List of cyberattacks

From HandWiki
Short description: none

A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.

Indiscriminate attacks

These attacks are wide-ranging, global and do not seem to discriminate among governments and companies.

  • Operation Shady RAT
  • World of Hell
  • Red October, discovered in 2012, was reportedly operating worldwide for up to five years prior to discovery, transmitting information ranging from diplomatic secrets to personal information, including from mobile devices.[1]
  • WannaCry ransomware attack on 12 May 2017 affected hundreds of thousands of computers in more than 150 countries.[2]
  • 2017 Petya cyberattack

Destructive attacks

These attacks relate to inflicting damage on specific organizations.

Cyberwarfare

These are politically motivated destructive attacks aimed at sabotage and espionage.

  • 2007 cyberattacks on Estonia, wide-ranging attacks targeting government and commercial institutions
  • 2008 Cyberattacks during the Russo-Georgian War, a series of cyberattacks that swamped and disabled websites of numerous South Ossetian, Georgian, Russian, and Azerbaijani organizations. The attacks were initiated three weeks before the shooting war began in what is regarded as "the first case in the history of a coordinated cyberspace domain attack synchronized with major combat actions in the other warfighting domains (consisting of Land, Air, Sea, and Space)."
  • 2009 DDoS attacks against South Korea, a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States.
  • July 2009 cyberattacks, against South Korea and the United States
  • 2009 Shadow Network, a China-based computer espionage operation that stole classified documents and emails from the Indian government, the office of the Dalai Lama, and other high-level government networks.
  • 2010 Australian cyberattacks, a series of denial-of-service attacks conducted by the Anonymous online community against the Australian government in response to proposed web censorship regulations.
  • 2010 cyberattacks on Burma, related to the 2010 Myanmar general election.
  • 2010 cyberattacks on Myanmar, distributed denial-of-service attacks (DDoS) ahead of the 2010 Myanmar general election, which is widely viewed as a sham election.
  • 2010 Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States
  • 2010 Japan–South Korea cyberwarfare
  • 2011 Canadian government hackings, hackers using IP addresses from China infiltrated 3 departments within the government and exfiltrated classified data. The attacks resulted in the government cutting off internet access in the departments affected and various responses from both the Canadian government and the Chinese government.
  • 2012 Operation Ababil, a series of cyber attacks starting in 2012, targeting various American financial institutions and carried out by a group calling itself the Cyber fighters of Izz Ad-Din Al Qassam.
  • 2013 Singapore cyberattacks, attack by Anonymous "in response to web censorship regulations in the country, specifically on news outlets"
  • 2013 South Korea cyberattack, two major sets of cyberattacks on South Korean targets attributed to elements within North Korea.
  • Office of Personnel Management data breach
  • 2015 Ukraine power grid hack, took place during an ongoing conflict in Ukraine and is attributed to a Russian advanced persistent threat group known as "Sandworm". It is the first publicly acknowledged successful cyberattack on a power grid.
  • 2016 Kyiv cyberattack, which caused another power outage
  • Democratic National Committee cyber attacks, against the Democratic National Committee by the Russia n-sponsored cyber-espionage groups Cozy Bear and Fancy Bear, possibly to assist Donald Trump's 2016 presidential campaign.[7]
  • 2017 cyberattacks on Ukraine, A series of powerful cyberattacks using the Petya malware began on 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. Similar infections were reported in France, Germany, Italy, Poland, Russia, United Kingdom, the United States and Australia.
  • 2019 cyberattacks on Sri Lanka, The 2019 cyberattacks on Sri Lanka were a series of powerful cyberattacks on at least 10 Sri Lankan domestic websites with the public domains of .lk and .com.
  • 2020 cyberattacks on Sri Lanka, a series of cyberattacks on at least 5 Sri Lankan national websites with the top-level domains of .gov and .com.
  • 2021 Cyberattacks on Sri Lanka, series of cyberattacks on at least 10 Sri Lankan national websites including Google.lk domain
  • #OpIsrael, a broad "anti-Israel" attack
  • 2022 Ukraine cyberattacks, undertaken during the prelude to the 2022 Russian invasion of Ukraine
  • 2022 cyberattacks on Romania, which occurred after a visit of Romanian officials to Kyiv where more support against Russia was promised while the invasion was taking place
  • 2023 Cyberattack on Australia, under which the IRGC launched a cyberattack against an Australian organization to obtain data from an extortion and double extortion ransomware operation. Australia expressed deep concern over IRGC's interference, including online harassment of Australian citizens.[8]

Government espionage

These attacks relate to stealing information from/about government organizations:

  • 2008 cyberattack on United States, cyber espionage targeting U.S. military computers
  • Cyber attack during the Paris G20 Summit, targeting G20-related documents including financial information
  • GhostNet
  • Moonlight Maze
  • Operation Newscaster, cyber espionage covert operation allegedly conducted by Iran
  • Operation Cleaver, cyberwarfare covert operation allegedly conducted by Iran
  • Shadow Network, attacks on India by China
  • Titan Rain, targeting defense contractors in the United States
  • Google – in 2009, the Chinese hackers breached Google's corporate servers gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government.[9]
  • Gauss trojan, discovered in 2012 is a state-sponsored computer espionage operation that uses state-of-the-art software to extract a wealth of sensitive data from thousands of machines located mostly in the Middle East.[10]
  • Office of Personnel Management data breach – December 2014 breach of data on U.S. government employees. The attack originated in China .[11]
  • A six-month-long cyberattack on the German parliament for which the Sofacy Group is suspected took place in December 2014.[12]
  • Vestige is also suspected to be behind a spearphishing attack in August 2016 on members of the Bundestag and multiple political parties such as Linken-faction leader Sahra Wagenknecht, Junge Union and the CDU of Saarland.[13][14][15][16] Authorities fear that sensitive information could be gathered by hackers to later manipulate the public ahead of elections such as the 2017 German federal election.[13]
  • Between 2019 and 2020, Israel was the target of a cyberattack believed to be originating in China and be part of a broader campaign against other countries, including Iran, Saudi Arabia, Ukraine, Uzbekistan and Thailand.[17]
  • Between July 7, 2021, and July 14, 2021, the Indian government email infrastructure was compromised thrice with hackers accessing emails of several top officials including that of Ajay Prakash Sawhney, the secretary to the Ministry of Electronics and Information Technology[18]

Corporate espionage

These attacks relate to stealing data of corporations related to proprietary methods or emerging products/services.

Stolen e-mail addresses and login credentials

These attacks relate to stealing login information for specific web resources.

  • 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally causing network disruption
  • Vestige (online store) – in 2010, a band of anonymous hackers has rooted the servers of the site and leaked half a gigabyte's worth of its private data.[19]
  • IEEE – in September 2012, it exposed user names, plaintext passwords, and website activity for almost 100,000 of its members.[20]
  • LivingSocial – in 2014, the company suffered a security breach that has exposed names, e-mail addresses and password data for up to 50 million of its users.[21]
  • Adobe – in 2013, hackers obtained access to Adobe's networks and stole user information and downloaded the source code for some of Adobe programs.[22] It attacked 150 million customers.[22]
  • RockYou – in 2009, the company experienced a data breach resulting in the exposure of over 32 million user accounts.
  • Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user accounts.[23] Again in January 2013[24] and in January 2014[25]
  • World Health Organization – in March 2020, hackers leaked information on login credentials from the staff members at WHO.[26] In response to cyberattacks, they stated that “Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the COVID-19 pandemic.”[27]

Stolen credit card and financial data

  • 2017 Equifax data breach – In 2017, Equifax Inc. announced that a cyber-security breach occurred between May and mid July of that year. Cyber criminals had accessed approximately 145.5 million U.S. Equifax consumers' personal data, including their full names, Social Security numbers, credit card information, birth dates, addresses, and, in some cases, driver's license numbers.[28]
  • 2016 Indian Banks data breach – It was estimated 3.2 million debit cards were compromised. Major Indian banks- SBI, HDFC Bank, ICICI, YES Bank and Axis Bank were among the worst hit.[29]
  • 2014 JPMorgan Chase data breach, allegedly conducted by a group of Russian hackers
  • Goodwill Industries – in September 2014, the company suffered from a credit card data breach that affected the charitable retailer's stores in at least 21 states. Another two retailers were affected.[30][31]
  • Home Depot – in September 2014, the cybercriminals that compromised Home Depot's network and installed malware on the home-supply company's point-of-sale systems likely stole information on 56 million payment cards.[32]
  • StarDust – in 2013, the botnet compromised 20,000 cards in active campaign hitting US merchants.[33]
  • Target – in 2013, approximately 40 million credit and debit card accounts were impacted in a credit card breach.[34][35][36] According to another estimate, it compromised as many as 110 million Target customers.[37]
  • Visa and Mastercard – in 2012, they warned card-issuing banks that a third-party payments processor suffered a security breach, affecting up to 10 million credit cards.[38][39]
  • Subway – in 2012, two Romanian men admitted to participating in an international conspiracy that hacked into credit-card payment terminals at more than 150 Subway restaurant franchises and stole data for more than 146,000 accounts.[40]
  • MasterCard – in 2005, the company announced that up to 40 million cardholders may have had account information stolen due to one of its payment processors being hacked.[41][42][43][44]

Blockchain and cryptocurrencies

  • 2014 Mt. Gox exchange exploits
  • The DAO fork – in June 2016, users exploited a vulnerability in The DAO, a decentralized autonomous organization formed as a venture capital fund, to siphon a third of the fund's ether (about $50 million at the time of the hack).[45]
  • Poly Network exploit – in August 2021, anonymous hackers transferred over $610 million in cryptocurrencies to external wallets. Although it was one of the largest DeFi hacks ever, all assets were eventually returned over the following two weeks.[46]
  • Wormhole hack – in early February 2022, an unknown hacker exploited a vulnerability on the DeFi platform Wormhole, making off with $320 million in wrapped ether.[47][48]
  • Ronin Network hack – in March 2022, North Korean state-sponsored Lazarus Group used hacked private keys to withdraw $625 million in ether and USDC from the Ronin bridge,[49][50] an Ethereum sidechain built for the NFT-based video game Axie Infinity.
  • Nomad bridge hack – in early August 2022, hackers targeted a misconfigured smart contract in a "free-for-all" attack,[51] withdrawing nearly $200 million in cryptocurrencies from the Nomad cross-chain bridge.[52]
  • The Uncle Maker attack – an attack on Ethereum by the F2Pool mining pool, which lasted between 2020 and 2022, but was only discovered in 2022 by Aviv Yaish, Gilad Stern and Aviv Zohar.[53][54]
  • BNB Chain hack – in early October 2022, about $570 million in cryptocurrency was stolen from a bridge for the BNB Chain, a blockchain operated by the Binance exchange.[55] Because a majority of the tokens could not be transferred off-chain, the hacker ultimately made off with about $100 million.[56]

Stolen medical-related data

  • By May, three healthcare payer organizations had been attacked in the United States in 2014 and 2015: Anthem, Premera Blue Cross and CareFirst. The three attacks together netted information on more than 91 million people.[57]
  • In January 2022, the International Committee of the Red Cross made a public plea to hackers who had attacked the organisation.[58]

Ransomware attacks

Notable criminal ransomware hacker groups

  • Vice Society
  • Conti (ransomware)
  • Hive (ransomware)
  • REvil

Hacktivism

See also

References

  1. Goodin, Dan (January 14, 2013). "Massive espionage malware targeting governments undetected for 5 years". https://arstechnica.com/security/2013/01/red-october-computer-espionage-network-may-have-stolen-terabytes-of-data/. 
  2. "WannaCry Ransomware: What We Know Monday" (in en). NPR.org. https://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday. 
  3. Perloth, Nicole (October 24, 2012). "Cyberattack On Saudi Firm Disquiets U.S.". New York Times: pp. A1. https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html. 
  4. Goodin, Dan (August 16, 2012). "Mystery malware wreaks havoc on energy sector computers". https://arstechnica.com/security/2012/08/shamoon-malware-attack/. 
  5. "Iranian Oil Sites Go Offline Amid Cyberattack". April 23, 2012. https://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html. 
  6. Goodin, Dan (August 29, 2012). "The perfect crime: Is Wiper malware connected to Stuxnet, Duqu?". https://arstechnica.com/security/2012/08/wiper-malware-stuxnet-duqu/. 
  7. "Secret CIA assessment says Russia was trying to help Trump win White House" (in en). Washington Post. https://www.washingtonpost.com/world/national-security/obama-orders-review-of-russian-hacking-during-presidential-campaign/2016/12/09/31d6b300-be2a-11e6-94ac-3d324840106c_story.html. 
  8. "Australians urged to be vigilant against continued cyber attacks from Iran's regime". 24 January 2023. https://www.abc.net.au/news/2023-01-25/australia-iran-irgc-cyber-attacks-senate-inquiry-human-rights/101886648. Retrieved 24 Jan 2023. 
  9. Goodin, Dan (May 21, 2013). "Chinese hackers who breached Google reportedly targeted classified data". https://arstechnica.com/security/2013/05/chinese-hackers-who-breached-google-reportedly-targeted-classified-data/. 
  10. Goodin, Dan (August 9, 2012). "Nation-sponsored malware with Stuxnet ties has mystery warhead". https://arstechnica.com/security/2012/08/nation-sponsored-malware-has-mystery-warhead/. 
  11. Sanders, Sam (June 4, 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records At Risk". NPR. https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk. 
  12. "Russian Hackers Suspected In Cyberattack On German Parliament". London South East (Alliance News). June 19, 2015. http://www.lse.co.uk/AllNews.asp?code=kwdwehme&headline=Russian_Hackers_Suspected_In_Cyberattack_On_German_Parliament. 
  13. 13.0 13.1 "Hackers lurking, parliamentarians told". Deutsche Welle. http://www.dw.com/en/hackers-lurking-parliamentarians-told/a-19564630. 
  14. "Hackerangriff auf deutsche Parteien". Süddeutsche Zeitung. 20 September 2016. http://www.sueddeutsche.de/politik/bundesregierung-ist-alarmiert-hackerangriff-aufdeutsche-parteien-1.3170347. 
  15. Holland, Martin (20 September 2016). "Angeblich versuchter Hackerangriff auf Bundestag und Parteien". Heise. https://www.heise.de/newsticker/meldung/Angeblich-versuchter-Hackerangriff-auf-Bundestag-und-Parteien-3328265.html. 
  16. Hemicker, Lorenz; Alto, Palo. ""Wir haben Fingerabdrücke"". Faz.net (Frankfurter Allgemeine). https://www.faz.net/aktuell/politik/inland/hackerangriffe-auf-politiker-wir-haben-fingerabdruecke-14445655.html. 
  17. "In First Massive Cyberattack, China Targets Israel" (in en). https://www.haaretz.com/israel-news/tech-news/chinese-cyberattack-targeted-dozens-of-israeli-public-and-private-organizations-1.10102531. 
  18. "Hackers breach Indian government emails multiple times". Arjun Ramprasad (Previewtech.net). June 30, 2021. https://previewtech.net/hackers-breach-indian-government-emails-multiple-times/. 
  19. Gawker rooted by anonymous hackers, December 13, 2010, Dan Goodin, The Register, retrieved at 2014-11-08
  20. Goodin, Dan (September 25, 2012). "Trade group exposes 100,000 passwords for Google, Apple engineers". https://arstechnica.com/security/2012/09/ieee-trade-group-exposes-100000-password-for-google-apple-engineers/. 
  21. Goodin, Dan (April 27, 2013). "Why LivingSocial's 50-million password breach is graver than you may think". https://arstechnica.com/security/2013/04/why-livingsocials-50-million-password-breach-is-graver-than-you-may-think/. 
  22. 22.0 22.1 Howley, Daniel (July 1, 2016). "7 biggest hacks". https://www.yahoo.com/tech/7-biggest-computer-hacks-152744364.html. 
  23. Goodin, Dan (July 12, 2012). "Hackers expose 453,000 credentials allegedly taken from Yahoo service (Updated)". https://arstechnica.com/security/2012/07/yahoo-service-hacked/. 
  24. Goodin, Dan (January 31, 2013). "How Yahoo allowed hackers to hijack my neighbor's e-mail account (Updated)". https://arstechnica.com/security/2013/01/how-yahoo-allowed-hackers-to-hijack-my-neighbors-e-mail-account/. 
  25. Goodin, Dan (January 31, 2014). "Mass hack attack on Yahoo Mail accounts prompts password reset". https://arstechnica.com/security/2014/01/mass-hack-attack-on-yahoo-mail-accounts-prompts-password-reset/. 
  26. "Exclusive: Elite hackers target WHO as coronavirus cyberattacks spike" (in en). Reuters. 24 March 2020. https://www.reuters.com/article/us-health-coronavirus-who-hack-exclusive/exclusive-elite-hackers-target-who-as-coronavirus-cyberattacks-spike-idUSKBN21A3BN. 
  27. "WHO reports fivefold increase in cyber attacks, urges vigilance" (in en). World Health Organization. https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance. 
  28. "Equifax data breach". 8 September 2017. https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do. 
  29. Shukla, Saloni; Bhakta, Pratik (20 October 2016). "3.2 million debit cards compromised; SBI, HDFC Bank, ICICI, YES Bank and Axis worst hit". The Economic Times. http://economictimes.indiatimes.com/industry/banking/finance/banking/3-2-million-debit-cards-compromised-sbi-hdfc-bank-icici-yes-bank-and-axis-worst-hit/articleshow/54945561.cms. 
  30. Gallagher, Sean (September 18, 2014). "Credit card data theft hit at least three retailers, lasted 18 months". https://arstechnica.com/security/2014/09/credit-card-data-theft-hit-at-least-three-retailers-lasted-18-months/. 
  31. "Banks: Card Breach at Goodwill Industries – Krebs on Security". 25 July 2014. http://krebsonsecurity.com/2014/07/banks-card-breach-at-goodwill-industries/. 
  32. Lemos, Robert (September 19, 2014). "Home Depot estimates data on 56 million cards stolen by cybercriminals". https://arstechnica.com/security/2014/09/home-depot-estimates-data-on-56-million-cards-stolen-by-cybercrimnals/. 
  33. Goodin, Dan (December 4, 2013). "Credit card fraud comes of age with advances in point-of-sale botnets". https://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/. 
  34. Farivar, Cyrus (December 19, 2013). "Secret Service investigating massive credit card breach at Target (Updated)". https://arstechnica.com/security/2013/12/secret-service-investigating-alleged-credit-card-breach-at-target/. 
  35. Goodin, Dan (December 20, 2013). "Cards stolen in massive Target breach flood underground "card shops"". https://arstechnica.com/tech-policy/2013/12/cards-stolen-in-massive-target-breach-flood-underground-card-shops/. 
  36. Goodin, Dan (February 5, 2014). "Target hackers reportedly used credentials stolen from ventilation contractor". https://arstechnica.com/security/2014/02/target-hackers-reportedly-used-credentials-stolen-from-ventilation-contractor/. 
  37. Goodin, Dan (January 16, 2014). "Point-of-sale malware infecting Target found hiding in plain sight". https://arstechnica.com/security/2014/01/point-of-sale-malware-infecting-target-found-hiding-in-plain-sight/. 
  38. Goodin, Dan (April 1, 2012). "After the hack: FAQ for breach affecting up to 10 million credit cards". https://arstechnica.com/business/2012/04/frequently-asked-questions-about-a-hack-that-may-affect-10-million-credit-cards/. 
  39. Goodin, Dan (March 30, 2012). ""Major" credit-card breach hits Visa, MasterCard (Updated)". https://arstechnica.com/business/2012/03/massive-credit-card-breach-reportedly-hits-visa-mastercard/. 
  40. Goodin, Dan (September 18, 2012). "Two men admit to $10 million hacking spree on Subway sandwich shops". https://arstechnica.com/security/2012/09/romanians-cop-to-10-million-hacking-spree/. 
  41. Bangeman, Eric (June 20, 2005). "CardSystems should not have retained stolen customer data". https://arstechnica.com/uncategorized/2005/06/5015-2/. 
  42. "Lost Credit Data Improperly Kept, Company Admits". June 20, 2005. https://www.nytimes.com/2005/06/20/technology/20credit.html?_r=0. 
  43. Bangeman, Eric (June 23, 2005). "Scope of CardSystems-caused credit card data theft broadens". https://arstechnica.com/uncategorized/2005/06/5031-2/. 
  44. Jonathan M. Gitlin (July 22, 2005). "Visa bars CardSystems from handling any more transactions.". https://arstechnica.com/uncategorized/2005/07/5129-2/. 
  45. Popper, Nathaniel (2016-06-17). "A Hacking of More Than $50 Million Dashes Hopes in the World of Virtual Currency" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2016/06/18/business/dealbook/hacker-may-have-removed-more-than-50-million-from-experimental-cybercurrency-project.html. 
  46. Browne, Ryan (2021-08-23). "Hacker behind $600 million crypto heist returns final slice of stolen funds" (in en). https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html. 
  47. Faife, Corin (2022-02-03). "Wormhole cryptocurrency platform hacked for $325 million after error on GitHub" (in en). https://www.theverge.com/2022/2/3/22916111/wormhole-hack-github-error-325-million-theft-ethereum-solana. 
  48. "Wormhole Hack: Lessons From The Wormhole Exploit" (in en-US). 2022-02-03. https://blog.chainalysis.com/reports/wormhole-hack-february-2022/. 
  49. Browne, Ryan (2022-04-15). "U.S. officials link North Korean hackers to $615 million cryptocurrency heist" (in en). https://www.cnbc.com/2022/04/15/ronin-hack-north-korea-linked-to-615-million-crypto-heist-us-says.html. 
  50. "North Korea's Lazarus Group moves funds through Tornado Cash | TRM Insights" (in en). https://www.trmlabs.com/post/north-koreas-lazarus-group-moves-funds-through-tornado-cash. 
  51. "Error: no |title= specified when using {{Cite web}}" (in en). https://twitter.com/samczsun/status/1554252024723546112. 
  52. Faife, Corin (2022-08-02). "Nomad crypto bridge loses $200 million in "chaotic" hack" (in en). https://www.theverge.com/2022/8/2/23288785/nomad-bridge-200-million-chaotic-hack-smart-contract-cryptocurrency. 
  53. "NVD - CVE-2022-37450". https://nvd.nist.gov/vuln/detail/CVE-2022-37450. 
  54. admin_afhu (2022-08-10). "Hebrew University Researchers Uncover Proof of Ethereum Pool Miners Manipulation" (in en-US). https://www.afhu.org/2022/08/10/hebrew-university-researchers-uncover-proof-of-ethereum-pool-miners-manipulation/. 
  55. Howcroft, Elizabeth (2022-10-07). "Binance-linked blockchain hit by $570 million crypto hack" (in en). Reuters. https://www.reuters.com/technology/hackers-steal-around-100-million-cryptocurrency-binance-linked-blockchain-2022-10-07/. 
  56. Movement, Q. ai-Powering a Personal Wealth. "What Happened With The $570 Million Binance (BNB) Hack? And What Does It Really Mean For Crypto Investors?" (in en). https://www.forbes.com/sites/qai/2022/10/09/what-happened-with-the-570-million-binance-bnb-hack-and-what-does-it-really-mean-for-crypto-investors/. 
  57. Dance, Scott (20 May 2015). "Cyberattack affects 1.1 million CareFirst customers". Baltim. Sun. http://www.baltimoresun.com/health/bs-bz-carefirst-data-breach-20150520-story.html. 
  58. "Red Cross appeals to hackers after major cyberattack". TheJournal.ie. 2022-01-20. https://www.thejournal.ie/red-cross-cyber-attack-hacked-5659878-Jan2022/.