Difference between revisions of "Template:Hacking in the 2010s"
Jump to navigation
Jump to search
(A new major vulnerability called ZombieLoad has been discovered by researchers from Graz University of Technology and Catholic University of Leuven in Intel chipsets which, if exploited, can be used to steal sensitive information directly from the processor. Almost every computer with an Intel chipsets dating back to 2011 are affected by these vulnerabilities. Visit the disclosure website for more details: https://zombieloadattack.com/) |
imported>Zazpot (rvv) |
||
| (122 intermediate revisions by 26 users not shown) | |||
| Line 1: | Line 1: | ||
{{Navbox | {{Navbox | ||
| − | | name = Hacking in the 2010s | + | |name = Hacking in the 2010s |
| − | | title = Hacking in the 2010s | + | |title = Hacking in the 2010s |
| − | | bodyclass = hlist | + | |bodyclass = hlist |
| − | | state = {{{state| | + | |state = {{{state|autocollapse}}} |
| − | | above = | + | |above = |
{{succession links | {{succession links | ||
| − | | left = | + | |left = [[Template:Hacking in the 2000s|2000s]] |
| − | | center = [[Timeline of computer security hacker history#2010s|Timeline]] | + | |center = [[Timeline of computer security hacker history#2010s|Timeline]] |
| − | | right = | + | |right = [[Template:Hacking in the 2020s|2020s]] |
}} | }} | ||
| − | | group1 = Major incidents | + | |group1 = Major incidents |
| − | | list1 = {{navbox|subgroup | + | |list1 = {{navbox|subgroup |
|group1 = 2010 | |group1 = 2010 | ||
|list1 = | |list1 = | ||
| + | * [[Operation Aurora]] | ||
* [[February 2010 Australian cyberattacks|Australian cyberattacks]] | * [[February 2010 Australian cyberattacks|Australian cyberattacks]] | ||
| − | * [[Operation | + | * [[Shadow Network|Operation ShadowNet]] |
* [[Operation Payback]] | * [[Operation Payback]] | ||
|group2 = 2011 | |group2 = 2011 | ||
| Line 32: | Line 33: | ||
* [[2012 LinkedIn hack|LinkedIn hack]] | * [[2012 LinkedIn hack|LinkedIn hack]] | ||
* [[2012–13 Stratfor email leak|Stratfor email leak]] | * [[2012–13 Stratfor email leak|Stratfor email leak]] | ||
| + | * [[Operation High Roller]] | ||
|group4 = 2013 | |group4 = 2013 | ||
|list4 = | |list4 = | ||
* [[2013 South Korea cyberattack|South Korea cyberattack]] | * [[2013 South Korea cyberattack|South Korea cyberattack]] | ||
* [[Snapchat#December 2013 hack|Snapchat hack]] | * [[Snapchat#December 2013 hack|Snapchat hack]] | ||
| + | * [[June 25 cyber terror|Cyberterrorism Attack of June 25]] | ||
* [[Yahoo! data breaches#August 2013 breach|2013 Yahoo! data breach]] | * [[Yahoo! data breaches#August 2013 breach|2013 Yahoo! data breach]] | ||
| + | * [[2013 Singapore cyberattacks|Singapore cyberattacks]] | ||
|group5 = 2014 | |group5 = 2014 | ||
|list5 = | |list5 = | ||
| Line 42: | Line 46: | ||
* [[Operation Tovar]] | * [[Operation Tovar]] | ||
* [[iCloud leaks of celebrity photos]] | * [[iCloud leaks of celebrity photos]] | ||
| + | * [[2014 JPMorgan Chase data breach]] | ||
* [[Sony Pictures hack]] | * [[Sony Pictures hack]] | ||
* [[2014 Russian hacker password theft|Russian hacker password theft]] | * [[2014 Russian hacker password theft|Russian hacker password theft]] | ||
| Line 51: | Line 56: | ||
* [[Ashley Madison data breach]] | * [[Ashley Madison data breach]] | ||
* [[VTech#2015 data breach|VTech data breach]] | * [[VTech#2015 data breach|VTech data breach]] | ||
| + | * [[December 2015 Ukraine power grid cyberattack|Ukrainian Power Grid Cyberattack]] | ||
* [[2015–2016 SWIFT banking hack|SWIFT banking hack]] | * [[2015–2016 SWIFT banking hack|SWIFT banking hack]] | ||
|group7 = 2016 | |group7 = 2016 | ||
| Line 58: | Line 64: | ||
* [[Commission on Elections data breach]] | * [[Commission on Elections data breach]] | ||
* [[Democratic National Committee cyber attacks]] | * [[Democratic National Committee cyber attacks]] | ||
| + | * [[Vietnamese airports hackings|Vietnam Airport Hacks]] | ||
* [[Democratic Congressional Campaign Committee cyber attacks|DCCC cyber attacks]] | * [[Democratic Congressional Campaign Committee cyber attacks|DCCC cyber attacks]] | ||
| + | * [[2016 Indian Banks data breach|Indian Bank data breaches]] | ||
| + | * [[Surkov leaks]] | ||
* [[2016 Dyn cyberattack|Dyn cyberattack]] | * [[2016 Dyn cyberattack|Dyn cyberattack]] | ||
* [[Russian interference in the 2016 United States elections|Russian interference in the 2016 U.S. elections]] | * [[Russian interference in the 2016 United States elections|Russian interference in the 2016 U.S. elections]] | ||
|group8 = 2017 | |group8 = 2017 | ||
|list8 = | |list8 = | ||
| + | * [[2017 Macron e-mail leaks]] | ||
* [[WannaCry ransomware attack]] | * [[WannaCry ransomware attack]] | ||
* [[2017 Westminster cyberattack|Westminster cyberattack]] | * [[2017 Westminster cyberattack|Westminster cyberattack]] | ||
* [[Petya (malware)|Petya cyberattack]] | * [[Petya (malware)|Petya cyberattack]] | ||
** [[2017 cyberattacks on Ukraine]] | ** [[2017 cyberattacks on Ukraine]] | ||
| − | * [[Equifax | + | * [[2017 Equifax data breach|Equifax data breach]] |
* [[Deloitte#E-mail hack|Deloitte breach]] | * [[Deloitte#E-mail hack|Deloitte breach]] | ||
* [[Disqus#October 2017 security breach|Disqus breach]] | * [[Disqus#October 2017 security breach|Disqus breach]] | ||
| Line 73: | Line 83: | ||
|list9 = | |list9 = | ||
* [[Trustico]] | * [[Trustico]] | ||
| − | |||
* [[2018 Atlanta cyberattack|Atlanta cyberattack]] | * [[2018 Atlanta cyberattack|Atlanta cyberattack]] | ||
| + | * [[2018 SingHealth data breach|SingHealth data breach]] | ||
| + | |group10 = 2019 | ||
| + | |list10 = | ||
| + | * [[2019 cyberattacks on Sri Lanka|Sri Lanka cyberattack]] | ||
| + | * [[2019 Baltimore ransomware attack|Baltimore ransomware attack]] | ||
| + | * [[2019 Bulgarian revenue agency hack]] | ||
}} | }} | ||
| − | | group2 = [[Hacker group|Groups]] | + | |group2 = [[Hacker group|Groups]] |
| − | | list2 = | + | |list2 = {{navbox|subgroup |
| + | |group1 = [[Hacktivism]] | ||
| + | |list1 = | ||
* [[Anonymous (group)|Anonymous]] | * [[Anonymous (group)|Anonymous]] | ||
** [[Timeline of events associated with Anonymous|associated events]] | ** [[Timeline of events associated with Anonymous|associated events]] | ||
| − | |||
| − | |||
* [[CyberBerkut]] | * [[CyberBerkut]] | ||
| − | |||
| − | |||
| − | |||
* [[Gay Nigger Association of America|GNAA]] | * [[Gay Nigger Association of America|GNAA]] | ||
* [[Goatse Security]] | * [[Goatse Security]] | ||
| − | |||
| − | |||
| − | |||
* [[Lizard Squad]] | * [[Lizard Squad]] | ||
* [[LulzRaft]] | * [[LulzRaft]] | ||
| Line 97: | Line 106: | ||
* [[2016 Dyn cyberattack#Perpetrators|New World Hackers]] | * [[2016 Dyn cyberattack#Perpetrators|New World Hackers]] | ||
* [[NullCrew]] | * [[NullCrew]] | ||
| + | * [[OurMine]] | ||
| + | * [[PayPal 14]] | ||
| + | * [[RedHack]] | ||
| + | * [[TeaMp0isoN]] | ||
| + | * [[UGNazi]] | ||
| + | |group2 = [[Advanced Persistent Threat]] | ||
| + | |list2 = | ||
| + | * [[Bureau 121]] | ||
| + | * [[Charming Kitten]] | ||
| + | * [[Cozy Bear]] | ||
| + | * [[Elfin Team]] | ||
| + | * [[Equation Group]] | ||
| + | * [[Fancy Bear]] | ||
| + | * [[Guccifer 2.0]]<!--Cybersecurity firms and intelligence agencies believe that this is a persona by Cozy Bear and Fancy Bear, not an individual. See article.--> | ||
| + | * [[Hacking Team]] | ||
| + | * [[Helix Kitten]] | ||
| + | * [[Iranian Cyber Army]] | ||
| + | * [[Lazarus Group]] ([[Lazarus Group#BlueNorOff|BlueNorOff]]) ([[Lazarus Group#AndAriel|AndAriel]]) | ||
* [[NSO Group]] | * [[NSO Group]] | ||
| − | |||
* [[PLA Unit 61398]] | * [[PLA Unit 61398]] | ||
| + | * [[PLA Unit 61486]] | ||
* [[PLATINUM (cybercrime group)|PLATINUM]] | * [[PLATINUM (cybercrime group)|PLATINUM]] | ||
* [[Pranknet]] | * [[Pranknet]] | ||
| − | * [[ | + | * [[Red Apollo]] |
* [[Rocket Kitten]] | * [[Rocket Kitten]] | ||
| − | |||
* [[Syrian Electronic Army]] | * [[Syrian Electronic Army]] | ||
| − | |||
* [[Tailored Access Operations]] | * [[Tailored Access Operations]] | ||
| − | * [[ | + | * [[The Shadow Brokers]] |
* [[Yemen Cyber Army]] | * [[Yemen Cyber Army]] | ||
| + | }} | ||
| − | | group3 = [[Hacker|Individuals]] | + | |group3 = [[Hacker|Individuals]] |
| − | | list3 = | + | |list3 = |
* [[Hacktivism#DkD%5B%7C%7C|DkD[||]] | * [[Hacktivism#DkD%5B%7C%7C|DkD[||]] | ||
* [[George Hotz]] | * [[George Hotz]] | ||
* [[Guccifer]] | * [[Guccifer]] | ||
| − | |||
* [[Jeremy Hammond]] | * [[Jeremy Hammond]] | ||
* [[Junaid Hussain]] | * [[Junaid Hussain]] | ||
| Line 123: | Line 148: | ||
* [[MLT (hacktivist)|MLT]] | * [[MLT (hacktivist)|MLT]] | ||
* [[Ryan Ackroyd]] | * [[Ryan Ackroyd]] | ||
| + | * [[Hector Monsegur|Sabu]] | ||
* [[Topiary (hacktivist)|Topiary]] | * [[Topiary (hacktivist)|Topiary]] | ||
| + | * [[Roman Seleznev|Track2]] | ||
* [[The Jester (hacktivist)|The Jester]] | * [[The Jester (hacktivist)|The Jester]] | ||
* [[weev]] | * [[weev]] | ||
| − | | group4 = Major [[Vulnerability (computing)|vulnerabilities]] <br | + | |group4 = Major [[Vulnerability (computing)|vulnerabilities]]<br>publicly [[Full disclosure (computer security)|disclosed]] |
| − | | list4 = | + | |list4 = |
* [[Evercookie]] (2010) | * [[Evercookie]] (2010) | ||
* [[iSeeYou]] (2013) | * [[iSeeYou]] (2013) | ||
| Line 152: | Line 179: | ||
* [[Spectre (security vulnerability)|Spectre]] (2018) | * [[Spectre (security vulnerability)|Spectre]] (2018) | ||
* [[EFAIL]] (2018) | * [[EFAIL]] (2018) | ||
| + | * [[Exactis]] (2018) | ||
* [[Speculative Store Bypass]] (2018) | * [[Speculative Store Bypass]] (2018) | ||
* [[Lazy FP State Restore]] (2018) | * [[Lazy FP State Restore]] (2018) | ||
* [[TLBleed]] (2018) | * [[TLBleed]] (2018) | ||
* [[SigSpoof]] (2018) | * [[SigSpoof]] (2018) | ||
| − | * [[Foreshadow ( | + | * [[Foreshadow]] (2018) |
| − | * [[ | + | * [[Microarchitectural Data Sampling]] (2019) |
| + | * [[BlueKeep]] (2019) | ||
| + | * [[Kr00k]] (2019) | ||
| − | | group5 = [[Malware]] | + | |group5 = [[Malware]] |
| − | | list5 = | + | |list5 = {{navbox|subgroup |
| + | |group1 = 2010 | ||
| + | |list1 = | ||
* [[Ransomware#Bad Rabbit|Bad Rabbit]] | * [[Ransomware#Bad Rabbit|Bad Rabbit]] | ||
| − | * [[ | + | * [[Stuxnet]] |
| + | * [[SpyEye]] | ||
| + | |group2 = 2011 | ||
| + | |list2 = | ||
| + | * [[Kelihos botnet|Kelihos]] | ||
| + | * [[Stars virus|Stars]] | ||
| + | * [[Metulji botnet]] | ||
| + | * [[Duqu]] | ||
| + | * [[Alureon]] | ||
| + | |group3 = 2012 | ||
| + | |list3 = | ||
| + | * [[Mahdi (malware)|Mahdi]] | ||
| + | * [[Carna botnet|Carna]] | ||
| + | * [[Flame (malware)|Flame]] | ||
| + | * [[FBI MoneyPak Ransomware|FBI]] | ||
| + | * [[Shamoon]] | ||
| + | * [[Red October (malware)|Red October]] | ||
| + | * [[Dexter (malware)|Dexter]] | ||
| + | |group4 = 2013 | ||
| + | |list4 = | ||
| + | * [[DarkSeoul (wiper)|DarkSeoul]] | ||
* [[CryptoLocker]] | * [[CryptoLocker]] | ||
| − | * [[ | + | |group5 = 2014 |
| − | * [[ | + | |list5 = |
| + | * [[Careto (malware)|Careto]] | ||
| + | * [[DarkHotel]] | ||
* [[Duqu 2.0]] | * [[Duqu 2.0]] | ||
* [[FinFisher]] | * [[FinFisher]] | ||
| − | * [[ | + | * [[Brambul]] |
* [[Gameover ZeuS]] | * [[Gameover ZeuS]] | ||
| − | * [[ | + | * [[Carbanak]] |
| − | * [[ | + | |group6 = 2015 |
| − | * [[ | + | |list6 = |
| + | * [[Dridex]] | ||
| + | * [[Rombertik]] | ||
| + | * [[TeslaCrypt]] | ||
| + | * [[Hidden Tear]] | ||
| + | |group7 = 2016 | ||
| + | |list7 = | ||
| + | * [[Hitler-Ransomware|Hitler]] | ||
| + | * [[Petya (malware)|Petya]] ([[NotPetya]]) | ||
| + | * [[KeRanger]] | ||
| + | * [[Jigsaw (ransomware)|Jigsaw]] | ||
| + | * [[MEMZ]] | ||
| + | * [[Pegasus (spyware)|Pegasus]] | ||
* [[Mirai (malware)|Mirai]] | * [[Mirai (malware)|Mirai]] | ||
| + | * [[X-Agent]] | ||
| + | |group8 = 2017 | ||
| + | |list8 = | ||
| + | * [[LogicLocker]] | ||
| + | * [[BrickerBot]] | ||
| + | * [[Kirk Ransomware|Kirk]] | ||
| + | * [[Rensenware|''Rensenware'' ransomware]] | ||
| + | * [[WannaCry ransomware attack|WannaCry]] | ||
| + | * [[Xafecopy Trojan|XafeCopy]] | ||
| + | * [[Triton_(malware)|Triton]] | ||
| + | |group9 = 2018 | ||
| + | |list9 = | ||
| + | |group10 = 2019 | ||
| + | |list10 = | ||
| + | * [[Grum botnet|Grum]] | ||
| + | * [[Joanap]] | ||
| + | * [[NetTraveler]] | ||
* [[NSA ANT catalog]] | * [[NSA ANT catalog]] | ||
| − | |||
| − | |||
* [[Chaos Computer Club#Staatstrojaner affair|R2D2]] | * [[Chaos Computer Club#Staatstrojaner affair|R2D2]] | ||
| − | * [[ | + | * [[Regin (malware)|Regin]] |
| − | * [[ | + | * [[Tinba]] |
| − | * [[ | + | * [[Titanium (malware)|Titanium]] |
* [[Vault 7]] | * [[Vault 7]] | ||
| − | * [[ | + | * [[ZeroAccess]] |
| − | + | }} | |
| − | |||
}}<noinclude> | }}<noinclude> | ||
| − | + | {{Navbox documentation}} | |
| − | [[Category:Computer security | + | [[Category:Computer security templates]] |
</noinclude> | </noinclude> | ||