The Worst Hacks In 2016

2016 was a record-setting year for hacking scandals as digital security become an issue of national security and electoral politics.

December’s hack of Netflix's Twitter account by hacking collective OurMine was only the latest development in a year that saw digital security become an issue of national security and election year politics.OurMine, which is "a self-described white hat security group," said it was just testing Netflix security. The group suggested Netflix contact it to find out more about the hack.

OurMine tweeted its message, along with an email address and logo, to the nearly 2.5 million Twitter followers of @netflix, which is Netflix's US account. "At least two more hacked tweets were sent. All of them have since been deleted, presumably by the Netflix social media team," according to CNET.

In previous years, most network intrusions have targeted enterprises and large corporations. But this year we saw a much more diverse field of victims, ranging from celebrities, technology CEOs, political parties, and even the Olympics.

More Political Hacks

Perhaps one of the most disturbing trends in 2016 was the increased use of hacking to achieve geopolitical goals. Hacking groups linked to either the Kremlin or Russian president Vladimir Putin have been accused of reverting to Cold War tactics to weaken and delegitimize countries seen as political rivals.

A hack of the World Anti-Doping Agency's database, resulting in the publication of private medical records for several US athletes, was attributed to a group of Russian hackers going by the names "Team Tsar" and "Fancy Bear." The group was also accused of hacking the Democratic Party’s network to find embarrassing information about then-presidential candidate Hillary Clinton.

The attack against the Democratic Party and the Clinton campaign appear to have been part of an orchestrated effort by Russia to use cyberwarfare to undermine the US electoral process. While it's impossible to say what, if any, effect the hack had on the election of Donald Trump, the hack has escalated tensions between the two countries and caused no small amount of alarm within the US intelligence community.

And it isn't just national security that was in the spotlight in 2016. The year also saw a big jump in ransomware attacks, with individuals being targeted by hackers who encrypt their data in to extort cash out of them. Perhaps the largest such attack this year featured the San Francisco transit system, which was targeted by a ransomware attack that resulted in travelers receiving free rides.

Individuals in the Crosshairs

Several high-profile individuals in the technology sector have also been targets of attacks this year, including Facebook CEO Mark Zuckerberg and Google CEO Sundar Pichai. And Twitter's former CEO Dick Costolo and current CEO Jack Dorsey also suffered from hacks.

Most of these attacks seem to have come from well-known hacking collectives such as OurMine. But an independent hacker going by the handle "Lid" was able to hijack the Twitter account of Oculus CEO Brendan Iribe.

Hacks weren't just about digital defacement and a chance to embarrass political opponents, though. This year also saw the second largest bitcoin hack in history, resulting in the theft of more than $65 million of the cryptocurrency.

But it wasn't just digital currency that was stolen. A gang of Russian hackers also managed to break into more than 330,000 point-of-sale machines running software by Micros, an Oracle company. The hack hit cash registers used in food chains, hotels and retail stores.

And speaking of hotels, the US hospitality industry suffered one of its largest hacks ever when 20 hotels owned by HEI Hotels and Resorts discovered malware running on point-of-sale machines used throughout the country. That hack may have resulted in the theft of customer data including account and credit card numbers.

In 2016 there was even information about past traditional hacks involving the theft of users' email addresses and login information. Yahoo reported that in 2013, it suffered the largest breach in history, involving more than 1 billion user accounts. That exceeds the hack of 500 million accounts in 2014 that the company also reported this year.

NewsFactor:  People Are Saying Machine Learning Will Reduce Cyber-Crime:

Cyber Attacks Are Growing Ever More Sophisticated:
 

 

« How Russian Cyber Power Attacked The US
Robots Can Build Weapons »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Perseus Cyber Security

Perseus Cyber Security

Perseus provides all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training and emergency response.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

SquareX

SquareX

Squarex secures your online activities without compromising productivity.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.