Top 5 Most Devastating Cyber Attacks

22 79
Avatar for Secure
Written by
3 years ago

Today lets take a closer look at some recent successful cyber-attacks. Some of these, no one saw it coming . to be sure cyber attacks can be successful or extinguished from the very start. But the iron-cloud rule of cyber attacks is that they come in many forms, from all directions and from incredibly different sources.

Let the count down some of the more interesting ones.


MAFIA BOY DENIAL OF SERVICE

 

Michael calce, aka Mafiaboy, then 15yrs old claimed that he had unknowingly input several widely known IP addresses into a security tool he had downloaded from the web. Being a teenager, calce wen off to school and when he returned home, to find his exploit were plastered all over the news. Denial of service attacks, like mafia boy flood a site with traffic disabling its ability to serve legitimate users. Yahoo which at the time, was the world most used search engine collapsed.Buy.com, eBay, CNN, Amazon were all bought down for several hours, costing billions in the aftermath.


   CONFLICKER


In 2008, this worn exploited a number of windows operating systems. It then linked these computers together into a massive botnet, which was a new idea at the time. Conficker had several spoils of victory, Including the Creation of a whole new class of threats and leaving many world leaders no choice but to call in a favour from other nations to mitigate the attack.


Jonathan James 

James breached the United State Department of Defense in 1999, stealing passwords, confidential messages and software designed for space exploration and us military. In the 1960s, John F Kennedy famously urged the United State to go to the moon not because it is easy but because it is hard. But 30 yrs later, NASA had to shut down its entire network for 3 weeks, costing millions in response to James's brute force attack.


SONY PICTURES


The Guardians of Peace (GOP) fessed up to the crime by releasing a trove of sensitive data, including emails, personal information, messages and correspondence, employee salaries and even snatching several sony films. The group used a modified Shamoon wiper malware with a mechanism to wipe hard drives data, Unlike the typical goal of steal data, this malware hurts victims by completely eliminating their valuable information.



MELLISA VIRUS 


David Smith is, perhaps the discovery of phishing attacks .taking you to America online chat group, Smith posted a document claiming to have credential to several websites but whose true content was the mellisa virus.

Melissa then went viral .spawing itself across the global email servers and several tech-savvy companies, including Microsoft, Intel, Lockheed Martin, were forced to shut down their email services after melissa cause over $80 million in damages.


Attacks are inevitable but successful attacks are not but when we lock our focus on cyber resilience we can withstand the unending parade of attacks and by persisting our security posture and maintaining the line of sight, the attacks surface is compressed and becomes an inhospitable place for an attacker to win.

27
$ 0.00
Sponsors of Secure
empty
empty
empty
Avatar for Secure
Written by
3 years ago

Comments

very nice post

$ 0.00
3 years ago

Thanks for reading

$ 0.00
3 years ago

....Nice..I subscribe you please subscribe me...

$ 0.00
3 years ago

Thanks for the information

$ 0.00
3 years ago

Thank you for the information

$ 0.00
3 years ago

very nice post,,,, nice article dear, i subscribe you please subscribe me

$ 0.00
3 years ago

nice article dear, i subscribe you please subscribe me

$ 0.00
3 years ago

thank your article

$ 0.00
3 years ago

Thanks for Sharing. The post is phenomenal

$ 0.00
3 years ago

wow thats nice

$ 0.00
3 years ago

Talent is a double edged sword and it has been proved in history time and again. This is not the end.

$ 0.00
3 years ago

thanks for reading

$ 0.00
3 years ago

Wow awesome article

$ 0.00
3 years ago

thanks for reading

$ 0.00
3 years ago

a digital assault is an assault propelled from at least one PCs against another PC, numerous PCs or systems. Digital assaults can be stalled into two expansive sorts: assaults where the objective is to impair the objective PC or thump it disconnected, or assaults where the objective is to gain admittance to the objective PC's information and maybe gain administrator benefits on it. For someone who don't know what cyber attacks are thanks me later😊

$ 0.00
3 years ago
$ 0.00
3 years ago

🌐🥜🏕️🥜Nicerights 💗💗Subscribed. Me

$ 0.00
3 years ago