text
stringlengths 4
429
|
---|
Foreign Minister and Defence Minister. (Benson,
|
2011)
|
4 The Stuxnet worm is a malicious computer program capable of
|
replicating itself to infect multiple linked computer systems.
|
PAGE 4 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
15 March 2011
|
Comodo Affiliated Root Authority
|
26 May 2011
|
Northrop Grumman
|
A Comodo affiliated digital certificate Root Authority
|
(RA) was compromised resulting in the issue of
|
fraudulent SSL certificates for the popular domains:
|
mail.google.com, www.google.com, login.yahoo.com,
|
login.skype.com, addons.mozilla.org, login.live.com
|
and global trustee. (Comodo, 2011)
|
Northrop Grumman reportedly shut down remote
|
access to its network without warning and
|
conducted an organisation wide password reset,
|
raising speculation that it had also been targeted
|
using information stolen from RSA. (Kaplan, 2011)
|
17 March 2011
|
RSA
|
RSA released a public statement advising that they
|
were recently targeted via socially engineered
|
emails containing malicious attachments that
|
exploited a zero day Adobe Flash vulnerability.
|
Hackers successfully gained access to the network
|
and exfiltrated information including that related to
|
s SecurID two
|
factor authentication products.
|
The stolen information was later used to enable
|
targeting of defence contractors. (Coviello, Open
|
Letter to RSA Customers, 2011)
|
June 2011
|
International Monetary Fund
|
At least one International Monetary Fund (IMF)
|
computer was compromised in a large and
|
sophisticated cyber attack that involved significant
|
reconnaissance and utilised software written
|
specifically to target the IMF. The compromised
|
computer was used to access internal systems and
|
files. The hackers
|
access could have given them
|
visibility of sensitive economic and political
|
information. (Reddy, Gorman, & Perez, 2011; Sanger
|
& Markoff, 2011) (The Guardian, 2011)
|
Mid April 2011
|
Oak Ridge National Laboratory
|
Oak Ridge National Laboratory was targeted with
|
socially engineered emails tailored to appear as
|
though they were from the laboratory
|
s Human
|
Resources department. The emails tricked recipients
|
into downloading malicious software that exploited
|
a zero day vulnerability in Internet Explorer. The
|
laboratory shut down all internet access and email
|
systems from April 15 to April 17 to ensure no data
|
was exfiltrated before the infection could be cleaned
|
up. No large scale exfiltration of data is known to
|
have occurred. (Munger, 2011)
|
6 April 2011
|
3 Communications
|
An L
|
3 Communications executive notified
|
employees that the company had been actively
|
targeted leveraging information stolen from RSA the
|
month prior. (gHale, 2011) (Poulsen, 2011)
|
21 May 2011
|
Lockheed Martin
|
Lockheed Martin detected a cyber attack on its
|
computer network. The company
|
s information
|
security team took aggressive actions to protect the
|
systems. No exfiltration of data is known to have
|
occurred. RSA has publicly stated that information
|
stolen from it in March was used as an element of
|
the attack on Lockheed Martin. (Lockheed Martin
|
Corporation, 2011) (Coviello, Open Letter to RSA
|
SecurID Customers, 2011)
|
PAGE 5 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
THE CURRENT CYBER THREAT ENVIRONMENT
|
APTs have targeted governments around the world,
|
global oil, energy, and petrochemical companies, the
|
mining sector, financial institutions, military
|
contractors, the science and technology sector,
|
dissidents, critical infrastructure and likely many
|
additional sectors. They have also targeted
|
technology companies that could enable future
|
targeting. The Operation Aurora attacks, the Comodo
|
affiliated RA compromise and the RSA attack set a
|
precedent for such targeting.
|
are the most common social engineering technique
|
used but not the only one. Secondly, it tells us
|
technology companies need to be better prepared to
|
protect sensitive information that can be used to
|
negatively affect the security of their customers and
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.