16-30 April 1017 Cyber Attacks Timeline

16-30 April 1017 Cyber Attacks Timeline

Here’s the second timeline of April (first part here) covering the main cyber attacks occurred between 16 and 30 April 2017.

Complete timeline here: https://www.hackmageddon.com/2017/06/05/16-30-april-2017-cyber-attacks-timeline/

Quite a busy fortnight this one: once again the infamous APT28 (AKA Fancy Bear) doesn’t really feel like getting some rest. This fortnight the list of its victims includes: the Danish Armed Forces, two German think tanks with ties to the Chancellor Angela Merkel’s party Christian Democratic Union (CDU), and also the newly elected French President Emmanuel Macron.

In the same time, while Google and Facebook have confirmed that they fell victim to an alleged $100m (£77m) scam between 2013 and 2015. a couple of mega breaches have joined the list: Fashion Fantasy Game and, for the second time, R2Games (more than one million accounts compromised this time); and yet another Bitcoin Exchange service, Yapizon, has suffered a massive theft (about 3,800 bitcoins corresponding to $5M).

Despite smaller in size, other two breaches are worthy to mention as they hit two high-profile targets like HipChat and Chipotle.

Last but not least, another interested trend is the increasingly common discovery of massive mobile malware infections: this fortnight two similar campaigns have been discovered: MilkyDoor and FalseGuide.

If you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013, 2014, 2015 and 2016 (regularly updated). You may also want to have a look at the Cyber Attack Statistics that are regularly published, and follow @paulsparrows on Twitter for the latest updates.

Additionally, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts), and if useful, you can access the timeline in Google Sheet format.


要查看或添加评论,请登录

Paolo Passeri的更多文章

  • The Cyber Kill Chain in the Age of Cloud

    The Cyber Kill Chain in the Age of Cloud

    The cyber kill chain is used to model a cyber intrusion, identifying the different stages involved in a cyber-attack…

    1 条评论
  • Three key steps to protect your business from chatbot hacking

    Three key steps to protect your business from chatbot hacking

    We’ve all experienced that moment when you’ve ordered food online from the likes of Deliveroo or Uber Eats, and when it…

  • August 2017 Cyber Attacks Statistics

    August 2017 Cyber Attacks Statistics

    And finally here we go with the statistics derived from the cyber attack timelines of August (Part I and Part II)…

  • 16-31 August 2017 Cyber Attacks Timeline

    16-31 August 2017 Cyber Attacks Timeline

    August’s gone (and the Summer with it unfortunately)… You are ready to start your usual activities after, hopefully…

  • 1-15 August 2017 Cyber Attacks Timeline

    1-15 August 2017 Cyber Attacks Timeline

    Eventually I have been able to catch up and now I am proud to publish the first timeline of August covering the main…

  • July 2017 Cyber Attacks Statistics

    July 2017 Cyber Attacks Statistics

    And finally I can publish the statistics for July derived from the corresponding timelines (part I and part II). The…

  • June 2017 Cyber Attacks Statistics

    June 2017 Cyber Attacks Statistics

    Unfortunately the end of Summer is close, however for just one moment, let’s close our eyes, go back to June and have a…

  • 16-31 July Cyber Attacks Timeline

    16-31 July Cyber Attacks Timeline

    Here we go with the second timeline of July (first part here) covering the main cyber attacks occurred between July 16…

  • 1-15 July 2017 Cyber Attacks Timeline

    1-15 July 2017 Cyber Attacks Timeline

    Et voilà, time has come to publish the first timeline of July, covering the main cyber attacks occurred during the…

  • 16-30 June 2017 Cyber Attacks Timeline

    16-30 June 2017 Cyber Attacks Timeline

    So, let's close the Infosec June 2017 with the second timeline covering the main cyber attacks occurred between June…

社区洞察

其他会员也浏览了