{"id":14716,"date":"2018-11-06T09:54:58","date_gmt":"2018-11-06T09:54:58","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/five-most-notorious-cyberattacks\/14716\/"},"modified":"2019-11-22T10:02:03","modified_gmt":"2019-11-22T10:02:03","slug":"five-most-notorious-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/five-most-notorious-cyberattacks\/14716\/","title":{"rendered":"Top 5 most notorious cyberattacks"},"content":{"rendered":"<p>Most cyberattacks are fairly mundane. In the worst cases, the user sees an on-screen ransom demand explaining that the computer is encrypted and can be unlocked after payment. Oftentimes, however, nothing visible happens at all \u2014 many types of malware act as surreptitiously as possible to maximize data theft before being spotted.<\/p>\n<p>But with some cyberattacks, their scale or sophistication cannot fail to attract attention. This post is dedicated to the five most spectacular and notorious cyberattacks of the last decade.<\/p>\n<h3>WannaCry: A real epidemic<\/h3>\n<p>The WannaCry attack put ransomware, and computer malware in general, on everyone\u2019s map, even those who don\u2019t know a byte from a bite. Using exploits from the Equation Group hacking team that <a href=\"https:\/\/threatpost.com\/shadowbrokers-windows-zero-days-already-patched\/125009\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">were made publicly available<\/a> by the Shadow Brokers, the attackers created a monstrosity \u2014 a ransomware encryptor able to spread quickly over the Internet and local networks.<\/p>\n<p>The four-day WannaCry epidemic knocked out more than 200,000 computers in 150 countries. This included critical infrastructure: In some hospitals, WannaCry encrypted all devices, including medical equipment, and some factories were forced to stop production. Among recent attacks, WannaCry is the most far-reaching.<\/p>\n<p><em>See <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-ransomware\/16518\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a> for more details about WannaCry, and <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-for-b2b\/16544\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-and-embedded\/16604\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a> for business aspects of the epidemic. Incidentally, WannaCry is still out there, endangering the world\u2019s computers. To find out how to configure Windows to stay protected, <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-windows-update\/16593\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">read this post<\/a>.<\/em><\/p>\n<h3>NotPetya\/ExPetr: The costliest cyberattack to date<\/h3>\n<p>That said, the title of most costly epidemic does not go to WannaCry, but rather to another ransomware encryptor (technically a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/wiper\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">wiper<\/a>, but that doesn\u2019t alter the bottom line) called ExPetr, also known as NotPetya. Its operating principle was the same: Using EternalBlue and EtrernalRomance exploits, the worm moved around the Web, irreversibly encrypting everything in its path.<\/p>\n<p>Although it was smaller in terms of total number of infected machines, the NotPetya epidemic targeted mainly businesses, partly because one of the initial propagation vectors was through the financial software MeDoc. The cybercriminals managed to gain control over the MeDoc update server, causing many clients using the software to receive the malware disguised as an update, which then spread across the network.<\/p>\n<p>The damage from the NotPetya cyberattack is <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">estimated at $10 billion<\/a>, whereas WannaCry, according to various estimates, lies in the $4\u2013$8 billion range. NotPetya is considered the costliest global cyberattack in history. Fingers crossed that if this record is ever broken, it won\u2019t be soon.<\/p>\n<p><em>More information about the NotPetya\/ExPetr epidemic can be found in <a href=\"https:\/\/www.kaspersky.com\/blog\/new-ransomware-epidemics\/17314\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this post<\/a>; the pain it caused businesses is examined <a href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-b2b\/17343\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a>; and see <a href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-everyone\/17374\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a> for why the epidemic, capable of disabling large businesses, affects not only those whose computers are infected, but everyone else as well.<\/em><\/p>\n<h3>Stuxnet: A smoking cybergun<\/h3>\n<p>Probably the most famous attack was the complex, multifaceted malware that disabled uranium-enrichment centrifuges in Iran, slowing down the country\u2019s nuclear program for several years. It was Stuxnet that first prompted talk of the use of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/cyberweapon\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">cyberweapons<\/a> against industrial systems.<\/p>\n<p>Back then, nothing could match Stuxnet for complexity or cunning \u2014 the worm was able to spread imperceptibly through USB flash drives, penetrating even computers that were not connected to the Internet or a local network.<\/p>\n<p>The worm spun out of control and quickly proliferated around the world, infecting hundreds of thousands of computers. But it could not damage those computers; it had been created for a very specific task. The worm manifested itself only on computers operated by Siemens programmable controllers and software. On landing on such a machine, it reprogrammed these controllers. Then, by setting the rotational speed of the uranium-enrichment centrifuges too high, it physically destroyed them.<\/p>\n<p><em>A lot of ink has been spilled over Stuxnet, including a <a href=\"https:\/\/www.amazon.com\/Countdown-Zero-Day-Stuxnet-Digital\/dp\/0770436196\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">whole book<\/a>, but for a general understanding of how the worm spread and what it infected, <a href=\"https:\/\/www.kaspersky.com\/blog\/stuxnet-victims-zero\/6775\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this post<\/a> should suffice.<\/em><\/p>\n<h3>DarkHotel: Spies in suite rooms<\/h3>\n<p>It is no secret that public Wi-Fi networks in caf\u00e9s or airports are not the most secure. Yet many believe that in hotels things should be better. Even if a hotel\u2019s network is public, at least some kind of authorization is required.<\/p>\n<p>Such misconceptions have cost various top managers and high-ranking officials dearly. On connecting to a hotel network, they were prompted to install a seemingly legitimate update for a popular piece of software, and immediately their devices were infected with the DarkHotel <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/spyware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">spyware<\/a>, which the attackers specifically introduced into the network a few days before their arrival and removed a few days after. The stealthy spyware logged keystrokes and allowed the cybercriminals to conduct targeted phishing attacks.<\/p>\n<p><em>Read more about the DarkHotel infection and its aftermath <a href=\"https:\/\/www.kaspersky.com\/blog\/darkhotel-apt\/6613\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a>.<\/em><\/p>\n<h3>Mirai: The fall of the Internet<\/h3>\n<p><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/botnet\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Botnets<\/a> had been around for ages already, but the emergence of the Internet of Things really breathed new life into them. Devices whose security had never been considered and for which no antiviruses existed suddenly began to be infected on a massive scale. These devices then tracked down others of the same kind, and promptly passed on the contagion. This zombie armada, built on a piece of malware romantically named Mirai (translated from Japanese as \u201cfuture\u201d), grew and grew, all the while waiting for instructions.<\/p>\n<p>Then one day \u2014 October 21, 2016 \u2014 the owners of this giant botnet decided to test its capabilities by causing its millions of digital video recorders, routers, IP cameras, and other \u201csmart\u201d equipment to flood the DNS service provider Dyn with requests.<\/p>\n<p>Dyn simply could not withstand such a massive <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ddos-distributed-denial-of-service-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS attack<\/a>. The DNS, as well as services that relied on it, became unavailable: PayPal, Twitter, Netflix, Spotify, PlayStation online services, and many others in the US were affected. Dyn eventually recovered, but the sheer scale of the Mirai attack made the world sit up and think about the security of \u201csmart\u201d things \u2014 it was the mother of all wake-up calls.<\/p>\n<p><em>You can read more about Mirai, Dyn, and \u201cthe attack that broke the Internet\u201d in <a href=\"https:\/\/www.kaspersky.com\/blog\/attack-on-dyn-explained\/13325\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this post<\/a>.<\/em><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.<\/p>\n","protected":false},"author":696,"featured_media":14717,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[423,111,205,1522,2391,847,1057,1850,36,2059,1849,441,196,529,1806],"class_list":{"0":"post-14716","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apt","9":"tag-attacks","10":"tag-botnets","11":"tag-cryptors","12":"tag-cyberweapons","13":"tag-darkhotel","14":"tag-ddos","15":"tag-expetr","16":"tag-malware-2","17":"tag-mirai","18":"tag-notpetya","19":"tag-ransomware","20":"tag-stuxnet","21":"tag-threats","22":"tag-wannacry"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/five-most-notorious-cyberattacks\/14716\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/13613\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/five-most-notorious-cyberattacks\/17277\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/five-most-notorious-cyberattacks\/16543\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/five-most-notorious-cyberattacks\/21607\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/five-most-notorious-cyberattacks\/5394\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/24506\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/five-most-notorious-cyberattacks\/11130\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/five-most-notorious-cyberattacks\/11042\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/five-most-notorious-cyberattacks\/10015\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/five-most-notorious-cyberattacks\/18055\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/five-most-notorious-cyberattacks\/9965\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/five-most-notorious-cyberattacks\/21943\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/five-most-notorious-cyberattacks\/17566\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/attacks\/","name":"attacks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=14716"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14716\/revisions"}],"predecessor-version":[{"id":17246,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14716\/revisions\/17246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/14717"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=14716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=14716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=14716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}