Professional Documents
Culture Documents
Top 5 Most Notorious Cyberattacks - Kaspersky Official Blog
Top 5 Most Notorious Cyberattacks - Kaspersky Official Blog
Most cyberattacks are fairly mundane. In the worst cases, the user sees an on-
screen ransom demand explaining that the computer is encrypted and can be
unlocked after payment. Oftentimes, however, nothing visible happens at all —
many types of malware act as surreptitiously as possible to maximize data theft
before
We usebeing
cookies spotted.
to make your experience of our websites better. By using and further
ACCEPT AND CLOSE
navigating this website you accept this. Detailed information about the use of cookies
on this website is available by clicking on more information.
But with some cyberattacks, their scale or sophistication cannot fail to attract
attention. This post is dedicated to the five most spectacular and notorious
cyberattacks of the last decade.
The four-day WannaCry epidemic knocked out more than 200,000 computers in
150 countries. This included critical infrastructure: In some hospitals, WannaCry
encrypted all devices, including medical equipment, and some factories were
forced to stop production. Among recent attacks, WannaCry is the most far-
reaching.
See here for more details about WannaCry, and here and here for business
aspects of the epidemic. Incidentally, WannaCry is still out there, endangering the
world’s computers. To find out how to configure Windows to stay protected, read
this post.
The damage from the NotPetya cyberattack is estimated at $10 billion, whereas
WannaCry, according to various estimates, lies in the $4–$8 billion range.
NotPetya is considered the costliest global cyberattack in history. Fingers crossed
that if this record is ever broken, it won’t be soon.
More information about the NotPetya/ExPetr epidemic can be found in this post;
the pain it caused businesses is examined here; and see here for why the
epidemic, capable of disabling large businesses, affects not only those whose
computers are infected, but everyone else as well.
Back then, nothing could match Stuxnet for complexity or cunning — the worm
was able to spread imperceptibly through USB flash drives, penetrating even
computers that were not connected to the Internet or a local network.
The worm spun out of control and quickly proliferated around the world,
infecting hundreds of thousands of computers. But it could not damage those
computers; it had been created for a very specific task. The worm manifested
itself only on computers operated by Siemens programmable controllers and
software. On landing on such a machine, it reprogrammed these controllers.
Then, by setting the rotational speed of the uranium-enrichment centrifuges too
high, it physically destroyed them.
A lot of ink has been spilled over Stuxnet, including a whole book, but for a
general understanding of how the worm spread and what it infected, this post
should suffice.
We use cookies to make your experience of our websites better. By using and further
ACCEPT AND CLOSE
navigating this website you accept this. Detailed information about the use of cookies
on this website is available by clicking on more information.
DarkHotel: Spies in suite rooms
It is no secret that public Wi-Fi networks in cafés or airports are not the most
secure. Yet many believe that in hotels things should be better. Even if a hotel’s
network is public, at least some kind of authorization is required.
Such misconceptions have cost various top managers and high-ranking officials
dearly. On connecting to a hotel network, they were prompted to install a
seemingly legitimate update for a popular piece of software, and immediately
their devices were infected with the DarkHotel spyware, which the attackers
specifically introduced into the network a few days before their arrival and
removed a few days after. The stealthy spyware logged keystrokes and allowed
the cybercriminals to conduct targeted phishing attacks.
Read more about the DarkHotel infection and its aftermath here.
Then one day — October 21, 2016 — the owners of this giant botnet decided to
test its capabilities by causing its millions of digital video recorders, routers, IP
cameras, and other “smart” equipment to flood the DNS service provider Dyn
with requests.
Dyn simply could not withstand such a massive DDoS attack. The DNS, as well as
services that relied on it, became unavailable: PayPal, Twitter, Netflix, Spotify,
PlayStation online services, and many others in the US were affected. Dyn
eventually recovered, but the sheer scale of the Mirai attack made the world sit up
and think about the security of “smart” things — it was the mother of all wake-up
calls.
We use cookies to make your experience of our websites better. By using and further
ACCEPT AND CLOSE
navigating this website you accept this. Detailed information about the use of cookies
on this website is available by clicking on more information.
You can read more about Mirai, Dyn, and “the attack that broke the Internet” in
this post.
Continue
WannaCry
We use cookies to make your experience of our websites better. By using and further
ACCEPT AND CLOSE
navigating this website you accept this. Detailed information about the use of cookies
on this website is available by clicking on more information.
Related
We use cookies to make your experience of our websites better. By using and further
ACCEPT AND CLOSE
navigating this website you accept this. Detailed information about the use of cookies
If only thewebsite
on this Internet starred by
is available in sci-fi movies
clicking on more information.
Read next
November 2, 2018
Tips
Tips
We use cookies to make your experience of our websites better. By using and further
September 12, 2023 ACCEPT AND CLOSE
navigating this website you accept this. Detailed information about the use of cookies
on this website is available by clicking on more information.
Tips
Tips
September 6, 2023
Tips
September 4, 2023
Home Solutions
Kaspersky Standard
Kaspersky Plus
Kaspersky Premium
All Solutions
All Products
All Products
Enterprise Solutions
1000 EMPLOYEES
Cybersecurity Services
Endpoint Security
All Solutions
We use cookies
Copyright to make
© 2023 AO your
Kaspersky experience
Lab. of our websites
All Rights Reserved. better.
• Privacy Policy • By using
Online and further
Tracking Opt-Out Guide
ACCEPT AND CLOSE
•navigating
Anti-Corruption Policy • License
this website Agreement
you accept B2C • License
this. Detailed Agreementabout
information B2B the use of cookies
Global
We use cookies to make your experience of our websites better. By using and further
ACCEPT AND CLOSE
navigating this website you accept this. Detailed information about the use of cookies
on this website is available by clicking on more information.