CYBER CRIME CHRONICLES

The Attacks That
Shaped History

Forensic case studies of the world's most consequential cyberattacks — the incidents that rewrote the rules of digital warfare, toppled corporations, and shook governments.

These chronicles are documented for educational purposes — understanding how attacks succeeded is foundational to prevention.

☢️

Stuxnet

2010

Nation-State Malware

WORLD-CHANGING
2010 NSA / Unit 8200 (Israel)

The world's first known digital weapon targeting physical infrastructure.

Impact

Sabotaged ~1,000 Iranian nuclear centrifuges at Natanz facility, setting back Iran's uranium enrichment program by years

Stuxnet was a groundbreaking piece of malware — a joint operation by the NSA and Israel's Unit 8200 cybersecurity corps. It exploited four zero-days simultaneously, traveled via USB drives into the air-gapped Natanz nuclear facility, and covertly manipulated Siemens industrial control systems to spin centrifuges at destructive speeds while reporting normal operation to operators. When eventually discovered by Kaspersky Lab in 2010, it fundamentally changed the world's understanding of cyber warfare — demonstrating that code could cause kinetic, physical destruction of critical infrastructure. The 'Pandora's Box' of cyber weapons was now open.

Key Lessons

  • Air-gapping alone doesn't guarantee security
  • Nation-states are sophisticated malware authors
  • Industrial control systems (ICS/SCADA) are vulnerable to tailored attacks
  • Cyber operations can produce physical, real-world damage
🐛

Morris Worm

1988

Self-Replicating Worm

HISTORIC
1988 Robert Tappan Morris

The internet's first major worm — and its first major denial-of-service event.

Impact

Infected ~6,000 Unix machines (~10% of the early internet), caused $10M-100M in damage and launched the age of cybersecurity legislation

Robert Tappan Morris, a Cornell graduate student, released what became the internet's first widely-distributed worm in November 1988. The worm exploited vulnerabilities in sendmail, fingerd, and rsh/rexec, and a bug in the Morris Worm itself caused it to replicate much faster than intended — crashing infected systems under load. Morris claimed it was an experiment, not malicious. The U.S. government disagreed: he became the first person convicted under the Computer Fraud and Abuse Act (CFAA). The Morris Worm directly led to the creation of CERT/CC at Carnegie Mellon University — the world's first computer security incident response team.

Key Lessons

  • Vulnerability chaining amplifies attack surface dramatically
  • Unintended consequences from security experiments can be catastrophic
  • Incident response capabilities are non-negotiable
  • Legislation follows landmark security incidents
💀

WannaCry Ransomware

2017

Ransomware Worm

CRITICAL
2017 Lazarus Group (North Korea)

A ransomware pandemic that paralyzed global healthcare and critical services.

Impact

Infected 230,000+ computers in 150 countries; disrupted NHS hospitals, Telefonica, FedEx, and Deutsche Bahn; caused $4B+ in damages

WannaCry was a devastating combination of ransomware and worm capabilities. It used EternalBlue — an NSA-developed exploit for Windows SMB (leaked by Shadow Brokers) — to self-propagate across networks without user interaction. North Korea's Lazarus Group repurposed this leaked NSA exploit to build a global cyberweapon. The UK's National Health Service was among the worst affected — hospitals turned away patients, cancelled surgeries, and diverted ambulances because critical systems were encrypted. Microsoft had released a patch (MS17-010) 59 days before WannaCry struck — but millions of unpatched systems remained vulnerable. Marcus Hutchins, a 22-year-old security researcher, accidentally stopped the attack by registering a hardcoded kill-switch domain.

Key Lessons

  • Patch management is critical national security infrastructure
  • Leaked government cyber weapons create second-order catastrophic risks
  • Self-propagating ransomware requires worm-like containment protocols
  • Healthcare systems require dedicated cyber resilience investment
☀️

SolarWinds SUNBURST

2020

Supply Chain Attack

CRITICAL
2020 SVR (Cozy Bear) - Russian Intelligence

The most sophisticated supply chain attack in history — compromising the US government itself.

Impact

Compromised 18,000+ organizations including US Treasury, DHS, State Department, NIH, and Microsoft via trojanized SolarWinds updates

The SUNBURST attack, attributed to Russia's SVR intelligence service, was a masterpiece of patience and precision. Attackers infiltrated SolarWinds' build pipeline and inserted malicious code (SUNBURST backdoor) into Orion software updates. Organizations that installed the updates — including the most sensitive US government agencies — were unknowingly backdoored for months. The attackers used careful techniques: a 2-week dormancy period, mimicking legitimate SolarWinds network traffic, and targeting only high-value victims. The breach was discovered not by government agencies, but by FireEye (now Mandiant) while investigating their own breach. It fundamentally reshaped how the industry thinks about software supply chain security and was a catalyst for SBOM (Software Bill of Materials) requirements.

Key Lessons

  • Software supply chains are critical attack vectors
  • Trusted vendor updates can be weaponized
  • Defenders must assume breach in privileged environments
  • SBOM and build pipeline integrity are now table stakes
🎭

LulzSec / Anonymous Attacks

2011

Hacktivism / SQL Injection

HIGH
2011 LulzSec Hacktivist Group

A 50-day global hacking spree that embarrassed governments, corporations and defense agencies.

Impact

Breached Sony, CIA, FBI, HBGary Federal, Stratfor, NATO, and dozens of others; exposed millions of records and humiliated intelligence establishment

LulzSec (Lulz Security) launched a brazen, 50-day campaign of highly publicized cyberattacks from May-June 2011 under the motto 'Laughing at your security since 2011.' The group targeted for 'lulz' (amusement), often using surprisingly simple techniques like SQL injection. Their breach of Sony PlayStation Network alone exposed 77 million user accounts. They hacked the CIA website, released internal FBI affiliate data, breached UK police servers, and attacked defense contractor HBGary Federal after its CEO threatened to publicly expose Anonymous members. LulzSec demonstrated that even hardened targets had embarrassingly basic security flaws — and that hacktivism had become a potent form of digital protest.

Key Lessons

  • SQL injection remains devastatingly effective despite being decades old
  • Public embarrassment from breaches can be as damaging as financial losses
  • Hacktivist operations can influence public discourse significantly
  • Security through obscurity is not a viable strategy
🎯

Target Data Breach

2013

POS Malware / Third-Party Intrusion

HIGH
2013 Eastern European Cybercriminals

The breach that changed retail security and created the modern third-party risk discipline.

Impact

40M credit/debit card records stolen; 70M customer records exposed; $292M in breach costs; CEO and CIO resigned

The Target breach became a landmark in cybersecurity not for its sophistication, but for what it revealed about enterprise attack surface. Attackers first compromised Fazio Mechanical — a small HVAC contractor with network access to Target's corporate environment for electronic billing and project management. From there, they installed BlackPOS malware on 1,800+ point-of-sale terminals during the holiday shopping season. Target's security team had actually been alerted by their FireEye system twice before the breach escalated — but the alerts were dismissed. The breach exposed the catastrophic security gap of third-party vendor access and created the foundational business case for Third-Party Risk Management (TPRM) as a discipline.

Key Lessons

  • Third-party vendor access is a primary breach vector
  • POS systems require dedicated network segmentation
  • Alert fatigue and analyst dismissal of alerts is a systemic risk
  • Contracting firms must meet the same security standards as direct employees
📬

Yahoo Data Breaches

2013–2016

Data Breach

HISTORIC
2013–2016 Nation-State Actors + Criminal Hackers

The largest data breach in human history — 3 billion accounts compromised.

Impact

All 3 billion Yahoo user accounts stolen; reduced Verizon's acquisition price by $350M; criminal charges filed against Russian FSB officers

Yahoo suffered two separate, massive data breaches that were disclosed years after they occurred. The 2013 breach, involving all 3 billion accounts, remained unknown until 2017 — during Verizon's acquisition negotiations. The 2014 breach affected 500 million accounts and implicated Russian state-sponsored hackers from the FSB. Yahoo's use of MD5 password hashing (cryptographically broken since 2005) made the stolen password data easily crackable. Perhaps most damaging was the culture of undisclosure: Yahoo's leadership had knowledge of the 2014 breach but failed to report it, triggering SEC charges. The case led to landmark CISO accountability discussions and reshaped US disclosure obligations for public companies.

Key Lessons

  • Outdated cryptographic standards (MD5) create catastrophic breach amplification
  • Breach disclosure timelines are a legal and ethical obligation
  • CISO accountability and Board cybersecurity oversight are essential
  • Mergers and acquisitions require rigorous cybersecurity due diligence
💳

Equifax Data Breach

2017

Web Application Exploit

CRITICAL
2017 Chinese PLA Unit 54938

The breach that exposed the financial identities of 147 million Americans.

Impact

147M Americans' SSNs, DOBs, addresses and financial data stolen; $700M FTC settlement; CISO and CEO resigned; linked to Chinese military intelligence

The Equifax breach remains one of the most consequential identity theft events in US history. Attackers exploited a known, unpatched vulnerability in Apache Struts (CVE-2017-5638) — a patch had been available for two months before the breach. Attackers had access to Equifax systems for 76 days before detection, exfiltrating data of 147 million Americans. The company's response was widely criticized: its breach notification website was itself flagged as a phishing site, and Equifax staff tweeted a wrong URL for the notification site. US DOJ later indicted four members of Chinese military intelligence unit PLA 54938, framing the breach as part of a broader intelligence collection campaign targeting American financial data.

Key Lessons

  • Vulnerability management and patching speed are mission-critical
  • Breach response communication planning must precede incidents
  • Credit bureaus holding sensitive PII face extraordinary threat actor interest
  • Nation-states target financial data for intelligence and leverage purposes
🔥

NotPetya

2017

Destructive Wiper / Ransomware

WORLD-CHANGING
2017 Sandworm (Russian GRU)

A Russian cyber weapon disguised as ransomware that became the most destructive cyberattack in history.

Impact

$10 billion in damages; paralyzed Maersk, Merck, FedEx, Mondelez, and Ukrainian critical infrastructure; considered an act of war

NotPetya was not ransomware — it was a destructive wiper masquerading as ransomware, deployed by Russia's GRU military intelligence unit Sandworm against Ukraine. It spread via a trojanized update to Ukrainian accounting software M.E.Doc and used the same EternalBlue exploit as WannaCry — combined with credential-stealing tools — to propagate with devastating speed across corporate networks globally. Shipping giant Maersk lost all 45,000 PCs and had to reinstall an entire global IT infrastructure in 10 days. Merck's manufacturing was disrupted so severely that US pharmaceutical supply chains were affected. NotPetya demonstrated that cyber weapons, once released, have catastrophic and uncontrollable collateral damage. Several US courts and NATO formally designated NotPetya as a 'wartime act.'

Key Lessons

  • Software update supply chains are a critical national security surface
  • Destructive malware has no geographic containment once deployed
  • Privileged credential exposure enables catastrophic lateral movement
  • Cyber insurance policies must specifically address nation-state cyberattacks

Colonial Pipeline

2021

Ransomware / Critical Infrastructure

CRITICAL
2021 DarkSide Ransomware Group

The attack that shut down 45% of the US East Coast's fuel supply for six days.

Impact

$4.4M ransom paid; fuel shortages across 11 US states; Biden declares state of emergency; FBI recovers $2.3M in Bitcoin

The DarkSide ransomware attack on Colonial Pipeline became the defining critical infrastructure cyberattack of the decade. Using a single compromised VPN credential (with no MFA) found on the dark web, attackers gained entry and deployed ransomware against Colonial's billing and IT systems. In response to uncertainty about whether operational technology systems were also affected, Colonial proactively shut down 5,500 miles of pipeline — immediately creating fuel shortages across the US Southeast. Panic buying, gas station queues, and airline schedule disruptions followed within hours. Colonial ultimately paid a $4.4M ransom in Bitcoin. The U.S. DOJ later recovered $2.3M of the Bitcoin using a law enforcement-controlled private key — a landmark crypto seizure. The attack directly triggered Biden's Executive Order on cybersecurity and mandatory OT/ICS security reporting.

Key Lessons

  • MFA on all internet-facing services is non-negotiable
  • Operational technology (OT) and IT network separation is critical
  • Proactive shutdown decision-making requires pre-planned protocols
  • Paying ransoms may enable DOJ recovery but also incentivizes future attacks
🧟

Mirai Botnet

2016

IoT Botnet / DDoS

WORLD-CHANGING
2016 Paras Jha, Josiah White, Dalton Norman

The largest DDoS attack in history powered by internet-connected cameras and routers.

Impact

Took down DNS provider Dyn, disrupting AWS, Twitter, Reddit, Netflix, and Spotify across the US East Coast for hours

Mirai was revolutionary because it didn't target servers or PCs — it targeted poorly secured Internet of Things (IoT) devices like IP cameras and home routers. By constantly scanning the internet for devices using factory-default usernames and passwords, it rapidly amassed an army of over 600,000 infected devices. The creators originally built Mirai to dominate the lucrative Minecraft server hosting market by DDoS-ing competitors. However, on October 21, 2016, Mirai was weaponized against Dyn, a major DNS provider. The resulting 1.2 Terabits per second (Tbps) flood essentially broke the internet for the East Coast of the United States. The source code was later released on Hack Forums, leading to countless variants that still plague the internet today.

Key Lessons

  • Default passwords on IoT devices are a systemic internet vulnerability
  • Botnet scale has outpaced traditional DDoS mitigation capacities
  • DNS infrastructure is a massive single point of failure
  • Amateur hackers can cause nation-state level disruptions
💣

Log4Shell

2021

Zero-Day Vulnerability

CRITICAL
2021 Various (Nation-states and Cybercriminals)

A catastrophic vulnerability in a ubiquitous, open-source logging tool that broke the internet.

Impact

Exposed hundreds of millions of devices and servers globally to trivial remote code execution; described by CISA director as 'the most serious vulnerability I have seen in my decades-long career'

Log4Shell (CVE-2021-44228) was a zero-day vulnerability in Apache Log4j, a Java-based logging utility used in everything from enterprise software and cloud services to Minecraft servers. The flaw allowed an attacker to execute arbitrary code simply by tricking the application into logging a specifically crafted text string. Because of how deeply embedded Log4j was in software supply chains, finding and patching it was a nightmare. Within hours of its public disclosure, attackers were actively scanning the internet and exploiting vulnerable systems to deploy ransomware, cryptominers, and establishing backdoors for long-term espionage.

Key Lessons

  • Open-source dependencies create hidden, massive attack surfaces (the supply chain problem)
  • A vulnerability's triviality to exploit drastically accelerates mass compromise
  • Software Bill of Materials (SBOM) is crucial for rapid response
  • Logging mechanisms must sanitize inputs rigorously
🎬

Sony Pictures Hack

2014

Wiper Malware / Data Exfiltration

HIGH
2014 Guardians of Peace (Lazarus Group / North Korea)

A devastating retaliatory cyberattack against a major Hollywood studio over a comedy film.

Impact

Erased Sony's internal infrastructure, exposed 100 terabytes of sensitive data (unreleased films, executive emails, employee PII), and forced the cancellation of the film 'The Interview's' theatrical release

In late 2014, Sony Pictures employees logged into their computers to find a glowing red skeleton on their screens and a warning from a group calling themselves the 'Guardians of Peace.' The attack was a state-sponsored retaliation by North Korea for Sony's upcoming comedy film 'The Interview,' which depicted the assassination of Kim Jong-un. The attackers used a variant of Shamoon wiper malware to destroy Sony's servers, forcing employees to use whiteboards and fax machines for weeks. Simultaneously, they leaked massive amounts of unreleased movies, embarrassing executive emails, and sensitive employee data online. It was a watershed moment demonstrating how nation-states could use cyberattacks to enforce censorship globally.

Key Lessons

  • Cyberattacks can be used for direct geopolitical coercion and censorship
  • Network segregation is vital to stop widespread wiper propagation
  • Unencrypted internal communications can cause massive reputational damage if leaked
  • Incident response plans must account for complete infrastructure destruction
👁️

Pegasus Spyware

2016–Present

Zero-Click Mobile Spyware

WORLD-CHANGING
2016–Present NSO Group (Sold to Nation-States)

Military-grade mobile spyware that silently turns smartphones into ultimate surveillance devices.

Impact

Used by oppressive regimes to target journalists, human rights activists, and politicians globally; triggered lawsuits by Apple and WhatsApp against NSO Group

Pegasus, developed by Israeli cyber-arms firm NSO Group, represents the pinnacle of mobile exploitation. Unlike traditional malware requiring a victim to click a link, modern Pegasus relies on 'zero-click' exploits—often delivered via a missed WhatsApp call or a silent iMessage containing a malicious image file (like the FORCEDENTRY exploit). Once installed, it grants operators total control over an iOS or Android device: turning on the microphone and camera, reading encrypted encrypted messages (Signal, WhatsApp) before they are encrypted, and tracking location down to the meter. Although NSO claims it is only sold to governments to fight terrorism, investigations by Amnesty International and Citizen Lab proved widespread abuse against civil society.

Key Lessons

  • Zero-click exploits make user awareness training irrelevant against top-tier threats
  • End-to-end encryption is useless if the endpoint (device) is compromised
  • The commercial spyware market provides nation-state capabilities to anyone with a budget
  • Mobile devices are the ultimate surveillance vector
💔

Ashley Madison Breach

2015

Data Breach / Extortion

HISTORIC
2015 Impact Team

A hack that exposed the affairs and absolute lack of security of a controversial dating site.

Impact

Leaked records of 32 million users, exposing widespread cheating; resulted in suicides, divorces, and a massive class-action lawsuit; revealed the company failed to delete data even when users paid for 'full deletion'

Ashley Madison, a dating website marketed to people seeking extramarital affairs, was breached by a group calling itself the 'Impact Team.' The hackers demanded the site shut down, citing the company's fraudulent practices—specifically, that their $19 'Full Delete' feature didn't actually delete user data, and that thousands of female profiles were actually bots created by the company. When Avid Life Media refused to close the site, the hackers released 9.7 gigabytes of user data onto the dark web, including names, passwords, addresses, and sexual fantasies. The fallout was immense, leading to intense public shaming, divorces, and tragic suicides. It remains one of the most socially impactful breaches in history.

Key Lessons

  • Data deletion policies must be verified, not just marketed
  • Sensitive personal data is a prime target for hacktivists and extortionists
  • Storing easily crackable password hashes (bcrypt was used poorly here) accelerates damage
  • Businesses built on privacy must have exceptional security architectures
🏦

Capital One Breach

2019

Cloud Misconfiguration / SSRF

HIGH
2019 Paige Thompson

A former AWS engineer exploited a misconfigured cloud firewall to steal data from 106 million bank customers.

Impact

Exposed personal information of 100M US and 6M Canadian customers, including 140,000 Social Security numbers; resulted in an $80 million fine by the OCC

The Capital One breach was a stark lesson in cloud security. Paige Thompson, a former Amazon Web Services software engineer, exploited a misconfigured Web Application Firewall (WAF) to execute a Server-Side Request Forgery (SSRF) attack. This allowed her to trick the server into returning temporary AWS IAM credentials, which she then used to list and download the contents of over 700 Amazon S3 storage buckets containing Capital One's sensitive customer credit card application data. She later boasted about the hack on GitHub and Slack, which led to her swift arrest by the FBI.

Key Lessons

  • Cloud misconfigurations are currently more dangerous than complex zero-day exploits
  • SSRF is a critical cloud vulnerability vector that must be mitigated
  • Overly permissive IAM roles can turn a small misconfiguration into a colossal breach
  • Insider threat knowledge (knowing how AWS works) is highly dangerous
🔑

RSA SecurID Hack

2011

Spear-Phishing / Supply Chain

WORLD-CHANGING
2011 Nation-State Actors (Suspected China)

The theft of the master seeds for the world's most ubiquitous two-factor authentication tokens.

Impact

Forced RSA to replace 40 million SecurID hardware tokens globally; attackers used the stolen data to immediately breach defense contractor Lockheed Martin

In early 2011, attackers compromised RSA Security, the company behind the ubiquitous SecurID hardware tokens (the key fobs generating random numbers for VPN logins). The attack began with a simple spear-phishing email containing a malicious Excel spreadsheet (exploiting an Adobe Flash zero-day) sent to low-level RSA employees. Once inside, attackers navigated the network to steal the highly guarded 'seed values' for RSA's tokens. By combining a seed value with a user's PIN, attackers could generate valid 2FA codes on demand. Soon after the breach, attackers used these exact stolen seeds to bypass VPN security and penetrate U.S. defense contractor Lockheed Martin's network.

Key Lessons

  • Security vendors themselves are prime targets for supply chain attacks
  • Hardware tokens are not invincible if the backend cryptographic seeds are compromised
  • Phishing low-level employees is a viable gateway to crown-jewel data
  • Zero-day vulnerabilities in common software (Flash/Office) are standard initial access vectors
🕵️

OPM Data Breach

2015

Data Breach / Espionage

WORLD-CHANGING
2015 Chinese State-Sponsored Hackers

The catastrophic theft of sensitive background check data for millions of US federal employees.

Impact

Theft of 21.5 million records including 5.6 million fingerprints, social security numbers, and SF-86 background investigation forms detailing drug use, financial distress, and foreign contacts

The breach of the US Office of Personnel Management (OPM) is considered one of the most damaging espionage operations in US history. Attackers, widely attributed to China, compromised OPM's incredibly outdated legacy systems (some running COBOL and lacking basic encryption or MFA). They stole essentially the entire database of SF-86 forms—the 127-page documents required for secret and top-secret security clearances. This data provided a hostile intelligence service with an unparalleled roadmap for targeting, blackmailing, and recruiting American intelligence officers, military personnel, and diplomats. The breach forced the US government to re-evaluate how it managed and secured classified personnel data.

Key Lessons

  • Technical debt and legacy systems are critical national security liabilities
  • Data is not just a financial asset; it is a counterintelligence weapon
  • Lack of internal network segmentation allows attackers to roam freely for months
  • Encryption at rest is necessary for highly sensitive databases
🥩

JBS Meatpacking Ransomware

2021

Ransomware / Critical Infrastructure

HIGH
2021 REvil (Russian-linked Cybercriminals)

A ransomware attack that disrupted a quarter of US beef production.

Impact

Halted JBS operations across North America and Australia; caused wholesale meat prices to spike; JBS paid an $11 million ransom in Bitcoin

Occurring just weeks after the Colonial Pipeline attack, the REvil ransomware group targeted JBS S.A., the world's largest meat processing company. The attackers gained access and encrypted IT systems critical to managing slaughterhouses and processing plants in the US, Canada, and Australia. Fearing prolonged disruption to the global food supply chain and soaring consumer prices, JBS opted to negotiate with the attackers and paid an $11 million ransom in Bitcoin. The incident underscored the fragile, highly consolidated nature of modern food supply chains and how deeply reliant physical manufacturing is on vulnerable IT systems.

Key Lessons

  • Ransomware against food supply chains creates immense pressure to pay quickly
  • Highly consolidated industries are exceptionally vulnerable to single points of cyber failure
  • Physical production stops immediately when the IT systems monitoring them are encrypted
  • The profitability of ransomware continues to drive larger, bolder attacks
🔗

Kaseya VSA Ransomware

2021

Supply Chain / Ransomware

CRITICAL
2021 REvil

A massive, coordinated ransomware attack executed through managed service providers (MSPs).

Impact

Compromised 50+ MSPs and over 1,500 of their downstream small-to-medium business clients globally; REvil demanded a $70 million universal decryptor ransom

During the US Fourth of July weekend in 2021, the REvil ransomware gang executed a highly sophisticated supply chain attack targeting Kaseya VSA, a remote monitoring and management tool used by IT service providers (MSPs). By exploiting a zero-day vulnerability in the VSA software, the attackers pushed an automated, malicious update that bypassed antivirus and deployed ransomware simultaneously to thousands of endpoints worldwide across hundreds of different companies. Victims ranged from a Swedish supermarket chain (unable to open its cash registers) to schools and local dental offices. It demonstrated a terrifying evolution: combining nation-state level zero-day supply chain exploitation with criminal ransomware monetization.

Key Lessons

  • MSPs are extremely high-value targets due to their privileged 'many-to-one' access
  • Holiday weekends are a preferred timing for major cyberattacks to exploit reduced staffing
  • Software widely trusted with 'SYSTEM' privileges must face extreme scrutiny
  • Ransomware groups are acquiring or developing advanced zero-day capabilities