BR +55 11 3069 3925 | USA +1 469 620 7643

The Biggest Cyberattacks of Recent Years

by | Sep 9, 2021 | BLOG | 0 comments

We all know that cyber vulnerabilities are not a current issue. However, with the evolution of technology and virtualization growing in all areas of society, cybercrime becomes more and more frequent, creating a critical problem that deserves a lot of attention from the digital security industry. 

One of the biggest challenges is to keep up with the evolution of these crimes, because as technology advances, crimes become increasingly strategic and sophisticated, requiring even more technological advances and security efforts, in addition to repeating a cycle that is difficult to prevent.

In recent years, especially during the coronavirus pandemic, in which most companies are adopting new work alternatives, migrating to digital environments, the role of criminals has been strengthened. 

According to data from FortiGuard Labs, the year 2020 had 41 billion attempts of cyberattacks in Latin America. The good news is that while these attempts are taking place, the cybersecurity industry has also worked hard and strengthened itself to ensure as much security as possible for digital media and to weaken this cycle of attacks.

To get a sense of this problem’s scale and the lessons we can pass on to those who want to strengthen the security of their information, we have listed the 5 biggest cyberattacks in recent years. Check it out below.

Solar Winds: The Biggest and Most Sophisticated Attack in History

In 2020, Solar Winds, an information infrastructure company, suffered what can be considered, according to Microsoft’s President Brad Smith, as “the biggest and most sophisticated attack the world has ever seen”. This is because several tactics and techniques of cyber invasion and espionage were employed. 

Hackers have inserted malicious software into Solar Winds’ monitoring software update that has been sent to up to 18,000 customers. These include Microsoft companies and the US Departments of Energy, Justice, and Nuclear Safety. But it was FireEye, one of Solar Winds’ client companies, the first victim to identify the attack. 

In the Microsoft attack alone, according to its president, at least a thousand engineers took part. Ongoing investigations indicate that the operation is very complex and surprising even for specialists, as it combines very advanced and stealthy techniques, which have bypassed the radar of the most experienced security specialists. This made everyone apprehensive about a critical vulnerability in the technology infrastructure.

Colossal DDoS Attack Against Dyn

Dyn, an American company of DNS (Domain Name System) services, has suffered a DDoS attack, which, in general, is a type of attack that intensifies data traffic and overloads a certain server, making it unavailable to users.

This attack caused a system crash for all the company’s customers in 2016, who had virtual newspapers and magazines from the United States and other large companies among them: Amazon, Netflix, PayPal, Spotify, Tumblr, Twitter, GitHub, Xbox Live, and PlayStation Network. 

It was an event known as “The American Internet Blackout”, one of the biggest DDoS attacks in recent times.

ASUS Automatic Updates

One of the largest laptop manufacturers in the world, ASUS, was the target of a hacker attack in 2018, with an automatic software update that infected nearly 1 million users worldwide. 

The attack targeted 600 computers, but the malware spread and reached more users. As the attackers used the company’s legitimate security certificate during the action, it was almost impossible to raise suspicion.

This type of crime can increase users’ distrust and lead them to avoid machine upgrades, which can raise the level of vulnerabilities and cause even bigger problems. 

STJ: Great Cyberattack in Brazil

Brazil is one of the countries with the highest number of users connected to the Internet, and according to the Internet Security Threat Report, released in 2019, the country occupies third place in the ranking of cyberattack attempts, fourth in bot attacks, and seventh in crypto-jacking.

As might be expected, government agencies are not left out of vulnerability for cybercrime. In Brazil, the biggest data attack involved the STJ (Supreme Court of Justice), a target of the ransomware action, which invaded more than 1,200 servers of the institution and destroyed the backups on the machines. 

On the scale of this attack, Marta Schuh, Director of Cyber Insurance at the international broker Marsh, stated that: “It was like the STJ databases could be placed inside an incinerator.” As expected, the criminals offered to ransom the information in exchange for a sum of money.

 

A Leak of Sensitive Data from Over 100 million Americans

Paige A. Thompson, a former Amazon employee, was responsible for hacking the database of Capital One, a US financial institution, compromising the data of more than 100 million Americans and 6 million Canadians by obtaining access to personal data of credit card requests. 

Although the affected information does not contain the users’ credit card numbers, as Capital One claimed, the damage will cost around $150 million to boost the institution’s digital security.

Other Relevant Data on Cybersecurity in 2020

  • 60% of users say they are poorly informed about cybersecurity. (ESET Survey).
  • Lack of backup is the main cause of loss of money for 3 out of 4 users (ESET Survey).
  • Of the top causes for data leaks, 16% are exploiting third-party software vulnerabilities, 19% are cloud-server misconfiguration procedures and login data breaches, and 14% involve phishing activities. (IBM)
  • 52% of data leaks were due to malicious attacks and 23% to human error. (IBM)
  • Only 61% of users believe that some of their passwords are secure. (ESET Survey)
  • The most used password in 2020 was “123456”, accounting for two and a half million users. (Nordpass)
  • 40% of consumers worldwide use between one and three financial applications, but only half have security software installed on their devices. (ESET Survey)
  • Reports of cyberattacks grew 400% during the pandemic. (FBI)
  • DDoS attacks increased 151% in the first half of 2020. (Neustar)

What Can We Expect from the Future?

The trend for the future is to have more devices and users connected to the Internet around the world, which could further increase the number of cyberattacks and attempts. On the other hand, it has been increasingly difficult and outdated to live in a non-digital world even to perform simple everyday tasks. 

Therefore, more than ever, digital security must be a concern for companies and governments, which must continue to invest heavily in the prevention and control of threats, and for users, who must always keep up-to-date on the best ways to protect their data and what legal protection they can receive in cases of attack.

If you are interested in the subject, we also invite you to read the next article. After All, How to Act in Case of Data Invasion and Theft?

 

____________________

 

References to mentioned research.

 

https://www.bhs.com.br/2019/07/22/grandes-crimes-ciberneticos/

https://noticias.r7.com/distrito-federal/jornal-de-brasilia/mp-no-df-abre-inquerito-para-apurar-vazamento-de-dados-de-clientes-do-banco-pan-04092019

https://olhardigital.com.br/2021/02/15/noticias/solarwinds-ataque-foi-o-maior-e-mais-sofisticado-que-o-mundo-ja-viu/

https://veja.abril.com.br/blog/radar-economico/brasil-sofre-seu-maior-ataque-hacker-da-historia/

https://olhardigital.com.br/2019/07/31/seguranca/hacker-vazou-dados-sensiveis-de-mais-de-100-milhoes-de-americanos/

https://canaltech.com.br/video/top-tech/7-ataques-hacker-que-entraram-para-a-historia-top-tech-10404/

https://olhardigital.com.br/2020/12/31/retrospectiva-2020/retrospectiva-2020-relembre-os-piores-ataques-ciberneticos/

https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Security_Report_2020_BR-1.pdf

https://thehill.com/policy/cybersecurity/493198-fbi-sees-spike-in-cyber-crime-reports-during-coronavirus-pandemic

 

Are you enjoying this post? Join our Newsletter!

7 + 12 =

We will send newsletters and promotional emails. By entering my data, I agree to the Privacy Policy and the Terms of Use.

How Do Pass-the-hash Attacks Work?

Despite being something old, from the 1990s, few people know how pass-the-hash attacks work. Keep reading the article to find out! Where Did the Name “Pass-the-hash” Come From? Pass-the-hash attacks occur when an attacker steals a user’s credential with a hash...

Windows Print Spooler Failure: Why Should I Upgrade Immediately?

Updating the operating system is a common activity. However, in July 2021, one of Microsoft’s Windows updates gained prominence.   Let’s talk about it: Windows print spooler failure: why should I update immediately? What is Print Spooler Failure? The print spooler is...

The Importance of Integrating Security into DevOps

Technology has undergone constant change, as innovations that emerge today can be surpassed tomorrow, and so on. This is a reality that can be contemplated in the IT sector or corporate software developers. As the market becomes increasingly competitive as a result of...

What is the importance of the Gartner Magic Quadrant?

All of us at some point have heard of digital transformation. This phenomenon affects companies of all verticals and sizes and has been gaining attention in the market. Digital transformation increasingly requires organizational leaders to adapt their organizational...
Copy link
Powered by Social Snap