Six Cyber Attacks That Shook 2017

Even as the world is moving towards a life more digital than ever before, the threats associated with the digital world are multiplying manifold, threatening to disrupt life as we have now come to know it. 

Cyber attacks are nothing new, but their increasing number and growing potency have become causes for concern for governments all over the world. There has been a marked increase in the amount of information getting stolen online every day.

Add to this mix a secret ingredient called Crypto-currencies and you have a potential Hindenburg on your hands. Crypto-currencies are very useful for making discreet transactions and have the added benefit of increasing in value exponentially, which makes them very valuable to cyber criminals.

It is estimated that the total damage on account of various ransomware attacks this year might be in excess of USD 5 billion. It is also estimated that this cost will only increase exponentially over the next 5 years, while the cost of cyber security will correspondingly amount to USD 1 trillion dollars in the next four years.

Here’s a quick look at some of the most brutal cyber-attacks this year:

Shadow Brokers
This anonymous group of hackers first surfaced in August 2016 when they breached the spy tools of a National Security Agency (NSA)-led program known as the Equation Group. However, the group’s most impactful release came in April 2017 - a trove of NSA tools, including a windows defect called EternalBlue (NotPetya and WannaCry hackers have since exploited this defect to infect targets with ransomware). The tools were auctioned off on the dark web.

WannaCry
The most infamous ransomware attack of 2017 was a strain of ransomware called WannaCry that spread all over the globe.
The ransomware targeted numerous public utilities and large corporations, most notably National Health Service hospitals and facilities in the United Kingdom, hobbling emergency rooms, delaying vital medical procedures, and creating chaos for many British patients.Though the origin of WannaCry is not yet known, the US government has blamed the Kim Jong-un-led North Korean government for initiating the attack.

Petya/NotPetya
Another dangerous malware that affected people across the globe this year was NotPetya. The malware, which bore many similarities to the 2016 ransomware Petya (hence ‘NotPetya’), began spreading to computers around the world, including those belonging to corporate giants like the US-based pharmaceutical company Merck, Danish shipping company Maersk, and Russian oil giant Rosneft.The ransomware hit Ukrainian infrastructure particularly hard, disrupting utilities like power companies, airports, public transit, and the country's central bank. India was affected the most by NotPetya in the Asia-Pacific and region and was the seventh most affected globally, according to the cyber security firm Symantec.

Zomato Hack
This one principally affected India. Zomato, which is one of the largest restaurant aggregators in India, was hacked and some of its user accounts were being sold on the dark web. A post on a blog called Hackread cited how accounts of 17 million users were being sold on the dark web. The vendor had also shared a trove of sample data to prove that the data is legitimate. Luckily, as Zomato stores its user’s payment details at a separate location, none of the users encountered a financial loss.

The HBO Hack
Game of Thrones is easily the most popular television show to hit the screens in the last decade, maybe more. Everyone loves it, everyone wants more of it, and most of all, everyone wants to be associated with it. This held true for a bunch of hackers too. In July 2017, hackers claimed to have acquired 1.5 terabytes of data from HBO, which is the producer of the show, and released yet-to-be-aired episodes of shows like Ballers and Room 104 online. But HBO did not truly feel the heat of this attack before it became known that the script for Episode 4 of Season 7 of Game of Thrones, which was scheduled to be released the following week, was put up online for the whole world to see. This was followed by a series of threats and ransom demands to HBO, which if not met would result in the leaking of more episodes of the popular show. The details of the ransom demanded by the hackers have been kept top secret and HBO refused to comment on whether it paid the ransom or not.

Equifax
In July this year, a group of hackers penetrated Equifax, one of the largest credit bureaus in the world, and stole personal data of 145 million people.The Equifax breach is considered one of the worst incidents of hacking ever because of the sensitivity of information stolen,  which included credit card numbers, birthday details, social security numbers. The information could easily be used for identity theft or misrepresentation.The company drew a lot of flak after it took two months to reveal that a breach had taken place. 

The Equifax breach raised concerns over the amount of information data brokers collect on consumers, which can range from public records to mailing addresses, birth dates and other personal details.

Money Control

You Might Also Read: 

Equifax Executives Resign Without Charge:

Postmortem: WannaCry Ransomware Explained:
 

« British IT Bosses Fear Sophisticated Cyber Threats
FBI Fingerprint Software Might Contain Russian code »

Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: Shifting Your Network Security Architecture To The Cloud

WEBINAR: Shifting Your Network Security Architecture To The Cloud

Thursday, July 8, 2021 - In this webinar, SANS and AWS Marketplace will discuss how to adapt network security architecture and control implementation to a cloud-based model.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Techzone Solutions

Techzone Solutions

Techzone Solutions is a leading ICT Solution Provider in Afghanistan. Services offered include cyber security.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.