Timeline: Critical infrastructure attacks increase steadily in past decade

A look back at noteworthy cyberattacks on utilities, ports, pipelines and more throughout the years

This timeline accompanies our story After Stuxnet: The new rules of cyberwar.?

1982

Siberian pipeline sabotage: The CIA places deliberate flaws in control system plans stolen by Russia. Allegedly flaws in the stolen software led to a massive pipeline explosion in June 1982.

Source: The Telegraph

1994

Salt River Project computer network hack: While accessing billing information, an employee gains access to the utility's mission-critical systems, including those that handle water and power monitoring and delivery, as well as financial and customer and personal information. Log-in and password files, computer system log files and "root" privileges were taken and/or altered.

Source: Idaho National Laboratory

2001

Port of Houston system crash: By bombarding its computer system with thousands of electronic messages, British hacker Aaron Caffrey crashes the system that helps ships navigate the harbor in the Port of Houston, one of the largest U.S. ports.

Source:BBC News

2003

The Slammer Worm: The worm infects at least 120,000 computers, causing network outages and disrupting flights, elections, ATMs, 9-1-1 emergency services and a nuclear monitoring system at the Davis-Besse Ohio Nuclear Power Plant.

Source: Computerworld

2003-2004

Titan Rain: A series of computer attacks originally launched against a variety of U.S. military computer systems in 2003 go undetected until the following year. Thought to have originated in China, the hacks didn't breach classified systems, but sensitive files were copied.

Source:Computerworld

2007

Sabotage of California's Tehama Colusa Canal Authority: A former employee of a small California canal system installs unauthorized software and damages a computer used to divert water from the Sacramento River.

Source: Computerworld

2009/2010

Operation Aurora: A persistent and sophisticated cyberspying operation attempts to siphon intellectual property from major corporations, including Google, Intel, Symantec and Adobe.

Source: Computerworld

2009

Spies breach electricity grid in U.S.: According to current and former national security officials, as reported in The Wall Street Journal, cyberspies from China, Russia and other countries penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system.

Source: The Wall Street Journal

2010

Stuxnet: The Stuxnet worm temporarily knocks out some of the centrifuges at Iran's Natanz nuclear facility, causing considerable delay to that country's uranium enrichment program. In June 2012, The New York Times reports that the U.S. and Israel developed the worm.

Source: Computerworld

2011

The Nitro Attacks: A series of targeted attacks using an off-the-shelf Trojan horse called "Poison Ivy" is directed mainly at companies involved in the research, development and manufacture of chemicals and advanced materials. After tricking targeted users into downloading Poison Ivy, the attackers issue instructions to the compromised computers, troll for higher-level passwords and eventually offload the stolen content to hacker-controlled systems.

Source: Computerworld

2011

Duqu Trojan: A remote-access Trojan (RAT) designed to steal data from computers it infects targets vendors of industrial control systems.

Source: Computerworld

2012

Shamoon malware: A destructive Trojan horse, which steals data and then wipes files, is allegedly used in an attack that disabled thousands of computers at Saudi Aramco, the national oil company of Saudi Arabia.

Source: Computerworld

2012

Flame: This highly sophisticated malware is believed to be responsible for data loss incidents at Iran's oil ministry. It was allegedly developed by the U.S. and Israeli governments to collect intelligence about Iran's computer networks that would facilitate future cyberattacks on computers used in that country's nuclear fuel enrichment program.

Source: Computerworld

2012

Cyberattacks on natural gas pipeline companies: The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), which is part of the U.S. Department of Homeland Security, issues an alert to warn of ongoing cyberattacks against the computer networks of U.S. natural gas pipeline companies. The ICS-CERT alert states that the campaign involves narrowly focused spear-phishing scams targeting employees of the pipeline companies.

Source: CSO

2012

Attacks on utilities systems: ICS-CERT issues an alert advising utilities to monitor Internet-facing control systems for activity by hackers attempting to gain remote access to control systems through brute force authentication attacks. The attackers attempted to obtain a user's log-on credentials by guessing usernames and passwords.

Source: ICS-CERT

2012

DDoS attacks on U.S. banks: The U.S. accuses Iran of staging a wave of denial-of-service attacks against U.S. financial institutions. Defense Secretary Leon Panetta warns of potential for a "cyber Pearl Harbor" against critical infrastructure and calls for new protection standards.

Source: The New York Times

Read the main story: After Stuxnet: The new rules of cyberwar

Research compiled by Mari Keefe, Computerworld editorial project manager.

Read more about Security in Computerworld's Security Topic Center.

Related:

Copyright © 2012 IDG Communications, Inc.

Bing’s AI chatbot came to work for me. I had to fire it.
Shop Tech Products at Amazon