Timeline of Internet conflicts
   HOME

TheInfoList



OR:

The Internet has a long history of turbulent relations, major maliciously designed disruptions (such as wide scale
computer virus A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a compu ...
incidents, DOS and DDOS attacks that cripple services, and organized attacks that cripple major online communities), and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications. Spawned from the original ARPANET, the modern Internet, World Wide Web and other services on it, such as virtual communities ( bulletin boards, forums, and Massively multiplayer online games) have grown exponentially. Such prolific growth of population, mirroring "offline" society, contributes to the number of conflicts and problems online growing each year. Today, billions of people in nearly all countries use various parts of the Internet. Inevitably, as in "brick and mortar" or offline society, the virtual equivalent of major turning points, conflicts, and disruptions—the online equivalents of the falling of the
Berlin Wall The Berlin Wall (german: Berliner Mauer, ) was a guarded concrete barrier that encircled West Berlin from 1961 to 1989, separating it from East Berlin and East Germany (GDR). Construction of the Berlin Wall was commenced by the government ...
, the creation of the United Nations, spread of disease, and events like the Iraqi invasion of Kuwait will occur. Criteria for inclusion to this article may range from small-scale incidents such as online bomb threats to large scale cyberterrorism instances such as hacks of critical infrastructures.


Pre World Wide Web era


1980s


1980

* ARPANET grinds to a complete halt on October 27 because of an accidentally-propagated status-message virus.


1982

* The 414s compromise dozens of high-profile computer systems, including those at Los Alamos National Laboratory,
Sloan-Kettering Cancer Center Memorial Sloan Kettering Cancer Center (MSK or MSKCC) is a cancer treatment and research institution in the borough of Manhattan in New York City, founded in 1884 as the New York Cancer Hospital. MSKCC is one of 52 National Cancer Institute ...
, and Security Pacific National Bank, between 1982 and 1983.


1985

* Kevin Mitnick was arrested by the FBI on February 15. Mitnick was convicted of wire fraud and of breaking into the computer systems of
Fujitsu is a Japanese multinational information and communications technology equipment and services corporation, established in 1935 and headquartered in Tokyo. Fujitsu is the world's sixth-largest IT services provider by annual revenue, and the la ...
, Motorola, Nokia, and
Sun Microsystems Sun Microsystems, Inc. (Sun for short) was an American technology company that sold computers, computer components, software, and information technology services and created the Java programming language, the Solaris operating system, ZFS, the ...
. He served five years in prison. His pursuit and subsequent arrest made him one of the most famous hackers up to that time.


1988

* A 23-year-old graduate student at Cornell University, Robert Tappan Morris, released the Internet's first worm, the Morris worm. Morris, the son of a National Security Agency (NSA) computer security expert, wrote 99 lines of code and released them as an experiment. The program began replicating and infecting machines at a much faster rate than he had anticipated, causing machines all over the world to crash.


1990

* In response to the US Secret Service's Operation Sundevil,
Mitch Kapor Mitchell David Kapor ( ; born November 1, 1950) is an American entrepreneur best known for his work as an application developer in the early days of the personal computer software industry, later founding Lotus, where he was instrumental in deve ...
establishes the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
to provide legal representation in cases involving the civil rights of computer users.


World Wide Web era


1990s


1991

* Phil Zimmermann creates and releases Pretty Good Privacy, an encryption tool still in use. By 1993, he was the target of U.S. government investigations, charged with "munitions export without a license". The investigation ended in 1996 with no charges filed.


1994

* An international group, dubbed the "Phonemasters" by the FBI, hacked into the networks of a number of companies including MCI WorldCom,
Sprint Sprint may refer to: Aerospace *Spring WS202 Sprint, a Canadian aircraft design *Sprint (missile), an anti-ballistic missile Automotive and motorcycle *Alfa Romeo Sprint, automobile produced by Alfa Romeo between 1976 and 1989 *Chevrolet Sprint, ...
, AT&T, and
Equifax Equifax Inc. is an American multinational consumer credit reporting agency headquartered in Atlanta, Georgia and is one of the three largest consumer credit reporting agencies, along with Experian and TransUnion (together known as the "Big Thr ...
credit reporters. The gang accounted for approximately $1.85 million in business losses. * In late 1995,
Vladimir Levin Vladimir Leonidovitch Levin (Владимир Леонидович Левин) is a Russian individual famed for his involvement in hacking attempt to fraudulently transfer USD 10.7 million via Citibank's computers. The commonly known story At ...
persuaded
Citibank Citibank, N. A. (N. A. stands for " National Association") is the primary U.S. banking subsidiary of financial services multinational Citigroup. Citibank was founded in 1812 as the City Bank of New York, and later became First National City ...
's computers to transfer $10 million from its customers' accounts to his. Interpol arrested him at Heathrow Airport, and Citibank got most of the money back. He pleaded guilty in 1995, but the method he used wasn't uncovered for another ten years, and at that time was one of the largest computer crimes by dollar value. *
Laurence Canter and Martha Siegel Laurence A. Canter (born June 24, 1953) and Martha S. Siegel (April 9, 1948 – September 24, 2000) were partners in a husband-and-wife firm of lawyers who posted the first massive commercial Usenet spam on April 12, 1994. This event came shortl ...
post the first large commercial
newsgroup spam Newsgroup spam is a type of spam where the targets are Usenet newsgroups. Spamming of Usenet newsgroups actually pre-dates e-mail spam. The first widely recognized Usenet spam (though not the most famous) was posted on 18 January 1994 by Clarenc ...
, setting off an
arms race An arms race occurs when two or more groups compete in military superiority. It consists of a competition between two or more states to have superior armed forces; a competition concerning production of weapons, the growth of a military, and t ...
between spammers and network operators.


1995

*
Scientology and the Internet There are a number of disputes concerning the Church of Scientology's attempts to suppress material critical of Scientology on the Internet, utilizing various methods primarily lawsuits and legal threats, as well as front organizations. In la ...
: After documents copyrighted by the
Church of Scientology The Church of Scientology is a group of interconnected corporate entities and other organizations devoted to the practice, administration and dissemination of Scientology, which is variously defined as a cult, a scientology as a business, bu ...
are posted to Usenet group alt.religion.scientology, church lawyers send threats of legal action to several users and attempt to shut down the group. Lawsuits are brought against users Dennis Erlich,
Grady Ward William Grady Ward (born April 4, 1951) is an American software engineer, lexicographer, and Internet activist who has been prominent in the Scientology versus the Internet controversy. Biography Grady Ward created the Moby Project, an extensive ...
, Arnaldo Lerma and
Karin Spaink Karin Spaink (born December 20, 1957 in Amsterdam) is a journalist, writer and feminist. Spaink is a free speech advocate and social critic. Some of her subjects are: * New-age writers who assert all diseases are only a psychological phenomen ...
, but these fail to stem distribution of the documents.


1996

*Tim Lloyd plants a software time bomb at Omega Engineering, a company in New Jersey. The results of the attack are devastating: losses of US$12 million and more than 80 employees lose their jobs. Lloyd is sentenced to 41 months in jail. *US President Bill Clinton signs the
Communications Decency Act The Communications Decency Act of 1996 (CDA) was the United States Congress's first notable attempt to regulate pornographic material on the Internet. In the 1997 landmark case ''Reno v. ACLU'', the United States Supreme Court unanimously struck ...
into US federal law as part of the Telecommunications Act of 1996. Web site operators turn their pages black in protest. The decency provisions are overturned the following year in ''
Reno v. American Civil Liberties Union ''Reno v. American Civil Liberties Union'', 521 U.S. 844 (1997), was a landmark decision of the Supreme Court of the United States, unanimously ruling that anti-indecency provisions of the 1996 Communications Decency Act violated the First Amendme ...
''.


1998

* The Digital Millennium Copyright Act (DMCA) becomes law in the United States. * The
CIH CIH or cih may refer to: * CIH (computer virus), also known as Chernobyl and Spacefiller * CIH Bank, a wholly owned subsidiary of the Moroccan ''Caisse de dépôt et de gestion'' * Capricorn Investment Holdings, a southern African umbrella for the ...
computer virus is released, written by Chen Ing Hau of Taiwan. It is considered to be one of the most harmful widely circulated viruses, overwriting critical information on infected system drives, and more importantly, in some cases corrupting the system
BIOS In computing, BIOS (, ; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the ...
, rendering computer systems unbootable. It was found in the wild in September. * Two
Chinese Chinese can refer to: * Something related to China * Chinese people, people of Chinese nationality, citizenship, and/or ethnicity **''Zhonghua minzu'', the supra-ethnic concept of the Chinese nation ** List of ethnic groups in China, people of va ...
hackers, Hao Jinglong and Hao Jingwen (twin brothers), are sentenced to death by a court in China for breaking into a bank's computer network and stealing 720,000 yuan ($87,000). * The US government allows the export of 56-bit encryption software, and stronger encryption software for highly sensitive data. * The
Electronic Disturbance Theater The Electronic Disturbance Theater (EDT), established in 1997 by performance artist and writer Ricardo Dominguez, is an electronic company of cyber activists, critical theorists, and performance artists who engage in the development of both the th ...
launches the Floodnet tool for civil disobedience, a tool to create a denial-of-service attack (DOS). The first DoS attacks were launched against the Pentagon, the Frankfurt Stock Exchange and the Mexican government.


1999

* From the time the Morris worm struck the Internet until the onset of the Melissa virus, the Internet was relatively free from swift-moving, highly destructive "malware". The
Melissa virus The Melissa virus is a mass-mailing macro virus released on or around March 26, 1999. It targets Microsoft Word and Outlook-based systems and created considerable network traffic. The virus infects computers via email; the email is titled "Import ...
, however, was rapacious; damages have been estimated at nearly $400 million. It marked a turning point, being the first incident of its kind to affect the newly commercial Internet.


2000s


2000

* The U.S. government establishes a technical review process to allow the export of encryption software regardless of key length. * Discovering a demo of their song " I Disappear" on the
Napster Napster was a peer-to-peer file sharing application. It originally launched on June 1, 1999, with an emphasis on digital audio file distribution. Audio songs shared on the service were typically encoded in the MP3 format. It was founded by Shawn ...
P2P file-sharing network, heavy metal band
Metallica Metallica is an American heavy metal band. The band was formed in 1981 in Los Angeles by vocalist/guitarist James Hetfield and drummer Lars Ulrich, and has been based in San Francisco for most of its career. The band's fast tempos, instrume ...
filed legal action against Napster over it (''
Metallica v. Napster, Inc. ''Metallica, et al. v. Napster, Inc.'' was a 2000 U.S. District Court for the Northern District of California case that focused on copyright infringement, racketeering, and unlawful use of digital audio interface devices. ''Metallica vs. Napster ...
''). This was the first time a major musical act publicly went against allegedly illegal file sharing. * In February 2000, some of the Internet's most reliable sites were rendered nearly unreachable by distributed denial-of-service (
DDoS In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host A ...
) attacks. Yahoo! took the first hit on February 7, 2000. In the next few days, Buy.com, eBay, CNN, Amazon.com, ZDNet.com, E-Trade, and
Excite Excitation, excite, exciting, or excitement may refer to: * Excitation (magnetic), provided with an electrical generator or alternator * Excite Ballpark, located in San Jose, California * Excite (web portal), web portal owned by IAC * Electron ex ...
were taken down by DDoS attacks. Though damage estimates vary widely, the FBI estimates that the companies suffered $1.7 billion USD in lost business and other damages. * On May 5, 2000, the ILOVEYOU computer worm attacked tens of millions of Windows-based PCs. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The outbreak was estimated to have caused US$5.5–8.7 billion in damages worldwide, and estimated to cost the US$15 billion to remove the worm. The worm originated from the Philippines.


2001

*
Dmitry Sklyarov ''United States v. ElcomSoft and Dmitry Sklyarov'' was a 2001–2002 criminal case in which Dmitry Sklyarov and his employer ElcomSoft were charged with alleged violation of the DMCA. The case raised some concerns of civil rights and legal proces ...
is arrested by
FBI agents The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
while visiting the United States for having cracked encryption on
Adobe Acrobat Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage Portable Document Format (PDF) files. The family comprises Acrobat Reader (formerly Reader), Acrobat (forme ...
e-book software, in violation of the United States' DMCA. This occurred despite the fact that Russia, of which he is a citizen, does not honor this law as of 2001.


2002

* Google receives legal notices from the
Church of Scientology The Church of Scientology is a group of interconnected corporate entities and other organizations devoted to the practice, administration and dissemination of Scientology, which is variously defined as a cult, a scientology as a business, bu ...
and removes links to
Operation Clambake Operation Clambake, also referred to by its domain name, xenu.net, is a website and Norway-based non-profit organization, launched in 1996, founded by Andreas Heldal-Lund, that publishes criticism of the Church of Scientology. It is owned and ma ...
from its search results. * In October, a massive attack against the 13 root domain servers of the Internet is launched by unidentified hackers. The aim: to stop the domain name resolution service around the net.


2003

* Site Finder, the attempt by VeriSign in 2003 to take control of all unregistered .com and .net domain names for their own purposes, is launched, and just as quickly scuttled after massive public outcry and official protest from groups such as
ARIN The American Registry for Internet Numbers (ARIN) is the regional Internet registry for Canada, the United States, and many Caribbean and North Atlantic islands. ARIN manages the distribution of Internet number resources, including IPv4 and IPv ...
and
IANA The Internet Assigned Numbers Authority (IANA) is a standards organization that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS), media types, and other Interne ...
.


2004

* In November, Marvel Comics filed a lawsuit against the developers of the ''
City of Heroes ''City of Heroes'' (''CoH'') was a massively multiplayer online role-playing game which was developed by Cryptic Studios and published by NCSOFT. The game was launched in North America on April 28, 2004, and in Europe by NCsoft Europe on Febru ...
'' MMO, Cryptic Studios and their publisher NCsoft alleging that the game not only allows, but actively promotes, the creation of characters whose copyrights and trademarks are owned by Marvel, and that Cryptic has intentionally failed to police these infringing characters. The suit sought unspecified damages and an injunction to force the companies to stop making use of its characters. The case is settled and rejected by United States courts in December 2005 with no changes made to the game.


2005

* In May, the
Wikipedia Seigenthaler biography incident In May 2005, an unregistered editor posted a hoax article onto Wikipedia about journalist John Seigenthaler. The article falsely stated that Seigenthaler had been a suspect in the assassinations of U.S. President John F. Kennedy and U.S. Attorney ...
began. * In October, the Sony BMG copy protection rootkit scandal began, where it was discovered that
Sony BMG Sony BMG Music Entertainment was an American record company owned as a 50–50 joint venture between Sony Corporation of America and Bertelsmann. The venture's successor, the revived Sony Music, is wholly owned by Sony, following their buyout o ...
surreptitiously and possibly illegally distributed copy protection software that forced itself to install on computers playing their audio CDs. As a result, many Windows-based computers belonging to consumers were left vulnerable to exploits and hacking. * In November, it was revealed that the online video game '' World of Warcraft'', with millions of subscribers, would be hackable due to the far-reaching corruption and invasiveness of Sony's copy protection scheme. * On December 20, the ''
City of Heroes ''City of Heroes'' (''CoH'') was a massively multiplayer online role-playing game which was developed by Cryptic Studios and published by NCSOFT. The game was launched in North America on April 28, 2004, and in Europe by NCsoft Europe on Febru ...
'' game servers were nearly all hacked by an undisclosed method. According to NCsoft representative CuppaJo, "Customer data and its security was not compromised in any way during the incident that occurred," and no additional information beyond this was publicly disclosed. As of July 2006, this is the first known hack of any MMO, of which there are millions of subscribers across numerous games.


2006

* In January 2006, the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
lodged a class action lawsuit ('' Hepting v. AT&T'') which alleged that AT&T had allowed agents of the National Security Agency to monitor phone and Internet communications of AT&T customers without warrants. In April 2006 a retired former AT&T technician, Mark Klein, lodged an affidavit supporting this allegation. The Department of Justice has stated they will intervene in this lawsuit by means of
State Secrets Privilege The state secrets privilege is an evidentiary rule created by United States legal precedent. Application of the privilege results in exclusion of evidence from a legal case based solely on affidavits submitted by the government stating that court ...
. The existence of this database and the NSA program that compiled it was mostly unknown to the general public until '' USA Today'' broke the story on May 10, 2006. It is estimated that the database contains over 1.9 trillion
call-detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that ...
s of phone calls made after September 11 attacks. * On May 3, a massive DDOS assault on
Blue Security Blue Frog was a freely-licensed anti-spam tool produced by Blue Security Inc. and operated as part of a community-based system which tried to persuade spammers to remove community members' addresses from their mailing lists by automating the co ...
, an anti-spam company, is redirected by Blue Security staff to their Movable Type-hosted blog. The result is that the DDOS instead knocks out all access to over 1.8 million active blogs, including all ten million plus registered LiveJournal accounts (which is owned by Movable Type's parent company). *The Motion Picture Association of America (MPAA) in May was accused of hiring illegal
hackers A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
to fight BitTorrent technology. * In June, The Pirate Bay, a BitTorrent tracker website based in and operating from
Sweden Sweden, formally the Kingdom of Sweden,The United Nations Group of Experts on Geographical Names states that the country's formal name is the Kingdom of SwedenUNGEGN World Geographical Names, Sweden./ref> is a Nordic country located on ...
, is raided by Swedish police for allegedly violating United States, Swedish, and European Union copyright law. As of November 2006, the site remains online, operating from Denmark and no legal action has been filed against it or its owners. (The site is online now at thepiratebay.org)


2007

* May 17: Estonia recovers from massive denial-of-service attack * June 13: FBI Operation Bot Roast finds over 1 million botnet victims * June 21: A
spear phishing Phishing is a type of Social engineering (security), social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker ...
incident at the
Office of the Secretary of Defense The Office of the Secretary of Defense (OSD) is a headquarters-level staff of the United States Department of Defense. It is the principal civilian staff element of the U.S. Secretary of Defense, and it assists the Secretary in carrying out aut ...
steals sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD. * August 11: United Nations website hacked by Indian Hacker Pankaj Kumar Singh. *November 14: Panda Burning Incense, which is known by several other names, including Fujacks and Radoppan.T lead to the arrest of eight people in China. Panda Burning Incense was a parasitic virus that infected executable files on a PC. When infected, the icon of the executable file changes to an image of a panda holding three sticks of incense. The arrests were the first for virus writing in China.


2008

* January 17:
Project Chanology Project Chanology (also called Operation Chanology) was a protest movement against the practices of the Church of Scientology by members of Anonymous, a leaderless Internet-based group. "Chanology" is a combination of "4chan" and "Scientology" ...
;
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
attacks Scientology website servers around the world. Private documents are stolen from Scientology computers and distributed over the Internet. * March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including the Pentagon. They operated from an apartment on a Chinese Island. * March 14: Trend Micro website successfully hacked by Turkish hacker Janizary (aka Utku).


2009

* April 4: Conficker worm infiltrated millions of PCs worldwide, including many government-level top-security computer networks.


2010s


2010

* June: Stuxnet The Stuxnet worm is found by VirusBlokAda. Stuxnet was unusual in that while it spread via Windows computers, its payload targeted just one specific model and type of
SCADA Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also covers sensors and ...
systems. It slowly became clear that it was a cyberattack on Iran's nuclear facilities—with most experts believing that Israel was behind it—perhaps with US help.


2011

* The hacker group
Lulz Security LulzSec (a contraction for Lulz Security) was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed ...
is formed. * April 9: Bank of America website got hacked by a Turkish hacker named JeOPaRDY. An estimated 85,000 credit card numbers and accounts were reported to have been stolen due to the hack. Bank officials say no personal customer bank information is available on that web-page. Investigations are being conducted by the FBI to trace down the incriminated hacker. * April 17: An " external intrusion" sends the
PlayStation Network PlayStation Network (PSN) is a digital media entertainment service provided by Sony Interactive Entertainment. Launched in November 2006, PSN was originally conceived for the PlayStation video game consoles, but soon extended to encompass smartp ...
offline, and compromises personally identifying information (possibly including credit card details) of its 77 million accounts, in what is claimed to be one of the five largest
data breach A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, info ...
es ever. * Computer hacker sl1nk releases information of his penetration in the servers of the Department of Defense (DoD), Pentagon, NASA, NSA, US Military, Department of the Navy, Space and Naval Warfare System Command and other UK/US government websites. * September: Bangladeshi hacker TiGER-M@TE made a world record in defacement history by hacking 700,000 websites in a single shot. * October 16: The YouTube channel of '' Sesame Street'' was hacked, streaming pornographic content for about 22 minutes. * November 1: The main phone and Internet networks of the Palestinian territories sustained a hacker attack from multiple locations worldwide. * November 7: The forums for Valve's
Steam Steam is a substance containing water in the gas phase, and sometimes also an aerosol of liquid water droplets, or air. This may occur due to evaporation or due to boiling, where heat is applied until water reaches the enthalpy of vaporization ...
service were hacked. Redirects for a hacking website, Fkn0wned, appeared on the Steam users' forums, offering "hacking tutorials and tools, porn, free giveaways and much more." * December 14: Five members of the Norwegian hacker group, Noria, were arrested, allegedly suspected of hacking into the email account of the militant extremist
Anders Behring Breivik Fjotolf Hansen (born 13 February 1979), better known by his birth name Anders Behring Breivik () and by his pseudonym Andrew Berwick, is a Norwegian far-right domestic terrorist, known for committing the 2011 Norway attacks on 22 July 2011. On ...
(who perpetrated the 2011 attacks in the country).


2012

* A hacker, Big-Smoke, published over 400,000 credit cards online, and threatened Israel to release 1 million credit cards in the future. In response to that incident, an Israeli hacker published over 200 Albanian' credit cards online. * Gottfrid Svartholm Warg, the co-founder of
Pirate Bay The Pirate Bay (sometimes abbreviated as TPB) is an online index of digital content of entertainment media and software. Founded in 2003 by Swedish think tank Piratbyrån, The Pirate Bay allows visitors to search, download, and contribute mag ...
, was convicted in Denmark of hacking a mainframe computer, what was then Denmark's biggest hacking case. *January 7: "Team Appunity", a group of Norwegian hackers, were arrested for breaking into Norway's largest prostitution website, then publishing the user database online. *February 3: Marriott was hacked by a New Age ideologist, Attila Nemeth, who was resisting against the New World Order where he said that corporations are allegedly controlling the world. As a response, Marriott reported him to the United States Secret Service. *February 8: Foxconn is hacked by a hacker group, "Swagg Security", releasing a massive amount of data including email and server logins, and even more alarming—bank account credentials of large companies like Apple and Microsoft. Swagg Security stages the attack just as a Foxconn protest ignites against terrible working conditions in southern China. *May 4: The websites of several Turkish representative offices of international IT-companies are defaced within the same day by F0RTYS3V3N (Turkish Hacker), including the websites of Google, Yandex, Microsoft, Gmail,
MSN MSN (meaning Microsoft Network) is a web portal and related collection of Internet services and apps for Windows and mobile devices, provided by Microsoft and launched on August 24, 1995, alongside the release of Windows 95. The Microsoft Net ...
, Hotmail, PayPal. *May 24: WHMCS is hacked by UGNazi, they claim that the reason for this is because of the illegal sites that are using their software. *May 31: MyBB is hacked by newly founded hacker group, UGNazi, the website was defaced for about a day, they claim their reasoning for this was because they were upset that the forum board Hackforums.net uses their software. *June 5: The social networking website LinkedIn has been hacked and the passwords for nearly 6.5 million user accounts are stolen by cybercriminals. As a result, a United States grand jury indicted Nikulin and three unnamed co-conspirators on charges of aggravated identity theft and computer intrusion. *August 15: The most valuable company in the world
Saudi Aramco Saudi Aramco ( ar, أرامكو السعودية '), officially the Saudi Arabian Oil Company (formerly Arabian-American Oil Company) or simply Aramco, is a Saudi Arabian public petroleum and natural gas company based in Dhahran. , it is one of ...
is crippled by a cyber warfare attack for months by malware called Shamoon. Considered the biggest hack in history in terms of cost and destructiveness . Carried out by an Iranian attacker group called Cutting Sword of Justice. Iranian hackers retaliated against Stuxnet by releasing Shamoon. The malware destroyed over 35,000
Saudi Saudi may refer to: * Saudi Arabia * Saudis, people from Saudi Arabia * Saudi culture, the culture of Saudi Arabia * House of Saud The House of Saud ( ar, آل سُعُود, ʾĀl Suʿūd ) is the ruling royal family of Saudi Arabia. It is c ...
Aramco computers, affecting business operations for months. *December 17: Computer hacker sl1nk announced that he has hacked a total of 9 countries'
SCADA Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also covers sensors and ...
systems. The proof includes 6 countries: France, Norway, Russia, Spain, Sweden and the United States.


2013

* The social networking website Tumblr is attacked by hackers. Consequently, 65,469,298 unique emails and passwords were leaked from Tumblr. The data breach's legitimacy is confirmed by computer security researcher
Troy Hunt Troy Adam Hunt is an Australian web security consultant known for public education and outreach on security topics. He created Have I Been Pwned?, a data breach search website that allows users to see if their personal information has been com ...
. * August:
Yahoo! data breaches The Internet service company Yahoo! was subjected to the largest data breach on record. Two major data breaches of user account data to hackers were revealed during the second half of 2016. The first announced breach, reported in September 2016, ...
occurred. More than 1 billion users' data is being leaked.


2014

* February 7: The
bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
exchange Mt. Gox filed for bankruptcy after $460million was apparently stolen by hackers due to "weaknesses in
heir Inheritance is the practice of receiving private property, titles, debts, entitlements, privileges, rights, and obligations upon the death of an individual. The rules of inheritance differ among societies and have changed over time. Officiall ...
system" and another $27.4million went missing from its bank accounts. * August: The
Gamergate Gamergate may refer to: * Gamergate (ant), a worker ant that can store sperm and reproduce sexually * Gamergate (harassment campaign), targeting women in the video game industry * Lt. Gamergate, a character in the ''Adventure Time'' episode " Den ...
harassment campaign erupts over the inclusion of women in video game industry. * October: The White House computer system was hacked. It was said that the FBI, the Secret Service, and other U.S. intelligence agencies categorized the attacks "among the most sophisticated attacks ever launched against U.S. government systems." * November 24: In response to the release of the film ''
The Interview ''The Interview'' is a 2014 satirical alternate history action-comedy film co-produced and directed by Seth Rogen and Evan Goldberg in their second directorial work, following ''This Is the End'' (2013). The screenplay was written by Dan Sterl ...
'', the servers of
Sony Pictures Sony Pictures Entertainment Inc. (commonly known as Sony Pictures or SPE, and formerly known as Columbia Pictures Entertainment, Inc.) is an American diversified multinational mass media and entertainment studio Conglomerate (company), conglom ...
are hacked by a hacker group calling itself "Guardian of Peace". * November 28: The website of the Philippine telecommunications company Globe Telecom was hacked in response to the poor internet service they are distributing.


2015

* June: the records of 21.5 million people, including social security numbers, dates of birth, addresses, fingerprints, and security clearance-related information, are stolen from the United States Office of Personnel Management (OPM). Most of the victims are employees of the United States government and unsuccessful applicants to it. '' The Wall Street Journal'' and '' The Washington Post'' report that government sources believe the hacker is the government of China. *July: The servers of extramarital affairs website Ashley Madison were
breached Breached was a Canadian rock band from Toronto, Ontario, active from 2010 to 2015. Its members were Bobby Noakes (vocals), Mike Diesel (guitar/vocals), Ryan Alexander (bass), and Neil Uppal (drums). Mike Diesel was a member of the band Age o ...
.


2016

* February: The 2016
Bangladesh Bank heist The Bangladesh Bank robbery, also known colloquially as the Bangladesh Bank cyber heist, was a theft that took place in February 2016. Thirty-five fraudulent instructions were issued by security hackers via the SWIFT network to illegally tra ...
attempted to steal US$951 million from a Bangladesh Bank, and succeeded in getting $101 million—although some of this was later recovered. * March: '' VICE'' reported that a teenage hacker
Cyber Anakin Cyber Anakin (also known by the handle cyberanakinvader) is the pseudonym of a computer hacktivist. Career In 2016, in retaliation against Russia for the shooting-down of Malaysia Airlines Flight 17, Cyber Anakin, who was then a teen, started ...
had gone on a hacking spree against Russian websites such as e-mail provider KM.RU and game company Nival to express his anger against Russia for the downing of the Malaysia Airlines Flight
MH17 Malaysia Airlines Flight 17 (MH17/MAS17) was a scheduled passenger flight from Amsterdam Airport Schiphol, Amsterdam to Kuala Lumpur International Airport, Kuala Lumpur that was shot down by Russian forces on 17 July 2014, while flying over e ...
in eastern Ukraine. According to cybersecurity researcher
Troy Hunt Troy Adam Hunt is an Australian web security consultant known for public education and outreach on security topics. He created Have I Been Pwned?, a data breach search website that allows users to see if their personal information has been com ...
, at least 1.5 million victims were affected by the breaches. Many years later
Latvia Latvia ( or ; lv, Latvija ; ltg, Latveja; liv, Leţmō), officially the Republic of Latvia ( lv, Latvijas Republika, links=no, ltg, Latvejas Republika, links=no, liv, Leţmō Vabāmō, links=no), is a country in the Baltic region of ...
-based independent news website
Meduza ''Meduza'' ( rus, Медуза, t=jellyfish) is a Russian- and English-language independent news website, headquartered in Riga. It was founded in 2014 by a group of former employees of the then-independent ''Lenta.ru'' news website. Free mob ...
used the content of KM.RU's data breach to pinpoint the identity of a person who has been harassing female chess players of various countries such as Russia, Kazakhstan and India with the delivery of mails containing used condoms. * July 22: WikiLeaks published the documents from the
2016 Democratic National Committee email leak The 2016 Democratic National Committee email leak is a collection of Democratic National Committee (DNC) emails stolen by one or more hackers operating under the pseudonym "Guccifer 2.0" who are alleged to be Russian intelligence agency hackers, ...
. * July 29: a group suspected coming from China launched hacker attacks on the website of Vietnam Airlines. * August 13: The Shadow Brokers (TSB) started publishing several leaks containing hacking tools from the National Security Agency (NSA), including several zero-day exploits. Ongoing leaks until April 2017 (
The Shadow Brokers The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group" who are widely suspected to be a branch of ...
) * September: Hacker Ardit Ferizi is sentenced to 20 years in prison after being arrested for hacking U.S. servers and passing the leaked information to members of ISIL terrorist group back in 2015. * October: The
2016 Dyn cyberattack On October 21, 2016, three consecutive distributed denial-of-service attacks were launched against the Domain Name System (DNS) provider Dyn. The attack caused major Internet platforms and services to be unavailable to large swathes of users in ...
is being conducted with a botnet consisting of IOTs infected with Mirai by the hacktivist groups SpainSquad, Anonymous, and New World Hackers, reportedly in retaliation for Ecuador's rescinding Internet access to WikiLeaks founder
Julian Assange Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army inte ...
at their embassy in London, where he has been granted asylum. *Late 2016: Hackers steal international personal user data from the company Uber, including phone numbers, email addresses, and names, of 57 million people and 600,000 driver's license numbers of drivers for the company. Uber's GitHub account was accessed through Amazon's cloud-based service. Uber paid the hackers $100,000 for assurances the data was destroyed. * December 2016:
Yahoo! data breaches The Internet service company Yahoo! was subjected to the largest data breach on record. Two major data breaches of user account data to hackers were revealed during the second half of 2016. The first announced breach, reported in September 2016, ...
reported and affected more than 1 billion users. The data leakage includes user names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and hashed passwords


2017

* April: A hacker group calling itself "The Dark Overlord" posted unreleased episodes of ''
Orange Is the New Black ''Orange Is the New Black'' (sometimes abbreviated to ''OITNB'') is an American comedy-drama streaming television series created by Jenji Kohan for Netflix. The series is based on Piper Kerman's memoir '' Orange Is the New Black: My Year in a Wo ...
'' TV series online after failing to extort the online entertainment company Netflix. * May: WannaCry ransomware attack started on Friday, May 12, 2017, and has been described as unprecedented in scale, infecting more than 230,000 computers in over 150 countries. A hacked unreleased Disney film is held for ransom, to be paid in Bitcoin. * May: 25,000 digital photos and ID scans relating to patients of the Grozio Chirurgija
cosmetic surgery Plastic surgery is a surgical specialty involving the restoration, reconstruction or alteration of the human body. It can be divided into two main categories: reconstructive surgery and cosmetic surgery. Reconstructive surgery includes craniofa ...
clinic in
Lithuania Lithuania (; lt, Lietuva ), officially the Republic of Lithuania ( lt, Lietuvos Respublika, links=no ), is a country in the Baltic region of Europe. It is one of three Baltic states and lies on the eastern shore of the Baltic Sea. Lithuania ...
were obtained and published without consent by an unknown group demanding ransoms. Thousands of clients from more than 60 countries were affected. The breach brought attention to weaknesses in Lithuania's information security. *June:
2017 Petya cyberattack A series of powerful cyberattacks using the Petya malware began on 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. Similar infections were reported in France, Germa ...
. *June: TRITON (TRISIS), a malware framework designed to reprogram Triconex safety instrumented systems (SIS) of industrial control systems (ICS), discovered in Saudi Arabian Petrochemical plant. *August: Hackers demand $7.5 million in
Bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
to stop pre-releasing
HBO Home Box Office (HBO) is an American premium television network, which is the flagship property of namesake parent subsidiary Home Box Office, Inc., itself a unit owned by Warner Bros. Discovery. The overall Home Box Office business unit is ba ...
shows and scripts, including '' Ballers'', '' Room 104'' and ''
Game of Thrones ''Game of Thrones'' is an American fantasy drama television series created by David Benioff and D. B. Weiss for HBO. It is an adaptation of ''A Song of Ice and Fire'', a series of fantasy novels by George R. R. Martin, the first ...
''. * May–July 2017: The Equifax breach. * September 2017: Deloitte breach. *December: Mecklenburg County, North Carolina computer systems were hacked. They did not pay the ransom.


2018

* March: Computer systems in the city of Atlanta, in the U.S. state of Georgia, are seized by hackers with
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
. They did not pay the ransom, and two Iranians were indicted by the FBI on cyber crime charges for the breach. * The town of
Wasaga Beach Wasaga Beach (or simply Wasaga) is a town in Simcoe County, Ontario, Canada. Situated along the longest freshwater beach in the world, it is a popular summer tourist destination. It is located along the southern end of Georgian Bay, approximate ...
in Ontario, Canada computer systems are seized by hackers with ransomware. *September: Facebook was hacked, exposing to hackers the personal information of an estimated 30 million Facebook users (initially estimated at 50 million) when the hackers "stole" the "access tokens" of 400,000 Facebook users. The information accessible to the hackers included users' email addresses, phone numbers, their lists of friends, Groups they are members of, users' search information, posts on their timelines, and names of recent Messenger conversations."Facebook Was Hacked. 3 Things You Should Do After the Breach. The social networking giant said attackers had exploited a weakness that enabled them to hijack the accounts of nearly 50 million users. Here are some tips for securing your account,"
September 28, 2018, New York Times, retrieved April 15, 2021
"Facebook says hackers accessed phone numbers, email addresses as part of latest breach,"
October 12, 2018, Fox News, retrieved April 15, 2021
*October: West Haven, Connecticut USA computer systems are seized by hackers with ransomware, they paid $2,000 in ransom. *November: **The first U.S. indictment of individual people for
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
attacks occurs. The U.S. Justice Department indicted two men Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri who allegedly used the SamSam ransomware for extortion, netting them more than $6 million in ransom payments. The companies infected with the
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
included
Allscripts Allscripts Healthcare Solutions, Inc. is a publicly traded American company that provides physician practices, hospitals, and other healthcare providers with practice management and electronic health record technology. Allscripts also provides ...
, Medstar Health, and Hollywood Presbyterian Medical Center. Altogether, the attacks caused victims to lose more than $30 million, in addition to the ransom payments. **Marriott disclosed that its Starwood Hotel brand had been subject to a security breach.


2019

*March: An online bomb threat was posted against
Axel Voss Axel Voss (born 7 April 1963, Hamelin) is a German lawyer and politician of the Christian Democratic Union of Germany who has been serving as a Member of the European Parliament since 2009 and became coordinator of the European People's Party g ...
' office in Bonn reportedly due to his support of Directive on Copyright in the Digital Single Market. *March: Jackson County computer systems in the U.S. state of Georgia are seized by hackers with
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
, they paid $400,000 in ransom. The city of Albany in the U.S. state of New York experiences a ransomware cyber attack. *April: Computer systems in the city of Augusta, in the U.S. state of Maine, are seized by hackers using ransomware. The City of Greenville (North Carolina)'s computer systems are seized by hackers using ransomware known as RobbinHood.
Imperial County Imperial Count (german: Reichsgraf) was a title in the Holy Roman Empire. In the medieval era, it was used exclusively to designate the holder of an imperial county, that is, a fief held directly ( immediately) from the emperor, rather than from ...
, in the U.S. state of California, computer systems are seized by hackers using Ryuk ransomware. * May: computer systems belonging to the
City of Baltimore Baltimore ( , locally: or ) is the most populous city in the U.S. state of Maryland, fourth most populous city in the Mid-Atlantic, and the 30th most populous city in the United States with a population of 585,708 in 2020. Baltimore was ...
are seized by hackers using ransomware known as RobbinHood that encrypts files with a "file-locking" virus, as well as the tool EternalBlue. *June: The city of
Riviera Beach, Florida Riviera Beach is a city in Palm Beach County, Florida, United States, which was incorporated September 29, 1922. Due to the location of its eastern boundary, it is also the easternmost municipality in the Miami metropolitan area, which was home to ...
paid roughly $600,000 ransom in
Bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
to hackers who seized their computers using ransomware. Hackers stole 18 hours of unreleased music from the band
Radiohead Radiohead are an English rock band formed in Abingdon, Oxfordshire, in 1985. The band consists of Thom Yorke (vocals, guitar, piano, keyboards); brothers Jonny Greenwood (lead guitar, keyboards, other instruments) and Colin Greenwood (bass) ...
demanding $150,000 ransom. Radiohead released the music to the public anyway and did not pay the ransom. *November: The
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
hacktivist collective announced that they have hacked into four Chinese computer databases and donated those to data breach indexing/notification service vigilante.pw. The hack was conducted in order to support the
2019 Hong Kong protests Nineteen or 19 may refer to: * 19 (number), the natural number following 18 and preceding 20 * one of the years 19 BC, AD 19, 1919, 2019 Films * ''19'' (film), a 2001 Japanese film * ''Nineteen'' (film), a 1987 science fiction film Music ...
, amidst the Hong Kong police's siege of the city's Polytechnic University. They also brought up a possible peace plan first proposed by a professor at Inha University in hopes of having the Korean reunification and the five key demands of the Hong Kong protest being fulfilled at once.


2020s


2020

* February:
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
hacked the United Nations website and created a page for Taiwan, a country which had not had a seat at the UN since 1971. The hacked page featured the
Flag of Taiwan A flag is a piece of fabric (most often rectangular or quadrilateral) with a distinctive design and colours. It is used as a symbol, a signalling device, or for decoration. The term ''flag'' is also used to refer to the graphic design employ ...
, the
KMT The Kuomintang (KMT), also referred to as the Guomindang (GMD), the Nationalist Party of China (NPC) or the Chinese Nationalist Party (CNP), is a major political party in the Republic of China, initially on the Chinese mainland and in Taiw ...
emblem, a
Taiwan Independence Taiwan, officially the Republic of China (ROC), is a country in East Asia, at the junction of the East and South China Seas in the northwestern Pacific Ocean, with the People's Republic of China (PRC) to the northwest, Japan to the northeast ...
flag, the Anonymous logo, embedded YouTube videos such as the Taiwanese national anthem and the closing score for the 2019 film '' Avengers: Endgame'' titled " It's Been a Long, Long Time", and a caption. The hacked server belonged to the United Nations Department of Economic and Social Affairs. * March: A Malaysian railway station was mentioned on a Twitter post as part of a warning issued via a hacked account by a group of entities with the names of "黎晓培", "Coltsfan", "biowolfjp", "CM Ang" and "chi.keat". On the website and Reddit they also claimed responsibility of allegedly contaminating the headquarters of United Malays National Organisation and Malaysian Islamic Party with the COVID-19 virus. As a result, the local mass transit company Rapid KL had reported it to the police. * March: Locations including
Ostankino Tower Ostankino Tower (russian: links=no, Останкинская телебашня, Ostankinskaya telebashnya) is a television and radio tower in Moscow, Russia, owned by the Moscow branch of unitary enterprise Russian TV and Radio Broadcasting N ...
, a station in
St Petersburg Metro The Saint Petersburg Metro (russian: links=no, Петербургский метрополитен, Peterburgskiy metropoliten) is a rapid transit system in Saint Petersburg, Russia. Construction began in early 1941, but was put on hold due to ...
and at least one
Aeroflot PJSC AeroflotRussian Airlines (russian: ПАО "Аэрофло́т — Росси́йские авиали́нии", ), commonly known as Aeroflot ( or ; russian: Аэрофлот, , ), is the flag carrier and the largest airline of Russia. The ...
flight were subjected to alleged bio-terrorist attacks by a group of entities including those with names of "Thomas Little Evil Utoyo", "Calton", "David Law", "Thanthom", "Hendy", "Gideon W", "Audentis", "Mister Eriee O", "Khengwin", "T-Zehang", "曾家顺", "Mr Castaigne", "kkkwan", "ronxi", "KC LING", "Le3p0ryuen", "Jayrulo", "S Teoh", "Ian Chew", "Mr Yiliang", "W. somboonsuk", "S Patcharaphon", "Victor pang", "jiangxin", "文_祥!", "Freddyisf0xy", "Masami", "Greg Galloway", "EncoreOngKai", "Alteredd State", "Jon@th@nlangdale" and "Dig Dejected" who had posted about it on the hacked University of Georgia's Grady Newsource website, the web page of US National Association of Women Business Owners (NAWBO), a
Council of Europe The Council of Europe (CoE; french: Conseil de l'Europe, ) is an international organisation founded in the wake of World War II to uphold European Convention on Human Rights, human rights, democracy and the Law in Europe, rule of law in Europe. ...
's Twitter account and that of Temple University's which they've taken over. They further said that they would target the RKA Mission Control Center at a later time and additionally claimed that "Elmo Chong" and "Krully" had contaminated the Twitter headquarters in San Francisco, United States. * May: Anonymous declared a large hack on May 28, three days after the murder of George Floyd. An individual claiming to represent Anonymous stated that "We are Legion. We do not forgive. We do not forget. Expect us." in a now-deleted video. Anonymous addressed police brutality and said they "will be exposing
heir Inheritance is the practice of receiving private property, titles, debts, entitlements, privileges, rights, and obligations upon the death of an individual. The rules of inheritance differ among societies and have changed over time. Officiall ...
many crimes to the world". It was suspected that Anonymous were the cause for the downtime and public suspension of the
Minneapolis Police Department The Minneapolis Police Department (MPD) is the primary law enforcement agency in Minneapolis, Minnesota, United States. It is also the largest police department in Minnesota. Formed in 1867, it is the second-oldest police department in Minnesot ...
website and its parent site, the website of the City of Minneapolis. * May: Indian national Shubham Upadhyay posed as Superintendent of Police and, using
social engineering Social engineering may refer to: * Social engineering (political science), a means of influencing particular attitudes and social behaviors on a large scale * Social engineering (security), obtaining confidential information by manipulating and/or ...
, used a free caller identification app to call up the in-charge of the Kotwali police station, K. K. Gupta, in order to threaten him to get his phone repaired amidst the COVID-19 lockdown. The attempt was foiled. * June: Anonymous claimed responsibility for stealing and leaking a trove of documents, collectively nicknamed ' BlueLeaks'. The 269-gigabytes collection was published by a leak-focused activist group known as Distributed Denial of Secrets. Furthermore, the collective took down Atlanta Police Department's website via
DDoS In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host A ...
, and defaced websites such as a Filipino governmental webpage and that of
Brookhaven National Labs Brookhaven National Laboratory (BNL) is a United States Department of Energy national laboratory located in Upton, Long Island, and was formally established in 1947 at the site of Camp Upton, a former U.S. Army base and Japanese internment c ...
. They expressed support for
Julian Assange Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army inte ...
and press freedom, while briefly "taking a swing" against Facebook, Reddit and Wikipedia for having 'engaged in shady practices behind our prying eyes'. In the case of Reddit, they posted a link to a court document describing the possible involvement of a moderator of a large traffic subreddit (/r/news) in an online harassment-related case. * June: The Buffalo, NY police department's website was supposedly hacked by Anonymous. While the website was up and running after a few minutes, Anonymous tweeted again on Twitter urging that it be taken down. A few minutes later, the Buffalo, NY website was brought down again. They also hacked Chicago police radios to play N.W.A's " Fuck tha Police". * June: Over 1,000 accounts on the multiplayer online game Roblox were hacked to display that they supported U.S. President Donald Trump. * July: The
2020 Twitter bitcoin scam On July 15, 2020, between 20:00 and 22:00 UTC, reportedly 130 high-profile Twitter accounts were compromised by outside parties to promote a bitcoin scam. Twitter and other media sources confirmed that the perpetrators had gained access to Tw ...
occurred. * July: User credentials of writing website Wattpad were stolen and leaked on a hacker forum. The database contained over 200 million records. * August: A large number of sub reddits were hacked to post materials endorsing Donald Trump. The affected subreddits included r/BlackPeopleTwitter, r/3amJokes, r/NFL, r/PhotoshopBattles. An entity with the name of "calvin goh and Melvern" had purportedly claimed responsibility for the massive defacement, and also made violent threats against a
Chinese embassy This is a list of diplomatic missions of the People's Republic of China. The People's Republic of China has the largest diplomatic network in the world, representing the country's significant economic, commercial, political, cultural, and milit ...
. * August: The US Air Force's Hack-A-Sat event was hosted at DEF CON's virtual conference where groups such as Poland Can Into Space, FluxRepeatRocket, AddVulcan, Samurai, Solar Wine, PFS, 15 Fitty Tree, and 1064CBread competed in order to control a satellite in space. The Poland Can Into Space team stood out for having successfully manipulated a satellite to take a picture of the Moon. * August: The website of Belarusian company "BrestTorgTeknika" was defaced by a hacker nicknaming herself " Queen Elsa", in order to support the
2020–21 Belarusian protests The dash is a punctuation mark consisting of a long horizontal line. It is similar in appearance to the hyphen but is longer and sometimes higher from the baseline. The most common versions are the endash , generally longer than the hyphen b ...
. In it, the page hacker exclaimed "Get Iced Iced already" and "Free Belarus, revolution of our times" with the latter alluding to the famous slogan used by
2019 Hong Kong protests Nineteen or 19 may refer to: * 19 (number), the natural number following 18 and preceding 20 * one of the years 19 BC, AD 19, 1919, 2019 Films * ''19'' (film), a 2001 Japanese film * ''Nineteen'' (film), a 1987 science fiction film Music ...
. The results of the hack were then announced on Reddit's /r/Belarus subreddit by a poster under the username "Socookre". * August: Multiple DDoS attacks forced New Zealand's stock market to temporarily shut down. * September: The first suspected death from a cyberattack was reported after cybercriminals hit a hospital in Düsseldorf, Germany with
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
. * October: A wave of botnet-coordinated
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
attacks against hospital infrastructure occurred in the United States, identified as . State security officials and American corporate security officers were concerned that these attacks might be a prelude to hacking of election infrastructure during the elections of the subsequent month, like similar incidents during the
2016 United States elections The 2016 United States elections were held on Tuesday, November 8, 2016. Republican nominee Donald Trump defeated Democratic former Secretary of State Hillary Clinton in the presidential election, while Republicans retained control of Congres ...
and other attacks; there was, however, no evidence that they performed attacks on election infrastructure in 2020. * December: A
supply chain attack A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. ...
targeting upstream dependencies from Texas IT service provider "SolarWinds" results in serious, wide-ranging security breaches at the U.S. Treasury and Commerce departments. White House officials did not immediately publicly identify a culprit; Reuters, citing sources "familiar with the investigation", pointed toward the Russian government. An official statement shared by Senate Finance Committee ranking member,
Ron Wyden Ronald Lee Wyden (; born May 3, 1949) is an American politician and retired educator serving as the Seniority in the United States Senate, senior United States Senate, United States senator from Oregon, a seat he has held since 1996 United Stat ...
said: "Hackers broke into systems in the Departmental Offices division of Treasury, home to the department’s highest-ranking officials." * December: A bomb threat posted from a Twitter account that was seemingly hacked by persons with the aliases of "Omnipotent" and "choonkeat", against the
Aeroflot PJSC AeroflotRussian Airlines (russian: ПАО "Аэрофло́т — Росси́йские авиали́нии", ), commonly known as Aeroflot ( or ; russian: Аэрофлот, , ), is the flag carrier and the largest airline of Russia. The ...
Flight 102, a passenger flight with the plane tail number of VQ-BIL coming from Moscow to New York City. Due to that, a runway of New York's John F. Kennedy International Airport was temporarily closed and resulted in the delay of Aeroflot Flight 103, a return flight back to Moscow. * December: The
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
group initiated 'Christmas gift' defacements against multiple Russian portals, including a municipal website in
Tomsk Tomsk ( rus, Томск, p=tomsk, sty, Түң-тора) is a city and the administrative center of Tomsk Oblast in Russia, located on the Tom River. Population: Founded in 1604, Tomsk is one of the oldest cities in Siberia. The city is a not ...
and that of a regional football club. Inside the defacements, they made multiple references such as Russian opposition activist
Alexei Navalny Alexei Anatolievich Navalny ( rus, links=no, Алексей Анатольевич Навальный, , ɐlʲɪkˈsʲej ɐnɐˈtolʲjɪvʲɪtɕ nɐˈvalʲnɨj; born 4 June 1976) is a Opposition to Vladimir Putin in Russia, Russian opposition ...
, freedom protests in Thailand and Belarus, and opposition to the Chinese Communist Party. They also held a mock award based on an event on the game platform Roblox that was called "RB Battles" where YouTubers Tanqr and KreekCraft, the winner and the runner-up of the actual game event, were compared to both Taiwan and New Zealand respectively due to the latter's reportedly stellar performance in fighting the COVID-19 pandemic.


2021

* January: Microsoft Exchange Server data breach * February: Anonymous announced cyber-attacks of at least five Malaysian websites. As a result, eleven individuals were nabbed as suspects. * February: Hackers including those with names of "张卫能 utoyo" and "full_discl0sure" hijacked an events website ''Aucklife'' in order to craft a phony bomb threat against the Chinese consulate in Auckland, New Zealand, and also a similar facility in
Sydney, Australia Sydney ( ) is the capital city of the States and territories of Australia, state of New South Wales, and the most populous city in both Australia and List of cities in Oceania by population, Oceania. Located on Australia's east coast, the metro ...
. Their motive was a punitive response against China due to COVID-19. As a result, a physical search was conducted at the consulate by New Zealand's Police Specialist Search Group, while Aucklife owner Hailey Newton had since regained her access to the website. Wellington-based cybersecurity consultant Adam Boileau remarked that the hack isn't 'highly technical'. * February: The group "Myanmar Hackers" attacked several websites belonging to
Myanmar Myanmar, ; UK pronunciations: US pronunciations incl. . Note: Wikipedia's IPA conventions require indicating /r/ even in British English although only some British English speakers pronounce r at the end of syllables. As John C. Wells, Joh ...
government agencies, such as the
Central Bank of Myanmar The Central Bank of Myanmar (; ; abbreviated CBM) is the central bank of Myanmar (formerly Burma). Organisation Its headquarter located in Naypyidaw, and it has branches in Yangon and Mandalay. The Governor is Kyaw Kyaw Maung and three V ...
and the military-run '' Tatmadaw True News Information Team''. The group also targeted the Directorate of Investment and Company Administration, Trade Department, Customs Department, Ministry of Commerce, Myawady TV and state-owned broadcaster Myanmar Radio and Television and some private media outlets. A computer technician in Yangon found that the hacks were denial-of-service attacks, while the group's motive is to protest the
2021 Myanmar coup 1 (one, unit, unity) is a number representing a single or the only entity. 1 is also a numerical digit and represents a single unit of counting or measurement. For example, a line segment of ''unit length'' is a line segment of length 1. ...
. * April: Over 500 million Facebook users' personal info—including info on 32 million in the United States—was discovered posted on a hackers' website, though Facebook claimed that the information was from a 2019 hack, and that the company had already taken mitigation measures; however, the company declined to say whether it had notified the affected users of the breach."Cybersecurity: Millions of Facebook accounts hacked,"
April 5, 2021, KTNV-TV, Las Vegas, Nevada, retrieved April 15, 2021
"Facebook hack How to find out if you were one of the 533 million Facebook users hacked,"
Fox5 TV, San Diego, California, retrieved April 15, 2021
"2021-04-13 Facebook data breach explained: How the world’s largest social media platform got hacked,"
April 13, 2021, '' Times of India,'' retrieved April 15, 2021
* April: The Ivanti Pulse Connect Secure data breach of unauthorized access to the networks of high-value targets since at least June 2020 via across the U.S. and some E.U. nations due to their use of
vulnerable Vulnerable may refer to: General * Vulnerability * Vulnerability (computing) * Vulnerable adult * Vulnerable species Music Albums * ''Vulnerable'' (Marvin Gaye album), 1997 * ''Vulnerable'' (Tricky album), 2003 * ''Vulnerable'' (The Used album) ...
,
proprietary {{Short pages monitor