text
stringlengths 4
429
|
---|
announcements a timeline of significant cyber
|
attacks likely attributable to APTs can be drawn as
|
in Figure 1. In several cases a single operation is
|
named to refer to a set of similar intrusions, or
|
intrusion attempts, affecting numerous targets.
|
1998-2000
|
Moonlight Maze
|
2006
|
US Congressmen
|
2007
|
US Congressmen (contd.)
|
Oak Ridge National Laboratory
|
Los Alamos National Laboratory
|
2008
|
US Department of Defense
|
Office of His Holiness the Dalai Lama
|
2009
|
GhostNet
|
Stuxnet
|
Night Dragon
|
Operation Aurora
|
2010
|
Stuxnet (contd.)
|
Australian Resource Sector
|
French Government
|
2011
|
French Government (contd.)
|
Canadian Government
|
Australian Government
|
Comodo Affiliated Root Authority
|
Oak Ridge National Laboratory
|
3 Communications
|
Lockheed Martin
|
Northrop Grumman
|
International Monetary Fund
|
SUMMARY OF SIGNIFICANT ATTACKS
|
March 1998
|
2000
|
Moonlight Maze
|
Cyber attacks dubbed
|
Moonlight Maze
|
targeted
|
computers at the Pentagon, NASA, the US Energy
|
Department, research laboratories and private
|
universities. The attackers successfully gained
|
access to tens of thousands of files. (Arquila, 2003)
|
(Central Intelligence Agency, 2007)
|
August 2006
|
2007
|
US Congressmen
|
The office computer networks of two congressmen
|
were reportedly compromised. Information is
|
believed to have been stolen about dissidents critical
|
of the Beijing regime. (The Washington Times, 2008)
|
29 October 2007
|
Oak Ridge National Laboratory
|
Oak Ridge National Laboratory was successfully
|
targeted using emails that were socially engineered
|
to appear as though they were legitimate official
|
communications. Computers were compromised, as
|
was a database which contained information about
|
visitors to the facility. The hackers are believed to
|
have stolen data from the database. (Oak Ridge
|
National Laboratory, 2007)
|
9 November 2007
|
Los Alamos National Laboratory
|
Los Alamos National Laboratory advised all
|
employees of a recent malicious hacking event that
|
affected a small number of computers on the
|
laboratory
|
s unclassified
|
Yellow
|
network. A
|
significant amount of unclassified data was stolen.
|
The attack is believed to have been part of a broader,
|
coordinated attack against US laboratories and other
|
institutions. (Anastasio, 2007) (Snodgrass, 2007)
|
(Goodin, 2007)
|
Early 2008
|
US Department of Defense
|
The US Department of Defense suffered a significant
|
compromise of both unclassified and classified
|
military computer networks after a foreign
|
intelligence agency placed malicious software on a
|
USB flash drive. The device infected a US military
|
laptop upon insertion. The malicious code then
|
propagated through US networks infecting
|
numerous computers. (Lynn III, 2010)
|
FIGURE 1
|
TIMELINE OF APT ATTACKS
|
PAGE 3 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
September 2008
|
Office of His Holiness the Dalai
|
Lama
|
A legitimate email was intercepted in transit to the
|
Office of His Holiness the Dalai Lama (OHHDL) and
|
the attachment replaced with a file containing
|
malicious content. This attack appeared to be part of
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.