text
stringlengths
4
429
a concerted effort in which hackers used social
engineering techniques to gain access to the OHHDL
computer network. The hackers appear to have
obtained user passwords through the intrusion and
later used these to remotely access the OHHDL mail
server. (Nagaraja & Anderson, 2009)
29 March 2009
GhostNet
Researchers released a report detailing a cyber
espionage operation dubbed
GhostNet
which
infiltrated at least 1295 computers in 103 countries,
including those belonging to embassies, South Asian
governments and the Dalai Lama. (Secdev, 2009)
June 2009
Stuxnet
First known targeting of an unnamed organisation
occurred using the Stuxnet 4 worm. The organisation
was again targeted in March and April 2010.
Numerous other organisations, primarily in Iran,
were also targeted. The worm appears to have been
part of a coordinated effort to reprogram a specific
industrial control system, such as a gas pipeline or
power plant, likely located in Iran. (Farlliere, O
Muchu, & Chien, 2011) (U.S Office of
Counterintelligence, 2011)
November 2009
Night Dragon
Starting in November, coordinated covert and
targeted cyber attacks were observed against global
oil and petrochemical companies. These attacks,
labelled as
Night Dragon
, used socially engineered
emails along with Microsoft Windows operating
system vulnerabilities to gain access to computers.
Using the access obtained the hackers accessed
information on operational oil and gas field
production systems and financial documents
relating to field exploration and bidding. (McAfee
Foundation Professional Services and McAfee Labs,
2011)
Mid December 2009
Operation Aurora
Google detected a highly sophisticated and targeted
attack on Google corporate infrastructure that
resulted in the theft of intellectual property. This
event is believed to have been part of a coordinated
attack, known as
Operation Aurora
, in which
hackers sought source code from Google, Adobe
Systems and dozens of other high profile companies.
(Drummond, 2010) (Zetter, 2010)
2010
Australian Resource Sector
Three major Australian resource sector companies
(BHP Billiton, Fortescue Metals Group and Rio Tinto)
were targeted by cyber attacks. Targeting of Rio
Tinto
s computer network occurred around the time
of the arrest of Stern Hu in July 2010. (AAP, 2010)
December 2010
March 2011
French Government
The French Government was successfully targeted
by a socially engineered email campaign. Over 150
computers in the French Ministry of Economy and
Finance
Central
Services
division
were
compromised. The hackers were able to remotely
control the ministry
s computers and retrieve
documents for over three months. The hackers
sought documents related to the French presidency
of the G20 and international economic affairs. (Walid
Berissoul et agencies, 2011) (AFP, 2011)
January 2011
Canadian Government
Canadian Government departments were targeted
using emails socially engineered to appear as though
they were sent from senior staff members within the
departments. The emails contained malicious
attachments
that
compromised
Canadian
Government computers and resulted in the theft of
classified information. (Postmedia News, 2011)
February
March 2011
Australian Government
Australian parliamentary computers were accessed
over a period of at least one month. During that time
several thousand emails may have been accessed
including those of the Australian Prime Minister,