text
stringlengths
4
429
announcements a timeline of significant cyber
attacks likely attributable to APTs can be drawn as
in Figure 1. In several cases a single operation is
named to refer to a set of similar intrusions, or
intrusion attempts, affecting numerous targets.
1998-2000
Moonlight Maze
2006
US Congressmen
2007
US Congressmen (contd.)
Oak Ridge National Laboratory
Los Alamos National Laboratory
2008
US Department of Defense
Office of His Holiness the Dalai Lama
2009
GhostNet
Stuxnet
Night Dragon
Operation Aurora
2010
Stuxnet (contd.)
Australian Resource Sector
French Government
2011
French Government (contd.)
Canadian Government
Australian Government
Comodo Affiliated Root Authority
Oak Ridge National Laboratory
3 Communications
Lockheed Martin
Northrop Grumman
International Monetary Fund
SUMMARY OF SIGNIFICANT ATTACKS
March 1998
2000
Moonlight Maze
Cyber attacks dubbed
Moonlight Maze
targeted
computers at the Pentagon, NASA, the US Energy
Department, research laboratories and private
universities. The attackers successfully gained
access to tens of thousands of files. (Arquila, 2003)
(Central Intelligence Agency, 2007)
August 2006
2007
US Congressmen
The office computer networks of two congressmen
were reportedly compromised. Information is
believed to have been stolen about dissidents critical
of the Beijing regime. (The Washington Times, 2008)
29 October 2007
Oak Ridge National Laboratory
Oak Ridge National Laboratory was successfully
targeted using emails that were socially engineered
to appear as though they were legitimate official
communications. Computers were compromised, as
was a database which contained information about
visitors to the facility. The hackers are believed to
have stolen data from the database. (Oak Ridge
National Laboratory, 2007)
9 November 2007
Los Alamos National Laboratory
Los Alamos National Laboratory advised all
employees of a recent malicious hacking event that
affected a small number of computers on the
laboratory
s unclassified
Yellow
network. A
significant amount of unclassified data was stolen.
The attack is believed to have been part of a broader,
coordinated attack against US laboratories and other
institutions. (Anastasio, 2007) (Snodgrass, 2007)
(Goodin, 2007)
Early 2008
US Department of Defense
The US Department of Defense suffered a significant
compromise of both unclassified and classified
military computer networks after a foreign
intelligence agency placed malicious software on a
USB flash drive. The device infected a US military
laptop upon insertion. The malicious code then
propagated through US networks infecting
numerous computers. (Lynn III, 2010)
FIGURE 1
TIMELINE OF APT ATTACKS
PAGE 3 OF 13
COPYRIGHT
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
September 2008
Office of His Holiness the Dalai
Lama
A legitimate email was intercepted in transit to the
Office of His Holiness the Dalai Lama (OHHDL) and
the attachment replaced with a file containing
malicious content. This attack appeared to be part of