ID
int64 2
2.11k
| name
stringlengths 4
279
| description
stringlengths 19
3.75k
| start_date
stringlengths 10
10
⌀ | end_date
stringlengths 10
10
⌀ | inclusion_criteria
stringclasses 22
values | inclusion_criteria_subcode
stringclasses 2
values | source_incident_detection_disclosure
stringclasses 26
values | incident_type
stringclasses 23
values | receiver_name
stringclasses 172
values | receiver_country
stringlengths 8
438
⌀ | receiver_region
stringlengths 8
1.24k
⌀ | receiver_category
stringlengths 11
3.52k
⌀ | receiver_category_subcode
stringlengths 11
1.32k
⌀ | initiator_name
stringlengths 7
480
⌀ | initiator_country
stringclasses 131
values | initiator_category
stringclasses 25
values | initiator_category_subcode
stringclasses 23
values | number_of_attributions
int64 0
10
| attribution_date
stringclasses 232
values | attribution_type
stringclasses 127
values | attribution_basis
stringclasses 101
values | attributing_actor
stringclasses 135
values | attribution_it_company
stringclasses 7
values | attributing_country
stringclasses 79
values | attributed_initiator
stringlengths 3
7.87k
⌀ | attributed_initiator_country
stringclasses 195
values | attributed_initiator_category
stringclasses 75
values | attributed_initiator_subcategory
stringclasses 50
values | sources_attribution
stringlengths 2
1.25k
| cyber_conflict_issue
stringclasses 56
values | offline_conflict_issue
stringclasses 62
values | offline_conflict_name_HIIK
stringclasses 21
values | offline_conflict_intensity
stringclasses 3
values | offline_conflict_intensity_subcode
stringclasses 5
values | number_of_political_responses
int64 0
7
| political_response_date
stringclasses 41
values | political_response_type
stringclasses 20
values | political_response_type_subcode
stringclasses 23
values | political_response_country
stringclasses 31
values | political_response_actor
stringclasses 41
values | zero_days
stringclasses 4
values | zero_days_subcode
stringclasses 2
values | MITRE_initial_access
stringclasses 20
values | MITRE_impact
stringclasses 28
values | user_interaction
stringclasses 2
values | has_disruption
bool 2
classes | data_theft
stringclasses 4
values | disruption
stringclasses 4
values | hijacking
stringclasses 4
values | physical_effects_spatial
stringclasses 4
values | physical_effects_temporal
stringclasses 4
values | unweighted_cyber_intensity
int64 0
7
| target_multiplier
stringclasses 3
values | weighted_cyber_intensity
float64 0
10
⌀ | impact_indicator
stringclasses 4
values | impact_indicator_value
float64 0
13
⌀ | functional_impact
stringclasses 6
values | intelligence_impact
stringclasses 6
values | political_impact_affected_entities
stringclasses 5
values | political_impact_affected_entities_exact_value
float64 0
150
⌀ | political_impact_third_countries
stringclasses 4
values | political_impact_third_countries_exact_value
float64 0
6
⌀ | economic_impact
stringclasses 2
values | economic_impact_exact_value
float64 0
100M
⌀ | economic_impact_currency
stringclasses 2
values | state_responsibility_indicator
stringclasses 4
values | IL_breach_indicator
stringclasses 32
values | IL_breach_indicator_subcode
stringclasses 21
values | evidence_for_sanctions_indicator
stringclasses 3
values | number_of_legal_responses
int64 0
3
| legal_response_date
stringclasses 18
values | legal_response_type
stringclasses 8
values | legal_response_type_subcode
stringclasses 4
values | legal_response_country
stringclasses 15
values | legal_response_actor
stringclasses 20
values | legal_attribution_reference
stringclasses 11
values | legal_attribution_reference_subcode
stringclasses 5
values | legal_response_indicator
stringclasses 4
values | casualties
float64 | sources_url
stringlengths 2
9.44k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2 | Cyberwar Azerbaijan-Armenia 2000/Azerbaijani Attack | Azerbaijani Hackers took down and defaced webpages of the Armenian state TV and webpages with information about the Armenia genocide. | 2000-01-01 | 2000-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | [['Not available']] | ['Armenia'] | [['ASIA', 'CENTAS', 'CSTO']] | [['State institutions / political system', 'Media', 'Other']] | null | ['Not available'] | ['Azerbaijan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Azerbaijan | Non-state-group | Hacktivist(s) | [] | Territory; Secession | Territory; Secession | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://eurasianet.org/nagorno-karabakh-dispute-takes-to-cyber-space'] |
3 | Cyberwar Azerbaijan-Armenia 2000/Armenian Counterattack | In response to the previous attack Armenian hacker group Liazor took down the webpages of many Azerbaijani users | 2000-01-01 | 2000-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Azerbaijan'] | [['ASIA', 'CENTAS']] | [['Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Other']] | [['Advocacy / activists (e.g. human rights organizations)', '', '', '']] | ['Liazor'] | ['Armenia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Liazor | Armenia | Non-state-group | Hacktivist(s) | [] | Territory; Secession | Territory; Secession | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
4 | Taiwan Election Hack 2000 | Chinese hackers succeeded in attacking several government websites after Mr Chen (Taiwanese President) was sworn in on May 20. | 2000-05-20 | 2000-05-20 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Taiwan'] | [['ASIA', 'SCS']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | China | Unknown - not attributed | null | ['https://nsarchive2.gwu.edu//NSAEBB/NSAEBB424/docs/Cyber-030.pdf'] | National power | National power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.hartford-hwp.com/archives/55/105.html', 'https://nsarchive2.gwu.edu//NSAEBB/NSAEBB424/docs/Cyber-030.pdf'] |
5 | "First Sino-US-Cyber-War" I | After the collision of an American spy plane and a Chinese jet, hackers in the United States and China began defacing Web sites on both sides of the Pacific. | 2001-05-01 | 2001-05-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', '']] | ['Honker Union'] | ['China'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Honker Union | China | Non-state-group | Hacktivist(s) | ['https://www.nytimes.com/2001/05/13/weekinreview/may-6-12-the-first-world-hacker-war.html', 'https://www.theguardian.com/technology/2001/may/04/china.internationalnews', 'https://nsarchive2.gwu.edu//NSAEBB/NSAEBB424/docs/Cyber-030.pdf'] | Other | Other | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2001/05/13/weekinreview/may-6-12-the-first-world-hacker-war.html', 'https://www.theguardian.com/technology/2001/may/04/china.internationalnews', 'https://nsarchive2.gwu.edu//NSAEBB/NSAEBB424/docs/Cyber-030.pdf', 'https://www.upi.com/Defense-News/2002/10/29/China-prevented-repeat-cyber-attack-on-US/51011035913195/'] |
6 | "First Sino-US-Cyber-War" II | After the collision of an American spy plane and a Chinese jet, hackers in the United States and China began defacing Web sites on both sides of the Pacific. | 2001-05-01 | 2001-05-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['Other']] | null | null | ['United States'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | United States | Non-state-group | Hacktivist(s) | ['https://www.nytimes.com/2001/05/13/weekinreview/may-6-12-the-first-world-hacker-war.html'] | Other | Other | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2001/05/13/weekinreview/may-6-12-the-first-world-hacker-war.html', 'https://www.theguardian.com/technology/2001/may/04/china.internationalnews', 'https://www.upi.com/Defense-News/2002/10/29/China-prevented-repeat-cyber-attack-on-US/51011035913195/'] |
7 | Textbook Hack South Korea vs. Japan | DDoS retaliatory campaign over a revisionist WWII Japanese history textbook | 2001-05-01 | 2001-05-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Japan'] | [['ASIA', 'SCS', 'NEA']] | [['Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | null | ['Antijapan'] | ['Korea, Republic of'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Antijapan | Korea, Republic of | Non-state-group | Hacktivist(s) | ['https://cmsw.mit.edu/mit2/Abstracts/ducke1.pdf'] | System / ideology; Other | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://cmsw.mit.edu/mit2/Abstracts/ducke1.pdf'] |
8 | Prior 9/11 Taliban Hack | A couple of weeks bevor 9/11 pro Taliban websites have been defaced by western activists, claiming to do so because of the Taliban`s threats to internet users. | 2001-08-01 | 2001-08-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Afghanistan'] | [['ASIA', 'SASIA']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://books.google.de/books?id=WfIFiEs0HQ8C&pg=PA89&lpg=PA89&dq=Pro-Palestinian+Hackers++AT%26T+2000&q=Pro-Palestinian%20Hackers%20%20AT%26T%202000&f=false'] |
9 | ZeeNews/India Today Hack 2001 | Website-defacements of Indian news outlets over the criticism of militant groups operating inside Pakistan, and Pakistani-controlled Kashmir. | 2001-10-22 | 2001-10-22 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | [['Not available']] | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['Media']] | null | ['Not available'] | ['Pakistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Pakistan | Non-state-group | Hacktivist(s) | ['http://news.bbc.co.uk/2/hi/south_asia/1617478.stm'] | System / ideology; Territory; Resources | Territory; Resources; International power | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.bbc.co.uk/2/hi/south_asia/1617478.stm'] |
10 | NSA vs. US muslims | The NSA spied on prominent muslims in the US | 2002-01-01 | 2008-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Social groups', 'End user(s) / specially protected groups', 'Science']] | [['Legislative', 'Civil service / administration', 'Election infrastructure / related systems', 'Religious', '', '']] | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 1 | 2013-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party | null | null | null | NSA/Equation Group | United States | State | null | [] | National power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://theintercept.com/2014/07/09/under-surveillance/'] |
11 | Titan Rain | Titan Rain was the designation given by the federal government of the United States to a series of coordinated attacks on American computer systems since 2003; they were known to have been ongoing for at least three years.[1] The attacks were labeled as Chinese in origin, although their precise nature, e.g., state-sponsored espionage, corporate espionage, or random hacker attacks, and their real identities – masked by proxy, zombie computer, spyware/virus infected – remain unknown. | 2003-01-01 | 2007-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by media (without further information on source); Incident disclosed by victim | Data theft | null | ['United States', 'United Kingdom'] | [['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['State institutions / political system', 'State institutions / political system', 'Critical infrastructure'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure']] | [['Government / ministries', 'Military', 'Defence industry'], ['Government / ministries', 'Military', 'Defence industry']] | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 2 | 2005-01-01; 2005-01-01 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; IT-security community attributes attacker | null | null | null | null | China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://www.symantec.com/content/en/us/enterprise/articles/b-cxo_how_to_combat_cyber_espionage_somaini_ART_21032685.en-us.pdf', 'https://www.theguardian.com/technology/2014/may/19/us-accusations-chinese-hacking-eight-years', 'https://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/AR2005082402318.html'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://content.time.com/time/subscriber/article/0,33009,1098961,00.html', 'https://www.symantec.com/content/en/us/enterprise/articles/b-cxo_how_to_combat_cyber_espionage_somaini_ART_21032685.en-us.pdf', 'https://www.theguardian.com/technology/2014/may/19/us-accusations-chinese-hacking-eight-years', 'https://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/AR2005082402318.html'] |
13 | DDoS North Korea 2004 | A total of 314 PCs were hacked, including servers at the Ministry of Maritime Affairs and Fisheries, enterprises and universities. The attack was attributed to North Korea by the Korea Economic Institute of America. | 2004-04-01 | 2004-07-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source) | Disruption | null | ['Korea, Republic of'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | [['Government / ministries', 'Military', 'Police', '', '']] | null | ["Korea, Democratic People's Republic of"] | ['State'] | null | 1 | 2009-01-01 00:00:00 | Attribution given, type unclear | Attribution by third-party | null | null | null | null | Korea, Democratic People's Republic of | State | null | [] | System / ideology | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.keia.org/sites/default/files/publications/kei_aps_mansourov_final.pdf'] |
14 | Taiwan's Kuomintang Hack 2004 | Attacks against Taiwan continued in 2004 targeting Websites belonging to Taiwan's Ministry of Finance, the Kuomintang Party, the Democratic Progressive Party (DPP) and the Ministry of National Defense’s (MND) Military News Agency. | 2004-07-01 | 2004-07-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Disruption | null | ['Taiwan'] | [['ASIA', 'SCS']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Political parties']] | null | ['China'] | ['Individual hacker(s)'] | null | 2 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Attribution given, type unclear | Attacker confirms; Media-based attribution | null | null | null | null | China; China | Individual hacker(s); Individual hacker(s) | null | ['https://books.google.de/books?id=APT eCwAAQBAJ&pg=PT122&lpg=PT122&dq=china+taiwan+2004+hacks+party&source=bl&ots=3sWN_ujpJn&sig=ACfU3U1lbym48HyjivjwwQzcJHCMcESvRQ&hl=de&sa=X&ved=2ahUKEwj-99T1i77jAhXD_KQKHeRZDYMQ6AEwB3oECAgQAQ#v=onepage&q=china%20taiwan%202004%20hacks%20party&f=false'] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://nsarchive2.gwu.edu//NSAEBB/NSAEBB424/docs/Cyber-030.pdf', 'https://books.google.de/books?id=APT eCwAAQBAJ&pg=PT122&lpg=PT122&dq=china+taiwan+2004+hacks+party&source=bl&ots=3sWN_ujpJn&sig=ACfU3U1lbym48HyjivjwwQzcJHCMcESvRQ&hl=de&sa=X&ved=2ahUKEwj-99T1i77jAhXD_KQKHeRZDYMQ6AEwB3oECAgQAQ#v=onepage&q=china%20taiwan%202004%20hacks%20party&f=false'] |
15 | ROK Hack 2004 | An attack, that has been attributed to the Chinese PLA was sophisticated and surprisingly successful, infecting at least 278 computers at 10 South Korean government agencies with Trojan horse-type viruses that allowed hackers to access computer data when the user opens the files. | 2004-07-01 | 2004-07-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Korea, Republic of'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2004-01-01 00:00:00 | Attribution given, type unclear | Attribution by third-party | null | null | null | null | China | Non-state actor, state-affiliation suggested | null | ['http://cc.pacforum.org/2004/10/turning-point-china-korea-relations/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://cc.pacforum.org/2004/10/turning-point-china-korea-relations/'] |
16 | Athens Affair | Vodafone Greeces services were hacked by an group, later attributed to the American NSA. They wiretapped the phones of parts of the greek government and of greek civil society for 5 months, via the "lawful intercept" system of Vodafone. | 2004-07-01 | 2005-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by media (without further information on source); Incident disclosed by victim | Data theft; Hijacking with Misuse | null | ['Greece'] | [['EUROPE', 'NATO', 'EU', 'BALKANS']] | [['State institutions / political system', 'International / supranational organization', 'Other']] | [['Political parties', '', '']] | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2015-01-01; 2015-01-01 | Political statement/report and indictment / sanctions; Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | ['https://theintercept.com/2015/09/28/death-athens-rogue-nsa-operation/'] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://spectrum.ieee.org/telecom/security/the-athens-affair', 'https://www.theguardian.com/commentisfree/2015/sep/30/athens-affair-encryption-backdoors', 'https://www.schneier.com/blog/archives/2007/07/story_of_the_gr_1.html', 'https://theintercept.com/2015/09/28/death-athens-rogue-nsa-operation/'] |
17 | Korea vs. Japan 2005 | A series of attacks believed to have originated from China and South Korea hit numerous Japanese university and industrial Websites. The attacks may have been caused by a rise in tensions between the countries over the Japanese Education Ministry‘s alleged omission of key historical facts pertaining to Japan’s actions in World War II and China’s opposition to Japan’s attempt to be a permanent member of the UN Security Council. | 2005-01-01 | 2005-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source) | Disruption | null | ['Japan'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system', 'Social groups', 'End user(s) / specially protected groups', 'Science', 'State institutions / political system']] | [['Government / ministries', 'Religious', '', '', 'Police']] | ['Not available', 'Not available'] | ['China', 'Korea, Republic of'] | ['Not available', 'Not available'] | null | 1 | null | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Media-based attribution; Media-based attribution | null | null | null | null | China; Korea, Republic of | null | null | ['http://www.crime-research.org/news/11.05.2005/1227/'] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.crime-research.org/news/11.05.2005/1227/'] |
18 | APT 30 aka Naikon, PLA Unit 78020, Lotus Panda | The Chinese government is accused of being behind a newly discovered set of cyber attacks waged against government agencies, corporate companies and journalists across India and Southeast Asia between 2005 and 2015. | 2005-01-01 | 2015-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft | null | ['India', 'United States', 'Vietnam', 'Myanmar', 'Philippines', 'Korea, Republic of', 'Singapore', 'Saudi Arabia', 'Thailand'] | [['ASIA', 'SASIA', 'SCO'], ['NATO', 'NORTHAM'], ['ASIA', 'SCS', 'SEA'], ['ASIA', 'SEA'], ['ASIA', 'SCS', 'SEA'], ['ASIA', 'SCS', 'NEA'], ['ASIA'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['ASIA', 'SEA']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | [['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', '']] | ['APT30/Naikon/G0013 (PLA, Unit 78020)', 'PLA Unit 78020'] | ['China', 'China'] | ['Non-state actor, state-affiliation suggested', 'Non-state actor, state-affiliation suggested'] | null | 1 | 2015-01-01; 2015-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | APT30/Naikon/G0013 (PLA, Unit 78020); PLA Unit 78020 | China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://www.fireeye.com/blog/threat-research/2015/04/APT _30_and_the_mecha.html', 'http://cdn2.hubspot.net/hubfs/454298/Project_CAMERASHY_ThreatConnect_Copyright_2015.pdf'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://techcrunch.com/2015/04/12/fireeye-APT%20-30-southeast-asia-india-report/', 'https://www.fireeye.com/blog/threat-research/2015/04/APT _30_and_the_mecha.html', 'http://cdn2.hubspot.net/hubfs/454298/Project_CAMERASHY_ThreatConnect_Copyright_2015.pdf', 'https://twitter.com/elinanoor/status/1630983893573566481'] |
19 | PoseidonGroup: The Boutique | Kaspersky identified Poseidon; a Brazilian, Portuguese-speaking APT active since at least 2005 and involved in numerous espionage operations until 2016. The targets are companies in energy and utilities, telecommunications, public relations, media, financial institutions, governmental institutions, services in general and manufacturing. | 2005-01-01 | 2016-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['United States', 'Brazil', 'France', 'Kazakhstan', 'United Arab Emirates', 'India', 'Russia'] | [['NATO', 'NORTHAM'], ['SOUTHAM'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'CSTO', 'SCO'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['ASIA', 'SASIA', 'SCO'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO']] | [['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Critical infrastructure']] | [['Government / ministries', 'Energy', '', '', 'Finance'], ['Government / ministries', 'Energy', '', '', 'Finance'], ['Government / ministries', 'Energy', '', '', 'Finance'], ['Government / ministries', 'Energy', '', '', 'Finance'], ['Government / ministries', 'Energy', '', '', 'Finance'], ['Government / ministries', 'Energy', '', '', 'Finance'], ['Government / ministries', 'Energy', '', '', 'Finance']] | ['Poseidon Group'] | ['Brazil'] | ['Non-state-group'] | ['Private technology companies / hacking for hire groups without state affiliation / research entities'] | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Poseidon Group | Brazil | Non-state-group | Private technology companies / hacking for hire groups without state affiliation / research entities | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://securelist.com/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage/73673/', 'https://securityaffairs.co/wordpress/44402/cyber-crime/poseidon-group-attacks.html'] |
20 | Tulip Revolution Kyrgyzstan | Websites belonging to political parties and independent media were subject to unexplained technical failures and deliberate hacking during Kyrgyzstan's recent Parliamentary elections. Attacks included flooding journalist e-mailaccounts with large amounts of spam, and spoofing of e-mail from Kyrgyz websites located in the US. Several political websites were deliberately defaced. | 2005-02-01 | 2005-04-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Disruption | null | ['Kyrgyzstan'] | [['ASIA', 'CENTAS', 'CSTO', 'SCS']] | [['State institutions / political system', 'State institutions / political system', 'Social groups', 'End user(s) / specially protected groups', 'Media']] | [['Political parties', 'Election infrastructure / related systems', 'Advocacy / activists (e.g. human rights organizations)', '', '']] | null | ['Kyrgyzstan'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by third-party | null | null | null | null | Kyrgyzstan | Unknown - not attributed | null | ['https://opennet.net/special/kg/'] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://web.mit.edu/smadnick/www/wp/2017-10.pdf', 'https://opennet.net/special/kg/'] |
21 | NSA vs. Al Jazeera | The NSA hacked the arab Al-Jazeera | 2006-01-01 | 2000-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Qatar'] | [['ASIA', 'MENA', 'MEA', 'GULFC']] | [['Media']] | null | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.spiegel.de/international/world/nsa-spied-on-al-jazeera-communications-snowden-document-a-919681.html'] |
22 | NSA vs. Aeroflot | The NSA hacked the Russian airline Aeroflot | 2006-01-01 | 2000-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Russia'] | [['EUROPE', 'EASTEU', 'CSTO', 'SCO']] | [['Critical infrastructure']] | [['Transportation']] | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
23 | PLA vs. Westinghouse Electric & US Steel | Chinese-government backed hackers steal e-mails from a US electric company containing the company's strategy. The US unsealed an indictment against the PLA hackers in 2014. | 2006-01-01 | 2014-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by authorities of victim state | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Advocacy / activists (e.g. human rights organizations)', '']] | ['APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398)', 'PLA Unit 61398'] | ['China', 'China'] | ['State', 'State'] | null | 1 | 2014-01-01; 2014-01-01 | Domestic legal action; Domestic legal action | Attribution by receiver government / state entity; Attribution by receiver government / state entity | null | null | null | APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398 | China; China | State; State | null | ['https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor'] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://time.com/106319/heres-what-chinese-hackers-actually-stole-from-u-s-companies/', 'https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor'] |
24 | Red Storm Rising | China has downloaded 10 to 20 terabytes of data from the NIPRNet (DOD's Non-Classified IP Router Network),' said Maj. Gen. William Lord, director of information, services and integration in the Air Force's Office of Warfighting Integration and Chief Information Officer. | 2006-01-01 | 2006-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Military']] | null | ['China'] | ['State'] | null | 1 | 2006-01-01 00:00:00 | Statement in media report and political statement/technical report | Attribution by receiver government / state entity | null | null | null | null | China | State | null | ['https://gcn.com/Articles/2006/08/17/Red-storm-rising.aspx?Page=1'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://gcn.com/Articles/2006/08/17/Red-storm-rising.aspx?Page=1'] |
25 | Operation Shady RAT | Operation Shady RAT is the name given to hacker attacks in which at least 72 companies, organizations and governments around the world were systematically spied out between 2006 and 2011, attributed by Dimitri Alperovitch, a former employee of McAfee. | 2006-01-01 | 2011-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by IT-security company | Data theft | null | ['United States', 'Canada', 'Korea, Republic of', 'Taiwan', 'Vietnam', 'Germany', 'India', 'Japan', 'United Kingdom'] | [['NATO', 'NORTHAM'], ['NATO', 'NORTHAM'], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'SCS'], ['ASIA', 'SCS', 'SEA'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SCS', 'NEA'], ['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | [['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', ''], ['Government / ministries', '', 'Energy', 'Telecommunications', 'Defence industry', 'Other social groups', '', '']] | ['APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398)', 'PLA Unit 61398'] | ['China', 'China'] | ['Non-state actor, state-affiliation suggested', 'Non-state-group', 'Non-state actor, state-affiliation suggested', 'Non-state-group'] | ['', 'Criminal(s)', '', 'Criminal(s)'] | 3 | 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01; 2011-01-01 | Statement in media report and political statement/technical report; Statement in media report and political statement/technical report; Statement in media report and political statement/technical report; Statement in media report and political statement/technical report; Statement in media report and political statement/technical report; Statement in media report and political statement/technical report; Statement in media report and political statement/technical report; Statement in media report and political statement/technical report; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | IT-security community attributes attacker; IT-security community attributes attacker; IT-security community attributes attacker; IT-security community attributes attacker; IT-security community attributes attacker; IT-security community attributes attacker; IT-security community attributes attacker; IT-security community attributes attacker; Contested attribution; Contested attribution; Attribution by third-party; Attribution by third-party | null | null | null | APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398; PLA Unit 61398; PLA Unit 61398; PLA Unit 61398; APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398; APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398 | China; China; China; China; China; China; China; China; China; China; China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state-group; Non-state-group; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state-group; Non-state-group; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | ; Criminal(s); ; Criminal(s); ; Criminal(s); ; Criminal(s); ; ; ; | ['https://eugene.kaspersky.com/2011/08/18/shady-rat-shoddy-rat/', 'https://www.washingtonpost.com/national/national-security/report-identifies-widespread-cyber-spying/2011/07/29/gIQAoTUmqI_story.html?utm_term=.f1ca0cb01882', 'https://www.darkreading.com/attacks-and-breaches/shady-rat-no-china-smoking-gun/d/d-id/1099506?=&piddl_msgorder=thrd', 'https://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?emc=na&_r=1&', 'https://www.csmonitor.com/USA/2012/0914/Stealing-US-business-secrets-Experts-ID-two-huge-cyber-gangs-in-China'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://web.archive.org/web/20110804083836/http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf', 'https://eugene.kaspersky.com/2011/08/18/shady-rat-shoddy-rat/', 'https://www.washingtonpost.com/national/national-security/report-identifies-widespread-cyber-spying/2011/07/29/gIQAoTUmqI_story.html?utm_term=.f1ca0cb01882', 'https://www.darkreading.com/attacks-and-breaches/shady-rat-no-china-smoking-gun/d/d-id/1099506?=&piddl_msgorder=thrd', 'https://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?emc=na&_r=1&', 'https://www.csmonitor.com/USA/2012/0914/Stealing-US-business-secrets-Experts-ID-two-huge-cyber-gangs-in-China', 'https://www.foxnews.com/tech/u-s-cybercops-caught-flat-footed-by-massive-global-cyberattack'] |
34 | APT 1 Campaign 2006-2013 | In its seminal report about APT 1, IT-company Mandiant exposed this group as being PLA Unit 61398, conducting economic cyber-espionage against targets wordlwide. One year later, the US released its first indictment against forein hackers, in this case from the Chinese APT 1. | 2006-01-01 | 2013-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['United States', 'United Kingdom', 'Canada', 'Taiwan', 'Singapore', 'Switzerland', 'Belgium', 'Israel', 'India', 'Japan'] | [['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['NATO', 'NORTHAM'], ['ASIA', 'SCS'], ['ASIA'], ['EUROPE', 'WESTEU'], ['EUROPE', 'EU', 'NATO', 'WESTEU'], ['ASIA', 'MENA', 'MEA'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SCS', 'NEA']] | [['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science'], ['State institutions / political system', 'International / supranational organization', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Science']] | [['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', ''], ['Civil service / administration', '', '', '', '', '']] | ['APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398)', 'PLA Unit 61398'] | ['China', 'China'] | ['State', 'State'] | null | 2 | 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01 | Domestic legal action; Domestic legal action; Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; Attribution by receiver government / state entity; IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398; APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398 | China; China; China; China | State; State; State; State | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-APT%201-report.pdf', 'https://books.google.de/books?id=KNlEWdlTxYYC&pg=PA5&lpg=PA5&dq=APT +1+report+mandiant+senator&source=bl&ots=3Vjtz3BJHM&sig=ACfU3U35FSxtDFVHjIwB-4M0St6m8FAatg&hl=de&sa=X&ved=2ahUKEwiNzICc_LLyAhXxhf0HHcYJDyoQ6AF6BAglEAM#v=onepage&q=APT %201%20report%20mandiant%20senator&f=false'] |
27 | NSA vs. SWIFT | The NSA hacked the global payment system SWIFT | 2006-01-01 | 2013-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on non-political target(s), politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Belgium'] | [['EUROPE', 'EU', 'NATO', 'WESTEU']] | [['Critical infrastructure']] | [['Finance']] | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.spiegel.de/international/world/how-the-nsa-spies-on-international-bank-transactions-a-922430.html'] |
28 | Denmark Cartoon Hack | Hackers break into about 600 Danish Websites to post threats and protest against satirical cartoons of the Prophet Mohammad | 2006-03-01 | 2006-03-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Disruption | null | ['Denmark'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Other']] | null | null | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.cnet.com/news/danish-web-sites-hacked-over-mohammad-cartoons/'] |
29 | DOS Asia Department Hack | The State Department is recovering from large-scale computer break-ins worldwide over the past several weeks that appeared to be directed at its headquarters and at offices dealing with Asia. | 2006-06-01 | 2006-07-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft; Hijacking without Misuse | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['China'] | ['Unknown - not attributed'] | null | 2 | null | Attribution given, type unclear; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | null | China; China | Unknown - not attributed; Unknown - not attributed | null | ['https://books.google.de/books?id=bpgq3nwxU2EC&pg=PA71&lpg=PA71&dq=Dawn+Onley,+Dawn+and+Patience+Wait,+“Red+Storm+Rising:+DoD’s+Efforts+to+Stave+Off+Nation-+State+Cyber+Attacks+Begin+with+China,”+Government+Computer+News,+August+2006.&source=bl&ots=awl6HiyumB&sig=ACfU3U0RTfaKYx8TP4qt3qLNQSbmCoGOmQ&hl=de&sa=X&ved=2ahUKEwinsuDJgLzjAhVBEVAKHZyNBAsQ6AEwAHoECAUQAQ#v=onepage&q=Dawn%20Onley%2C%20Dawn%20and%20Patience%20Wait%2C%20“Red%20Storm%20Rising%3A%20DoD’s%20Efforts%20to%20Stave%20Off%20Nation-%20State%20Cyber%20Attacks%20Begin%20with%20China%2C”%20Government%20Computer%20News%2C%20August%202006.&f=false(S.71)'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2006/07/12/washington/12hacker.html', 'https://books.google.de/books?id=bpgq3nwxU2EC&pg=PA71&lpg=PA71&dq=Dawn+Onley,+Dawn+and+Patience+Wait,+“Red+Storm+Rising:+DoD’s+Efforts+to+Stave+Off+Nation-+State+Cyber+Attacks+Begin+with+China,”+Government+Computer+News,+August+2006.&source=bl&ots=awl6HiyumB&sig=ACfU3U0RTfaKYx8TP4qt3qLNQSbmCoGOmQ&hl=de&sa=X&ved=2ahUKEwinsuDJgLzjAhVBEVAKHZyNBAsQ6AEwAHoECAUQAQ#v=onepage&q=Dawn%20Onley%2C%20Dawn%20and%20Patience%20Wait%2C%20“Red%20Storm%20Rising%3A%20DoD’s%20Efforts%20to%20Stave%20Off%20Nation-%20State%20Cyber%20Attacks%20Begin%20with%20China%2C”%20Government%20Computer%20News%2C%20August%202006.&f=false(S.71)'] |
30 | BND vs. Spiegel & Afghan Minister | The German BND spied on the email conversation between an Afghani minister and a German Spiegel Journalist. | 2006-06-08 | 2006-12-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['Germany', 'Afghanistan'] | [['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'SASIA']] | [['State institutions / political system', 'Media'], ['State institutions / political system', 'Media']] | [['Government / ministries', ''], ['Government / ministries', '']] | ['BND'] | ['Germany'] | ['State'] | null | 1 | 2008-01-01 00:00:00 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Media-based attribution | null | null | null | BND | Germany | State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.spiegel.de/spiegel/print/d-56756328.html'] |
31 | Republican Frank Wolf, Chris Smith Hack | The office of the Republican Frank Wolf was hacked by China because of its longstanding critical attitude towards its human rights abuses, he said. | 2006-08-01 | 2006-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'End user(s) / specially protected groups']] | [['Legislative', '']] | null | ['China'] | ['State'] | null | 1 | 2008-01-01 00:00:00 | Statement in media report and political statement/technical report | Attribution by receiver government / state entity | null | null | null | null | China | State | null | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nysun.com/foreign/china-critic-says-congressional-computers-hacked/79782/'] |
32 | BIS Hack | An attack against the US Bureau of Industry and Security (BIS) forced the agency to turn off Internet access in early September 2006. Hundreds of computers must be replaced to cleanse the agency of malicious code. | 2006-08-01 | 2006-10-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by victim | Hijacking without Misuse | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Civil service / administration']] | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 2 | 2006-01-01; 2006-01-01 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by receiver government / state entity; IT-security community attributes attacker | null | null | null | null | China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://custom.crn.com/news/security/193105261/chinese-hackers-hit-commerce-department.htm?itc=refresh'] | Resources | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | none | none | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theregister.co.uk/2006/10/09/chinese_crackers_attack_us/', 'https://custom.crn.com/news/security/193105261/chinese-hackers-hit-commerce-department.htm?itc=refresh'] |
33 | US Naval War College Hack 2006 | Computer and e-mail systems were off-line at the Naval War College following a network intrusion Nov.15. According to newsreports, hackers in China attacked the Website of the college, which trains senior Navy officers and develops cyberspace strategies. | 2006-11-15 | 2006-12-04 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source) | Data theft; Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'Science']] | [['Military', '']] | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2006-01-01 00:00:00 | Media report (e.g., Reuters makes an attribution statement, without naming further sources) | Media-based attribution | null | null | null | null | China | Non-state actor, state-affiliation suggested | null | ['https://fcw.com/articles/2006/12/04/china-is-suspected-of-hacking-into-navy-site.aspx?sc_lang=en'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://fcw.com/articles/2006/12/04/china-is-suspected-of-hacking-into-navy-site.aspx?sc_lang=en'] |
26 | APT 10/Technology Theft Campaign | Beginning in or about 2006, members of the APT 10 Group, engaged in an intrusion campaign to obtain unauthorized access to the computers and computer networks of commercial and defense technology companies and U.S. Government agencies in order to steal information and data concerning a number of technologies | 2006-01-01 | 2018-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by authorities of victim state | Data theft | null | ['United States', 'Brazil', 'Canada', 'France', 'Switzerland', 'Germany', 'India', 'Japan', 'United Kingdom', 'United Arab Emirates'] | [['NATO', 'NORTHAM'], ['SOUTHAM'], ['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['EUROPE', 'WESTEU'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SCS', 'NEA'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['ASIA', 'MENA', 'MEA', 'GULFC']] | [['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', '']] | ['APT10/Stone Panda/MenuPass Team/Cloud Hopper/Red Apollo/Cicada/POTASSIUM/BRONZE RIVERSIDE/CVNX/HOGFISH/G0045 (MSS, Tianjin State Security Bureau)'] | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 2 | 2018-01-01; 2018-01-01 | Domestic legal action; Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; Attribution by third-party | null | null | null | APT10/Stone Panda/MenuPass Team/Cloud Hopper/Red Apollo/Cicada/POTASSIUM/BRONZE RIVERSIDE/CVNX/HOGFISH/G0045 (MSS, Tianjin State Security Bureau); APT10/Stone Panda/MenuPass Team/Cloud Hopper/Red Apollo/Cicada/POTASSIUM/BRONZE RIVERSIDE/CVNX/HOGFISH/G0045 (MSS, Tianjin State Security Bureau) | China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://www.justice.gov/opa/press-release/file/1121706/download', 'https://intrusiontruth.wordpress.com/2018/08/15/APT 10-was-managed-by-the-tianjin-bureau-of-the-chinese-ministry-of-state-security/'] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.wired.com/story/doj-indictment-chinese-hackers-APT%2010/', 'https://www.justice.gov/opa/press-release/file/1121706/download', 'https://intrusiontruth.wordpress.com/2018/08/15/APT 10-was-managed-by-the-tianjin-bureau-of-the-chinese-ministry-of-state-security/'] |
35 | Operation RedOctober | Kaspersky found 2013 a campaign of espionage/stealing of confidential information in many countries, mostly in Eastern Europe, but also in Western Europe and America, specifically targeting "Cryptofiler"files. Some evidence point to Russian and Chinese hackers,while precisely the origin could not be identified | 2007-01-01 | 2013-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['Russia', 'Kazakhstan', 'Azerbaijan', 'Belgium', 'India', 'Afghanistan', 'Armenia', 'Iran, Islamic Republic of', 'Turkmenistan', 'Ukraine'] | [['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['ASIA', 'CSTO', 'SCO'], ['ASIA', 'CENTAS'], ['EUROPE', 'EU', 'NATO', 'WESTEU'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SASIA'], ['ASIA', 'CENTAS', 'CSTO'], ['ASIA', 'MENA', 'MEA'], ['ASIA'], ['EUROPE', 'EASTEU']] | [['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', ''], ['Government / ministries', 'Military', 'Energy', '']] | null | ['China', 'Russia'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | null | China; Russia | Unknown - not attributed; Unknown - not attributed | null | ['https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/inception-framework-hiding-behind-proxies'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://securelist.com/the-red-october-campaign/57647/', 'https://www.bbc.com/news/technology-21013087', 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/inception-framework-hiding-behind-proxies'] |
36 | Operation Byzantine Hades (Lockheed Martin) - 2007 | Documents leaked by Edward Snowden are the first public confirmation that Chinese hackers have been able to extrapolate top secret data on the F-35 Lightning II joint strike fighter jet. According to sources, the data breach already took place in 2007 at the prime subcontractor Lockheed Martin. | 2007-01-01 | 2007-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on non-political target(s), politicized | null | Incident disclosed by media (without further information on source); Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Defence industry']] | null | ['China'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by third-party; Media-based attribution | null | null | null | null | China; China | State; State | null | ['https://thediplomat.com/2015/01/new-snowden-documents-reveal-chinese-behind-f-35-hack/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thediplomat.com/2015/01/new-snowden-documents-reveal-chinese-behind-f-35-hack/', 'https://de.reuters.com/article/usa-fighter-hacking/theft-of-f-35-design-data-is-helping-u-s-adversaries-pentagon-idUSL2N0EV0T320130619'] |
37 | Turkish Hacker vs. Sweden | Attacks on Swedish Web hosts and Web sites following the publication of a satirical drawing by Lars Vilks portraying the Muslim Prophet Mohammed as a roundabout dog by turkish hackers | 2007-01-01 | 2007-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Sweden'] | [['EUROPE', 'EU', 'NORTHEU']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Other']] | null | null | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Turkey | Non-state-group | Hacktivist(s) | ['https://www.worldbulletin.net/archive/swedish-hackers-retaliate-against-turkish-attack-h12233.html'] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.worldbulletin.net/archive/swedish-hackers-retaliate-against-turkish-attack-h12233.html'] |
38 | Swedish Hackers vs. Turkey | A group of swedish hackers has chosen to leak these user details in response to the many recent attacks on Swedish Web hosts and Web sites following the publication of a satirical drawing by Lars Vilks portraying the Muslim Prophet Mohammed as a roundabout dog. | 2007-01-01 | 2007-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other']] | null | null | ['Sweden'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Sweden | Non-state-group | Hacktivist(s) | ['https://www.worldbulletin.net/archive/swedish-hackers-retaliate-against-turkish-attack-h12233.html'] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.worldbulletin.net/archive/swedish-hackers-retaliate-against-turkish-attack-h12233.html'] |
39 | Infy/Prince of Persia | Prince of Persia Campaign used InfyMalware for almost ten years to spy on government and corporate entities, also known as Operation Mermaid. | 2007-01-01 | 2016-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by IT-security company | Data theft | null | ['Iran, Islamic Republic of', 'United States', 'Denmark', 'Israel', 'Saudi Arabia', 'Pakistan', 'Afghanistan', 'Iraq'] | [['ASIA', 'MENA', 'MEA'], ['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['ASIA', 'MENA', 'MEA'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SASIA'], ['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | [['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', '']] | ['Infy'] | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | 2016-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Infy | Unknown | Unknown - not attributed | null | ['http://blogs.360.cn/post/operation-mermaid.html', 'https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf'] | National power; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://unit42.paloaltonetworks.com/prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks/', 'http://blogs.360.cn/post/operation-mermaid.html', 'https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf'] |
40 | Darkhotel APT | DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests | 2007-01-01 | 2014-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft | null | ["Korea, Democratic People's Republic of", 'Japan', 'India', 'United States', 'Asia (region)'] | [['ASIA', 'NEA'], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'SASIA', 'SCO'], ['NATO', 'NORTHAM'], []] | [['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media', 'Other']] | [['Military', 'Intelligence agencies', 'Defence industry', '', '', ''], ['Military', 'Intelligence agencies', 'Defence industry', '', '', ''], ['Military', 'Intelligence agencies', 'Defence industry', '', '', ''], ['Military', 'Intelligence agencies', 'Defence industry', '', '', ''], ['Military', 'Intelligence agencies', 'Defence industry', '', '', '']] | ['DarkHotel'] | ['Korea, Republic of'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2014-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | DarkHotel | Korea, Republic of | Non-state actor, state-affiliation suggested | null | ['https://www.wired.com/2014/11/darkhotel-malware/', 'https://labs.bitdefender.com/2017/07/inexsmar-an-unusual-darkhotel-campaign/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | Yes | multiple | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://securelist.com/the-darkhotel-apt/66779/', 'https://www.wired.com/2014/11/darkhotel-malware/', 'https://labs.bitdefender.com/2017/07/inexsmar-an-unusual-darkhotel-campaign/'] |
41 | CozyBear vs. Obama Campaign | State-sponsored Russian hackers systematically targeted the campaign of Barack Obama and close government officials in 2007 and thus immediately before his first candidacy in 2008. Mainly phishing attacks are said to have been involved. According to the Area 1 Security report, however, Chinese influence cannot be ruled out entirely, as they carried out a massive cyberespionage operation against the 2008 presidential campaigns of Barack Obama and John McCain. | 2007-01-01 | 2017-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Election infrastructure / related systems']] | ['Cozy Bear/APT29/Dukes/Group 100/IRON HEMLOCK/NOBELIUM/UNC2452/Cozy Duke/YTTRIUM/G0016 (SVR)'] | ['Russia'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2017-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Cozy Bear/APT29/Dukes/Group 100/IRON HEMLOCK/NOBELIUM/UNC2452/Cozy Duke/YTTRIUM/G0016 (SVR) | Russia | Non-state actor, state-affiliation suggested | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.newsweek.com/russia-hacking-trump-clinton-607956'] |
42 | Poison Ivy APT | Through research, 360 Helios Team has found that, since 2007, the PoisonIvy Group has carried out 11 years of cyberespionage campaigns against Chinese key units and departments, such as national defense, government, science and technology, education and maritime agencies. The group seems to have similar interests as OceanLotus. | 2007-01-01 | 2018-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'State institutions / political system', 'Science', 'Other']] | [['Government / ministries', 'Military', '', '']] | ['PoisonIvy/APT-C-01'] | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | PoisonIvy/APT-C-01 | Unknown | Unknown - not attributed | null | ['http://blogs.360.cn/post/APT_C_01_en.html'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | Yes | One | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://blogs.360.cn/post/APT_C_01_en.html'] |
43 | Careto aka The Mask | The Mask is an advanced threat actor that has been involved in cyber-espionage operations since at least 2007. What makes The Mask special is the complexity of the toolset used by the attackers. | 2007-01-01 | 2014-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft | null | ['Morocco', 'Brazil', 'United Kingdom', 'Spain', 'France', 'Switzerland', 'Libya', 'United States'] | [['AFRICA', 'NAF', 'MENA'], ['SOUTHAM'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['EUROPE', 'WESTEU'], ['AFRICA', 'MENA', 'MEA', 'NAF'], ['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science', 'Other']] | [['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', '']] | ['Careto/The Mask'] | ['Unknown'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2014-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Careto/The Mask | Unknown | Non-state actor, state-affiliation suggested | null | ['https://securelist.com/the-caretomask-apt-frequently-asked-questions/58254/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://securelist.com/the-caretomask-apt-frequently-asked-questions/58254/'] |
44 | Putter Panda aka APT 2 | Crowdstrike has been tracking the activity of a cyber espionage group operating out of shanghai, China, with connections to the People’s liberation army third General staff department (Gsd) 12th Bureau Military Unit Cover designator (MUCd) 61486, since 2012, active at least since 2007. The group shows similarities to the conduct of APT 1 aka Comment Crew/Panda, which is aligned with PLA Unit 61398. | 2007-01-01 | 2012-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by IT-security company | Data theft | null | ['United States', 'Europe (region)'] | [['NATO', 'NORTHAM'], []] | [['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Science'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Science']] | [['Military', 'Telecommunications', 'Defence industry', ''], ['Military', 'Telecommunications', 'Defence industry', '']] | ['Putter Panda/APT 2'] | ['China'] | ['State'] | null | 1 | 2014-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Putter Panda/APT 2 | China | State | null | ['http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf'] | International power | International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf'] |
45 | The Mobile Surge | According to documents leaked by Edward Snowden, the American NSA and the British Government Communications Headquarters allegedly collected and stored dozens of pieces of data from smartphone apps in a joint initiative called The Mobile Surge until 2007. The main purpose of this was the systematic exchange of ways to obtain information, but information was also tapped, especially from apps that had been around for a while. Publicly, this initiative has been used to gain a better understanding of potential security vulnerabilities that could improve the privacy of citizens' sensitive data in the long term. The UK authority relies on the fact that it would therefore be in compliance with the law. However, it is not known how many users are affected by this action. | 2007-01-01 | 2013-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Global (region)'] | null | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | null | ['NSA/Equation Group', 'GCHQ'] | ['United Kingdom', 'United States', 'United Kingdom', 'United States'] | ['State', 'State'] | null | 2 | 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Attribution by third-party; Attribution by third-party; Attribution by third-party; Media-based attribution; Media-based attribution; Media-based attribution; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group; GCHQ; GCHQ; NSA/Equation Group; NSA/Equation Group; GCHQ; GCHQ | United Kingdom; United States; United Kingdom; United States; United States; United Kingdom; United States; United Kingdom | State; State; State; State; State; State; State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html'] |
46 | Stuxnet | US and Israeli created worm Stuxnet infiltrates Iranian nuclear facility which leads to destruction of uranium centrifuges. | 2007-01-01 | 2010-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on non-political target(s), politicized | null | Incident disclosed by IT-security company | Disruption; Hijacking with Misuse | null | ['Iran, Islamic Republic of'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'Critical infrastructure']] | [['Military', 'Defence industry']] | ['NSA/Equation Group'] | ['Israel', 'United States'] | ['State'] | null | 2 | 2011-01-01; 2011-01-01; 2011-01-01 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; Attribution by receiver government / state entity; IT-security community attributes attacker | null | null | null | NSA/Equation Group; NSA/Equation Group; NSA/Equation Group | Israel; United States; United States | State; State; State | null | ['https://www.cbsnews.com/news/iran-blames-us-israel-for-stuxnet-malware/', 'https://www.theregister.co.uk/2013/07/08/snowden_us_israel_stuxnet/', 'https://archive.f-secure.com/weblog/archives/00002791.html', 'https://web.archive.org/web/20150217023145/https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf'] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | Yes | multiple | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | Local effects, e.g., affecting only one restricted area of a country or region (incident scores 1 point in intensity) | Long lasting effects (> 24h; incident scores 2 points in intensity) | 7 | Very high political importance (e.g., critical infrastructure, military) - intensity multiplied by 1.5 | 10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.jpost.com/international/article-731254', 'https://www.darkreading.com/attacks-breaches/wiper-malware-surges-ahead-spiking-53-in-3-months', 'https://www.malwarebytes.com/blog/news/2023/03/ransomware-gunning-for-transport-sectors-ot-systems-next', 'https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=2&pagewanted=2&seid=auto&smid=tw-nytimespolitics&pagewanted=all', 'https://www.cbsnews.com/news/iran-blames-us-israel-for-stuxnet-malware/', 'https://www.theregister.co.uk/2013/07/08/snowden_us_israel_stuxnet/', 'https://archive.f-secure.com/weblog/archives/00002791.html', 'https://web.archive.org/web/20150217023145/https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf', 'https://therecord.media/more-than-2000-cybersecurity-patent-applications-filed-since-2010-report/'] |
48 | Perdido | According to the in 2013 by Snowden leaked NSA 2007 document, US intelligence services are spying on the European Union mission in New York and its embassy in Washington. One document lists 38 embassies and missions. Germany's justice minister, Sabine Leutheusser-Schnarrenberger, Robert Madelin, one of Britain's most senior officials in the European commission, a spokesman for the European commission, Guy Verhofstadt, the former Belgian primeminister and others have commented on the incident. | 2007-01-01 | 2013-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['EU (region)', 'France', 'Greece', 'Italy', 'Mexico', 'Korea, Republic of', 'Turkey', 'Japan', 'India'] | [['EU'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['EUROPE', 'NATO', 'EU', 'BALKANS'], ['EUROPE', 'NATO', 'EU'], [], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'NATO', 'MEA'], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization'], ['State institutions / political system', 'International / supranational organization']] | null | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/world/2013/jun/30/nsa-spying-europe-claims-us-eu-trade', 'https://www.theguardian.com/world/2013/jun/30/nsa-leaks-us-bugging-european-allies'] |
49 | Support of Bundeswehr Presence in Congo | The German BND hacked computers in the Democratic Republic of Congo with the goal of gathering information to support the Bundeswehr presence there | 2007-01-01 | 2007-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by media (without further information on source) | Data theft; Hijacking with Misuse | null | ['Congo, the Democratic Republic of the'] | [['AFRICA', 'SSA']] | [['Unknown']] | null | ['BND'] | ['Germany'] | ['State'] | null | 1 | 2008-01-01 00:00:00 | Media report (e.g., Reuters makes an attribution statement, without naming further sources) | Media-based attribution | null | null | null | BND | Germany | State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
50 | Operation Pawn Storm 2007 | Fancy Bear attacked the military and defense contractors of the US and some of their allies in a longterm espionage campaign, with the usage of some Zerodays | 2007-01-01 | 2014-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['United States', 'France', 'Russia', 'Pakistan', 'Holy See (Vatican City State)', 'Austria', 'Hungary', 'Poland'] | [['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['ASIA', 'SASIA', 'SCO'], ['EUROPE'], ['EUROPE', 'EU', 'WESTEU'], ['EUROPE', 'NATO', 'EU', 'EASTEU'], ['EUROPE', 'NATO', 'EU', 'EASTEU']] | [['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Social groups', 'Media']] | [['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Defence industry', 'Political opposition / dissidents / expats', '']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | null | Unknown | Unknown - not attributed | null | [] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf'] |
51 | Russian Anti-Kasparov Campaign | Pro-Russian hackers bombarded the sites of opposition leaders like Garry Kasparov in the midst of his 2007 campaign for president, keeping Kasparov's site offline or sluggish at key moments during the campaign season | 2007-01-01 | 2007-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Russia'] | [['EUROPE', 'EASTEU', 'CSTO', 'SCO']] | [['State institutions / political system', 'State institutions / political system']] | [['Political parties', 'Election infrastructure / related systems']] | null | ['Russia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | 2017-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Media-based attribution | null | null | null | null | Russia | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.wired.com/story/russia-election-hacking-playbook/'] |
52 | Azerbaijani-Armenian Cybewar 2007 Armenian Attack | Hackers identifying themselves to be connected to the Armenian state service hacked and defaced the website of the Azerbaijani state television | 2007-01-22 | 2007-01-22 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Azerbaijan'] | [['ASIA', 'CENTAS']] | [['State institutions / political system', 'Media']] | [['Election infrastructure / related systems', '']] | ['Armenian State Service'] | ['Armenia'] | ['State'] | null | 1 | 2007-01-01 00:00:00 | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Armenian State Service | Armenia | State | null | [] | Territory; Secession | Territory; Secession | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
53 | Azerbaijani-Armenian Cybewar 2007 Azerbaijani Counterattack | Bacioglu counter attacked and defaced five Armenian websites | 2007-01-29 | 2007-01-29 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Armenia'] | [['ASIA', 'CENTAS', 'CSTO']] | [['Social groups', 'Other']] | [['Advocacy / activists (e.g. human rights organizations)', '']] | ['Bacioglu'] | ['Azerbaijan'] | ['Individual hacker(s)'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Bacioglu | Azerbaijan | Individual hacker(s) | null | [] | Territory; Secession | Territory; Secession | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
54 | Azerbaijani-Armenian Cyberwar 2007 Axteam intevenes | Axteam, an Armenian hackergroup retaliated for Bacioglus attack and took down Azerbaijani websites | 2007-02-05 | 2007-02-05 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Azerbaijan'] | [['ASIA', 'CENTAS']] | [['Media']] | null | ['Axteam'] | ['Armenia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Axteam | Armenia | Non-state-group | Hacktivist(s) | [] | Territory; Secession | Territory; Secession | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
55 | Chemical Hack | By stealing the password the North Korean hacker unit could excess information including data on organizations that manufacture toxic chemical substances, and the information on types of toxic chemical substances. | 2007-03-01 | 2007-03-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['Korea, Republic of'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system', 'Science']] | [['Military', '']] | null | ["Korea, Democratic People's Republic of"] | ['State'] | null | 2 | 2014-01-01; 2014-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Receiver attributes attacker; Attribution by third-party | null | null | null | null | Korea, Democratic People's Republic of; Korea, Democratic People's Republic of | State; State | null | ['https://www.hsdl.org/?view&did=790510'] | System / ideology | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hsdl.org/?view&did=790510'] |
56 | Estonia 2007 | Different targets in Estonia attacked on the background of tensions with Russia and Russian minority in Estonia over removal of Soviet war memorial. Estonia accused Russia, but involvement of Russian government is contested and doubted by experts from the IT sector. | 2007-04-27 | 2007-05-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by media (without further information on source) | Disruption | null | ['Estonia'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | [['Government / ministries', 'Legislative', 'Political parties', '', '']] | null | ['Russia'] | ['Non-state actor, state-affiliation suggested'] | null | 3 | 2007-01-01; 2007-01-01; 2007-01-01 | Political statement / report (e.g., on government / state agency websites); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Attribution given, type unclear | Attribution by receiver government / state entity; IT-security community attributes attacker; Contested attribution | null | null | null | null | Russia; Unknown; Russia | Non-state actor, state-affiliation suggested; Unknown - not attributed; Non-state actor, state-affiliation suggested | null | ['https://www.theguardian.com/world/2007/may/17/topstories3.russia', 'http://www.spiegel.de/international/world/old-wars-and-new-estonians-accuse-kremlin-of-cyberwarfare-a-483394.html', 'https://searchsecurity.techtarget.com/news/1255548/Experts-doubt-Russian-government-launched-DDoS-attacks', 'http://www.internetnews.com/security/article.php/3678606'] | System / ideology; Autonomy | Autonomy | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.bbc.co.uk/2/hi/europe/6665195.stm', 'https://www.theguardian.com/world/2007/may/17/topstories3.russia', 'http://foreignpolicy.com/2010/12/07/who-was-behind-the-estonia-cyber-attacks/', 'http://www.spiegel.de/international/world/old-wars-and-new-estonians-accuse-kremlin-of-cyberwarfare-a-483394.html', 'https://searchsecurity.techtarget.com/news/1255548/Experts-doubt-Russian-government-launched-DDoS-attacks', 'http://www.internetnews.com/security/article.php/3678606', 'https://www.rferl.org/a/bulgaria-soviet-war-memorials-ghosts-art-nft-brezunek/32038555.html'] |
57 | DoD Systems Outage | China accused of attack on the Office of the Secretary of Defense, according to what US Secretary of Defense Robert Gatest old reporters it was unclassified OSD emailsystem. | 2007-06-01 | 2007-06-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Military']] | null | ['China'] | ['State'] | null | 1 | 2007-01-01 00:00:00 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity | null | null | null | null | China | State | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://web.archive.org/web/20070625081555/http://www.theregister.co.uk/2007/06/22/department_of_defense_email_hacked/', 'http://news.bbc.co.uk/2/hi/americas/6977533.stm', 'https://www.telegraph.co.uk/news/worldnews/1562149/Chinese-military-hacked-into-Pentagon.html', 'https://www.ft.com/content/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac'] |
58 | Chinese Espionage in Germany | Der Spiegel reports based on BfV-report attacks from China on Germany like Chinese espionage attacks on other countries , Merkel didn't comment it directly on the summit ,while "German officials believe the hackers were being directed by the People's Liberation Army ". Later German politicians asked Government to make direct remonstrations with Chinese officials, inparticular SPD politician Rolf Muetzenich, FDP expert of internal affairs Max Stadler and others. | 2007-08-01 | 2007-08-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source) | Data theft | null | ['Germany'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['China'] | ['State'] | null | 1 | 2007-01-01 00:00:00 | Statement in media report and political statement/technical report | Attribution by receiver government / state entity | null | null | null | null | China | State | null | ['https://nsarchive2.gwu.edu//NSAEBB/NSAEBB424/docs/Cyber-030.pdf'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://nsarchive2.gwu.edu//NSAEBB/NSAEBB424/docs/Cyber-030.pdf', 'http://www.spiegel.de/netzwelt/tech/computerspionage-chinesische-trojaner-auf-pcs-im-kanzleramt-a-501954.html', 'http://www.spiegel.de/international/world/espionage-report-merkel-s-china-visit-marred-by-hacking-allegations-a-502169.html', 'http://www.spiegel.de/politik/ausland/computer-spionage-fdp-will-chinesische-hacker-angriffe-in-den-bundestag-bringen-a-502253.html', 'https://www.heise.de/newsticker/meldung/Politiker-fordern-Aufklaerung-ueber-chinesische-Trojaner-Angriffe-Update-167417.html'] |
59 | UN website Defacement | The hackers, who named themselvesas "kerem125", "Gsy" and "M0sted", one of which claimed to be Turkish, defaced main UN website with logos against the US and Israel killing children, as well as claimed having hacked many other sites including the webpages for the Economic and Social Council and the Paris website of the UN Environment Program, Harvard, Norfolk and Norwich University Hospital in Britain and other US and Israeli universities, Toyota, Nestle, Yahoo Korea, MSN Italy, CocaCola, Sony, Renault. | 2007-08-12 | 2007-08-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['United Nations', 'United Nations Economic and Social Council', 'United Nations Environment Programme', 'United States', 'Israel', 'United Kingdom'] | [[], [], [], ['NATO', 'NORTHAM'], ['ASIA', 'MENA', 'MEA'], ['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['International / supranational organization', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['International / supranational organization', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['International / supranational organization', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['International / supranational organization', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['International / supranational organization', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['International / supranational organization', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | null | null | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.dailytelegraph.com.au/news/world/united-nations-website-hacked/news-story/13e8a7ae2ea91870029e1ab1c594c57f?sv=98f5643b01e22cb449ca41be1a1ce43a', 'https://www.computerworld.com/article/2543082/security0/-hackers--deface-un-site.html', 'https://www.iol.co.za/business-report/technology/un-hackers-used-sql-injection-901265', 'http://news.bbc.co.uk/2/hi/technology/6943385.stm'] |
60 | DHS breach 2007 | Sensitive information from Department of Homeland Security was exfiltrated on Chinese-language websites, the contractor charged with network security was suspected. They"don't know what was taken", but to the best of our knowledge there was no classified information [taken]." | 2007-09-01 | 2007-09-01 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://edition.cnn.com/2007/US/09/24/homelandsecurity.computers/index.html?eref='] |
61 | Chinese Attack on french systems | Francis Delon,the secretary general of France's National Defence Office ,confirmed that Chinese hackers had "penetrated outer levels" of state computer systems,but French gov. has no proof that Chinese government is behind the attacks,even though have some evidence of Chinese invorlvement. | 2007-09-01 | 2007-09-01 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['France'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Military']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker | null | null | null | null | China | Unknown - not attributed | null | ['https://www.theregister.co.uk/2007/09/12/french_cyberattacks/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://web.archive.org/web/20080118141424/http://www.france24.com/france24Public/en/news/france/20070909-Internet-piracy-france-secuirty-china-hacker.html', 'https://www.theregister.co.uk/2007/09/12/french_cyberattacks/'] |
62 | Operation Orchard | Israel reportedly used electronic warfare to take over Syrian air-defenses and feed them a false-skypicture, for the entire period of time that the Israeli fighter jets needed to cross Syria, bomb their target and return. | 2007-09-06 | 2007-09-07 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by media (without further information on source) | Disruption; Hijacking with Misuse | null | ['Syria'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Military']] | null | ['Israel'] | ['State'] | null | 1 | 2009-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Media-based attribution | null | null | null | null | Israel | State | null | [] | Territory; International power; Other | Territory; Other | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.wired.com/2007/10/how-israel-spoo/', 'http://www.spiegel.de/international/world/the-story-of-operation-orchard-how-israel-destroyed-syria-s-al-kibar-nuclear-reactor-a-658663.html'] |
63 | Satellite Hack | US commission claimed in the draft of an annual report that in October 2007, July (and October) 2008 hackers used a groundstation to interfere with the operation of two US government satellites used for earth observation. The commission did not explicitly accuse the Chinese government of orchestrating the attacks, but said they were consistent with Chinese military protocol. | 2007-10-01 | 2007-10-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on non-political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by victim | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Science']] | null | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2011-01-01 00:00:00 | Statement in media report and political statement/technical report | Attribution by receiver government / state entity | null | null | null | null | China | Non-state actor, state-affiliation suggested | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/technology/2011/oct/27/chinese-hacking-us-satellites-suspected', 'https://www.theguardian.com/technology/2011/oct/31/china-us-claims-satellite-hacking'] |
64 | Taiwan vs. Chinese Government 2007 | The Chinese government accused Taiwan's intelligence agency of compromising Chinese government, military and defence ind. networks. A secret agent Lee Fang-jung was accused of gaining access to information related to political, military, diplomatic, economic, medical and health affairs. Diff. Some Taiwanese officials indirectly confirmed, some denied the incident or claimed no awareness of it. | 2007-10-01 | 2007-10-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure']] | [['Government / ministries', 'Civil service / administration', 'Military', 'Defence industry']] | null | ['Taiwan'] | ['State'] | null | 1 | 2007-01-01 00:00:00 | Political statement / report (e.g., on government / state agency websites) | Attribution by receiver government / state entity | null | null | null | null | Taiwan | State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.scmp.com/article/613904/beijing-seeks-taiwanese-secret-agent-over-hacking'] |
65 | Chinese Espionage in GB 2007 | Jonathan Evans, the Director‐General of MI5, accused the Russian and "Chinese state organisations "of espionage against British banks and companies | 2007-11-01 | 2007-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by authorities of victim state | Data theft | null | ['United Kingdom'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2007-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by receiver government / state entity | null | null | null | null | China | Non-state actor, state-affiliation suggested | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.thetimes.co.uk/article/mi5-alert-on-chinas-cyberspace-spy-threat-tbxdgkv5l9v', 'http://www.washingtonpost.com/wp-dyn/content/article/2007/12/03/AR2007120300782.html'] |
66 | Chinese Attack against US-Election Campaigns | U.S. officials have determined that the Chinese government hacked into and spied on the 2008 presidential campaigns of Barack Obama and John McCain. Obama publicly referred to the attacks -- in general terms -- at a May 29, 2009, at White House event announcing a new cybersecurity policy. But neither the president nor his top aides publicly spoke about the identity of the hackers. | 2008-01-01 | 2008-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Political parties', 'Election infrastructure / related systems']] | null | ['China'] | ['State'] | null | 1 | 2013-01-01 00:00:00 | Statement in media report and political statement/technical report | Attribution by receiver government / state entity | null | null | null | null | China | State | null | [] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehill.com/policy/technology/304111-report-china-hacked-obama-mccain-campaigns', 'https://www.theguardian.com/global/2008/nov/07/obama-white-house-usa'] |
67 | Regin | Technical reports from Kaspersky and Symantec, which first reported on a tool called Regin in autumn 2014, show that the malware has been active for more than 10 years and has infected numerous countries such as Germany, Belgium, Brazil and two other countries in South (East) Asia. Several versions of Regin have been found in the wild, targeting various businesses, institutions, academics and individuals.
Regin is described as a versatile data collection tool that is the most dangerous spy tool after Stuxnet.
In 2015, it was identified as an NSA toolkit used by the international intelligence alliance Five Eyes. | 2008-01-01 | 2018-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | [['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available']] | ['Germany', 'Pakistan', 'Saudi Arabia', 'Russia', 'Brazil', 'Austria', 'Iran, Islamic Republic of', 'Belgium'] | [['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['SOUTHAM'], ['EUROPE', 'EU', 'WESTEU'], ['ASIA', 'MENA', 'MEA'], ['EUROPE', 'EU', 'NATO', 'WESTEU']] | [['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups', 'Critical infrastructure', 'Critical infrastructure']] | [['', 'Energy', '', '', 'Transportation', 'Telecommunications'], ['', 'Energy', '', '', 'Transportation', 'Telecommunications'], ['', 'Energy', '', '', 'Transportation', 'Telecommunications'], ['', 'Energy', '', '', 'Transportation', 'Telecommunications'], ['', 'Energy', '', '', 'Transportation', 'Telecommunications'], ['', 'Energy', '', '', 'Transportation', 'Telecommunications'], ['', 'Energy', '', '', 'Transportation', 'Telecommunications'], ['', 'Energy', '', '', 'Transportation', 'Telecommunications']] | ['GCHQ'] | ['United Kingdom'] | ['State'] | null | 2 | 2015-01-01; 2015-01-01 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker; Media-based attribution | null | null | null | GCHQ; NSA/Equation Group | United Kingdom; United States | State; State | null | ['http://www.spiegel.de/international/world/regin-malware-unmasked-as-nsa-tool-after-spiegel-publishes-source-code-a-1015255.html'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf', 'https://www.itpro.co.uk/security/33926/former-yandex-ciso-weighs-in-on-alleged-five-eyes-hack', 'http://www.spiegel.de/international/world/regin-malware-unmasked-as-nsa-tool-after-spiegel-publishes-source-code-a-1015255.html'] |
68 | Anarchist | US and UK agencies hacked into Israeli drones and other aircraft as they gathered intelligence according to the leaks of Edward Snowden. Intelligence reports stemming from GCHQ and the NSA extend from 2008 to 2012. | 2008-01-01 | 2012-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Military']] | ['NSA/Equation Group', 'GCHQ'] | ['United States', 'United Kingdom'] | ['State', 'State'] | null | 2 | 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Attribution by third-party; Attribution by third-party; Attribution by third-party; Media-based attribution; Media-based attribution; Media-based attribution; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group; GCHQ; GCHQ; NSA/Equation Group; NSA/Equation Group; GCHQ; GCHQ | United States; United Kingdom; United States; United Kingdom; United States; United Kingdom; United States; United Kingdom | State; State; State; State; State; State; State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://theintercept.com/2016/01/28/israeli-drone-feeds-hacked-by-british-and-american-intelligence/', 'https://www.jpost.com/Israel-News/Report-US-UK-intelligence-hacked-into-Israeli-drones-under-operation-Anarchist-443228', 'https://www.nytimes.com/2016/01/30/world/middleeast/israel-drones-snowden-britain-us.html'] |
69 | Blackgear | Blackgear, also known as Topgear and Comnie, has been around since at least 2008, mainly targeting entities in Taiwan, South Korea and Japan. Their objectives include organizations in the telecommunications, defense, government, aerospace, and high-tech sectors. | 2008-01-01 | 2018-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft | null | ['Taiwan', 'Korea, Republic of', 'Japan'] | [['ASIA', 'SCS'], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'SCS', 'NEA']] | [['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Telecommunications', 'Defence industry', ''], ['Government / ministries', 'Telecommunications', 'Defence industry', '']] | ['Blackgear/Topgear/Comnie'] | ['Unknown'] | ['Unknown - not attributed'] | null | 2 | 2018-01-01; 2018-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Attribution given, type unclear | IT-security community attributes attacker; Media-based attribution | null | null | null | Blackgear/Topgear/Comnie; Blackgear/Topgear/Comnie | Unknown; China | Unknown - not attributed; Non-state actor, state-affiliation suggested | null | ['https://www.securityweek.com/blackgear-cyberspies-resurface-new-tools-techniques'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://blog.trendmicro.com/trendlabs-security-intelligence/blackgear-cyberespionage-campaign-resurfaces-abuses-social-media-for-cc-communication/', 'https://www.securityweek.com/blackgear-cyberspies-resurface-new-tools-techniques'] |
70 | Optic Nerve | The british GCHQ spied on the webcams of millions of Yahoo users | 2008-01-01 | 2012-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Global (region)'] | null | [['End user(s) / specially protected groups']] | null | ['GCHQ'] | ['United Kingdom'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by third-party; Media-based attribution | null | null | null | GCHQ; GCHQ | United Kingdom; United Kingdom | State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo'] |
71 | World of Spycraft | The NSA and CIA gathered information on online gamers via various methods, including infiltrating online communities and data mining. | 2008-01-01 | 2013-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Global (region)'] | null | [['End user(s) / specially protected groups']] | null | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.propublica.org/article/world-of-spycraft-intelligence-agencies-spied-in-online-games'] |
72 | GCHQ vs. Journalists | The british GCHQ wiretapped emails of journalists, seeing them as a serious security threat | 2008-01-01 | 2008-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['United Kingdom', 'United States', 'France'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['Media'], ['Media'], ['Media']] | null | ['GCHQ'] | ['United Kingdom'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by third-party; Media-based attribution | null | null | null | GCHQ; GCHQ | United Kingdom; United Kingdom | State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/uk-news/2015/jan/19/gchq-intercepted-emails-journalists-ny-times-bbc-guardian-le-monde-reuters-nbc-washington-post'] |
73 | Chinese Attack against Alcoa | Chinese military hackers accessed the network of Alcoa, with the goal of getting access to commercial secrets | 2008-01-01 | 2008-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by authorities of victim state | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398)', 'PLA Unit 61398'] | ['China', 'China'] | ['State', 'State'] | null | 1 | 2014-01-01; 2014-01-01 | Domestic legal action; Domestic legal action | Attribution by receiver government / state entity; Attribution by receiver government / state entity | null | null | null | APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398 | China; China | State; State | null | [] | International power | International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor'] |
75 | Pinch duke | The campaign of Pinch Duke is malware toolset attributed to the Dukes, a Russian state-sponsored cyberespionage operation with the joint goal of gathering intelligence on the sentiments of the targeted countries. | 2008-01-01 | 2015-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft | null | ['Georgia', 'Turkey', 'Kazakhstan', 'Azerbaijan', 'Uzbekistan', 'Kyrgyzstan'] | [['ASIA', 'CENTAS'], ['ASIA', 'NATO', 'MEA'], ['ASIA', 'CSTO', 'SCO'], ['ASIA', 'CENTAS'], ['ASIA', 'CENTAS', 'CSTO', 'SCO'], ['ASIA', 'CENTAS', 'CSTO', 'SCS']] | [['State institutions / political system', 'International / supranational organization', 'Social groups'], ['State institutions / political system', 'International / supranational organization', 'Social groups'], ['State institutions / political system', 'International / supranational organization', 'Social groups'], ['State institutions / political system', 'International / supranational organization', 'Social groups'], ['State institutions / political system', 'International / supranational organization', 'Social groups'], ['State institutions / political system', 'International / supranational organization', 'Social groups']] | [['Government / ministries', '', 'Criminal'], ['Government / ministries', '', 'Criminal'], ['Government / ministries', '', 'Criminal'], ['Government / ministries', '', 'Criminal'], ['Government / ministries', '', 'Criminal'], ['Government / ministries', '', 'Criminal']] | ['Cozy Bear/APT29/Dukes/Group 100/IRON HEMLOCK/NOBELIUM/UNC2452/Cozy Duke/YTTRIUM/G0016 (SVR)'] | ['Russia'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2015-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Cozy Bear/APT29/Dukes/Group 100/IRON HEMLOCK/NOBELIUM/UNC2452/Cozy Duke/YTTRIUM/G0016 (SVR) | Russia | Non-state actor, state-affiliation suggested | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf'] |
76 | Project Chanology | Anonymous attacks (with DDoS and other disruption-oriented attacks) the Church of Scientology firstly in response to the take-down of the Tom Cruise video, against Scientology's actions viewed as Internet censorship. | 2008-01-01 | 2008-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Social groups']] | [['Religious']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/technology/2008/feb/04/news', 'http://artofthemooc.org/wiki/project-chanology/', 'https://www.cnet.com/news/anonymous-hackers-take-on-the-church-of-scientology/'] |
77 | Tibetean Activists Attacked | Pro-Tibet activist groups attacked through e-mails allegedly from China on the background of increased protests | 2008-03-01 | 2008-03-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by IT-security company | Data theft | null | ['China', 'United States'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO'], ['NATO', 'NORTHAM']] | [['Social groups'], ['Social groups']] | [['Advocacy / activists (e.g. human rights organizations)'], ['Advocacy / activists (e.g. human rights organizations)']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | IT-security community attributes attacker | null | null | null | null | China | Unknown - not attributed | null | [] | System / ideology; Secession | System/ideology; Secession | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theregister.co.uk/2008/03/22/pro_tibetan_groups_targeted/', 'http://www.washingtonpost.com/wp-dyn/content/article/2008/03/21/AR2008032102605.html'] |
78 | "Chinese Civil Militia" attack on Pentagon | A group of Chinese hackers, belonging to what Western experts say is "civilian cyber militia" in China, has claimed to gain unauthorized entry to several high-protected computer systems of the US including the servers of the Pentagon and downloaded information. The hackers' group also said that the Chinese government sometimes pays it secretly. | 2008-03-07 | 2008-03-07 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by attacker | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | China | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.spamfighter.com/News-10011-Chinese-Hackers-Claim-Gaining-Unauthorized-Entry-into-Pentagon.htm', 'http://edition.cnn.com/2008/TECH/03/07/china.hackers/index.html'] |
79 | Byzantine Candor | More than 50 megabytes of email messages and a complete list of user names and passwords from an unspecified US government agency were stolen according to a State Department cable made public by WikiLeaks. At least some of the attacks originated from a Shanghai-based hacker group linked to the People’s Liberation Army’s Third Department | 2008-04-01 | 2008-10-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Election infrastructure / related systems']] | ['APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398)', 'PLA Unit 61398'] | ['China', 'China'] | ['State', 'State'] | null | 1 | 2011-01-01; 2011-01-01 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by third-party; Attribution by third-party | null | null | null | APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398 | China; China | State; State | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/us-china-usa-cyberespionage/special-report-in-cyberspy-vs-cyberspy-china-has-the-edge-idUSTRE73D24220110414', 'https://www.nytimes.com/2010/12/05/world/asia/05wikileaks-china.html', 'https://venturebeat.com/2010/12/04/wikileaks-documents-lay-bare-vast-hacking-attempts-by-chinese-leaders/', 'https://www.smh.com.au/technology/beijing-used-hackers-to-find-us-secrets-20101205-18lf8.html'] |
80 | Belgium State Department Hack 2008 | Belgium officials said that government computer networks are targeted by attacks from China which could benefit Chinese government | 2008-04-01 | 2008-04-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by victim | Data theft | null | ['Belgium'] | [['EUROPE', 'EU', 'NATO', 'WESTEU']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2008-01-01 00:00:00 | Statement in media report and political statement/technical report | Attribution by receiver government / state entity | null | null | null | null | China | Non-state actor, state-affiliation suggested | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.sophos.com/en-us/press-office/press-releases/2008/05/belgium.aspx', 'https://www.theregister.co.uk/2008/05/08/belgium_india_china_warnings/'] |
81 | Chinese Hacktivist Attack on CNN | Chinese hackers organised several attacks on CNN and later other websites. | 2008-04-17 | 2008-05-05 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Media']] | null | null | ['China'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | China | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://chinascope.org/archives/6680', 'https://www.pcworld.com/article/144809/article.html', 'https://news.netcraft.com/archives/2008/04/22/cnn_site_bears_the_brunt_of_chinese_attackers.html', 'https://www.zdnet.com/article/chinese-hackers-disable-cnn-com-for-three-hours/'] |
82 | DDOS on RFE - 2008 | Primarily Radio Free Europe in Belarus (though also in some other countries) was targeted with DDoS allegedly related to its coverage of a rally organized by opposition to the Belarusian opposition. RFE provided no solid evidence, but said the Belarusian government was most likely behind the attacks. Other Belarusian websites including Charter97 were also hit. The botnet behind the attacks was a Russian-language botnet that had been active in other politically motivated attacks in there centpast. | 2008-04-26 | 2008-04-28 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by victim | Disruption | null | ['Belarus', 'Serbia', 'Russia', 'Tajikistan', 'United States'] | [['EUROPE', 'EASTEU', 'CSTO'], ['EUROPE', 'BALKANS', 'WBALKANS'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['ASIA', 'CENTAS', 'CSTO', 'SCO'], ['NATO', 'NORTHAM']] | [['Media'], ['Media'], ['Media'], ['Media'], ['Media']] | null | null | ['Belarus'] | ['State'] | null | 1 | 2008-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker | null | null | null | null | Belarus | State | null | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theregister.co.uk/2008/04/29/radio_free_europe_ddos_attacks/'] |
83 | Chilean Education Data Leak | The Education Ministry, Electoral Service and military servers used by the Chilean government have been infiltrated by a hacker. "Confidential" personal records of over 6 million Chileans were published then. The hacker claimed the reason was to show the lack of overall data protection there exists in Chile. | 2008-05-12 | 2008-05-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Chile'] | [['SOUTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Military']] | null | ['Chile'] | ['Individual hacker(s)'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Chile | Individual hacker(s) | null | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.bbc.co.uk/2/hi/americas/7395295.stm'] |
84 | Anti-Lithuanian Defacement 2008 | 300 Lithuanian official and private websites were defaced with communist symbols after the ban on communist symbols in the country, but the Government didn't accused Russia directly | 2008-06-01 | 2008-06-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['Lithuania'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Political parties', '']] | null | ['Russia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Russia | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2008/07/01/world/europe/01baltic.html', 'https://www.irishtimes.com/news/lithuania-accuses-russian-hackers-of-cyber-assault-after-collapse-of-over-300-websites-1.942155', 'https://www.zdnet.com/article/300-lithuanian-sites-hacked-by-russian-hackers/'] |
85 | GhostNet | Chinese hacker network GhostNet steals information from South and South East Asian government servers and from the Office of the Dalai Lama | 2008-06-01 | 2009-03-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['China', 'United States', 'India', 'Vietnam', 'Taiwan', 'Bangladesh', 'Philippines', 'Hong Kong', 'Laos'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO'], ['NATO', 'NORTHAM'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SCS', 'SEA'], ['ASIA', 'SCS'], ['ASIA', 'SASIA'], ['ASIA', 'SCS', 'SEA'], ['ASIA'], ['ASIA', 'SEA']] | [['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other'], ['State institutions / political system', 'State institutions / political system', 'International / supranational organization', 'Media', 'Other']] | [['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', ''], ['Government / ministries', '', '', '', '']] | ['Ghostnet'] | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by third-party | null | null | null | Ghostnet | China | Unknown - not attributed | null | ['http://www.nartv.org/mirror/ghostnet.pdf', 'https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://de.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network', 'http://www.nartv.org/mirror/ghostnet.pdf', 'https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf'] |
86 | Longtime CIA campaign against China | Chinese antivirus firm Qihoo 360 said CIA hackers have spent more than a decade breaking into the Chinese airline industry and other targets, a blunt allegation of American espionage from a Beijing-based firm. | 2008-07-01 | 2019-09-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'Science', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure']] | [['Government / ministries', '', 'Telecommunications', 'Chemicals', 'Transportation']] | ['CIA'] | ['United States'] | ['State'] | null | 1 | 2020-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | CIA | United States | State | null | ['https://blogs.360.cn/post/APT-C-39_CIA_EN.html'] | International power | International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/us-china-usa-cia-idUSKBN20Q2SI', 'https://blogs.360.cn/post/APT-C-39_CIA_EN.html'] |
87 | Cyberdomain Russia-Georgia War | Different targets in Georgia were attacked, mostly with DDoS, in parallel with the Russo-Georgian War over South Ossetia and Abkhazia. Georgia accused Russia, but involvement of Russian government was contested at that time. The website of the Georgian Foreign Ministry was also affected, according to the ministry. | 2008-07-20 | 2008-08-14 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['Georgia'] | [['ASIA', 'CENTAS']] | [['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure']] | [['Government / ministries', 'Energy', '', 'Legislative', 'Military', 'Telecommunications', 'Finance']] | null | ['Russia'] | ['State'] | null | 3 | 2008-01-01; 2008-01-01; 2008-01-01 | Statement in media report and political statement/technical report; Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; IT-security community attributes attacker; Attribution by third-party | null | null | null | null | Russia; Russia; Russia | State; Non-state actor, state-affiliation suggested; State | null | ['https://www.nytimes.com/2008/08/13/technology/13cyber.html', 'https://www.reuters.com/article/us-georgia-ossetia-hackers/georgia-says-russian-hackers-block-govt-websites-idUSLB2050320080811', 'http://www.fistfulofgold.com/Documents/ProjectGreyGoose.pdf'] | International power | International power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2008/08/13/technology/13cyber.html', 'http://www.cybertalkblog.co.uk/unlikely-that-russians-hacked-georgia-though-attacks-were-political/', 'https://www.newsweek.com/how-russia-may-have-attacked-georgias-internet-88111', 'https://www.reuters.com/article/us-georgia-ossetia-hackers/georgia-says-russian-hackers-block-govt-websites-idUSLB2050320080811', 'http://www.fistfulofgold.com/Documents/ProjectGreyGoose.pdf', 'https://www.telegraph.co.uk/news/worldnews/europe/georgia/2553058/Russia-continues-cyber-war-on-Georgia.html'] |
88 | Georgia vs. Russian Media 2008 | DDoS attacks against RT and RIA Novosty in the middle of the Georgian Conflict 2008. | 2008-08-10 | 2008-08-10 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Russia'] | [['EUROPE', 'EASTEU', 'CSTO', 'SCO']] | [['State institutions / political system', 'Media']] | [['Government / ministries', '']] | null | ['Georgia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Statement in media report and political statement/technical report | Receiver attributes attacker | null | null | null | null | Georgia | Non-state-group | Hacktivist(s) | [] | International power; Secession | International power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://bits.blogs.nytimes.com/2008/08/11/georgia-takes-a-beating-in-the-cyberwar-with-russia/?mtrref=www.google.com'] |
89 | APT-C-39 campaign against China | The American CIA spied on various companies in China over the years between 2008 and 2019 | 2008-09-01 | 2019-06-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Science']] | [['Government / ministries', 'Energy', 'Telecommunications', 'Defence industry', '']] | ['APT-C-39/CIA'] | ['United States'] | ['State'] | null | 1 | 2020-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | APT-C-39/CIA | United States | State | null | [] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://blogs.360.cn/post/APT-C-39_CIA_EN.html'] |
90 | Palin Doxxing | Alaska Governor and vice presidential candidate Sarah Palin's email account hacked by student David Kernell during the 2008 presidential election campaign and the gained materials posted. | 2008-09-16 | 2008-09-16 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Data theft & Doxing | [['Sarah Palin']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Political parties', '']] | ['David Kernell'] | ['United States'] | ['Individual hacker(s)'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | David Kernell | United States | Individual hacker(s) | null | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.telegraph.co.uk/news/worldnews/sarah-palin/7750050/Sarah-Palin-vs-the-hacker.html', 'http://news.bbc.co.uk/2/hi/americas/7631225.stm', 'https://nypost.com/2008/09/19/dem-pols-son-was-hacker/', 'https://www.foxnews.com/us/palin-set-to-take-stand-in-tenn-hacking-trial'] |
91 | Agent.btz - US; Operation Buckshot Yankee (against the breach) | Classified and unclassified U.S. military networks were infected with worm Agent.btz, which spread at the computers of the DOD and CENTCOM. The worm is attributed to Russia, specifically by US Intelligence, and is associated with Turla, according to Kasperski lab analysis, though members of the US military involved in Operation Buckshot Yankee are reluctant to call agent.btz the work of a hostile government. | 2008-10-01 | 2008-11-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Military']] | ['Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center)'] | ['Russia'] | ['State'] | null | 2 | 2008-01-01; 2008-01-01 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; IT-security community attributes attacker | null | null | null | Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center); Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center) | Russia; Russia | State; State | null | ['https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf', 'https://www.wired.com/2010/08/insiders-doubt-2008-pentagon-hack-was-foreign-spy-attack/', 'https://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html', 'https://www.gdata.de/blog/2014/02/23822-uroburos-hochkomplexe-spionagesoftware-mit-russischen-wurzeln'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html?utm_term=.3da4823e8b45', 'http://articles.latimes.com/2008/nov/28/nation/na-cyberattack28', 'https://securelist.com/blog/virus-watch/58551/agent-btz-a-source-of-inspiration/', 'https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf', 'https://www.technewsworld.com/story/70699.html', 'https://www.wired.com/2010/08/insiders-doubt-2008-pentagon-hack-was-foreign-spy-attack/', 'https://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html', 'https://www.gdata.de/blog/2014/02/23822-uroburos-hochkomplexe-spionagesoftware-mit-russischen-wurzeln'] |
92 | Indian Hacktivists vs. Pakistan | OGRAs Website hacked by Indian Hackers, named HMG. | 2008-11-01 | 2008-11-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | null | ['Hindu Militant Group'] | ['India'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Hindu Militant Group | India | Non-state-group | Hacktivist(s) | [] | System / ideology | Territory; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://propakistani.pk/2008/11/18/ogra-defacement-or-welcome/'] |
93 | Pakistan Hacktivists vs. India | In response to an action by HMG, Indian scriptkiddie, who hacked OGRA’s website, A Pakistani Group called PCA (Pakistan CyberArmy) has reportedly hacked at least five Indian websites | 2008-11-01 | 2008-11-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', '']] | ['Pakistan Cyber Army'] | ['Pakistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Pakistan Cyber Army | Pakistan | Non-state-group | Hacktivist(s) | [] | System / ideology | Territory; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://propakistani.pk/2008/11/24/here-we-go-again/'] |
94 | Operation CastLead | Israel began a military assault on Hamas’s infrastructure in Gaza on December 27, 2008, called “Operation CastLead.” A cyberbacklash by Arabic hackers targeted thousands of Israeli government and civilian Websites. In a later stage of the conflict, Anonymous was also involved. | 2008-12-01 | 2012-11-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'Other']] | null | ['Anonymous/Arabic Hackers'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous/Arabic Hackers | Unknown | Non-state-group | Hacktivist(s) | ['http://web.mit.edu/smadnick/www/wp/2017-10.pdf'] | System / ideology; Secession | System/ideology; Resources; Secession | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://web.mit.edu/smadnick/www/wp/2017-10.pdf', 'http://web.mit.edu/smadnick/www/wp/2017-10.pdf'] |
95 | French embassy in Beijing Hack | The website of the French embassy in Beijing has apparently come under a cyber-attack after President Nicolas Sarkozy outraged China by meeting Tibetan spiritual leader, the Dalai Lama. | 2008-12-01 | 2008-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['France'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system']] | null | null | ['China'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | China | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://zeenews.india.com/news/world/french-embassy-website-in-china-hacked_490316.html'] |
96 | Gaza Offense Attack | Israel's government website paralyzed by hackergroup, Israeli officials believe it may have been carried out by a criminal organization from the former Soviet Union, and paid for by Hamas or Hezbollah. | 2009-01-01 | 2009-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by victim | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Unknown'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | null | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity | null | null | null | null | Unknown | Non-state-group | Criminal(s) | [] | System / ideology; Secession | System/ideology; Secession | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.haaretz.com/1.5065382'] |
97 | Insurgent Drone Hack | Iraqi insurgents hack US drones and intercept live video feeds, backing by Iran suggested | 2009-01-01 | 2009-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Military']] | null | ['Iraq'] | ['Non-state-group'] | ['Private technology companies / hacking for hire groups without state affiliation / research entities'] | 1 | null | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Receiver attributes attacker | null | null | null | null | Iraq | Non-state-group | Private technology companies / hacking for hire groups without state affiliation / research entities | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/world/2009/dec/17/skygrabber-american-drones-hacked'] |
98 | Platinum Group | Platinum has been targeting its victims since at least as early as 2009, and may have been active for several year sprior. Like many such groups, Platinum seeks to steal sensitive intellectual property related to government interests, but its range of preferred targets is consistently limited to specific governmental organizations, defense institutes, intelligence agencies, diplomatic institutions, and telecommunication providers in South and Southeast Asia. | 2009-01-01 | 2016-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['Malaysia', 'Indonesia', 'China', 'Singapore', 'India', 'Thailand'] | [['ASIA', 'SCS', 'SEA'], ['ASIA', 'SCS', 'SEA'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO'], ['ASIA'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SEA']] | [['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | [['Government / ministries', 'Defence industry', '', ''], ['Government / ministries', 'Defence industry', '', ''], ['Government / ministries', 'Defence industry', '', ''], ['Government / ministries', 'Defence industry', '', ''], ['Government / ministries', 'Defence industry', '', ''], ['Government / ministries', 'Defence industry', '', '']] | ['Platinum'] | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Platinum | Unknown | Unknown - not attributed | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf', 'https://www.microsoft.com/security/blog/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/?source=mmpc'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | Yes | multiple | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf', 'https://www.microsoft.com/security/blog/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/?source=mmpc'] |
99 | Winnti Umbrella aka Axiom aka DeputyDog | Chinese State-Espionage Group Winnti Umbrella conducted espionage against targets since 2009. | 2009-01-01 | 2018-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft | null | ['United States', 'Japan', 'Korea, Republic of', 'Thailand', 'China'] | [['NATO', 'NORTHAM'], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'SEA'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | [['Government / ministries', 'Advocacy / activists (e.g. human rights organizations)', '', ''], ['Government / ministries', 'Advocacy / activists (e.g. human rights organizations)', '', ''], ['Government / ministries', 'Advocacy / activists (e.g. human rights organizations)', '', ''], ['Government / ministries', 'Advocacy / activists (e.g. human rights organizations)', '', ''], ['Government / ministries', 'Advocacy / activists (e.g. human rights organizations)', '', '']] | ['Axiom/APT17/Tailgater Team/Group 72/Dogfish/G0001 (MSS, Jinan Bureau) <\xa0Winnti Umbrella/G0044\xa0'] | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2018-01-01 00:00:00 | Political statement / report (e.g., on government / state agency websites) | Attribution by third-party | null | null | null | Axiom/APT17/Tailgater Team/Group 72/Dogfish/G0001 (MSS, Jinan Bureau) < Winnti Umbrella/G0044 | China | Non-state actor, state-affiliation suggested | null | ['https://401trg.com/burning-umbrella/'] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://401trg.com/burning-umbrella/'] |
100 | NSA vs. Credit Card Companies | The NSA spied on various worldwide creditcard companies | 2009-01-01 | 2013-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Global (region)'] | null | [['Critical infrastructure']] | [['Finance']] | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
101 | Project Mystic | The NSA accessed various worldwide communication networks and wire tapped the corresponding communications | 2009-01-01 | 2013-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['Bahamas', 'Afghanistan', 'Mexico', 'Kenya', 'Philippines'] | [[], ['ASIA', 'SASIA'], [], ['AFRICA', 'SSA'], ['ASIA', 'SCS', 'SEA']] | [['Critical infrastructure'], ['Critical infrastructure'], ['Critical infrastructure'], ['Critical infrastructure'], ['Critical infrastructure']] | [['Telecommunications'], ['Telecommunications'], ['Telecommunications'], ['Telecommunications'], ['Telecommunications']] | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://theintercept.com/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/'] |
102 | DarkUniverse | Various civilian and military institutions were hacked by the Duke campaign via spear-phishing | 2009-01-01 | 2017-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft | null | ['Syria', 'Iran, Islamic Republic of', 'Afghanistan', 'Tanzania', 'Ethiopia', 'Sudan', 'Russia', 'Belarus', 'United Arab Emirates'] | [['ASIA', 'MENA', 'MEA'], ['ASIA', 'MENA', 'MEA'], ['ASIA', 'SASIA'], ['AFRICA', 'SSA'], ['AFRICA', 'SSA'], ['AFRICA', 'MEA', 'NAF'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['EUROPE', 'EASTEU', 'CSTO'], ['ASIA', 'MENA', 'MEA', 'GULFC']] | [['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Military', 'Criminal', ''], ['Military', 'Criminal', ''], ['Military', 'Criminal', ''], ['Military', 'Criminal', ''], ['Military', 'Criminal', ''], ['Military', 'Criminal', ''], ['Military', 'Criminal', ''], ['Military', 'Criminal', ''], ['Military', 'Criminal', '']] | ['DarkUniverse'] | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | DarkUniverse | Unknown | Unknown - not attributed | null | ['https://threatpost.com/darkuniverse-apt-targeted-spy-attacks/149927/', 'https://securelist.com/darkuniverse-the-mysterious-apt-framework-27/94897/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://threatpost.com/darkuniverse-apt-targeted-spy-attacks/149927/', 'https://securelist.com/darkuniverse-the-mysterious-apt-framework-27/94897/'] |
103 | Operation Troy | The Lazarus Group prepared with Operation Troy for the operation DarkSeoul in 2013 | 2009-01-01 | 2012-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Disruption; Hijacking with Misuse | null | ['Korea, Republic of', 'United States'] | [['ASIA', 'SCS', 'NEA'], ['NATO', 'NORTHAM']] | [['State institutions / political system'], ['State institutions / political system']] | [['Military'], ['Military']] | ['Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110)'] | ["Korea, Democratic People's Republic of"] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2016-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110) | Korea, Democratic People's Republic of | Non-state actor, state-affiliation suggested | null | ['https://www.group-ib.com/blog/lazarus', 'https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf'] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | Yes | One | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.mcafee.com/enterprise/en-us/assets/white-papers/wp-dissecting-operation-troy.pdf', 'https://www.group-ib.com/blog/lazarus', 'https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf'] |
104 | Chinese Attack on South Korea 2009 | South Korea’s primary intelligence agency claimed that China-based hackers stole confidential material from the country’s diplomatic and security services | 2009-01-01 | 2009-01-01 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['Korea, Republic of'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Intelligence agencies']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Political statement / report (e.g., on government / state agency websites) | Receiver attributes attacker | null | null | null | null | China | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.fastcompany.com/1696014/south-koreas-power-structure-hacked-digital-trail-leads-china'] |