Notable attacks and breaches
Notable attacks and breaches
Some illustrative examples of different types of computer security
breaches are given below.
Robert Morris and the first computer worm
In 1988, only 60,000 computers were connected to the Internet, and most
were mainframes, minicomputers and professional workstations. On 2 November
1988, many started to slow down, because they were running a malicious code
that demanded processor time and that spread itself to other computers – the
first internet "computer worm". The software was traced back to
23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who
said 'he wanted to count how many machines were connected to the Internet'.
Rome Laboratory
In 1994, over a hundred intrusions were made by unidentified crackers
into the Rome Laboratory, the US Air Force's main command and research
facility. Using trojan horses, hackers were able to obtain unrestricted access
to Rome's networking systems and remove traces of their activities. The
intruders were able to obtain classified files, such as air tasking order
systems data and furthermore able to penetrate connected networks of National
Aeronautics and Space Administration's Goddard Space Flight Center,
Wright-Patterson Air Force Base, some Defense contractors, and other private
sector organizations, by posing as a trusted Rome center user.[121]
TJX customer credit card details
In early 2007, American apparel and home goods company TJX announced
that it was the victim of an unauthorized computer systems intrusion and that
the hackers had accessed a system that stored data on credit card, debit card,
check, and merchandise return transactions.
Stuxnet attack
The computer worm known as Stuxnet reportedly ruined almost one-fifth of Iran's
nuclear centrifuges by disrupting industrial programmable logic controllers
(PLCs) in a targeted attack generally believed to have been launched by Israel
and the United States – although neither has publicly admitted this.
Global surveillance disclosures
In early 2013, documents provided by Edward Snowden were published by The Washington Post and The Guardian exposing the massive
scale of NSA global surveillance. It was also revealed that the NSA had
deliberately inserted a backdoor in a NIST standard for encryption and tapped the links between
Google's data centres.
Target and Home Depot breaches
In 2013 and 2014, a Russian/Ukrainian hacking ring known as
"Rescator" broke into Target Corporation computers in 2013, stealing
roughly 40 million credit cards, and then Home Depot computers in 2014, stealing
between 53 and 56 million credit card numbers. Warnings were delivered at both
corporations, but ignored; physical security breaches using self checkout
machines are believed to have played a large role. "The malware utilized
is absolutely unsophisticated and uninteresting," says Jim Walter,
director of threat intelligence operations at security technology company
McAfee – meaning that the heists could have easily been stopped by existing
antivirus software had administrators responded to the warnings. The size of
the thefts has resulted in major attention from state and Federal United States
authorities and the investigation is ongoing.
Office of Personnel Management data breach
In April 2015, the Office of Personnel Management discovered it had been
hacked more than a year earlier in a data breach, resulting in the theft of
approximately 21.5 million personnel records handled by the office. The Office of Personnel
Management hack has been described by federal officials as among the largest
breaches of government data in the history of the United States. Data targeted in the breach
included personally identifiable information such as Social Security Numbers, names, dates and places of birth,
addresses, and fingerprints of current and former government employees as well
as anyone who had undergone a government background check. It is believed the hack was
perpetrated by Chinese hackers but the motivation remains unclear.
Ashley Madison breach
In July 2015, a hacker group known as "The Impact Team"
successfully breached the extramarital relationship website Ashley Madison. The
group claimed that they had taken not only company data but user data as well.
After the breach, The Impact Team dumped emails from the company's CEO, to
prove their point, and threatened to dump customer data unless the website was
taken down permanently. With this initial data release, the group stated
"Avid Life Media has been instructed to take Ashley Madison and
Established Men offline permanently in all forms, or we will release all
customer records, including profiles with all the customers' secret sexual
fantasies and matching credit card transactions, real names and addresses, and
employee documents and emails. The other websites may stay online." When Avid Life Media, the parent
company that created the Ashley Madison website, did not take the site offline,
The Impact Group released two more compressed files, one 9.7GB and the second
20GB. After the second data dump, Avid Life Media CEO Noel Biderman resigned,
but the website remained functional.
Legal issues and global regulation
Conflict of laws in cyberspace has become a major cause of concern for
computer security community. Some of the main challenges and complaints about
the antivirus industry are the lack of global web regulations, a global base of
common rules to judge, and eventually punish, cyber crimes and cyber criminals.
There is no global cyber law and cyber security treaty that can be invoked for
enforcing global cyber security issues.
International legal issues of cyber attacks are complicated in nature.
Even if an antivirus firm locates the cybercriminal behind the creation of a
particular virus or piece of malware or form of cyber attack, often the local
authorities cannot take action due to lack of laws under which to prosecute.
Authorship attribution for cyber crimes and cyber attacks is a major problem
for all law enforcement agencies.
"[Computer viruses] switch from one country to another, from one
jurisdiction to another – moving around the world, using the fact that we don't
have the capability to globally police operations like this. So the Internet is
as if someone [had] given free plane tickets to all the online criminals of the
world." Use of dynamic DNS, fast flux and
bullet proof servers have added own complexities to this situation.
No comments