Six Cyber Attacks That Shook 2017

Even as the world is moving towards a life more digital than ever before, the threats associated with the digital world are multiplying manifold, threatening to disrupt life as we have now come to know it. 

Cyber attacks are nothing new, but their increasing number and growing potency have become causes for concern for governments all over the world. There has been a marked increase in the amount of information getting stolen online every day.

Add to this mix a secret ingredient called Crypto-currencies and you have a potential Hindenburg on your hands. Crypto-currencies are very useful for making discreet transactions and have the added benefit of increasing in value exponentially, which makes them very valuable to cyber criminals.

It is estimated that the total damage on account of various ransomware attacks this year might be in excess of USD 5 billion. It is also estimated that this cost will only increase exponentially over the next 5 years, while the cost of cyber security will correspondingly amount to USD 1 trillion dollars in the next four years.

Here’s a quick look at some of the most brutal cyber-attacks this year:

Shadow Brokers
This anonymous group of hackers first surfaced in August 2016 when they breached the spy tools of a National Security Agency (NSA)-led program known as the Equation Group. However, the group’s most impactful release came in April 2017 - a trove of NSA tools, including a windows defect called EternalBlue (NotPetya and WannaCry hackers have since exploited this defect to infect targets with ransomware). The tools were auctioned off on the dark web.

WannaCry
The most infamous ransomware attack of 2017 was a strain of ransomware called WannaCry that spread all over the globe.
The ransomware targeted numerous public utilities and large corporations, most notably National Health Service hospitals and facilities in the United Kingdom, hobbling emergency rooms, delaying vital medical procedures, and creating chaos for many British patients.Though the origin of WannaCry is not yet known, the US government has blamed the Kim Jong-un-led North Korean government for initiating the attack.

Petya/NotPetya
Another dangerous malware that affected people across the globe this year was NotPetya. The malware, which bore many similarities to the 2016 ransomware Petya (hence ‘NotPetya’), began spreading to computers around the world, including those belonging to corporate giants like the US-based pharmaceutical company Merck, Danish shipping company Maersk, and Russian oil giant Rosneft.The ransomware hit Ukrainian infrastructure particularly hard, disrupting utilities like power companies, airports, public transit, and the country's central bank. India was affected the most by NotPetya in the Asia-Pacific and region and was the seventh most affected globally, according to the cyber security firm Symantec.

Zomato Hack
This one principally affected India. Zomato, which is one of the largest restaurant aggregators in India, was hacked and some of its user accounts were being sold on the dark web. A post on a blog called Hackread cited how accounts of 17 million users were being sold on the dark web. The vendor had also shared a trove of sample data to prove that the data is legitimate. Luckily, as Zomato stores its user’s payment details at a separate location, none of the users encountered a financial loss.

The HBO Hack
Game of Thrones is easily the most popular television show to hit the screens in the last decade, maybe more. Everyone loves it, everyone wants more of it, and most of all, everyone wants to be associated with it. This held true for a bunch of hackers too. In July 2017, hackers claimed to have acquired 1.5 terabytes of data from HBO, which is the producer of the show, and released yet-to-be-aired episodes of shows like Ballers and Room 104 online. But HBO did not truly feel the heat of this attack before it became known that the script for Episode 4 of Season 7 of Game of Thrones, which was scheduled to be released the following week, was put up online for the whole world to see. This was followed by a series of threats and ransom demands to HBO, which if not met would result in the leaking of more episodes of the popular show. The details of the ransom demanded by the hackers have been kept top secret and HBO refused to comment on whether it paid the ransom or not.

Equifax
In July this year, a group of hackers penetrated Equifax, one of the largest credit bureaus in the world, and stole personal data of 145 million people.The Equifax breach is considered one of the worst incidents of hacking ever because of the sensitivity of information stolen,  which included credit card numbers, birthday details, social security numbers. The information could easily be used for identity theft or misrepresentation.The company drew a lot of flak after it took two months to reveal that a breach had taken place. 

The Equifax breach raised concerns over the amount of information data brokers collect on consumers, which can range from public records to mailing addresses, birth dates and other personal details.

Money Control

You Might Also Read: 

Equifax Executives Resign Without Charge:

Postmortem: WannaCry Ransomware Explained:
 

« British IT Bosses Fear Sophisticated Cyber Threats
FBI Fingerprint Software Might Contain Russian code »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Odyssey

Odyssey

Odyssey is an ISO 27001 certified, Cyber -Security, Infrastructure and Risk Management Solutions integrator and a Managed Security Services Provider.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

Qubika

Qubika

Qubika are shaping the future of next-generation applications by seamlessly integrating high-quality UX, robust security, and AI-driven intelligence.