The Worst Hacks In 2016

2016 was a record-setting year for hacking scandals as digital security become an issue of national security and electoral politics.

December’s hack of Netflix's Twitter account by hacking collective OurMine was only the latest development in a year that saw digital security become an issue of national security and election year politics.OurMine, which is "a self-described white hat security group," said it was just testing Netflix security. The group suggested Netflix contact it to find out more about the hack.

OurMine tweeted its message, along with an email address and logo, to the nearly 2.5 million Twitter followers of @netflix, which is Netflix's US account. "At least two more hacked tweets were sent. All of them have since been deleted, presumably by the Netflix social media team," according to CNET.

In previous years, most network intrusions have targeted enterprises and large corporations. But this year we saw a much more diverse field of victims, ranging from celebrities, technology CEOs, political parties, and even the Olympics.

More Political Hacks

Perhaps one of the most disturbing trends in 2016 was the increased use of hacking to achieve geopolitical goals. Hacking groups linked to either the Kremlin or Russian president Vladimir Putin have been accused of reverting to Cold War tactics to weaken and delegitimize countries seen as political rivals.

A hack of the World Anti-Doping Agency's database, resulting in the publication of private medical records for several US athletes, was attributed to a group of Russian hackers going by the names "Team Tsar" and "Fancy Bear." The group was also accused of hacking the Democratic Party’s network to find embarrassing information about then-presidential candidate Hillary Clinton.

The attack against the Democratic Party and the Clinton campaign appear to have been part of an orchestrated effort by Russia to use cyberwarfare to undermine the US electoral process. While it's impossible to say what, if any, effect the hack had on the election of Donald Trump, the hack has escalated tensions between the two countries and caused no small amount of alarm within the US intelligence community.

And it isn't just national security that was in the spotlight in 2016. The year also saw a big jump in ransomware attacks, with individuals being targeted by hackers who encrypt their data in to extort cash out of them. Perhaps the largest such attack this year featured the San Francisco transit system, which was targeted by a ransomware attack that resulted in travelers receiving free rides.

Individuals in the Crosshairs

Several high-profile individuals in the technology sector have also been targets of attacks this year, including Facebook CEO Mark Zuckerberg and Google CEO Sundar Pichai. And Twitter's former CEO Dick Costolo and current CEO Jack Dorsey also suffered from hacks.

Most of these attacks seem to have come from well-known hacking collectives such as OurMine. But an independent hacker going by the handle "Lid" was able to hijack the Twitter account of Oculus CEO Brendan Iribe.

Hacks weren't just about digital defacement and a chance to embarrass political opponents, though. This year also saw the second largest bitcoin hack in history, resulting in the theft of more than $65 million of the cryptocurrency.

But it wasn't just digital currency that was stolen. A gang of Russian hackers also managed to break into more than 330,000 point-of-sale machines running software by Micros, an Oracle company. The hack hit cash registers used in food chains, hotels and retail stores.

And speaking of hotels, the US hospitality industry suffered one of its largest hacks ever when 20 hotels owned by HEI Hotels and Resorts discovered malware running on point-of-sale machines used throughout the country. That hack may have resulted in the theft of customer data including account and credit card numbers.

In 2016 there was even information about past traditional hacks involving the theft of users' email addresses and login information. Yahoo reported that in 2013, it suffered the largest breach in history, involving more than 1 billion user accounts. That exceeds the hack of 500 million accounts in 2014 that the company also reported this year.

NewsFactor:  People Are Saying Machine Learning Will Reduce Cyber-Crime:

Cyber Attacks Are Growing Ever More Sophisticated:
 

 

« How Russian Cyber Power Attacked The US
Robots Can Build Weapons »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.