slug
stringlengths 8
16
| event_date
stringlengths 19
19
| event_year
int64 2.01k
2.02k
| affected_country
stringclasses 163
values | affected_organization
stringlengths 2
328
| affected_industry
stringclasses 22
values | afftected_industry_code
int64 11
99
| event_type
stringclasses 4
values | event_subtype
stringclasses 86
values | motive
stringclasses 10
values | description
stringlengths 13
1.46k
| actor
stringlengths 2
116
| actor_type
stringclasses 6
values | actor_country
stringclasses 82
values | source_url
stringlengths 13
382
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
744a792e8257c647
|
2017-05-12 00:00:00
| 2,017
|
Singapore
|
Tiong Bahru Plaza
|
Retail Trade
| 44
|
Disruptive
|
Data Attack
|
Financial
|
Message Manipulation; Data Attack
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
17f8695a4694cacf
|
2017-05-12 00:00:00
| 2,017
|
Singapore
|
White Sands
|
Retail Trade
| 44
|
Disruptive
|
Data Attack
|
Financial
|
Message Manipulation; Data Attack
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
5e5dadf2d1d9c3a0
|
2017-05-12 00:00:00
| 2,017
|
India
|
Government of Maharashtra
|
Public Administration
| 92
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.hindustantimes.com/mumbai-news/hit-by-wannacry-ransomware-civic-body-in-mumbai-suburb-to-take-3-more-days-to-fix-computers/story-eSIMZQ2NFT217erJAFkS0J.html
|
101bd6bf40ade2ef
|
2017-05-12 00:00:00
| 2,017
|
India
|
Government of West Bengal
|
Public Administration
| 92
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.ndtv.com/india-news/ransomware-wannacry-surfaces-in-kerala-bengal-10-facts-1693806
|
223904778d15051f
|
2017-05-12 00:00:00
| 2,017
|
China
|
Guilin University of Aerospace Technology
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.avast.com/c-wannacry
|
d65275019c5ee069
|
2017-05-12 00:00:00
| 2,017
|
China
|
Guilin University of Electronic Technology
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.avast.com/c-wannacry
|
9fb5ea58b983c8f6
|
2017-05-12 00:00:00
| 2,017
|
Indonesia
|
Harapan Kita Hospital
|
Health Care and Social Assistance
| 62
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
|
2a08ebceb326abce
|
2017-05-12 00:00:00
| 2,017
|
Japan
|
Hitachi
|
Management of Companies and Enterprises
| 55
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.bbc.com/news/world-39919249
|
6430ec751ef78a30
|
2017-05-12 00:00:00
| 2,017
|
Japan
|
Honda
|
Manufacturing
| 31
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.reuters.com/article/us-honda-cyberattack-idUSKBN19C0EI
|
e74fdc1de4ea1328
|
2017-05-12 00:00:00
| 2,017
|
Colombia
|
Instituto Nacional de Salud
|
Public Administration
| 92
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602
|
51da0725f1cb3827
|
2017-05-12 00:00:00
| 2,017
|
Brazil
|
Justice Court of Sao Paulo
|
Public Administration
| 92
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html
|
6c8976ed066710c6
|
2017-05-12 00:00:00
| 2,017
|
Canada
|
Lakeridge Health
|
Health Care and Social Assistance
| 62
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.thestar.com/news/canada/2017/05/13/ontario-health-ministry-on-high-alert-amid-global-cyberattack.html
|
9a5c12f72041e4b3
|
2017-05-12 00:00:00
| 2,017
|
Netherlands
|
LAKS
|
Other Services (except Public Administration)
| 81
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.nu.nl/internet/4706262/laks-tweede-nederlandse-slachtoffer-ransomware-wannacry.html
|
601c42a1dbcd276c
|
2017-05-12 00:00:00
| 2,017
|
Chile
|
LATAM Airlines Group
|
Transportation and Warehousing
| 48
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://thehill.com/blogs/pundits-blog/technology/333506-havoc-wrought-by-wannacry-ransomware-might-be-just-the
|
9401a2871a985318
|
2017-05-12 00:00:00
| 2,017
|
United Kingdom of Great Britain and Northern Ireland
|
Nissan
|
Manufacturing
| 31
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system. The attack shut down a Nissan factory in Sunderland.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.bbc.com/news/world-39919249
|
887b795b1b15daa9
|
2017-05-12 00:00:00
| 2,017
|
Germany
|
O2
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.haz.de/Nachrichten/Wirtschaft/Deutschland-Welt/WannaCry-Kundendienst-von-O2-ausgefallen
|
994e22c2b3b05593
|
2017-05-12 00:00:00
| 2,017
|
Brazil
|
Petrobras
|
Mining, Quarrying, and Oil and Gas Extraction
| 21
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
fc861800aa434395
|
2017-05-12 00:00:00
| 2,017
|
Portugal
|
Portugal Telecom
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
1812cb3908989220
|
2017-05-12 00:00:00
| 2,017
|
Australia
|
Pulse FM
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.radioinfo.com.au/news/ransomware-infects-narrowcast-radio-station
|
672ffb50ccb8cac4
|
2017-05-12 00:00:00
| 2,017
|
Netherlands
|
Q-Park
|
Other Services (except Public Administration)
| 81
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.nu.nl/internet/4691349/parkeerbedrijf-q-park-kampt-nog-steeds-met-ransomware-aanval.html?redirect=1
|
b687a19e005a49da
|
2017-05-12 00:00:00
| 2,017
|
France
|
Renault
|
Manufacturing
| 31
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system. The attack shut down Renault operations in several countries.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.bbc.com/news/world-39919249
|
b53c8c918a9571a0
|
2017-05-12 00:00:00
| 2,017
|
Russian Federation
|
Russian Central Bank
|
Finance and Insurance
| 52
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system. The Russian Central Bank detected an attack on its systems, but was able to thwart it.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
34d9f188097c05fe
|
2017-05-12 00:00:00
| 2,017
|
Russian Federation
|
Russian Ministry of the Interior
|
Public Administration
| 92
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.bbc.com/news/world-39919249
|
a0d30a54250a761e
|
2017-05-12 00:00:00
| 2,017
|
Russian Federation
|
Russian Railways
|
Transportation and Warehousing
| 48
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
30d30dc8e746512a
|
2017-05-12 00:00:00
| 2,017
|
Sweden
|
Sandvik
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
47d88ccdf90f3b44
|
2017-05-12 00:00:00
| 2,017
|
Saudi Arabia
|
Saudi Telecom Company
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.businessinsider.com/ap-the-latest-saudi-arabia-confirms-its-computers-hit-by-virus-2017-5
|
00b5cc79419d34cf
|
2017-05-12 00:00:00
| 2,017
|
Russian Federation
|
Sberbank
|
Finance and Insurance
| 52
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.reuters.com/article/us-cyber-attack-russia-cenbank/wannacry-cyber-attack-compromised-some-russian-banks-central-bank-idUSKCN18F16V
|
0eca27ca39060b3e
|
2017-05-12 00:00:00
| 2,017
|
China
|
Shandong University
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://medium.com/act-news/how-wannacry-froze-100-000-computers-in-chinas-colleges-and-institutions-43196bb91739
|
5921434a358d0330
|
2017-05-12 00:00:00
| 2,017
|
China
|
Sun Yat-sen University
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
|
1b6c5f3d8a411c8d
|
2017-05-12 00:00:00
| 2,017
|
Hungary
|
Telenor Hungary
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
ce810328f7370842
|
2017-05-12 00:00:00
| 2,017
|
South Africa
|
Telkom
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://mybroadband.co.za/news/security/211576-telkom-systems-crippled-by-wannacry-ransomware.html
|
3b3197d139d2a88b
|
2017-05-12 00:00:00
| 2,017
|
Taiwan (Province of China)
|
TSMC (Taiwan Semiconductor Manufacturing Co.)
|
Manufacturing
| 31
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.bankinfosecurity.com/chipmaker-tsmc-wannacry-attack-could-cost-us170-million-a-11285
|
72dc760b625e4f86
|
2017-05-12 00:00:00
| 2,017
|
United Kingdom of Great Britain and Northern Ireland
|
UK National Health Service
|
Health Care and Social Assistance
| 62
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.bbc.com/news/technology-40297493
|
a486f6a6b5c64952
|
2017-05-12 00:00:00
| 2,017
|
Indonesia
|
Universitas Jember
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://nasional.tempo.co/read/875604/virus-ransomware-wannacry-serang-perpustakaan-universitas-jember
|
7f98719d86f3fc1c
|
2017-05-12 00:00:00
| 2,017
|
Italy
|
University of Milano-Bicocca
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/
|
8e1ff9a02d37bda5
|
2017-05-12 00:00:00
| 2,017
|
Canada
|
University of Montreal
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/
|
bf0be0c95bea2038
|
2017-05-12 00:00:00
| 2,017
|
Brazil
|
Vivo
|
Information
| 51
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html
|
7d0dbf13267e8fa4
|
2017-05-12 00:00:00
| 2,017
|
Russian Federation
|
VTB
|
Finance and Insurance
| 52
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.reuters.com/article/us-cyber-attack-russia-cenbank/wannacry-cyber-attack-compromised-some-russian-banks-central-bank-idUSKCN18F16V
|
a6dffaa4cd039c7e
|
2017-05-12 00:00:00
| 2,017
|
India
|
West Bengal State Electricity Distribution Company
|
Utilities
| 22
|
Disruptive
|
Data Attack
|
Financial
|
A threat actor used a tool called WannaCry to encrypt data in compromised networks, and intended to provide the victims with theÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'àdecryption key only after a ransom had been paid. The threat actors used an exploit, called EternalBlue--first discovered by the U.S. National Security Agency--to propagate WannaCry in organizations using the Windows operating system.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.dataprotectionreport.com/2017/05/wannacry-ransomware-attack-summary/
|
584aa01fc4a10f81
|
2017-05-11 00:00:00
| 2,017
|
United States of America
|
Edmodo
|
Professional, Scientific, and Technical Services
| 54
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
A hacker steals millions of user account details from popular education platform Edmodo, and the data is apparently for sale on the so-called dark web. The organization claims to have over 78 million members.
|
nclay
|
Criminal
|
Undetermined
|
https://motherboard.vice.com/en_us/article/hacker-steals-millions-of-user-account-details-from-education-platform-edmodo
|
1ff3f2203f4d4fdd
|
2017-05-11 00:00:00
| 2,017
|
Lithuania
|
Energy networks of the Baltic states
|
Utilities
| 22
|
Exploitive
|
Exploitation of Application Server
|
Sabotage
|
Reuters reports that suspected Russia-backed hackers have launched exploratory cyber attacks against the energy networks of the Baltic states.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.reuters.com/article/us-baltics-cyber-insight-idUSKBN1871W5
|
24d5af9b22e7995b
|
2017-05-11 00:00:00
| 2,017
|
Latvia
|
Energy networks of the Baltic states
|
Utilities
| 22
|
Exploitive
|
Exploitation of Application Server
|
Sabotage
|
Reuters reports that suspected Russia-backed hackers have launched exploratory cyber attacks against the energy networks of the Baltic states.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.reuters.com/article/us-baltics-cyber-insight-idUSKBN1871W5
|
a4edc7ea3ee28b0d
|
2017-05-11 00:00:00
| 2,017
|
Estonia
|
Energy networks of the Baltic states
|
Utilities
| 22
|
Exploitive
|
Exploitation of Application Server
|
Sabotage
|
Reuters reports that suspected Russia-backed hackers have launched exploratory cyber attacks against the energy networks of the Baltic states.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.reuters.com/article/us-baltics-cyber-insight-idUSKBN1871W5
|
e8cfd2454daff018
|
2017-05-11 00:00:00
| 2,017
|
Ukraine
|
Ukrainian Soldiers
|
Public Administration
| 92
|
Disruptive
|
Message Manipulation
|
Sabotage
|
Ukrainian soldiers are hit by an ongoing campaign of propaganda-texting. The campaign is attributed to Russian forces equipped with cell site simulators (IMSI-catchers).
|
Undetermined
|
Criminal
|
Undetermined
|
https://apnews.com/9a564a5f64e847d1a50938035ea64b8f/Sinister-text-messages-reveal-high-tech-front-in-Ukraine-war
|
ffb165ac234f24fd
|
2017-05-10 00:00:00
| 2,017
|
United States of America
|
Cedexis
|
Information
| 51
|
Disruptive
|
External Denial of Service
|
Undetermined
|
A DDos attack against Cedexis knocks out several major French news websites including Le Monde and Le Figaro.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.ibtimes.co.uk/ddos-attack-knocks-out-major-french-news-sites-including-le-monde-le-figaro-1621040
|
d28a1547d5b37359
|
2017-05-07 00:00:00
| 2,017
|
United States of America
|
FCC (Federal Communications Commission)
|
Public Administration
| 92
|
Disruptive
|
External Denial of Service
|
Undetermined
|
The FCC website is hit by a DDoS Attack.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.theregister.co.uk/2017/05/09/fcc_ddos/
|
19b41357ffd74ca5
|
2017-05-06 00:00:00
| 2,017
|
United States of America
|
Confluence Charter Schools
|
Educational Services
| 61
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
The network servers for Confluence Charter Schools are hacked, but school leadership say there is no evidence that student or employee data have been compromised.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/confluence-charter-school-servers-are-hacked/
|
79dc616cc71c0e77
|
2017-05-06 00:00:00
| 2,017
|
France
|
Emmanuel Macron's Staff
|
Other Services (except Public Administration)
| 81
|
Exploitive
|
Exploitation of Application Server
|
Sabotage
|
The French presidential candidate Emmanuel Macron is targeted by a "massive and coordinated" hacking attack, hours before voters go to the polls. Tens of thousands of internal emails and other documents (9Gb) are released online.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.theguardian.com/world/2017/may/06/emmanuel-macron-targeted-by-hackers-on-eve-of-french-election
|
8f5486532e687ed8
|
2017-05-05 00:00:00
| 2,017
|
United Kingdom of Great Britain and Northern Ireland
|
Debenhams
|
Retail Trade
| 44
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Malware infects the backend systems used by British high street chain Debenhams, and steals 26,000 people's personal information in the process. The hack happened after compromising the systems at Ecomnova, the firm that runs the Debenhams Flowers business, for more than six weeks.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.theregister.co.uk/2017/05/05/debenhams_flowers_breach/
|
8d73f4b30c816e74
|
2017-05-04 00:00:00
| 2,017
|
United States of America
|
Aesthetic Dentistry OC Gastrocare Tampa Bay Surgery Center
|
Health Care and Social Assistance
| 62
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
TheDarkOverlord dumps 180,000 patients' records from 3 hacks. The victims are: Aesthetic Dentistry, OC Gastrocare, Tampa Bay Surgery Center.
|
The Dark Overlord
|
Criminal
|
United Kingdom of Great Britain and Northern Ireland
|
https://www.databreaches.net/thedarkoverlord-dumps-180000-patients-records-from-3-hacks/
|
89055604a781e3ff
|
2017-05-04 00:00:00
| 2,017
|
United States of America
|
Charlotte Flair, Victoria
|
Other Services (except Public Administration)
| 81
|
Exploitive
|
Exploitation of Application Server
|
Personal Attack
|
WWE divas Charlotte Flair and Victoria are the latest victims of the Celebgate leak.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.hackread.com/wwe-divas-charlotte-flair-victoria-leaked-photos/
|
abab976469eb07be
|
2017-05-03 00:00:00
| 2,017
|
Germany
|
German O2-Telefonica users
|
Information
| 51
|
Exploitive
|
Exploitation of Application Server,Exploitation of End Hosts,Exploitation of Data in Transit
|
Financial
|
O2-Telefonica in Germany confirms to SÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã 'ÃÆÃ'Ãâ '̢̢̮'ìÃ'à'ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'üddeutsche Zeitung that some of its customers have had their bank accounts drained using a two-stage attack that exploits SS7.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/
|
38fa8b87e90c117c
|
2017-05-03 00:00:00
| 2,017
|
United States of America
|
Tufts University
|
Educational Services
| 61
|
Exploitive
|
Exploitation of Application Server
|
Protest
|
A group calling itself TuftsLeaks publishes documents online that contain sensitive financial information from Tufts. The leak includes department budgets, the salaries of thousands of staff and faculty and the ID numbers of student employees with salaries listed.
|
TuftsLeaks
|
Undetermined
|
Undetermined
|
https://www.databreaches.net/illinois-elections-board-offers-more-information-on-hacking-incident/
|
fbba1396faf923fe
|
2017-05-02 00:00:00
| 2,017
|
United States of America
|
City of Fitchburg
|
Public Administration
| 92
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Fitchburg, Mass. city officials report that the Social Security numbers of 1,800 residents were compromised during a data breach that was discovered on April 14, but took place more than three years ago.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.scmagazine.com/fitchburg-mass-officials-discover-three-year-old-breach-affecting-1800/article/654317/
|
3ee427e61b5e2c29
|
2017-05-02 00:00:00
| 2,017
|
United States of America
|
Gannett Co.
|
Information
| 51
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
A phishing email attack potentially compromises the accounts of as many as 18,000 current and former employees of media company Gannett Co.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.usatoday.com/story/tech/news/2017/05/02/gannett-hit-email-phishing-attack/101200110/
|
91d9fb6b937472ba
|
2017-05-02 00:00:00
| 2,017
|
France
|
HandBrake
|
Information
| 51
|
Exploitive
|
Exploitation of End Hosts
|
Financial
|
The popular DVD-ripping HandBrake app, is hacked to install a new variant of the Proton malware.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.ibtimes.co.uk/handbrake-mirror-download-server-hacked-serve-malware-mac-users-1620495
|
439d0bbe2ffbd4c2
|
2017-05-02 00:00:00
| 2,017
|
United States of America
|
Sabre Corp. Hospitality Unit
|
Arts, Entertainment, and Recreation
| 71
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Travel industry giant Sabre Corp. disclosed what could be a significant breach of payment and customer data tied to bookings processed through a reservations system that serves more than 32,000 hotels and other lodging establishments.
|
Undetermined
|
Criminal
|
Undetermined
|
https://krebsonsecurity.com/2017/05/breach-at-sabre-corp-s-hospitality-unit/
|
fb3abe24ca7ccbb5
|
2017-05-02 00:00:00
| 2,017
|
United Kingdom of Great Britain and Northern Ireland
|
UK Banks
|
Finance and Insurance
| 52
|
Mixed
|
Message Manipulation,Exploitation of End Hosts
|
Financial
|
DomainTools reveals that hundreds of fake website domains are being used by hackers to mimic some of the most popular banking services in the UK in an attempt to trick victims into handing over personal details and sensitive login credentials.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.ibtimes.co.uk/hackers-using-cybersquatting-tactics-spoof-websites-uks-biggest-banks-1619769
|
f310798008870c2a
|
2017-05-02 00:00:00
| 2,017
|
New Zealand
|
Wellington's Victoria University
|
Educational Services
| 61
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Students and staff of Wellington's Victoria University have been warned their usernames and passwords may have been compromised following a data breach following an unauthorised access to the university's IT systems.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.stuff.co.nz/technology/92121891/student-data-potentially-compromised-after-victoria-university-it-system-hacked
|
2896b204e4aaa526
|
2017-04-30 00:00:00
| 2,017
|
United States of America
|
Pekin Community High School
|
Educational Services
| 61
|
Disruptive
|
Data Attack
|
Financial
|
A ransomware attack takes down Pekin Community High School.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/il-pekin-high-school-hit-by-ransomware-and-37000-demand/
|
78a42e8cbea04058
|
2017-04-30 00:00:00
| 2,017
|
United States of America
|
Unity 3D Forum
|
Arts, Entertainment, and Recreation
| 71
|
Disruptive
|
Message Manipulation
|
Undetermined
|
OurMine hackers deface the official domain of Unity 3D Forums leaving a deface page along with a note.
|
OurMine
|
Hobbyist
|
Saudi Arabia
|
https://www.hackread.com/ourmine-hacking-group-hacks-unity-3d-forums/
|
5dc19573ae0c44bf
|
2017-04-29 00:00:00
| 2,017
|
United States of America
|
Greenwood County School District 50
|
Educational Services
| 61
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
About 3,300 are affected by a security breach after the school discovers that an unauthorized user logged in to four Greenwood County School District 50 employees' emails as well as current and former employees' payroll accounts in January and February.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/sc-greenwood-county-school-district-50-notifies/
|
8f40afac360138d9
|
2017-04-29 00:00:00
| 2,017
|
United States of America
|
Hill Country Memorial Hospital
|
Health Care and Social Assistance
| 62
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Hill Country Memorial Hospital notifies patients after an employee email was accessed without authorization.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/hill-country-memorial-hospital-notifies-patients-after-employee-email-accessed-without-authorization/
|
df79db8295f87194
|
2017-04-29 00:00:00
| 2,017
|
United States of America
|
Virginia Sex Offender and Crimes Against Children Registry (SOR)
|
Public Administration
| 92
|
Disruptive
|
Internal Denial of Service
|
Undetermined
|
A malware infection affecting servers belonging to the Virginia State Police (VSP) shuts down the department's email system, along with its ability to update the Virginia Sex Offender and Crimes Against Children Registry (SOR).
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.bleepingcomputer.com/news/security/malware-blocks-virginia-state-police-from-updating-sex-offender-registry/
|
456dffce298e3f46
|
2017-04-28 00:00:00
| 2,017
|
United States of America
|
Facebook
|
Information
| 51
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Google and Facebook confirm that they fell victim to an alleged $100m (ÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'ã77m) scam between 2013 and 2015.
|
Evaldas Rimasauskas
|
Criminal
|
Undetermined
|
http://www.bbc.co.uk/news/technology-39744007
|
5c69147fea09f36d
|
2017-04-28 00:00:00
| 2,017
|
United States of America
|
Google
|
Information
| 51
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Google and Facebook confirm that they fell victim to an alleged $100m (ÃÆÃ'Ãâ '̢̮â¬Â 'ÃÆÃ'ââ'¬Ã ''ÃÆÃ'Ãâ '̢̮â¬Â ''ÃÆÃ'Ãâ ''ÃÆÃ''ÃÆ'Ã'ã77m) scam between 2013 and 2015.
|
Evaldas Rimasauskas
|
Criminal
|
Undetermined
|
http://www.bbc.co.uk/news/technology-39744007
|
f1a3a38a5738ebe7
|
2017-04-28 00:00:00
| 2,017
|
Lithuania
|
Grozio Chirurgija
|
Health Care and Social Assistance
| 62
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Cybercriminals steal personal records and photos of patients from the data system of a Lithuanian plastic surgery clinic and put them up for sale.
|
Tsar Team
|
Criminal
|
Undetermined
|
https://www.occrp.org/en/daily/6387-lithuania-cybercriminals-blackmail-plastic-surgery-clinic-with-stolen-photos
|
18de15856a923b54
|
2017-04-28 00:00:00
| 2,017
|
United States of America
|
Netflix
|
Arts, Entertainment, and Recreation
| 71
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
TheDarkOverlord leaks upcoming episode of Orange is the New Black after Netflix doesn't pay extortion demand. The hack happened via a "production vendor".
|
The Dark Overlord
|
Criminal
|
United Kingdom of Great Britain and Northern Ireland
|
https://www.databreaches.net/thedarkoverlord-leaks-upcoming-episode-of-orange-is-the-new-black-after-netflix-doesnt-pay-extortion-demand/
|
6f53dbe84a774fbc
|
2017-04-27 00:00:00
| 2,017
|
Denmark
|
Danish Ministry of Defense
|
Public Administration
| 92
|
Exploitive
|
Exploitation of Application Server
|
Political-Espionage
|
Denmark's Defense Intelligence Service says in a report that the Danish Ministry of Defense has had its emails hacked over the last two years. The hack has been attributed to Fancy Bear.
|
GRU 85th Main Special Service Center (Unit 26165) (FANCYBEAR)
|
Nation-State
|
Russian Federation
|
https://www.reuters.com/article/us-denmark-security-russia-idUSKBN17P0NR
|
51154c4c18d33200
|
2017-04-26 00:00:00
| 2,017
|
United States of America
|
Ciphr
|
Professional, Scientific, and Technical Services
| 54
|
Exploitive
|
Exploitation of Application Server
|
Undetermined
|
Customer data from encrypted phone company Ciphr is dumped online.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.vice.com/en/article/bme5w3/customer-data-from-encrypted-phone-company-ciphr-has-been-dumped-online#:~:text=Customer%20data%20from%20one%20company,the%20work%20of%20a%20competitor.&text=%22All%20Ciphr%20emails%2Fservers%20have%20been%20compromised.
|
59332d29fa2eb7ec
|
2017-04-26 00:00:00
| 2,017
|
Germany
|
Two German think tanks with ties to Christian Democratic Union (CDU) and Social Democratic Party (SPD)
|
Other Services (except Public Administration)
| 81
|
Exploitive
|
Exploitation of Application Server
|
Political-Espionage
|
Trend Micro reveals that Kremlin-linked Fancy Bear hackers targeted two German think tanks with ties to Angela Merkel's ruling coalition parties Christian Democratic Union (CDU) and Social Democratic Party (SPD).
|
GRU 85th Main Special Service Center (Unit 26165) (FANCYBEAR)
|
Nation-State
|
Russian Federation
|
http://www.ibtimes.co.uk/fancy-bear-hackers-ramp-attacks-against-german-think-tanks-key-european-elections-approach-1618648
|
7830665727a99591
|
2017-04-25 00:00:00
| 2,017
|
Undetermined
|
250 ISIS Twitter Accounts
|
Other Services (except Public Administration)
| 81
|
Disruptive
|
Message Manipulation
|
Personal Attack
|
WauchulaGhost defaces 250 ISIS Twitter accounts with adult content.
|
WauchulaGhost
|
Hacktivist
|
Undetermined
|
http://news.softpedia.com/news/hacktivist-defaces-250-isis-twitter-accounts-with-adult-content-515153.shtml
|
c562dd5ced15e7ca
|
2017-04-25 00:00:00
| 2,017
|
United States of America
|
Blowout Cards
|
Retail Trade
| 44
|
Exploitive
|
Exploitation of End Hosts
|
Financial
|
Blowout Cards issues a security alert to customers, warning that their payment card details may have been compromised after an attacker hacked its website and customers began reporting related card fraud.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.databreachtoday.com/blowout-cards-issues-card-skimming-breach-alert-a-9864
|
06aad7076f2911df
|
2017-04-25 00:00:00
| 2,017
|
United States of America
|
City of Newark
|
Public Administration
| 92
|
Disruptive
|
Data Attack
|
Financial
|
A ransomware attack hits some municipal computers in New Jersey's most populous city, Newark.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.scmagazine.com/city-of-newark-reportedly-hit-in-ransomware-attack/article/652644/
|
7076095c5d86a43e
|
2017-04-25 00:00:00
| 2,017
|
France
|
Emmanuel Macron
|
Other Services (except Public Administration)
| 81
|
Exploitive
|
Exploitation of Application Server
|
Sabotage
|
The same reports reveals that French presidential candidate Emmanuel Macron was targeted by APT28.
|
GRU 85th Main Special Service Center (Unit 26165) (FANCYBEAR)
|
Nation-State
|
Russian Federation
|
http://www.ibtimes.co.uk/french-elections-russian-hacking-group-fancy-bear-targeted-macron-through-phishing-attacks-1618449
|
9121a5cdb87276b1
|
2017-04-25 00:00:00
| 2,017
|
United States of America
|
HipChat
|
Professional, Scientific, and Technical Services
| 54
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
HipChat is hacked over the weekend due to a vulnerability in a third-party library. The incident affects a server in the HipChat Cloud web tier, and for a small number of instances (less than 0.05 percent), there's evidence messages and content in rooms may have been accessed.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.zdnet.com/article/hipchat-hacked-user-account-info-and-some-user-content-potentially-compromised/
|
9f0cdcba05ddc1c8
|
2017-04-25 00:00:00
| 2,017
|
China
|
R2Games
|
Arts, Entertainment, and Recreation
| 71
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Online gaming company Reality Squared Games (R2Games) is hacked for the second time in two years and more than one million accounts are compromised. Leaked data includes usernames, passwords, email addresses, IP addresses, and other optional record fields.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.csoonline.com/article/3192246/security/r2games-compromised-again-over-one-million-accounts-exposed.html
|
6052960f0d83d267
|
2017-04-24 00:00:00
| 2,017
|
United States of America
|
Alison Brie
|
Other Services (except Public Administration)
| 81
|
Exploitive
|
Exploitation of Application Server
|
Personal Attack
|
Fappening 2.0 continues: this time Alison Brie is targeted and has some nude images leaked online.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.ibtimes.co.uk/fappening-2-0-leak-celebrity-nudes-continues-alison-brie-targeted-by-hacker-1618338
|
7553cfd1e9a515c8
|
2017-04-24 00:00:00
| 2,017
|
United States of America
|
Greenway Health
|
Health Care and Social Assistance
| 62
|
Disruptive
|
Data Attack
|
Financial
|
Greenway Health is the victim of a ransomware attack.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/greenway-health-reports-ransomware-attack/
|
df086967b1421366
|
2017-04-24 00:00:00
| 2,017
|
United States of America
|
Northrop Grumman
|
Public Administration
| 92
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Northrop Grumman admits one of its internal portals was broken into, exposing employees' sensitive tax records to W-2 Scams.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.theregister.co.uk/2017/04/24/northrop_grumman_breach_worker_w2s/
|
84f20951b5ef2d40
|
2017-04-23 00:00:00
| 2,017
|
United States of America
|
KCG Holdings
|
Finance and Insurance
| 52
|
Exploitive
|
Exploitation of Application Server
|
Undetermined
|
The FBI arrests Zhengquan Zhang, a 31-year-old IT engineer, accused of installing malware on his employer's servers to steal proprietary source.
|
Zhengquan Zhang
|
Undetermined
|
Undetermined
|
https://www.bleepingcomputer.com/news/security/wall-street-it-engineer-hacks-employer-to-see-if-he-will-be-let-go/
|
13e289b8580aba18
|
2017-04-23 00:00:00
| 2,017
|
United Kingdom of Great Britain and Northern Ireland
|
North Mundham Primary in Chichester
|
Educational Services
| 61
|
Disruptive
|
Message Manipulation
|
Undetermined
|
Police are investigating after "malicious" messages are left on a school website by Turkish nationalists in an apparent hacking attempt.
|
Ayy?ld?z Tim
|
Hacktivist
|
United Kingdom of Great Britain and Northern Ireland
|
https://www.thesun.co.uk/news/3397114/sussex-school-website-hacked-with-malicious-messages-sparking-police-investigation/
|
ab0ba43abfe58294
|
2017-04-22 00:00:00
| 2,017
|
Korea (the Republic of)
|
Yapizon
|
Finance and Insurance
| 52
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Yapizon, a South Korean Bitcoin exchange suffers a massive data breach when hackers steal 3,800 Bitcoin (US$5 million) which is 37% of user funds.
|
NGB 3rd Technical Surveillance Bureau
|
Nation-State
|
Korea (the Democratic People's Republic of)
|
https://www.hackread.com/south-korean-bitcoin-exchange-yapizon-hacked/
|
21dceef6733195da
|
2017-04-21 00:00:00
| 2,017
|
United States of America
|
Atlantic Digestive Specialists
|
Health Care and Social Assistance
| 62
|
Disruptive
|
Data Attack
|
Financial
|
Atlantic Digestive Specialists notify patients of a ransomware incident.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/atlantic-digestive-specialists-notify-patients-of-ransomware-incident/
|
67604e90c5549ce0
|
2017-04-21 00:00:00
| 2,017
|
United States of America
|
Cleveland Metropolitan School District
|
Educational Services
| 61
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Cleveland Metropolitan School District discloses a phishing-related incident.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/cleveland-metropolitan-school-district-discloses-phishing-related-incident/
|
05c58788324e06d5
|
2017-04-21 00:00:00
| 2,017
|
United States of America
|
Iowa Veterans Home
|
Public Administration
| 92
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Iowa Veterans Home warns nearly 3,000 of data breach after phishing incident.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.databreaches.net/iowa-veterans-home-warns-nearly-3000-of-data-breach-after-phishing-incident/
|
d9a34e2d1db48730
|
2017-04-21 00:00:00
| 2,017
|
Korea (the Republic of)
|
South Korea
|
Finance and Insurance
| 52
|
Exploitive
|
Exploitation of Application Server,Exploitation of End Hosts
|
Sabotage
|
FireEye claims Chinese hackers are trying to break into South Korea's military to halt the deployment of an anti-ballistic weapons system in the country.
|
Ministry of State Security's (MSS) Tianjin State Security Department (APT10)
|
Nation-State
|
China
|
https://www.theregister.co.uk/2017/04/21/china_accused_south_korea_hack/
|
87c22a61d5a04c72
|
2017-04-20 00:00:00
| 2,017
|
United States of America
|
Fashion Fantasy Game
|
Information
| 51
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
A 2016 data breach leaves Fashion Fantasy Game, an online game and social network for fashion lovers, with millions of user account credentials being leaked on the web.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.zdnet.com/article/amid-data-breach-responsibility-thrown-to-the-wind/
|
84ef4fd5a4b37ea3
|
2017-04-18 00:00:00
| 2,017
|
United States of America
|
FlexiSpy
|
Professional, Scientific, and Technical Services
| 54
|
Exploitive
|
Exploitation of Application Server
|
Undetermined
|
Motherboard obtains the data of 130,000 customers of the two mobile surveillance software firms Retina-X and FlexiSpy.
|
Undetermined
|
Criminal
|
Undetermined
|
https://motherboard.vice.com/en_us/article/inside-stalkerware-surveillance-market-flexispy-retina-x
|
37b942c346669137
|
2017-04-18 00:00:00
| 2,017
|
United States of America
|
Retina-X
|
Professional, Scientific, and Technical Services
| 54
|
Exploitive
|
Exploitation of Application Server
|
Undetermined
|
Motherboard obtains the data of 130,000 customers of the two mobile surveillance software firms Retina-X and FlexiSpy.
|
Undetermined
|
Criminal
|
Undetermined
|
https://motherboard.vice.com/en_us/article/inside-stalkerware-surveillance-market-flexispy-retina-x
|
9b8ae026854913f1
|
2017-04-17 00:00:00
| 2,017
|
United States of America
|
Westminster College
|
Educational Services
| 61
|
Exploitive
|
Exploitation of End Hosts
|
Financial
|
Westminster College in Missouri reveals the details of a breach discovered on March 26 after a phishing scam duped a staffer into sending off W-2 statements.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.scmagazine.com/w-2-data-breach-at-westminster-college/article/650860/
|
ca45a6443a51f1d7
|
2017-04-16 00:00:00
| 2,017
|
United States of America
|
McAfee Linkedin Page
|
Professional, Scientific, and Technical Services
| 54
|
Disruptive
|
Message Manipulation
|
Undetermined
|
The LinkedIn page for McAfee is hijacked by a single person or an unknown number of individuals allegedly affiliated with the OurMine collective.
|
OurMine
|
Hobbyist
|
Saudi Arabia
|
http://www.csoonline.com/article/3190163/security/mcafee-linkedin-page-hijacked.html
|
03d5a58c6eb588cc
|
2017-04-14 00:00:00
| 2,017
|
United States of America
|
Best American Hospitality Corp.
|
Accommodation and Food Services
| 72
|
Exploitive
|
Exploitation of Sensors
|
Financial
|
Best American Hospitality Corp. issues a statement regarding stolen payment cards at some of the restaurants it manages and operates.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.prnewswire.com/news-releases/best-american-hospitality-corp-issues-statement-regarding-stolen-payment-cards-at-some-restaurants-it-manages-some-shoneys-restaurants-300439983.html
|
a7b8301464175754
|
2017-04-12 00:00:00
| 2,017
|
United Kingdom of Great Britain and Northern Ireland
|
AQA (Assessment and Qualifications Alliance)
|
Educational Services
| 61
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Data relating to 64,000 current and former examiners stored on some of AQA's online systems are stolen by attackers, including examiners' name, address, personal phone numbers, and passwords.
|
Undetermined
|
Criminal
|
Undetermined
|
http://schoolsweek.co.uk/thousands-of-examiners-personal-details-stolen-in-aqa-cyber-attack/
|
ac1ae9e7282392bc
|
2017-04-12 00:00:00
| 2,017
|
United Kingdom of Great Britain and Northern Ireland
|
Britain First
|
Other Services (except Public Administration)
| 81
|
Disruptive
|
Message Manipulation
|
Protest
|
Britain First is hit by a massive hack that targets its websites and Twitter accounts, and their YouTube channel.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.huffingtonpost.co.uk/entry/britain-first-hacked_uk_58f0ccf6e4b0bb9638e323ab
|
7e93e74fe819883f
|
2017-04-12 00:00:00
| 2,017
|
Australia
|
Melbourne IT
|
Information
| 51
|
Disruptive
|
External Denial of Service
|
Financial
|
Australian ISP Melbourne IT confirms that it was hit by "a large DDoS attack" that disrupted its web hosting.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.infosecurity-magazine.com/news/australian-isp-fights-ddos-attack/
|
e9a0f929f5d7f0fe
|
2017-04-12 00:00:00
| 2,017
|
United States of America
|
NSA
|
Public Administration
| 92
|
Exploitive
|
Exploitation of Application Server
|
Undetermined
|
The Shadow Brokers dump a new collection of files, containing what appears to be exploits and hacking tools targeting Microsoft's Windows OS and evidence the Equation Group had gained access to servers and targeted the SWIFT banking system of several banks.
|
Shadow Brokers
|
Criminal
|
Russian Federation
|
https://www.bleepingcomputer.com/news/security/shadow-brokers-release-new-files-revealing-windows-exploits-swift-attacks/
|
1aa0cb3638ead2bd
|
2017-04-12 00:00:00
| 2,017
|
China
|
Youku
|
Information
| 51
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
A dark web vendor going by the handle of CosmicDark sells a database containing 100,759,591 user accounts stolen from of Youku Inc., a popular video service in China.
|
Undetermined
|
Criminal
|
Undetermined
|
https://www.hackread.com/chinese-video-service-youku-hacked-accounts-sold-on-darkweb/
|
0bb2397ac4dda9f4
|
2017-04-11 00:00:00
| 2,017
|
United States of America
|
eConcordia
|
Educational Services
| 61
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
Concordia's online course systems, eConcordia and KnowledgeOne, are hacked, 9000 users are compromised.
|
Undetermined
|
Criminal
|
Undetermined
|
https://thelinknewspaper.ca/article/econcordia-system-hacked
|
8302c8531d746ed0
|
2017-04-11 00:00:00
| 2,017
|
India
|
Union Bank of India
|
Finance and Insurance
| 52
|
Exploitive
|
Exploitation of Application Server
|
Financial
|
North Korean hackers are suspected of attempting to steal $170m from Union Bank of India, back in 2015.
|
Undetermined
|
Criminal
|
Undetermined
|
http://www.ibtimes.co.uk/north-korean-hackers-may-have-launched-bangladesh-bank-style-cyberattack-indian-bank-1616419
|
Subsets and Splits
Cyber Attacks by Industry Since 201
Displays the number and percentage of events affecting different industries annually since 2019, highlighting significant trends and proportions.