-
Notifications
You must be signed in to change notification settings - Fork 0
/
curated_list_of_infamous_attacks_reuben_johnston.tex
127 lines (103 loc) · 8.16 KB
/
curated_list_of_infamous_attacks_reuben_johnston.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
%Copyright 2024, Reuben Johnston, www.reubenjohnston.com
%Dependencies
%$ sudo apt-get install texlive texlive-latex-extra
%Usage
%$ pdflatex curated_list_of_infamous_attacks_reuben_johnston.tex
\documentclass[a4paper]{article}
\usepackage[a4paper, portrait, margin=0.5in]{geometry}
% copyright
\usepackage[pages=all, color=black, position={current page.south}, placement=bottom, scale=1, opacity=1, vshift=5mm]{background}
\SetBgContents{
\tt This work is shared under a \href{https://creativecommons.org/licenses/by-nc-sa/4.0/}{CC BY-NC-SA 4.0 license} unless otherwise noted
}
\usepackage{hyperref}
\usepackage[ampersand]{easylist}
\title{Curated List of Infamous Attacks}
\author{Edited by Reuben Aaron Johnston, Ph.D. \\ email \href{mailto:reub@jhu.edu}{reub@jhu.edu}}
\date{January 2024}
\begin{document}
\maketitle
In the spirit of learning, please enjoy this curated list of infamous attacks with references to associated writings. Instructions for contributions are available on the \href{https://github.com/reubenajohnston/CuratedCyberReads}{GitHub project}.
\bigskip\noindent
\noindent\textbf{Solar Sunrise (1998):}
\begin{easylist}[itemize]
& \href{https://www.wired.com/2008/09/video-solar-sun}{Video: Solar Sunrise, the Best FBI-Produced Hacker Flick Ever, by Poulsen, Wired, September 23, 2008}
& \href{https://youtu.be/bOr5CtqYnsA}{Solar Sunrise: Dawn of a New Threat, FBI, 1999}
\end{easylist}
\noindent\textbf{Titan Rain (2005):}
\begin{easylist}[itemize]
& \href{https://content.time.com/time/subscriber/article/0,33009,1098961-1,00.html}{The Invasion of the Chinese Cyberspies, by Thornburgh, August 29, 2005}
\end{easylist}
\noindent\textbf{Bank Heists by Tenenbaum (~2007):}
\begin{easylist}[itemize]
& \href{https://www.wired.com/2012/07/tenenbaum-sentenced/}{'The Analyzer' Gets Time Served for Million-Dollar Bank Heist, by Zetter, Wired, July 5, 2012}
\end{easylist}
\noindent\textbf{Estonia Attack (2007):}
\begin{easylist}[itemize]
& \href{https://www.theguardian.com/world/2007/may/17/topstories3.russia}{Russia accused of unleashing cyberwar to disable Estonia, by Traynor, The Guardian, May 16, 2007}
& \href{http://news.bbc.co.uk/2/hi/europe/6665145.stm}{Estonia hit by 'Moscow cyber war', BBC News, May 17, 2007}
\end{easylist}
\noindent\textbf{Stuxnet Attack (2010):}
\begin{easylist}[itemize]
& Curated List of Infamous Malware, CuratedCyberReads, Johnston (todo, insert link to result from latex build)
\end{easylist}
\noindent\textbf{Sony's PlayStation Hack (2011):}
\begin{easylist}[itemize]
& \href{https://www.bbc.com/news/technology-13206004}{Sony's PlayStation hack apology, BBC, April 27, 2011}
& \href{https://arstechnica.com/gaming/2011/04/sonys-black-eye-is-a-pr-problem-not-a-legal-one}{PlayStation Network hacked, data stolen: how badly is Sony hurt?, By Kuchera, ARS Technica, April 26, 2011}
\end{easylist}
\noindent\textbf{Target Data Breach (2013):}
\begin{easylist}[itemize]
& \href{https://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned}{Anatomy of the Target data breach: Missed opportunities and lessons learned, by Kassner, ZDNet, February 2, 2015}
\end{easylist}
\noindent\textbf{Yahoo Data Breach (2013):}
\begin{easylist}[itemize]
& \href{https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html}{All 3 Billion Yahoo Accounts Were Affected by 2013 Attack, by Perlroth, The New York Times, October 3, 2017}
& \href{https://www.sec.gov/news/press-release/2018-71}{Press Release Altaba, Formerly Known as Yahoo!, Charged With Failing to Disclose Massive Cybersecurity Breach; Agrees To Pay \$35 Million, U.S. SECURITIES AND EXCHANGE COMMISSION, April 24, 2018}
\end{easylist}
\noindent\textbf{OPM Data Breach (2013):}
\begin{easylist}[itemize]
& \href{https://www.csoonline.com/article/566509/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html}{The OPM hack explained: Bad security practices meet China’s Captain America, by Fruhlinger, CSO Online, February 12, 2020}
& \href{https://oversight.house.gov/wp-content/uploads/2016/09/The-OPM-Data-Breach-How-the-Government-Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf}{The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation, Committee on Oversight and Government Reform
U.S. House of Representatives 114th Congress, September 7, 2016}
\end{easylist}
\noindent\textbf{Sony Pictures Hack (2014):}
\begin{easylist}[itemize]
& \href{https://www.vox.com/2014/12/14/7387945/sony-hack-explained}{The Sony hack: how it happened, who is responsible, and what we've learned, by Lee, Vox, December 17, 2014}
\end{easylist}
\noindent\textbf{Cambridge Analytica Scandal (2014):}
\begin{easylist}[itemize]
& \href{https://www.netflix.com/title/80117542}{The Great Hack, Amer et al., Netflix, 2019}
& \href{https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html}{Cambridge Analytica and Facebook: The Scandal and the Fallout So Far, by Confessore, New York Times, April 4, 2018}
& \href{https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election}{Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, by Cadwalladr and Graham-Harrison, The Guardian, March 17, 2018}
& \href{https://www.ftc.gov/news-events/news/press-releases/2019/12/ftc-issues-opinion-order-against-cambridge-analytica-deceiving-consumers-about-collection-facebook}{FTC Issues Opinion and Order Against Cambridge Analytica For Deceiving Consumers About the Collection of Facebook Data, Compliance with EU-U.S. Privacy Shield, FTC, December 6, 2019}
\end{easylist}
\noindent\textbf{Equifax Data Breach (2017):}
\begin{easylist}[itemize]
& \href{https://www.csoonline.com/article/567833/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html}{Equifax data breach FAQ: What happened, who was affected, what was the impact?, by Fruhlinger, CSO Online, February 12, 2020}
& \href{https://www.bloomberg.com/news/features/2017-09-29/the-equifax-hack-has-all-the-hallmarks-of-state-sponsored-pros}{The Equifax Hack Has the Hallmarks of State-Sponsored Pros, by Riley et al., Bloomberg, September 29, 2017}
& \href{https://www.warren.senate.gov/imo/media/doc/2018.09.06%20GAO%20Equifax%20report.pdf}{DATA PROTECTION Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach, United States Government Accountability Office, August, 2018}
\end{easylist}
\noindent\textbf{Marriott Data Breach (2018):}
\begin{easylist}[itemize]
& \href{https://www.csoonline.com/article/567795/marriott-data-breach-faq-how-did-it-happen-and-what-was-the-impact.html}{Marriott data breach FAQ: How did it happen and what was the impact?, by Fruhlinger, CSO Online, February 12, 2020}
& \href{https://www.hsgac.senate.gov/wp-content/uploads/imo/media/doc/Soresnson%20Testimony.pdf}{Testimony of Arne Sorenson, President \& CEO, Marriott International, Senate Committee on Homeland Security \& Governmental Affairs Permanent Subcommittee on Investigations, March 7, 2019}
\end{easylist}
\noindent\textbf{Solarwinds Attack (2019):}
\begin{easylist}[itemize]
& Curated List of Infamous Malware, CuratedCyberReads, Johnston (todo, insert link to result from latex build)
\end{easylist}
\noindent\textbf{Attack on Denmark's Critical Infrastructure (2023):}
\begin{easylist}[itemize]
& \href{https://sektorcert.dk/wp-content/uploads/2023/11/SektorCERT-The-attack-against-Danish-critical-infrastructure-TLP-CLEAR.pdf}{The attack against Danish, critical infrastructure, Sektorcert, November, 2023}
\end{easylist}
\noindent\textbf{MGM Attack (2023):}
\begin{easylist}[itemize]
& \href{https://www.vox.com/technology/2023/9/15/23875113/mgm-hack-casino-vishing-cybersecurity-ransomware}{The chaotic and cinematic MGM casino hack, explained, by Morrison, Vox, October 6, 2023}
\end{easylist}
%section without number uses \section*{SECTIONNAME} instead of \section{SECTIONNAME}
\section*{Contributors}
\begin{easylist}[itemize]
& Your name, organization, and email could be here. Please contribute!
\end{easylist}
\end{document}