• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  5 Cyber Attacks that Shook the World
World's major cyber attacks
14 June 2017

5 Cyber Attacks that Shook the World

Written by Seqrite
Seqrite
Uncategorized
Estimated reading time: 3 minutes

Cyber-crime, with sophisticated methods, has become a multi billion dollar industry. Cyber-crime has evolved to data breaches and online identity theft using highly technical methods such as network eavesdropping. The definition of most expensive attack or which one is most damaging varies according to the criteria you choose. Some attacks on government agencies may be difficult to represent in monitory terms, but their impact on the security of the country is huge. Let’s have a look at some of the most outrageous attacks in the history of cyber attacks.

  1. The Logic Bomb attack:This one is considered as one of the most devastating cyber attacks in the history. It was so huge that it is not possible to put a dollar value on this. This one actually seems to be straight out of some movie. As the story goes, during the cold war in 1982, America (CIA) found out that Russia (KGB) was stealing technology from America for years. America decided to embed a logic bomb in a piece of code and fed it to Russians. The code was used to control the pipeline that transported natural gas from Siberia. When the logic bomb got activated the Siberian gas pipeline exploded. The explosion was so powerful that it could be seen through space and was estimated to have one fifth of the power of the bomb dropped on Hiroshima at three kilotons. It is a great example of how huge a devastation cyber-attack can cause in real world.
  2. Epsilon Data Breach: Epsilon is one of the world’s largest email marketing service provider. It handles more than 40 billion emails and more than 2200 brands globally. The hackers stole an undefined number of details (such as emails and other data) pertaining to more than 50 of their clients. The affected clients include some of the top banks and retail giants with a massive amount of data related to their own clientele. All these people were then the target of phishing attacks. Epsilon faced years of repercussions and more than 225 million USD in cost. The total cost of the breach was projected to be over 4 Billion USD.
  3. The Veteran Administration Breach: In 2006, the Veteran’s Affair administration had given permission to an analyst to copy its data onto his laptop and allowed him to work from home. The data contained millions of social security numbers, their ratings and other personal information, and was not encrypted. The laptop was stolen. It was later discovered that data of about 26.5 million veterans, active military personals and their family members was stolen. The impact of the theft was estimated to be between 100 million to 500 million dollars.
  4. Hannaford Bros.: Hannaford is a supermarket chain with its stores located mainly on the east coast of the United States of America. A security breach exposed more than 4 million credit card numbers and led to 1800 cases of fraud. The breach affected more than 200 stores and was on for about 3 months before it was discovered. The total of the breach was estimated to be over 250 million Dollars.
  5. Sony Play Station: In 2011, hackers broke into Sony’s data storage and had access to over 100 million records of customers who used PlayStation online service. The data included personal details and credit card information of the users. The total cost to Sony for this breach was over 171 million USD.

Most cyber attacks leverage some inherent weaknesses of the system. One hole in the firewall is all that is needed for a hacker to intrude into organization’s network and have free access to data. The organizations on their part are many times oblivious to the fact that the security software, the operating systems, the antivirus and the firewalls all have weaknesses. Once past these security doors, the intruder, be it human or inorganic (a malware, a logic bomb or any piece of code) have free access to data unless data is further protected. If the data is protected and controlled to decide who can access it, how is it to be accessed and from where, the level of protection is much higher, even if the intruder is inside your system.

Seqrite’s data loss prevention (DLP) solution ensures that only the right person can have access to the data from the right location and right device at the right time. DLP not only protects static data but also data in motion. Seqrite Endpoint Security ensures that intruder even if they get inside secure network cannot do anything with secured data.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website. 

 Previous PostCertLock Trojan can disable your antivirus software
Next Post  Addressing the weakest link in cyber security: Human Error
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Gorgon APT fractures India’s Industrial Backbone

    Gorgon APT targeting MSME sector in India

    August 10, 2020
  • Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

    May 21, 2020
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.