Few days later MapleSoft Software customers begin to receive emails pretending to be from the “MapleSoft Security Update Team” that claimed Maple software was vulnerable to attack and a patch was available, redirecting them to websites hosting Blackhole 4 Exploit Kit. NullCrew returns with another major data breach. Hackers claimed to have access to the database belong to the South July 17 Unknown Online Services Cyber Crime Africa's Leading ISP Directory and Community Portal 5 (ispdirectory.co.za) Anonymous’ OpGodFather continues. This time, the July 17 hacktivists publish details from the Internet filtering systems Unknown Government Hacktivism 6 instated by Yemen’s government. An unknown group of hackers breaches a server managed by Proserve, a Dutch hosting services provider. The databases of websites such as Q-Music, The Telegraaf, Jul 18 ? Unknown Hosting Cyber Crime Stedin, and various online stores were accessed and the details of around 800,000 users were stolen as a result of 7 the hack. NullCrew turn their attention to Yale University and obtain details of around 1,200 students and members of the staff from the databases of the educational institution and claim July 18 that the database they’ve gained access to contains even SQLi? Education Cyber Crime more sensitive information such as social security numbers, names, addresses and phone numbers, although they only 8 published usernames, passwords and email addresses. @MidasBank from @TeamGhostShell hacks Industry: July 18 ITWallStreet.com, an online job source, and dumps around SQLi? Cyber Crime 9 Recruting 50,000 accounts. A hacker called @SirLeakAlot hacks The Himalayan Times @SirLeak (thehimalayantimes.com) and dumps 23,453 accounts (plus July 18 Alot SQLi News Cyber Crime 9 administrators) including username, phone number and 10 clear text password. Anonymous declares what they call the "iWot", meaning "Internet War On Terror" and hacks Dahabshiil", an international funds transfer company dumping several July 19 accounts and threating to publish everything in two months Finance SQLi? Hacktivism if Dahabshill will not come completely clean on its terrorist 11 activities. However Dahabshill denies the Anonymous 12 were responsible for the attack. Catherine Venusto, a former secretary, successfully changed her daughter's grade from an F to an M and her son's grade Catherine Unlegitimate July 19 Venusto from a 98 to a 99 for a total of 110 times between 2011 and Education Cyber Crime Access 2012. She used the Northwestern Lehigh School District's 3 superintendent's password to make the changes
  • 2. #DoktorBass from Anonymous Australia hacks the Women’s Land Link Africa website (wllaweb.org) and dumps over Organization: July 19 50,000 emails and passwords many of which appear to also Unknown Hacktivism 13 Civil Rights be duplicates. Curiously, after the attack the author 14 apologize for what he made. ZDNET reveals that last year, 25-year-old Brad Stephenson found a loophole in one of Nike's websites and decided to Brad Vulnerability Industry: July 19 Stephenson take advantage. Over the span of five months, he used Cyber Crime in Web Site Clothing accounts meant for professional athletes to steal Nike 15 merchandise worth over $80,000. Nullcrew hacks Netcom, an U.K. ISP and dumps 70 accounts July 19 with emails, usernames, encrypted passwords, user address SQLi ISP Cyber Crime 16 and phone numbers and other information. The Japan Finance Ministry announces to have found that some of its computers were infected with a Trojan malware Cyber July 20 ? Trojan Government from 2010 to 2011 and admitted information may have Espionage 17 been leaked. Another cyber attack carried on by @SirLeakAlot. This time @SirLeak the victim is cichlid-forum.com, whose 67,000 accounts are Organization: Jul 21 Alot SQLi Cyber Crime leaked. The leaked data contains usernames, emails and Forum 18 encrypted passwords. The official 2012 big dance website (bigdance2012.com) is Organization: Jul 21 5NiP3R hacked by a hacker called 5NiP3R and as a result SQLi Cyber Crime 19 Entertainment approximately 7,000 accounts are leaked. Another attack by 5NiP3R. This time the target is london2012rentals.com, a website related to rental services Jul 21 5NiP3R SQLi Online Services Cyber Crime for the upcoming London 2012 Olympic Games which has 20 5,000 accounts leaked. #Op_Australia goes on and the latest victim is a website Jul 21 belonging to the Queensland government Defacement Government Hacktivism 21 (workliveplay.qld.gov.au) which is hacked and defaced. A hacker using the twitter handle @lulz_much_lulz Industry: (Anonymous – BR) announces a leak of source code (77 Mb) Jul 22 Unknown Adult Cyber Crime that belongs to a well-known cams website 22 Entertainment (cam4bucks.com). @SirLeakAlot hacks elevatemagazine.com, an e-commerce @SirLeak website dedicated to anti-age products, and dumps nearly Jul 22 Alot SQLi Online Services Cyber Crime 700 accounts with emails, usernames and hashed 23 passwords. As many as 11 million passwords are posted online more than four months after hackers penetrated the defenses of July 23 ? Unknown Online Games Cyber Crime Gamigo, a free gaming website based in Germany, according 24 to published reports. A purported Iran scientist working for the Atomic Energy Organization of Iran e-mailed an SOS to F-Secure Chief Research Officer Mikko Hypponen, saying the AEOI was Unspecified Cyber July 23 ? under a cyber attack capable to shut down the AEOI Government Malware Warfare? “automation network” in its Natanz and Fordo facilities and to turn on computer’s volumes to high blasting what 25 appeared to be ‘Thunderstruck’ by AC/DC. Black A hacker group called Black Tiger Security hacks the website July 24 Tiger torontohomestaysearch.com and dumps over 14,000 SQLi Online Services Cyber Crime 26 Security account details. As part of the so-called #opfuckuganda, #DoktorBass of Anonymous Australia hacks several websites in Uganda, July 24 SQLi News Hacktivism among which ntvuganda.co.ug from whom he dumps nearly 27 1,500 accounts. After the DDoS to her site, during the previous half, Carly Rae Jepsen has lodged a complaint to the Vancouver Police Industry: July 25 ? Unknown Cyber Crime Department after allegedly having naked photos stolen from Entertainment 28 her personal computer. AAPT, an Australian ISP, confirms the breach claimed by the 29 Anonymous collective the day before. The hackers July 26 Unknown ISP Hackivism allegedly stole 40GB of data from AAPT in protest against 30 proposed new surveillance and data retention laws.
  • 3. Bloomberg reveals that Chinese hackers, on July 18 last year, were able to harvest the e-mails of the president of the European Union Council, Herman Van Rompuy. Over 10 days last July, the hackers returned to the council’s Cyber July 27 computers four times, accessing the internal Unknown Government Espionage communications of 11 of the EU’s economic, security and foreign affairs officials. The breach, unreported until now, potentially gave the intruders an unvarnished view of the 31 financial crisis gripping Europe. Industry: Oil The same hackers targeted other victims: from oilfield Industry: Law services leader Halliburton Co. to Washington law firm Firm Wiley Rein LLP; from a Canadian magistrate involved in a Cyber July 27 Unknown sensitive China extradition case to Kolkata-based tobacco Government Espionage and technology conglomerate ITC Ltd. For a total of 20 31 Industry: victims. Technology Korean Police arrest two people for allegedly hacking into “Choi” the network system of KT Corp., Korea's No.2 mobile carrier, plus and selling the data. The 40-year-old suspect, identified only July 29 unnamed Unknown Mobile Carrier Cyber Crime by his family name Choi, and another were accused of suspect leaking personal information of about 8.7 million mobile 32 phone subscribers from February until recently. #DoktorBass hacks luxuryhomesaustralia.com.au and dumps July 29 nearly 800 records containing usernames, hashed SQLi Online Services Cyber Crime 33 passwords and encrypted Credit Card Details. In an explanatory blog post, Dropbox declares that a stolen password was "used to access an employee Dropbox account containing a project document with user email addresses." Hackers apparently started spamming those July 31 ? Unknown Online Services Cyber Crime addresses, although there’s no indication that user passwords were revealed as well. Some Dropbox customer accounts were hacked too, but this was apparently an 34 unrelated matter. 1 http://news.softpedia.com/news/Security-Breach-The-Consumerist-Resets-Passwords-Turns-Off-Commenting-282087.shtml 2 http://packetstormsecurity.org/news/view/21252/New-Madi-Cyber-Espionage-Campaign-Targets-Iran-And-Israel.html 3 http://www.maplesoft.com/security/ 4 http://www.zdnet.com/mom-accessed-school-system-110-times-to-change-kids-grades-7000001230/ 5 http://www.ehackingnews.com/2012/07/south-africas-leading-isp-directory.html 6 http://news.softpedia.com/news/Anonymous-Hackers-Publish-Details-of-Yemen-s-Internet-Filtering-Systems-281745.shtml 7 http://news.softpedia.com/news/User-Details-of-800-000-Stolen-in-Dutch-ISP-Server-Breach-282083.shtml 8 http://news.softpedia.com/news/1-200-Usernames-Passwords-Leaked-from-Yale-University-281841.shtml 9 http://www.cyberwarnews.info/2012/07/18/50000-accounts-leaked-from-itwallstreet-com-by-midasbank/ 10 http://www.cyberwarnews.info/2012/07/18/20000-clear-text-account-details-leaked-from-the-himalayan-times-by-sirleakalot/ 11 http://slashdot.org/submission/2166657/anonymousiwot-somaleaks 12 http://www.news.com.au/technology/war-on-terror-anonymous-hacks-middle-eastern-bank/story-e6frfro0-1226430985426 13 http://www.cyberwarnews.info/2012/07/19/womens-land-link-africa-hacked-50000-accounts-leaked-by-doktorbass/ 14 http://pastebin.com/5iBwZzn3 15 http://www.zdnet.com/nike-hacker-steals-over-80000-7000001177/ 16 http://www.cyberwarnews.info/2012/07/19/uk-isp-netcom-hacked-data-leaked-after-refused-help-by-nullcrew/ 17 http://www.japantimes.co.jp/text/nn20120721b7.html 18 http://www.cyberwarnews.info/2012/07/21/67000-accounts-leaked-from-cichlids-forums-by-sirleakalot/ 19 http://www.cyberwarnews.info/2012/07/21/big-dance-2012-hacked-7k-accounts-leaked-by-5nip3r/ 20 http://www.cyberwarnews.info/2012/07/21/london2012rentals-com-hacked-5000-accounts-leaked-by-5nip3r/ 21 http://www.cyberwarnews.info/2012/07/21/another-australian-government-website-hacked-and-defaced-by-op_australia/ 22 http://www.cyberwarnews.info/2012/07/22/cam4bucks-hacked-source-leaked-by-lulz_much_lulz/ 23 http://ozdc.net/archives.php?aid=2760 24 http://www.forbes.com/sites/andygreenberg/2012/07/23/eight-million-passwords-spilled-from-gaming-site-gamigo-months- after-breach/ 25 http://venturebeat.com/2012/07/23/iran-atomic-organization-malware/ 26 http://www.cyberwarnews.info/2012/07/25/toronto-homestay-search-hacked-14000-accounts-leaked/
  • 4. 27 http://www.cyberwarnews.info/2012/07/25/uganda-kaabong-district-website-hacked-accounts-leaked-by-doktorbass/ 28 http://nakedsecurity.sophos.com/2012/07/26/carly-rae-jepsen-nude-photos/ 29 http://www.theregister.co.uk/2012/07/25/anonymous_names_au_target/ 30 http://www.theregister.co.uk/2012/07/26/aapt_confirms_anonymous_hack/ 31 http://www.bloomberg.com/news/2012-07-26/china-hackers-hit-eu-point-man-and-d-c-with-byzantine-candor.html 32 http://www.koreatimes.co.kr/www/news/biz/2012/07/113_116143.html 33 http://ozdc.net/archives.php?aid=2824 34 http://blog.dropbox.com/index.php/security-update-new-features/