text
stringlengths 4
429
|
---|
a concerted effort in which hackers used social
|
engineering techniques to gain access to the OHHDL
|
computer network. The hackers appear to have
|
obtained user passwords through the intrusion and
|
later used these to remotely access the OHHDL mail
|
server. (Nagaraja & Anderson, 2009)
|
29 March 2009
|
GhostNet
|
Researchers released a report detailing a cyber
|
espionage operation dubbed
|
GhostNet
|
which
|
infiltrated at least 1295 computers in 103 countries,
|
including those belonging to embassies, South Asian
|
governments and the Dalai Lama. (Secdev, 2009)
|
June 2009
|
Stuxnet
|
First known targeting of an unnamed organisation
|
occurred using the Stuxnet 4 worm. The organisation
|
was again targeted in March and April 2010.
|
Numerous other organisations, primarily in Iran,
|
were also targeted. The worm appears to have been
|
part of a coordinated effort to reprogram a specific
|
industrial control system, such as a gas pipeline or
|
power plant, likely located in Iran. (Farlliere, O
|
Muchu, & Chien, 2011) (U.S Office of
|
Counterintelligence, 2011)
|
November 2009
|
Night Dragon
|
Starting in November, coordinated covert and
|
targeted cyber attacks were observed against global
|
oil and petrochemical companies. These attacks,
|
labelled as
|
Night Dragon
|
, used socially engineered
|
emails along with Microsoft Windows operating
|
system vulnerabilities to gain access to computers.
|
Using the access obtained the hackers accessed
|
information on operational oil and gas field
|
production systems and financial documents
|
relating to field exploration and bidding. (McAfee
|
Foundation Professional Services and McAfee Labs,
|
2011)
|
Mid December 2009
|
Operation Aurora
|
Google detected a highly sophisticated and targeted
|
attack on Google corporate infrastructure that
|
resulted in the theft of intellectual property. This
|
event is believed to have been part of a coordinated
|
attack, known as
|
Operation Aurora
|
, in which
|
hackers sought source code from Google, Adobe
|
Systems and dozens of other high profile companies.
|
(Drummond, 2010) (Zetter, 2010)
|
2010
|
Australian Resource Sector
|
Three major Australian resource sector companies
|
(BHP Billiton, Fortescue Metals Group and Rio Tinto)
|
were targeted by cyber attacks. Targeting of Rio
|
Tinto
|
s computer network occurred around the time
|
of the arrest of Stern Hu in July 2010. (AAP, 2010)
|
December 2010
|
March 2011
|
French Government
|
The French Government was successfully targeted
|
by a socially engineered email campaign. Over 150
|
computers in the French Ministry of Economy and
|
Finance
|
Central
|
Services
|
division
|
were
|
compromised. The hackers were able to remotely
|
control the ministry
|
s computers and retrieve
|
documents for over three months. The hackers
|
sought documents related to the French presidency
|
of the G20 and international economic affairs. (Walid
|
Berissoul et agencies, 2011) (AFP, 2011)
|
January 2011
|
Canadian Government
|
Canadian Government departments were targeted
|
using emails socially engineered to appear as though
|
they were sent from senior staff members within the
|
departments. The emails contained malicious
|
attachments
|
that
|
compromised
|
Canadian
|
Government computers and resulted in the theft of
|
classified information. (Postmedia News, 2011)
|
February
|
March 2011
|
Australian Government
|
Australian parliamentary computers were accessed
|
over a period of at least one month. During that time
|
several thousand emails may have been accessed
|
including those of the Australian Prime Minister,
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.