Difference between revisions of "Template:Hacking in the 2010s"
Jump to navigation
Jump to search
imported>Zazpot (rvv) |
|||
(242 intermediate revisions by 79 users not shown) | |||
Line 1: | Line 1: | ||
{{Navbox | {{Navbox | ||
− | + | |name = Hacking in the 2010s | |
− | | name | + | |title = Hacking in the 2010s |
− | | title | + | |bodyclass = hlist |
− | | | + | |state = {{{state|autocollapse}}} |
− | | state | ||
− | |||
− | |||
− | |||
− | | | + | |above = |
− | | | + | {{succession links |
− | + | |left = [[Template:Hacking in the 2000s|2000s]] | |
− | + | |center = [[Timeline of computer security hacker history#2010s|Timeline]] | |
− | + | |right = [[Template:Hacking in the 2020s|2020s]] | |
− | + | }} | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | | group2 = [[Hacker group|Groups]] | + | |group1 = Major incidents |
− | | list2 = | + | |list1 = {{navbox|subgroup |
+ | |group1 = 2010 | ||
+ | |list1 = | ||
+ | * [[Operation Aurora]] | ||
+ | * [[February 2010 Australian cyberattacks|Australian cyberattacks]] | ||
+ | * [[Shadow Network|Operation ShadowNet]] | ||
+ | * [[Operation Payback]] | ||
+ | |group2 = 2011 | ||
+ | |list2 = | ||
+ | * [[DigiNotar]] | ||
+ | * [[DNSChanger]] | ||
+ | * [[HBGary|HBGary Federal]] | ||
+ | * [[Operation AntiSec]] | ||
+ | * [[Operation Tunisia]] | ||
+ | * [[2011 PlayStation Network outage|PlayStation]] | ||
+ | * [[RSA SecurID#March 2011 system compromise|RSA SecurID compromise]] | ||
+ | |group3 = 2012 | ||
+ | |list3 = | ||
+ | * [[2012 LinkedIn hack|LinkedIn hack]] | ||
+ | * [[2012–13 Stratfor email leak|Stratfor email leak]] | ||
+ | * [[Operation High Roller]] | ||
+ | |group4 = 2013 | ||
+ | |list4 = | ||
+ | * [[2013 South Korea cyberattack|South Korea cyberattack]] | ||
+ | * [[Snapchat#December 2013 hack|Snapchat hack]] | ||
+ | * [[June 25 cyber terror|Cyberterrorism Attack of June 25]] | ||
+ | * [[Yahoo! data breaches#August 2013 breach|2013 Yahoo! data breach]] | ||
+ | * [[2013 Singapore cyberattacks|Singapore cyberattacks]] | ||
+ | |group5 = 2014 | ||
+ | |list5 = | ||
+ | * [[Anthem medical data breach]] | ||
+ | * [[Operation Tovar]] | ||
+ | * [[iCloud leaks of celebrity photos]] | ||
+ | * [[2014 JPMorgan Chase data breach]] | ||
+ | * [[Sony Pictures hack]] | ||
+ | * [[2014 Russian hacker password theft|Russian hacker password theft]] | ||
+ | * [[Yahoo! data breaches#Late 2014 breach|2014 Yahoo! data breach]] | ||
+ | |group6 = 2015 | ||
+ | |list6 = | ||
+ | * [[Office of Personnel Management data breach]] | ||
+ | * [[Hacking Team#2015 data breach|Hacking Team]] | ||
+ | * [[Ashley Madison data breach]] | ||
+ | * [[VTech#2015 data breach|VTech data breach]] | ||
+ | * [[December 2015 Ukraine power grid cyberattack|Ukrainian Power Grid Cyberattack]] | ||
+ | * [[2015–2016 SWIFT banking hack|SWIFT banking hack]] | ||
+ | |group7 = 2016 | ||
+ | |list7 = | ||
+ | * [[Bangladesh Bank robbery]] | ||
+ | * [[Hollywood Presbyterian Medical Center#Ransomware|Hollywood Presbyterian Medical Center ransomware incident]] | ||
+ | * [[Commission on Elections data breach]] | ||
+ | * [[Democratic National Committee cyber attacks]] | ||
+ | * [[Vietnamese airports hackings|Vietnam Airport Hacks]] | ||
+ | * [[Democratic Congressional Campaign Committee cyber attacks|DCCC cyber attacks]] | ||
+ | * [[2016 Indian Banks data breach|Indian Bank data breaches]] | ||
+ | * [[Surkov leaks]] | ||
+ | * [[2016 Dyn cyberattack|Dyn cyberattack]] | ||
+ | * [[Russian interference in the 2016 United States elections|Russian interference in the 2016 U.S. elections]] | ||
+ | |group8 = 2017 | ||
+ | |list8 = | ||
+ | * [[2017 Macron e-mail leaks]] | ||
+ | * [[WannaCry ransomware attack]] | ||
+ | * [[2017 Westminster cyberattack|Westminster cyberattack]] | ||
+ | * [[Petya (malware)|Petya cyberattack]] | ||
+ | ** [[2017 cyberattacks on Ukraine]] | ||
+ | * [[2017 Equifax data breach|Equifax data breach]] | ||
+ | * [[Deloitte#E-mail hack|Deloitte breach]] | ||
+ | * [[Disqus#October 2017 security breach|Disqus breach]] | ||
+ | |group9 = 2018 | ||
+ | |list9 = | ||
+ | * [[Trustico]] | ||
+ | * [[2018 Atlanta cyberattack|Atlanta cyberattack]] | ||
+ | * [[2018 SingHealth data breach|SingHealth data breach]] | ||
+ | |group10 = 2019 | ||
+ | |list10 = | ||
+ | * [[2019 cyberattacks on Sri Lanka|Sri Lanka cyberattack]] | ||
+ | * [[2019 Baltimore ransomware attack|Baltimore ransomware attack]] | ||
+ | * [[2019 Bulgarian revenue agency hack]] | ||
+ | }} | ||
+ | |||
+ | |group2 = [[Hacker group|Groups]] | ||
+ | |list2 = {{navbox|subgroup | ||
+ | |group1 = [[Hacktivism]] | ||
+ | |list1 = | ||
* [[Anonymous (group)|Anonymous]] | * [[Anonymous (group)|Anonymous]] | ||
** [[Timeline of events associated with Anonymous|associated events]] | ** [[Timeline of events associated with Anonymous|associated events]] | ||
− | |||
− | |||
* [[CyberBerkut]] | * [[CyberBerkut]] | ||
− | |||
− | |||
− | |||
* [[Gay Nigger Association of America|GNAA]] | * [[Gay Nigger Association of America|GNAA]] | ||
* [[Goatse Security]] | * [[Goatse Security]] | ||
− | |||
− | |||
* [[Lizard Squad]] | * [[Lizard Squad]] | ||
* [[LulzRaft]] | * [[LulzRaft]] | ||
Line 58: | Line 106: | ||
* [[2016 Dyn cyberattack#Perpetrators|New World Hackers]] | * [[2016 Dyn cyberattack#Perpetrators|New World Hackers]] | ||
* [[NullCrew]] | * [[NullCrew]] | ||
+ | * [[OurMine]] | ||
+ | * [[PayPal 14]] | ||
+ | * [[RedHack]] | ||
+ | * [[TeaMp0isoN]] | ||
+ | * [[UGNazi]] | ||
+ | |group2 = [[Advanced Persistent Threat]] | ||
+ | |list2 = | ||
+ | * [[Bureau 121]] | ||
+ | * [[Charming Kitten]] | ||
+ | * [[Cozy Bear]] | ||
+ | * [[Elfin Team]] | ||
+ | * [[Equation Group]] | ||
+ | * [[Fancy Bear]] | ||
+ | * [[Guccifer 2.0]]<!--Cybersecurity firms and intelligence agencies believe that this is a persona by Cozy Bear and Fancy Bear, not an individual. See article.--> | ||
+ | * [[Hacking Team]] | ||
+ | * [[Helix Kitten]] | ||
+ | * [[Iranian Cyber Army]] | ||
+ | * [[Lazarus Group]] ([[Lazarus Group#BlueNorOff|BlueNorOff]]) ([[Lazarus Group#AndAriel|AndAriel]]) | ||
* [[NSO Group]] | * [[NSO Group]] | ||
− | |||
* [[PLA Unit 61398]] | * [[PLA Unit 61398]] | ||
+ | * [[PLA Unit 61486]] | ||
+ | * [[PLATINUM (cybercrime group)|PLATINUM]] | ||
* [[Pranknet]] | * [[Pranknet]] | ||
− | * [[ | + | * [[Red Apollo]] |
* [[Rocket Kitten]] | * [[Rocket Kitten]] | ||
− | |||
* [[Syrian Electronic Army]] | * [[Syrian Electronic Army]] | ||
− | |||
* [[Tailored Access Operations]] | * [[Tailored Access Operations]] | ||
− | * [[ | + | * [[The Shadow Brokers]] |
* [[Yemen Cyber Army]] | * [[Yemen Cyber Army]] | ||
+ | }} | ||
− | | group3 = [[Hacker|Individuals]] | + | |group3 = [[Hacker|Individuals]] |
− | | list3 = | + | |list3 = |
+ | * [[Hacktivism#DkD%5B%7C%7C|DkD[||]] | ||
* [[George Hotz]] | * [[George Hotz]] | ||
* [[Guccifer]] | * [[Guccifer]] | ||
− | |||
− | |||
* [[Jeremy Hammond]] | * [[Jeremy Hammond]] | ||
* [[Junaid Hussain]] | * [[Junaid Hussain]] | ||
Line 83: | Line 148: | ||
* [[MLT (hacktivist)|MLT]] | * [[MLT (hacktivist)|MLT]] | ||
* [[Ryan Ackroyd]] | * [[Ryan Ackroyd]] | ||
+ | * [[Hector Monsegur|Sabu]] | ||
* [[Topiary (hacktivist)|Topiary]] | * [[Topiary (hacktivist)|Topiary]] | ||
+ | * [[Roman Seleznev|Track2]] | ||
* [[The Jester (hacktivist)|The Jester]] | * [[The Jester (hacktivist)|The Jester]] | ||
* [[weev]] | * [[weev]] | ||
− | | group4 = [[Vulnerability (computing)| | + | |group4 = Major [[Vulnerability (computing)|vulnerabilities]]<br>publicly [[Full disclosure (computer security)|disclosed]] |
− | | list4 = | + | |list4 = |
+ | * [[Evercookie]] (2010) | ||
+ | * [[iSeeYou]] (2013) | ||
* [[Heartbleed| Heartbleed]] (2014) | * [[Heartbleed| Heartbleed]] (2014) | ||
* [[Shellshock (software bug)|Shellshock]] (2014) | * [[Shellshock (software bug)|Shellshock]] (2014) | ||
* [[POODLE]] (2014) | * [[POODLE]] (2014) | ||
* [[Rootpipe]] (2014) | * [[Rootpipe]] (2014) | ||
+ | * [[Row hammer]] (2014) | ||
* [[JASBUG]] (2015) | * [[JASBUG]] (2015) | ||
* [[Stagefright (bug)|Stagefright]] (2015) | * [[Stagefright (bug)|Stagefright]] (2015) | ||
Line 98: | Line 168: | ||
* [[Badlock]] (2016) | * [[Badlock]] (2016) | ||
* [[Dirty COW]] (2016) | * [[Dirty COW]] (2016) | ||
+ | * [[Cloudbleed]] (2017) | ||
+ | * [[Broadcom Corporation#soc-wifi-vulns|Broadcom Wi-Fi]] (2017) | ||
+ | * [[EternalBlue]] (2017) | ||
+ | * [[DoublePulsar]] (2017) | ||
+ | * [[Intel Active Management Technology#Silent Bob is Silent|Silent Bob is Silent]] (2017) | ||
+ | * [[KRACK]] (2017) | ||
+ | * [[ROCA vulnerability]] (2017) | ||
+ | * [[BlueBorne (security vulnerability)|BlueBorne]] (2017) | ||
+ | * [[Meltdown (security vulnerability)|Meltdown]] (2018) | ||
+ | * [[Spectre (security vulnerability)|Spectre]] (2018) | ||
+ | * [[EFAIL]] (2018) | ||
+ | * [[Exactis]] (2018) | ||
+ | * [[Speculative Store Bypass]] (2018) | ||
+ | * [[Lazy FP State Restore]] (2018) | ||
+ | * [[TLBleed]] (2018) | ||
+ | * [[SigSpoof]] (2018) | ||
+ | * [[Foreshadow]] (2018) | ||
+ | * [[Microarchitectural Data Sampling]] (2019) | ||
+ | * [[BlueKeep]] (2019) | ||
+ | * [[Kr00k]] (2019) | ||
− | | group5 = [[Malware]] | + | |group5 = [[Malware]] |
− | | list5 = | + | |list5 = {{navbox|subgroup |
− | * [[ | + | |group1 = 2010 |
+ | |list1 = | ||
+ | * [[Ransomware#Bad Rabbit|Bad Rabbit]] | ||
+ | * [[Stuxnet]] | ||
+ | * [[SpyEye]] | ||
+ | |group2 = 2011 | ||
+ | |list2 = | ||
+ | * [[Kelihos botnet|Kelihos]] | ||
+ | * [[Stars virus|Stars]] | ||
+ | * [[Metulji botnet]] | ||
+ | * [[Duqu]] | ||
+ | * [[Alureon]] | ||
+ | |group3 = 2012 | ||
+ | |list3 = | ||
+ | * [[Mahdi (malware)|Mahdi]] | ||
+ | * [[Carna botnet|Carna]] | ||
+ | * [[Flame (malware)|Flame]] | ||
+ | * [[FBI MoneyPak Ransomware|FBI]] | ||
+ | * [[Shamoon]] | ||
+ | * [[Red October (malware)|Red October]] | ||
+ | * [[Dexter (malware)|Dexter]] | ||
+ | |group4 = 2013 | ||
+ | |list4 = | ||
+ | * [[DarkSeoul (wiper)|DarkSeoul]] | ||
* [[CryptoLocker]] | * [[CryptoLocker]] | ||
− | * [[ | + | |group5 = 2014 |
− | * [[ | + | |list5 = |
+ | * [[Careto (malware)|Careto]] | ||
+ | * [[DarkHotel]] | ||
* [[Duqu 2.0]] | * [[Duqu 2.0]] | ||
* [[FinFisher]] | * [[FinFisher]] | ||
− | * [[ | + | * [[Brambul]] |
* [[Gameover ZeuS]] | * [[Gameover ZeuS]] | ||
− | * [[ | + | * [[Carbanak]] |
− | * [[ | + | |group6 = 2015 |
+ | |list6 = | ||
+ | * [[Dridex]] | ||
+ | * [[Rombertik]] | ||
+ | * [[TeslaCrypt]] | ||
+ | * [[Hidden Tear]] | ||
+ | |group7 = 2016 | ||
+ | |list7 = | ||
+ | * [[Hitler-Ransomware|Hitler]] | ||
+ | * [[Petya (malware)|Petya]] ([[NotPetya]]) | ||
+ | * [[KeRanger]] | ||
+ | * [[Jigsaw (ransomware)|Jigsaw]] | ||
+ | * [[MEMZ]] | ||
+ | * [[Pegasus (spyware)|Pegasus]] | ||
+ | * [[Mirai (malware)|Mirai]] | ||
+ | * [[X-Agent]] | ||
+ | |group8 = 2017 | ||
+ | |list8 = | ||
+ | * [[LogicLocker]] | ||
+ | * [[BrickerBot]] | ||
+ | * [[Kirk Ransomware|Kirk]] | ||
+ | * [[Rensenware|''Rensenware'' ransomware]] | ||
+ | * [[WannaCry ransomware attack|WannaCry]] | ||
+ | * [[Xafecopy Trojan|XafeCopy]] | ||
+ | * [[Triton_(malware)|Triton]] | ||
+ | |group9 = 2018 | ||
+ | |list9 = | ||
+ | |group10 = 2019 | ||
+ | |list10 = | ||
+ | * [[Grum botnet|Grum]] | ||
+ | * [[Joanap]] | ||
+ | * [[NetTraveler]] | ||
* [[NSA ANT catalog]] | * [[NSA ANT catalog]] | ||
− | * [[ | + | * [[Chaos Computer Club#Staatstrojaner affair|R2D2]] |
− | * [[ | + | * [[Regin (malware)|Regin]] |
− | * [[ | + | * [[Tinba]] |
− | * [[ | + | * [[Titanium (malware)|Titanium]] |
− | * [[ | + | * [[Vault 7]] |
− | * [[ | + | * [[ZeroAccess]] |
− | }} | + | }} |
− | + | }}<noinclude> | |
− | [[Category:Computer security | + | {{Navbox documentation}} |
+ | [[Category:Computer security templates]] | ||
</noinclude> | </noinclude> |