{"id":9415,"date":"2022-02-25T08:06:02","date_gmt":"2022-02-25T11:06:02","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9415"},"modified":"2022-02-25T08:06:02","modified_gmt":"2022-02-25T11:06:02","slug":"incidentes-ciberneticos-significativos-a-nivel-mundial","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9415","title":{"rendered":"Incidentes cibern\u00e9ticos significativos a nivel mundial"},"content":{"rendered":"<p>Es muy interesante apreciar los que se realizaron sobre Ucrania. Quiz\u00e1 acciones previas al conflicto en desarrollo. Se presenta un interesante registro de incidentes cibern\u00e9ticos desde el a\u00f1o 2006. Tambi\u00e9n se muestra un resumen de los incidentes de durante el \u00faltimo a\u00f1o. El registro de incidentes se puede descargar desde el art\u00edculo. Se enfoca en los ataques cibern\u00e9ticos a agencias gubernamentales, empresas de defensa y alta tecnolog\u00eda, o delitos econ\u00f3micos con p\u00e9rdidas de m\u00e1s de un mill\u00f3n de d\u00f3lares.<\/p>\n<hr \/>\n<p><strong>January 2022.\u00a0<\/strong>A Belarusian hacktivist group accessed the networks of state-owned Belarusian Railway. The group encrypted the majority of the Railway\u2019s servers and destroyed data held on a backup server, possibly to complicate Russian troop movements throughout the country.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>A Chinese hacking group breached several German pharma and tech firms. According to the German government, the hack into the networks of service providers and companies was primarily an attempt to steal intellectual property.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>Hackers shut down internet traffic to and from North Korea twice in two weeks from what researchers say was likely a series of DDoS attacks. The second attack came just after North Korea\u2019s 5<sup>th<\/sup>\u00a0missile test of the month.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>Hackers breached the Canadian Foreign Ministry, hampering some of the Ministry\u2019s internet-connected services. The hack came a day after the government issued a warning to bolster network security in anticipation of Russia-based cyberattacks on critical infrastructure.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>A series of DDoS attacks targeted a high-stakes Minecraft tournament and ended up impacting Andorra Telecom, the country&#8217;s only internet service provider. The attack disrupted 4G and internet services for customers.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>The Informatic Directorate of the Greek Parliament identified an attempt to hack into 60 parliamentary email accounts. In response, authorities temporarily shut down the mailing system in the legislature.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>An Australian spokesman accused WeChat of taking down Prime Minister Scott Morrison\u2019s account and redirecting users to a website that provides information for Chinese expatriates. The Government claims that they first encountered problems posting to the Prime Minister\u2019s account in mid-2021.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>Hackers breached systems belonging to the International Committee of the Red Cross, gaining access to data on more than 500,000 people and disrupting their services around the world.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>A cyberattack targeted the Ukrainian government, hitting 90 websites and deploying malicious software masquerading as ransomware to damage dozens of computers in government agencies.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>Hackers attacked several Israeli media outlets, including Maariv and the Jerusalem Post, posting threatening messages on their websites. One message stated &#8220;we are close to you where you do not think about it&#8221; in English and Hebrew.<\/p>\n<p><strong>January 2022.\u00a0<\/strong>A DRPK-affiliated group targeted multiple Russian diplomats with malware. The diplomats received an email disguised as a New Year greetings screensaver but which, after being opened, installed a remote access trojan.<\/p>\n<p><strong>December 2021<\/strong>\u00a0. A cyberattack on the Belgium Ministry of Defence forced part of its computer network, including the ministry\u2019s mail system, to shut down for several days. Hackers exploited the Log4j vulnerability to compromise the network.<\/p>\n<p><strong>December 2021.<\/strong>\u00a0Hackers targeted multiple Southeast Asian governments over the past 9 months using custom malware linked to Chinese state-sponsored groups. Many of the nations targeted are currently engaged in disputes with China over territorial claims in the South China Sea.<\/p>\n<p><strong>December 2021<\/strong>\u00a0<strong>.<\/strong>\u00a0A breach of Prime Minster Modi\u2019s Twitter allowed hackers to Tweet from the account that India officially adopted bitcoin as legal tender. The Tweet also included a scam link promising a bitcoin giveaway.<\/p>\n<p><strong>December 2021.<\/strong>\u00a0A Bloomberg investigation publicly linked an intrusion into Australia\u2019s telecommunications systems in 2012 to malicious code embedded in a software update from Huawei.<\/p>\n<p><strong>December 2021.\u00a0<\/strong>Cybersecurity firms found government-linked hackers from China, Iran, and North Korea attempting to use the Log4j vulnerability to gain access to computer networks. Following the announcement of Log4j, researchers already found over 600,000 attempts to exploit the vulnerability.<\/p>\n<p><strong>December 2021.\u00a0<\/strong>Chinese hackers breached four more U.S. defense and technology firms in December, in addition to one organization in November. The hackers obtained passwords to gain access to the organizations\u2019 systems and looked to intercept sensitive communications.<\/p>\n<p><strong>December 2021.<\/strong>\u00a0A Russian group took responsibility for a ransomware attack on Australian utility company CS energy. This announcement came after Australian media outlets blamed Chinese government hackers for the attack.<\/p>\n<p><strong>November 2021<\/strong>\u00a0. A Russian-speaking group targeted the personal information of around 3,500 individuals, including government officials, journalists, and human rights activists. The group obtained access to private email accounts and financial details, and operated malware on Android and Windows devices.<\/p>\n<p><strong>November 2021.<\/strong>\u00a0Hackers gained access to the social security and driver\u2019s license numbers of employees after compromising a U.S. defense contractor.<\/p>\n<p><strong>November 2021.\u00a0<\/strong>Chinese officials claim a foreign intelligence agency hacked into several airlines in China and stole passenger information. The officials stated the hacks are connected due to the use of a custom trojan in all the attacks.<\/p>\n<p><strong>November 2021<\/strong>\u00a0. After CISA publicly shared details on a vulnerability, Chinese hackers targeted nine companies and 370 servers between September and October using the same vulnerability.<\/p>\n<p><strong>November 2021.<\/strong>\u00a0A vendor that handles data for the UK Labour Party was subject to a cyberattack, affecting the data of its members and affiliates.<\/p>\n<p><strong>November 2021.<\/strong>\u00a0Hackers gained access to the FBI\u2019s Law Enforcement Enterprise Portal\u2014a system used to communicate to state and local officials\u2014and sent a warning of a cyberattack in an email claiming to be from the Department of Homeland Security (DHS).<\/p>\n<p><strong>November 2021.<\/strong>\u00a0The stock trading platform, Robinhood, disclosed a social engineering cyberattack that allowed a hacker to gain access to the personal information of around 7 million customers. The data included names, email addresses, and for some, data of birth, and zip codes. Following the breach, the hacker requested payment, presumably not to disclose the stolen data.<\/p>\n<p><strong>October 2021.\u00a0<\/strong><span data-contrast=\"none\">A Chinese-linked hacking group gained access to calling records and text messages from telecommunication carriers across the globe, according to a report from CrowdStrike. The report outlines the group began\u00a0its<\/span>\u00a0cyberattacks in 2016 and infiltrated at least 13 telecommunications networks.<\/p>\n<p><span data-contrast=\"none\"><strong>October 2021.<\/strong><\/span><span data-contrast=\"none\">\u00a0A cyberattack\u00a0targeted the government-issued electronic cards Iranians use to buy subsidized fuel and altered the text of electronic billboards to display anti-regime messages against the Supreme Leader Ayatollah Ali Khamenei.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>October 2021.<\/strong><\/span><span data-contrast=\"none\">\u00a0A group with ties to Iran attempted to hack over 250 Office 365 accounts. All the targeted accounts were either U.S. and Israeli defense technology companies, had a focus on Persian Gulf ports of entry, or maritime transportation companies with a presence in the Middle East.<\/span><br \/>\n<span data-contrast=\"none\">\u00a0\u00a0<\/span><br \/>\n<span data-contrast=\"auto\"><strong>October 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Brazilian hackers carried out a cyberattack on the National Malware Center website belonging to Indonesia\u2019s State Cyber and Password Agency. The hackers edited the contents of the webpage and indicated that the cyberattack was retribution for an Indonesian hack on the Brazilian state website.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>October 2021<\/strong><\/span><span data-contrast=\"none\">. Hackers leaked data and photos from the Israeli Defense Ministry after gaining access to 165 servers and 254 websites, overall compiling around 11 terabytes of data.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>October 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">An American company announced that the Russian Foreign Intelligence Service (SVR) launched a campaign targeting resellers and other technology service providers that customize, deploy and manage cloud services.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Chinese state-linked hackers targeted Afghan telecom provider Roshan and stole gigabytes of data from their corporate mail server over the past year.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The EU formally blamed Russia for its involvement in the &#8216;Ghostwriter\u2019 cybercampaign, which targeted the elections and political systems of several member states. Since 2017, Russian operators hacked the social media accounts of government officials and news websites, with the goal of creating distrust in U.S. and NATO forces.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Hackers obtained 15 TB of data from 8,000 organizations working with Israel-based company,\u00a0Voicenter\u00a0and offered the data online for $1.5 million. Some experts have stipulated the hackers have ties to Iran, but no link has been confirmed.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The Lithuanian Defense Ministry found hidden features in popular 5G smartphone models manufactured in China, according to its state-run cybersecurity body. The module embedded in the phones detects and censors 449 keywords or groups of keywords that are counter to the message of the Chinese government.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">Two hours after the vote opened for Hungary\u2019s opposition primary elections, the polling systems in electoral districts nationwide fell victim to a cyberattack. The actor responsible is still unknown, but the cyberattack led to the government extending voting by two days.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The U.S. Department of Justice sentenced Ghaleb\u00a0Alaumary\u00a0to more than 11 years in prison for aiding North Korean cybercriminals in money laundering. His assistance included ATM cash-out operations, cyber-enabled bank heists, and business email compromise (BEC) schemes. These attacks targeted banks, professional soccer clubs, and other unnamed companies in the U.S. and U.K.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0A cyberattack against the United Nations occurred in April 2021, targeting users within the UN network to further long-term intelligence gathering. The hacker was able to access their networks through stolen user credentials purchased on the dark web.\u00a0\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The Norwegian Government stated a series of cyberattacks against private and state IT infrastructure came from bad actors sponsored by and operating from China. Their investigation of the hacks claims the actors attempted to capture classified information relating to Norway\u2019s national defense and security intelligence.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Researchers and cybersecurity experts revealed a mobile espionage campaign against the Kurdish ethnic group. Hackers targeted individuals on Facebook, persuading them to download apps that contain Android backdoors utilized for espionage.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>September 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0In April 2020, Chinese bots swarmed the networks of the Australian government days after Australia called for an independent international probe into the origins of the coronavirus. These bots looked for potential vulnerabilities on the network to exploit in future cyberattacks.\u00a0\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>August 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0A cyberattack on the government of Belarus compromised dozens of police and interior ministry databases.\u00a0The hack claims to be a part of an attempt to overthrow President Alexander Lukashenko\u2019s regime.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>August 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0A hacking group targeted a high-profile Iranian prison, uncovering documents, videos, and images\u00a0that\u00a0displayed the\u00a0violent treatment of\u00a0its\u00a0prisoners. The group claims to be hacktivists demanding the release of political prisoners.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>August 2021<\/strong><\/span><span data-contrast=\"auto\">. A cyber-espionage group linked to one of Russia\u2019s intelligence forces targeted the Slovak government from February to July\u00a02021 through spear-fishing attempts.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>August 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0Russia targeted and blocked content on \u201csmart voting\u201d app created by Kremlin critic Alexei Navalny and his allies intended to organize voting against the Kremlin in next month&#8217;s parliamentary elections.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>August 2021<\/strong><\/span><span data-contrast=\"auto\">. Hacks initially attributed to Iran in 2019 and 2020 were found to be conducted by Chinese operatives. The\u00a0cyberattack\u00a0broke into computers across Israel\u2019s government and tech companies.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>August 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0A cyberattack\u00a0on the\u00a0Covid-19 vaccine-scheduling website for the Italian region of Lazio\u00a0forced\u00a0the website to temporarily shut down.\u00a0New vaccination appointments were unable to be scheduled for several days after the attack.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>August 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0Various Chinese cyber-espionage groups are responsible for the hacks of at least five major Southeast Asian telecommunication providers beginning in 2017. The attacks were carried out by three different hacking groups and are seemingly unlinked despite all groups having a connection to Chinese espionage efforts.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Estonia stated a Tallinn-based hacker downloaded 286,438 ID photos from government database, exposing a vulnerability in a\u00a0platform\u00a0managed by their Information System Authority (RIA).\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0A cyberattack\u00a0gained access to 1 terabyte of data from the Saudi Arabian Oil Company through a zero-day exploitation.\u00a0Hackers\u00a0are offering to delete the data in exchange for $50\u00a0million\u00a0in cryptocurrency.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0A widespread APT operation was discovered against users in Southeast Asia, believed to be spearheaded by Chinese entities.\u00a0Researchers found\u00a0a total of\u00a0100 victims in Myanmar and 1,400 in the Philippines, including many government entities.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The United States, the European Union, NATO and other world powers released joint statements\u00a0condemning\u00a0the Chinese government for a series\u00a0of malicious cyber activities. They attributed responsibility to\u00a0China for the Microsoft Exchange hack\u00a0from\u00a0early 2021 and\u00a0the\u00a0compromise\u00a0of\u00a0more than 100,000 servers worldwide.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Transnet Port Terminals (TPT), South Africa\u2019s state-run ports operator and freight rail monopoly, had its rail services disrupted after a hack by unknown actors. Transnet reportedly declared it an act \u201cforce majeure.\u201d<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Several countries used Pegasus, surveillance software created by NSO Group that targets iPhone and Android operating systems,\u00a0on devices belonging to activists, politicians, and journalists.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA)\u00a0released a statement exposing a spearfishing campaign by\u00a0Chinese state-sponsored hackers between 2011 and 2013. The campaign targeted oil and natural gas pipeline companies in the United States.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021<\/strong><strong>.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Iran used Facebook accounts to pose as recruiters, journalists, and NGO affiliates,\u00a0targeting U.S. military personnel. The hackers sent malware-infected files or tricked targets into submitting sensitive credentials to phishing sites.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The Russian\u00a0defense\u00a0ministry claimed\u00a0it\u00a0was hit with a DDoS attack\u00a0that caused its website to\u00a0shut down, stating the attack came from outside the Russian Federation.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">Norway attributed a March\u00a02021\u00a0cyberattack on parliament&#8217;s e-mail system\u00a0to China.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">Iran\u2019s transport and urbanization ministry\u00a0was the victim of a\u00a0cyber attack\u00a0that impacted display boards at stations\u00a0throughout\u00a0the country. The attack\u00a0caused delays and cancellations of hundreds of trains across Iran.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.<\/strong><strong>\u00a0<\/strong><\/span><span data-contrast=\"auto\">Russian hackers exploited a\u00a0vulnerability in Kaseya\u2019s<\/span>\u00a0<span data-contrast=\"auto\">virtual systems\/server administrator\u00a0(VSA) software allowing them\u00a0to deploy a ransomware attack on the network. The hack affected\u00a0around\u00a01,500 small and midsized businesses, with attackers asking for $70 million\u00a0in payment.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>July 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">The Ukranian Ministry of Defense claimed\u00a0its naval forces\u2019 website\u00a0was targeted by\u00a0Russian hackers who published fake reports about the international Sea Breeze-2021 military drills.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Russia claimed that Vladimir Putin\u2019s annual phone-in session was targeted by DDoS attacks.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">A Chinese-speaking hacking group spearheaded an ongoing espionage effort against the Afghan government through phishing emails. Hackers posed as the Office of the President of Afghanistan and targeted the Afghan National Security Council.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">The Iranian government launched a widescale disinformation campaign, targeting WhatsApp groups, Telegram channels and messaging apps used by Israeli activists. The campaign aimed to advance political unrest and distrust in Israel.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Chinese actors targeted organizations, including Verizon and the Metropolitan Water District of Southern California using a platform used by numerous government agencies and companies for secure remote access to their networks.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Hackers linked to Russia\u2019s Foreign Intelligence Service installed malicious software on a Microsoft system that allowed hackers to gain access to accounts and contact information. The majority of the customers targeted were U.S. based, working for IT companies or the government.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0The U.S. and British governments announced the Russian GRU\u00a0attempted a\u00a0series of brute force access against hundreds of\u00a0government\u00a0and private sector targets worldwide from 2019 to 2021,\u00a0targeting\u00a0organizations using Microsoft Office 365\u00ae cloud services.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0United States Naval Institute (USNI) claimed the tracking data of two NATO ships, the U.K. Royal Navy\u2019s HMS Defender and the Royal Netherlands Navy\u2019s HNLMS Evertsen, was falsified off the coast of a Russian controlled naval base in the Black Sea. The faked data positioned the two warships at the entrance of a major Russian naval base.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0A cyberattack reportedly from Russia\u00a0compromised the email inboxes\u00a0of more\u00a0than 30 prominent Polish officials, ministers and deputies of political parties,\u00a0and some journalists.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">Sol\u00a0Oriens, a small government contractor that works for the Department of Energy on nuclear weapons issues, was attacked by the Russia-linked hacking group\u00a0REvil.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0A spreadsheet was leaked containing classified personal details of the\u00a01,182\u00a0United Kingdom\u2019s Special Forces soldiers\u00a0on WhatsApp.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0A ransomware attack targeted\u00a0iConstituent, a newsletter service used by U.S. lawmakers to contact constituents.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>June 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0Hackers working on behalf of Russian intelligence services are believed to have hacked Netherlands police internal network in 2017. The attack occurred during the country\u2019s\u00a0investigation of the Malaysia Airlines Flight 17 (MH17) that was shot down in 2014.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>May 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0LineStar\u00a0Integrity Services, a pipeline-focused business, was hit by a ransomware attack the same time as the Colonial Pipeline, with 70 gigabytes of its internal files being stolen.<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>May 2021.<\/strong><\/span><span data-contrast=\"auto\">\u00a0A North Korean cyberattack on South Korea&#8217;s state-run Korea Atomic Energy Research Institute (KAERI) occurred through a vulnerability in a vendor\u2019s VPN.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>May 2021.\u00a0<\/strong><\/span><span data-contrast=\"none\">The world\u2019s largest meat processing company, Brazilian-based JBS, was the victim of a ransomware attack. The attack shut down facilities in the United States, Canada and Australia. The attack was attributed to the Russian speaking cybercrime group,\u00a0REvil<\/span>.<\/p>\n<p><span data-contrast=\"none\"><strong>May 2021.<\/strong><\/span><span data-contrast=\"none\">\u00a0On May 24th, hackers gained access to Fujitsu\u2019s systems and stole files belonging to multiple Japanese government entities. So far four government agencies have been impacted.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>May 2021.<\/strong><\/span><span data-contrast=\"none\">\u00a0Cybersecurity researchers identified a North Korean hacking group to be responsible for<\/span>\u00a0<span data-contrast=\"none\">a cyber espionage campaign, targeting high profile South Korean government officials, utilizing a phishing methodology. The group\u2019s targets were based in South Korea and included: the Korea Internet and Security Agency (KISA), ROK Ministry of Foreign Affairs, Ambassador of the Embassy of Sri Lanka to the State (in ROK), International Atomic Energy Agency Nuclear Security Officer, Deputy Consul General at Korean Consulate General in Hong Kong, Seoul National University, and Daishin Securities.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>May 2021<\/strong><\/span><span data-contrast=\"none\">. On May 14, Ireland\u2019s national health service, the Health Service Executive (HSE), was the victim of a ransomware attack. Upon discovering the attack, government authorities shut down the HSE system. The attackers utilized the Conti ransomware-as-a-service (RaaS), which is reported to be operated by a Russia-based cybercrime group.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>May 2021<\/strong><\/span><span data-contrast=\"none\">. The FBI and the Australian Cyber Security Centre warned of an ongoing\u00a0Avaddon<\/span>\u00a0ransomware campaign targeting multiple sectors in various countries. The reported targeted countries are Australia, Belgium, Brazil, Canada, China, Costa Rica, Czech Republic, France, Germany, India, Indonesia, Italy, Jordan, Peru, Poland, Portugal, Spain, UAE, UK, US. The targeted industries include: academia, airlines, construction, energy, equipment, financial, freight, government, health, it, law enforcement, manufacturing, marketing, retail, pharmaceutical.<\/p>\n<p><span data-contrast=\"none\"><strong>May 2021<\/strong><\/span><span data-contrast=\"none\">. On May 6, the Colonial Pipeline, the largest fuel pipeline in the United States, was the target of a ransomware attack. The energy company shut down the pipeline and later paid a $5 million ransom. The attack is attributed to\u00a0DarkSide<\/span>, a Russian speaking hacking group.<\/p>\n<p><span data-contrast=\"none\"><strong>May 2021<\/strong><\/span><span data-contrast=\"none\">. On May 4th and 5th, the Norwegian energy technology company\u00a0Volue<\/span>\u00a0was the victim of a ransomware attack. The attack resulted in the shutdown of water and water treatment facilities in 200 municipalities, affecting approximately 85% of the Norwegian population.<\/p>\n<p><span data-contrast=\"none\"><strong>May 2021<\/strong><\/span><span data-contrast=\"none\">. A large DDoS attack disabled the ISP used by Belgium\u2019s government,\u00a0impacting more than 200 organizations\u00a0<\/span>causing the cancellation of\u00a0multiple Parliamentary meetings<\/p>\n<p><span data-contrast=\"none\"><strong>May 2021<\/strong><\/span><span data-contrast=\"none\">. A Chinese hacking group compromised a Russian defense contractor involved in designing nuclear submarines for the Russian navy.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">.\u00a0A hacking group\u00a0<\/span>compromised\u00a0the social media accounts of Polish officials and used them to\u00a0disseminate\u00a0narratives critical of NATO. German authorities have reported that the same group has also attempted to compromise members of the Bundestag and state parliament.<\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">. Hackers linked to the Chinese military conducted an espionage campaign targeting military and government organizations in Southeast Asia beginning in 2019<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">. Malware triggered an outage for airline reservation systems that caused the networks of 20 low-cost airlines around the world to crash.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">. Russian hackers targeted Ukrainian government officials with\u00a0spearphishing<\/span>\u00a0attempts\u00a0as tensions between the two nations rose during early 2021.<\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">.\u00a0Hackers linked to Palestinian intelligence conducted a cyber espionage campaign\u00a0<\/span>compromising approximately 800\u00a0Palestinian reporters, activists, and dissidents both in Palestine and more broadly across the Middle East.<\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">.\u00a0Two state-backed hacking groups\u2014one of which works on behalf of the Chinese government\u2014exploited vulnerabilities in a VPN service to target\u00a0<\/span>organizations across the U.S. and Europe with a particular focus on U.S. defense contractors.<\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">. MI5 warned that over 10,000 UK professional shave been targeted by hostile states over the past five years as part of\u00a0spearphishing<\/span>\u00a0and social engineering campaigns on LinkedIn.<\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">.\u00a0Swedish officials disclosed that t<\/span>he Swedish Sports\u00a0Confederation was hacked by Russian military intelligence in late 2017 and early 2018 in response to accusations of Russian government-sponsored doping of Russian athletes.<\/p>\n<p><span data-contrast=\"none\"><strong>April 2021.<\/strong><\/span><span data-contrast=\"none\">\u00a0New York City&#8217;s Metropolitan Transportation Authority (MTA) was hacked by Chinese-backed actors but were unable to gain access to user data or information systems.\u00a0\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">. French security researchers found that the number of attacks hitting critical French businesses increased fourfold in 2020 during the COVID-19 pandemic.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">. The European Commission announced that the EC and multiple other EU organizations were hit by a major cyberattack\u00a0by unknow<\/span>n hackers.<\/p>\n<p><span data-contrast=\"none\"><strong>April 2021<\/strong><\/span><span data-contrast=\"none\">. Chinese hackers launched a months-long cyber espionage campaign\u00a0during the second half of 2020\u00a0<\/span>targeting government agencies in Vietnam\u00a0with the intent of gathering\u00a0political intelligence<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">.\u00a0The North Korean hacking group responsible for a set of attacks on\u00a0<\/span>cybersecurity researchers in January 2021 launched a new campaign\u00a0targeting infosec professionals\u00a0using fake social media profiles and a fake website for a non-existent\u00a0security\u00a0service\u00a0company\u00a0target.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. Suspected Iranian hackers targeted medical researchers in Israel and the U.S.\u00a0in an attempt to steal the credentials of geneticists, neurologists, and oncologists in the two countries<\/span>.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. Suspected Russian hackers stole thousands of emails after breaching the email server of the U.S. State Department<\/span>.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. Suspected state hackers targeted the Australian media company Nine Entertainment with a ransomware variant, disrupting live broadcasts and print production systems.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">.\u00a0Suspected Russian hackers\u00a0<\/span>attempted to gain access to the personal email accounts of German parliamentarians in the run-up to Germany\u2019s national elections.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. U.S. Cyber Command confirmed that it was assisting Columbia in responding to election interference and influence operations.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. The head of U.S. Cyber Command testified that\u00a0the organization had conducted more than two dozen operations to confront foreign threats ahead of the 2020 U.S. elections, including eleven forward hunt operations in nine different countries.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. A group of Chinese hackers used Facebook\u00a0to send malicious links to\u00a0<\/span>Uyghur\u00a0activists, journalists, and dissidents\u00a0located\u00a0abroad.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. The Indian Computer Emergency Response Team found evidence of Chinese\u00a0hackers conducting a cyber espionage campaign against the Indian transportation sector<\/span>.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. Polish security services announced that\u00a0suspected\u00a0<\/span>Russian hackers\u00a0briefly\u00a0took over the websites of Poland\u2019s National Atomic Energy Agency and Health Ministry to spread false alerts of a nonexistent radioactive threat.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021.\u00a0<\/strong><\/span><span data-contrast=\"none\">Both\u00a0Russian and Chinese intelligence services targeted the European Medicines Agency in 2020<\/span>\u00a0in unrelated campaigns, stealing documents relating to COVID-19 vaccines and medicines.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">.\u00a0Ukraine\u2019s<\/span>\u00a0State Security Service announced it had prevented a large-scale attack by Russian FSB hackers attempting to gain access to classified government data.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021.<\/strong><\/span><span data-contrast=\"none\">\u00a0Lithuania\u2019s State Security Department declared that Russian hackers had targeted top Lithuanian officials in 2020 and used the country\u2019s IT infrastructure to carry out attacks against organizations involved in developing a C<\/span>OVID-19 vaccine.<\/p>\n<p><span data-contrast=\"none\"><strong>March 2021.\u00a0<\/strong><\/span><span data-contrast=\"none\">Suspected Iranian hackers\u00a0targeted government agencies, academia, and the tourism industry in Azerbaijan, Bahrain, Israel, Saudi Arabia, and the UAE as part of a cyber espionage campaign.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>March 2021<\/strong><\/span><span data-contrast=\"none\">. Chinese government hackers targeted Microsoft\u2019s enterprise email software to steal data from\u00a0over 30,000<\/span>\u00a0organizations\u00a0around the world,\u00a0including government agencies, legislative bodies,\u00a0law firms, defense contractors, infectious disease researchers, and policy think tanks.<\/p>\n<p><span data-contrast=\"auto\"><strong>March 2021<\/strong><\/span><span data-contrast=\"auto\">. Suspected Chinese hackers\u00a0<\/span>targeted electricity grid operators in India in an apparent attempt to lay the groundwork for\u00a0possible\u00a0future attacks.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0<\/span>A Portuguese-speaking\u00a0cyber criminal\u00a0group\u00a0accessed computer systems at\u00a0a division of Oxford University researching COVID-19\u00a0vaccines,\u00a0and are suspected to be selling the data\u00a0they collected\u00a0to nation states.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0<\/span>North Korean hackers\u00a0targeted defense firms in more than a dozen countries in an espionage campaign starting in early 2020.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">.<\/span>\u00a0<span data-contrast=\"auto\">Hackers associated with the Chinese military conducted a surveillance campaign against Tibetans both in China and abroad<\/span>.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">. Russian hackers compromised a Ukrainian government file-sharing system and attempted to disseminate malicious documents\u00a0<\/span>that would install malware on computers that downloaded the planted files.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">. Hackers linked to the Vietnamese government conducted a nearly thre<\/span>e-year\u00a0cyber espionage campaign against human rights advocates in the\u00a0country by using spyware to infiltrate individuals\u2019 systems, spy on their activity, and exfiltrate data.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0<\/span>Ukrainian officials reported that a\u00a0multi-day distributed denial-of-service attack\u00a0against the website of the Security Service of Ukraine\u00a0was part of Russia\u2019s hybrid warfare\u00a0operations in the country.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">. The US Department of Justice indicted three North Korean hackers for conspiring to steal and extort more than $1.3 billion in cash and cryptocurrencies<\/span>.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">. Iranian hackers\u00a0<\/span>took control of a server in Amsterdam and used it as a\u00a0command and control\u00a0center for attacks against political opponents in the Netherlands, Germany,\u00a0Sweden, and India.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">North Korean hackers attempted to break into the computer systems of pharmaceutical company\u00a0<\/span>Pfizer\u00a0to gain information about vaccines and treatments for the\u00a0COVID-19.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">. Suspected Iranian hackers targeted government agencies in the UAE<\/span>\u00a0as part of a cyber espionage campaign related to the normalizations of relations with Israel.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">. The French national cybersecurity agency announced that a four-year campaign against French IT providers was the work of a Russian hacking group<\/span>.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">. Suspected Indian hackers targeted over 150 individuals in Pakistan, Kazakhstan, and India using mobile malware, including those wi<\/span>th links to the Pakistan Atomic Energy Commission, the Pakistan Air Force, and election officials in Kashmir.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021<\/strong><\/span><span data-contrast=\"auto\">.\u00a0<\/span>Ten members of a\u00a0cybercriminal gang were\u00a0arrested after a campaign where they tricked telecom companies into assigning celebrities\u2019 phone numbers to new devices, stealing more than $100 million worth of cryptocurrencies.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">Unknown hackers attempted to raise levels of sodium hydroxide in the water supply of\u00a0<\/span>Oldsmar, Florida\u00a0by a factor of 100 by exploiting a remote access system.<\/p>\n<p><span data-contrast=\"auto\"><strong>February 2021.\u00a0<\/strong><\/span><span data-contrast=\"auto\">Two Iranian hacking groups conducted espionage campaigns against Iranian dissidents in\u00a0<\/span>sixteen countries in the Middle East, Europe, South Asia, and North America.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.csis.org<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Es muy interesante apreciar los que se realizaron sobre Ucrania. Quiz\u00e1 acciones previas al conflicto en desarrollo. Se presenta un interesante registro de incidentes cibern\u00e9ticos&hellip; <\/p>\n","protected":false},"author":1,"featured_media":9416,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9415"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9415"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9415\/revisions"}],"predecessor-version":[{"id":9417,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9415\/revisions\/9417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/9416"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}