Timeline: Critical infrastructure attacks increase steadily in past decade
A look back at noteworthy cyberattacks on utilities, ports, pipelines and more throughout the years
Siberian pipeline sabotage: The CIA places deliberate flaws in control system plans stolen by Russia. Allegedly flaws in the stolen software led to a massive pipeline explosion in June 1982.
Source: The Telegraph
Salt River Project computer network hack: While accessing billing information, an employee gains access to the utility's mission-critical systems, including those that handle water and power monitoring and delivery, as well as financial and customer and personal information. Log-in and password files, computer system log files and "root" privileges were taken and/or altered.
Source: Idaho National Laboratory
Port of Houston system crash: By bombarding its computer system with thousands of electronic messages, British hacker Aaron Caffrey crashes the system that helps ships navigate the harbor in the Port of Houston, one of the largest U.S. ports.
Source: BBC News
The Slammer Worm: The worm infects at least 120,000 computers, causing network outages and disrupting flights, elections, ATMs, 9-1-1 emergency services and a nuclear monitoring system at the Davis-Besse Ohio Nuclear Power Plant.
Titan Rain: A series of computer attacks originally launched against a variety of U.S. military computer systems in 2003 go undetected until the following year. Thought to have originated in China, the hacks didn't breach classified systems, but sensitive files were copied.
Sabotage of California's Tehama Colusa Canal Authority: A former employee of a small California canal system installs unauthorized software and damages a computer used to divert water from the Sacramento River.
Operation Aurora: A persistent and sophisticated cyberspying operation attempts to siphon intellectual property from major corporations, including Google, Intel, Symantec and Adobe.
Spies breach electricity grid in U.S.: According to current and former national security officials, as reported in The Wall Street Journal, cyberspies from China, Russia and other countries penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system.
Source: The Wall Street Journal
Stuxnet: The Stuxnet worm temporarily knocks out some of the centrifuges at Iran's Natanz nuclear facility, causing considerable delay to that country's uranium enrichment program. In June 2012, The New York Times reports that the U.S. and Israel developed the worm.
The Nitro Attacks: A series of targeted attacks using an off-the-shelf Trojan horse called "Poison Ivy" is directed mainly at companies involved in the research, development and manufacture of chemicals and advanced materials. After tricking targeted users into downloading Poison Ivy, the attackers issue instructions to the compromised computers, troll for higher-level passwords and eventually offload the stolen content to hacker-controlled systems.
Duqu Trojan: A remote-access Trojan (RAT) designed to steal data from computers it infects targets vendors of industrial control systems.
Shamoon malware: A destructive Trojan horse, which steals data and then wipes files, is allegedly used in an attack that disabled thousands of computers at Saudi Aramco, the national oil company of Saudi Arabia.
Flame: This highly sophisticated malware is believed to be responsible for data loss incidents at Iran's oil ministry. It was allegedly developed by the U.S. and Israeli governments to collect intelligence about Iran's computer networks that would facilitate future cyberattacks on computers used in that country's nuclear fuel enrichment program.
Cyberattacks on natural gas pipeline companies: The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), which is part of the U.S. Department of Homeland Security, issues an alert to warn of ongoing cyberattacks against the computer networks of U.S. natural gas pipeline companies. The ICS-CERT alert states that the campaign involves narrowly focused spear-phishing scams targeting employees of the pipeline companies.
Attacks on utilities systems: ICS-CERT issues an alert advising utilities to monitor Internet-facing control systems for activity by hackers attempting to gain remote access to control systems through brute force authentication attacks. The attackers attempted to obtain a user's log-on credentials by guessing usernames and passwords.
DDoS attacks on U.S. banks: The U.S. accuses Iran of staging a wave of denial-of-service attacks against U.S. financial institutions. Defense Secretary Leon Panetta warns of potential for a "cyber Pearl Harbor" against critical infrastructure and calls for new protection standards.
Source: The New York Times
Research compiled by Mari Keefe, Computerworld editorial project manager.
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Exponentially Accelerate Data Protection and Recovery with Simpana 10 IntelliSnap® Snapshot Management Technology Are you making the best use of your storage array snapshot functionality? CommVault Simpana 10 IntelliSnap technology manages hardware-based snapshots across multiple vendor...
- Simpana IntelliSnap Technology Datasheet With IntelliSnap you can maximize the value of your snapshot technology while dramatically reducing management overhead and complexity.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cyberwarfare White Papers | Webcasts