• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  5 Biggest Cyberattacks of 2016
hacking, security threat, ransomware, malware
01 December 2016

5 Biggest Cyberattacks of 2016

Written by Ankita Ashesh
Ankita Ashesh
Security
Estimated reading time: 4 minutes

As the world is rapidly going digital, our privacy and security is more vulnerable than ever. Ignorance is no bliss and this is why we bring to you a roundup of some of the biggest cyberattacks of the year 2016.

  1. Ransomware attack on Hollywood Presbyterian Hospital, Los Angeles

On February 5, 2016, computers of Hollywood Presbyterian Hospital in Los Angeles were left dysfunctional by a ransomware attack demanding a ransom of 40 Bitcoins (approx. $17,000) to provide a digital decryption key. It is believed that the hackers had initially demanded a whopping $3.4 million as ransom. They used a malware which infected the hospital’s network and prevented the staff from accessing any digital records. The attack made the hospital resort to pen and paper for maintaining patients’ records till the access was regained. In order to restore normal operations the hospital authorities ultimately decided to pay the ransom and obtain the decryption key from the hackers.

  1. Bangladesh Central Bank heist

In February 2016, a group of elite hackers launched a cyberattack on Bangladesh Central Bank which has earned the title of the largest financial cybercrime in history (so far). The hackers used Bangladesh Central Bank’s SWIFT credentials to send fraudulent money transfer requests to the Federal Reserve Bank of New York asking them to transfer huge funds to various bank accounts in Sri Lanka, Philippines and some other parts of Asia. The heist was so meticulously planned that it would have gone unnoticed for a long time if it wasn’t for a printing error which was noticed by the Bangladesh bank. By the time the bank took notice of the fraudulent transactions an amount of $101 million was already stolen from them. The Bank managed to reroute $20 million to Bangladesh Bank’s New York Federal account but the remaining $81 million was already debited by the hackers.

The hackers had installed malware on the bank’s network which prevented the bank staff from getting any alerts about these suspicious transactions. Some reports even suggested that the bank didn’t have a firewall installed on its network thereby giving hackers easy access to the bank’s network and view the SWIFT credentials stored on their system.

  1. DDoS attack on PayPal, Twitter and other sites

A major cyberattack was launched on October 21, 2016 which disrupted traffic to several popular websites including Netflix, Twitter, Spotify, Airbnb, Reddit, CNN, PayPal, Pinterest and Fox News – as well as major newspapers like the Guardian, the New York Times and the Wall Street Journal. The attack disabled access to these sites for millions of users on the US east and west coasts for over 2 hours.

In a DDoS attack, hackers attempt to flood a website with so much traffic that the servers are unable to carry the load and the site crashes. In this particular attack, cyber criminals targeted Dyn, a domain name services company which provides services to most of the popular websites in the world. Although no user data was compromised in this attack, hackers managed to keep these websites down for hours. Many experts have predicted that this attack seemed like the hackers were testing the waters before launching an even bigger Internet outage. And who knows what collateral damage this outage might bring along.

  1. San Francisco public transport system hack

In November 2016, the ticketing system of San Francisco’s Municipal Transportation Agency (MUNI) was compromised by a ransomware attack which led to the shutdown of several ticketing machines of the transport agency. The computer screens of a lot of MUNI employees read “You Hacked, ALL Data Encrypted”. With no immediate solution to fix the issue, the transport agency had to allow passengers to ride for free over the busy Thanksgiving weekend. It is reported that the hackers demanded 100 Bitcoins (approx. $70,000) to release the transport agency’s computer network. The hackers also threatened the agency that they will leak 30 GB of their data which comprises employees’ information, documents, etc., if the ransom was not paid.

  1. Tesco Bank cyberattack

Tesco bank, the banking arm of the supermarket giant suspended online transactions for 24 hours in Nov 2016 due to a cyberattack which led to money being stolen from up to 20,000 customers’ accounts. 40,000 customer accounts of the bank were hacked. Reports claim that the hacker group had been targeting these customers for months before the attack with phishing scams as a buildup which eventually resulted in this hack. The bank had to refund the amount stolen from its customers’ accounts. It is estimated that the cyberattack resulted in a loss of £2.5m for the bank.

These are just a few reported cyberattacks that happened in the year 2016. Most of the cybercrimes across the world are not even reported. The ease and convenience that the Internet of Things offers us comes with a flip side that it takes away a very important aspect away which is our ‘security’. Cybercrime has no one particular target, anyone with an email address, a social media account or using the Internet for financial transactions is vulnerable. Let’s face it; hackers have proved time and time again that no business, government or individual is 100% secure. One weak link in your digital environment is all that a hacker needs to exploit your security.

Preparedness is the only solution to combat cyberattacks and this is why individuals and businesses must inculcate a security strategy that is proactive. To know more about how to enhance your digital security, have a look at the solutions offered by Seqrite.

 Previous PostEPS Enterprise Suite earns AVLab Award for real-time ransomware p...
Next Post  Seqrite Endpoint Security (EPS) version 7.1 released: All the key...
Ankita Ashesh
About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020
  • APT harbingers are using Honey Traps to attack Indian Defence.

    Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

    July 8, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.