About these ads

Archive

Posts Tagged ‘OpEgypt’

16-31 August 2013 Cyber Attacks Timeline

September 2, 2013 Leave a comment

August is gone (and unfortunately the Summer is also reaching the end), so it is time to analyze what happened in the Cyber Space during the second half of this month.

Apparently the hacktivism has been the most influencing factor of the last two weeks on the wake of the sad events happening in Syria, which also influenced the Cyber Space from both sides (loyalists represented by the Syrian Electronic Army and rebels represented by the Anonymous). Other events influencing the landscape include the protests in Turkey, Colombia, Gabon and (marginally) Egypt, which also had some echoes in the Cyber Space.

On the Cyber Crime front the chronicles report the breaches against the RPG League of Legends (million of users theoretically at risk), the Estate Agent Foxtons (10,000 records allegedly compromised) and Pizza Hut Spain and Malta (7,000 records leaked) and a controversial attack to Twitter (nearly 18,000 accounts leaked purportedly belonging to Turkish users).

As usual, if you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

16-31 August 2013 Cyber Attacks Timeline

Read more…

About these ads

1-16 February 2013 Cyber Attacks Timeline

February 18, 2013 3 comments

Here is the summary of the Cyber Attacks Timeline for February. A month that will probably be remembered for the “sophisticated” cyber attacks to the two main social networks: Facebook and Twitter.

But the attacks against the two major social networks were not the only remarkable events of this period. Other governmental and industrial high-profile targets have fallen under the blows of (state-sponsored) cyber criminals: the list of the governmental targets is led by the U.S. Department of Energy and the Japan Ministry of Foreign Affairs, while Bit9, a primary security firm, was also targeted, leading the chart of Industrial targets.

Hacktivists have raised the bar and breached the Federal Reserve, leaking the details of 4,000 U.S. Banks executives. Similarly, the Bush family was also targeted, suffering the leak of private emails.

Even if the list is not as long as the one of January, it includes other important targets, so, scroll it down to have an idea of how fragile our data are inside the cyberspace. Also have a look at the timelines of the main Cyber Attacks in 2011, 20122013, and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts). To do so, you can use this form.

1-16 February 2013 Cyber Attacks Timeline

Read more…

16-31 January 2013 Cyber Attacks Timeline

February 7, 2013 1 comment

Two Weeks Living Dangerously! I have no other words to describe this second half of January (first two weeks here) that has shown an unprecedented level of attacks! And if a good day starts with the morning, this will be a very troubled year from an information security perspective.

Not only the peaks of DDoS attacks against the US Banks have reached an unstoppable peak, but, most of all, at the end of the month details have been unveiled about a massive cyber-espionage campaign allegedly orchestrated by Chinese hackers against some major US media including The New York Times, The Wall Street Journal, The Washington Post and Bloomberg News.

A very very long list of targets this month, with some high profile victims such as the U.S. Sentencing Commission, whose web site has been hacked twice and turned into an Asteroid game, but also Renault Argentina that suffered 37,000 accounts leaked.

To summarize this month is really impossible, you just have to scroll down the timeline to realize the hacking spree in this January 2013.

If this trend continues, I will have to decrease the frequency of publication…

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts). To do so, you can use this form.

16-31 January 2013 Cyber Attacks Timeline

Read more…

Categories: Cyber Attacks Timeline, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

1-15 December 2012 Cyber Attacks Timeline

December 17, 2012 2 comments

Christmas is coming quickly, we have just passed the first half of December, and hence it’s time for the first update of the Cyber Attacks Timeline for December.

The Team GhostShell has decided to close the year with a clamorous Cyber Attack, and hence,as part of the project ProjectWhiteFox, has leaked 1.6 million of accounts from several organizations all over the world. This is the most important event for this first part of the month that apparently has shown a decreasing trend. Hacktivists are still focusing their attention (and their keyboards) to Israel, and Cyber Criminals are maybe preparing for the Christmas attacks.

However, the main events of the first half of December, are related to hacktivism, besides the above mentioned cyber attack, it worth to mention the new wave of massive DDoS attacks against US Banks (up to 60 Gbps of peak according to Arbor Networks), but also the leak of a ITU document on the future of Deep Packet Inspection and the attacks in Egypt, Mexico and India.

Last but not least: this two weeks also offered a giant attack to the famous Social Platform Tumblr and also the warning of the Switzerland’s national security agency (NDB) that a huge amount of secrets may have been leaked by a disgruntled IT Administrator.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts). To do so, you can use this form.

1-15 December 2012 Cyber Attack Timeline Read more…

Cyberrevolution E Hacktivism All’Ombra Delle Piramidi

February 1, 2011 Leave a comment

Gli eventi che stanno scuotendo l’Africa Mediterranea in queste ore, inerenti a Egitto e Tunisia, sollevano numerosi interrogativi relativi al ruolo e all’impatto delle nuove tecnologie di comunicazione e del Social Network all’interno dei grandi eventi politici e sociali.

Chiunque in queste drammatiche ore può entrare su Twitter e digitare #Jan25 oppure #Egypt per diventare, in tempo reale, spettatore virtuale degli eventi grazie alla più potente agenzia di stampa mai esistita: quella costituita dai numerosi reporter improvvisati che, armati di uno smartphone ed una connessione Internet, possono catturare gli eventi e trasmetterli in tempo reale al mondo intento grazie ai 6 gradi di separazione del Social Network.

Deve aver pensato la stessa cosa il governo Egiziano che ha deciso, grossolanamente, a partire dal 27 gennaio, di disconnettere  la Terra del Nilo dal Mare del Web, arrestando il dilagare dei tweet (e dello spam), ma attirando ancora di più l’attenzione dei media occidentali.

Andamento del Traffico Internet Egiziano (Dati Arbor Networks)

Dietro a questa decisione che non è passata inosservata, la constatazione che è notevolmente più facile colpire il centro (ovvero il backbone di rete) piuttosto che bloccare (ammesso che sia possibile farlo) i terminali periferici,  anche a patto di generare sgradevoli effetti collaterali quali il fermo delle attività economiche e finanziare (oramai la quasi totalità) che utilizzano la rete per lo scambio dei dati (per inciso, dopo una parziale riapertura dei bocchettoni Internet, questa mattina verso le 4:30 EST il traffico è stato nuovamente arrestato, ad eccezione di qualche Mbps diretto verso gli Autonomous System di Giordania e Sudan).

Cosa è lecito attendersi per il futuro? Probabilmente, e non è semplice enfasi, quanto accaduto in questi giorni dovrà spingere a riconsiderare seriamente le implicazioni socio-politiche delle nuove tecnologie (qualcuno sostiene addirittura che la spinta porterà ad una necessaria riconsiderazione del ruolo della donna nella Cultura Islamica). Nell’immediato, vista la temperatura (non soltanto metereologica purtroppo) dell’area mediorientale e di altre parti del mondo, è ipotizzabile che i governi con la coscienza un po’ meno pulita relativamente ai diritti civili, stiano cominciando a preoccuparsi seriamente per la forza dirompente (e apparentemente inarrestabile) delle nuove tecnologie correndo ai ripari. Ripari, putroppo finalizzati a mettere fuori combattimento le risorse di generazione delle informazioni (ovvero i terminali mobili) e quelle di condivisione (ovvero i Social Network).

Tra i Cyberarsenali dei governi con la coscienza sporca potrebbero rientrare:

  • Ovviamente un blocco preventivo dei Social Network per impedire qualsiasi forma di condivisione preventiva delle informazioni. Il blocco totale di Internet sarebbe lesivo per il sistema paese;
  • Il Denial of Service massivo dei terminali mediante l’exploit di vulnerabilità (sempre più presenti sui questo tipo di dispositivi) o mediante azioni su appositi comandi nascosti (speriamo non messi a disposizione di produttori);
  • La falsificazione (o spoof) dei terminali per screditare le fonti di cinguetti (o tweet) attendibili o renderle irraggiungibili mettendole fuori combattimento;
  • Il più tradizionale Distributed Denial of Service per mettere fuori combattimento i siti di condivisione delle informazioni (Social Network).

Ovviamente a tali azioni sarà anche lecito attendersi, come accaduto in Egitto, reazioni della medesima portata: ne è testimonianza l’operazione #OpEgypt, attuata dal gruppo Anonymous in risposta agli iniziali tentativi del Governo Egiziano di sedare la protesta con mezzi più o meno leciti.

E’ proprio vero: gira e rigira Social Network e Terminali Mobili (il tutto condito in questo caso con un pizzico di Hactivism) sono sempre al centro dell’attenzione, e il tutto, sempre di più, lascia pensare che le guerre e le rivoluzioni del futuro si combatteranno sempre di più su terreni e con armi impensabili sino a poco tempo fa: i terreni di battaglia saranno le grandi dorsali di Internet, le armi? Naturalmente  terminali mobili…

Follow

Get every new post delivered to your Inbox.

Join 3,094 other followers