ID
int64 2
2.11k
| name
stringlengths 4
279
| description
stringlengths 19
3.75k
| start_date
stringlengths 10
10
⌀ | end_date
stringlengths 10
10
⌀ | inclusion_criteria
stringclasses 22
values | inclusion_criteria_subcode
stringclasses 2
values | source_incident_detection_disclosure
stringclasses 26
values | incident_type
stringclasses 23
values | receiver_name
stringclasses 172
values | receiver_country
stringlengths 8
438
⌀ | receiver_region
stringlengths 8
1.24k
⌀ | receiver_category
stringlengths 11
3.52k
⌀ | receiver_category_subcode
stringlengths 11
1.32k
⌀ | initiator_name
stringlengths 7
480
⌀ | initiator_country
stringclasses 131
values | initiator_category
stringclasses 25
values | initiator_category_subcode
stringclasses 23
values | number_of_attributions
int64 0
10
| attribution_date
stringclasses 232
values | attribution_type
stringclasses 127
values | attribution_basis
stringclasses 101
values | attributing_actor
stringclasses 135
values | attribution_it_company
stringclasses 7
values | attributing_country
stringclasses 79
values | attributed_initiator
stringlengths 3
7.87k
⌀ | attributed_initiator_country
stringclasses 195
values | attributed_initiator_category
stringclasses 75
values | attributed_initiator_subcategory
stringclasses 50
values | sources_attribution
stringlengths 2
1.25k
| cyber_conflict_issue
stringclasses 56
values | offline_conflict_issue
stringclasses 62
values | offline_conflict_name_HIIK
stringclasses 21
values | offline_conflict_intensity
stringclasses 3
values | offline_conflict_intensity_subcode
stringclasses 5
values | number_of_political_responses
int64 0
7
| political_response_date
stringclasses 41
values | political_response_type
stringclasses 20
values | political_response_type_subcode
stringclasses 23
values | political_response_country
stringclasses 31
values | political_response_actor
stringclasses 41
values | zero_days
stringclasses 4
values | zero_days_subcode
stringclasses 2
values | MITRE_initial_access
stringclasses 20
values | MITRE_impact
stringclasses 28
values | user_interaction
stringclasses 2
values | has_disruption
bool 2
classes | data_theft
stringclasses 4
values | disruption
stringclasses 4
values | hijacking
stringclasses 4
values | physical_effects_spatial
stringclasses 4
values | physical_effects_temporal
stringclasses 4
values | unweighted_cyber_intensity
int64 0
7
| target_multiplier
stringclasses 3
values | weighted_cyber_intensity
float64 0
10
⌀ | impact_indicator
stringclasses 4
values | impact_indicator_value
float64 0
13
⌀ | functional_impact
stringclasses 6
values | intelligence_impact
stringclasses 6
values | political_impact_affected_entities
stringclasses 5
values | political_impact_affected_entities_exact_value
float64 0
150
⌀ | political_impact_third_countries
stringclasses 4
values | political_impact_third_countries_exact_value
float64 0
6
⌀ | economic_impact
stringclasses 2
values | economic_impact_exact_value
float64 0
100M
⌀ | economic_impact_currency
stringclasses 2
values | state_responsibility_indicator
stringclasses 4
values | IL_breach_indicator
stringclasses 32
values | IL_breach_indicator_subcode
stringclasses 21
values | evidence_for_sanctions_indicator
stringclasses 3
values | number_of_legal_responses
int64 0
3
| legal_response_date
stringclasses 18
values | legal_response_type
stringclasses 8
values | legal_response_type_subcode
stringclasses 4
values | legal_response_country
stringclasses 15
values | legal_response_actor
stringclasses 20
values | legal_attribution_reference
stringclasses 11
values | legal_attribution_reference_subcode
stringclasses 5
values | legal_response_indicator
stringclasses 4
values | casualties
float64 | sources_url
stringlengths 2
9.44k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
205 | XtReMiSt defaces Indian government pages | Pakistani hacker defaces several Indian government and commercial websites and leaves political messages about Kashmir. | 2011-05-21 | 2011-05-21 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', '']] | ['XtReMiSt'] | ['Pakistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | XtReMiSt | Pakistan | Non-state-group | Hacktivist(s) | [] | System / ideology; Territory; International power | Territory; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/05/200-important-some-govt-websites-of.html'] |
206 | ALLAH`U EKBER-Team defaces webpage of Thai Democratic Party | Hacker defaces a website of the Thai Democratic Party. | 2011-05-22 | 2011-05-22 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Thailand'] | [['ASIA', 'SEA']] | [['State institutions / political system']] | [['Political parties']] | ['ALLAH`UEKBER-Team'] | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | ALLAH`UEKBER-Team | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/05/democrat-website-youngdemocratorg.html'] |
207 | Anonymous vs. US Chamber of Commerce | The hacker collective Anonymous took down the US chamber of commerce in response to an planed copyright act | 2011-05-27 | 2011-05-27 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/05/anonymous-takes-down-us-chamber-of.html'] |
208 | Lulzsec vs. PBS | The hacking group LulzSec breaks into PBS and pastes in a report that says Tupac Shakur is living in NewZealand, in protest against critical reporting on WikiLeaks. | 2011-05-30 | 2011-05-30 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['LulzSec'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | LulzSec | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.cnet.com/news/pbs-hacked-says-tupac-is-still-alive/', 'https://www.forbes.com/sites/andygreenberg/2011/05/30/pbs-hacked-after-critical-wikileaks-show/#2a90db8a2fb0'] |
209 | China vs. Vietnam Hacker | Computer hackers from Vietnam and China have attacked websites including portals run by each other's governments, amid a sea-border row. | 2011-06-01 | 2011-06-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Vietnam'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system']] | null | null | ['China'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | China | Non-state-group | Hacktivist(s) | [] | System / ideology; Territory | Territory; Resources | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.bbc.com/news/world-asia-pacific-13707921'] |
210 | China vs. Vietnam Hacker | Computer hackers from Vietnam and China have attacked websites including portals run by each other's governments, amid a sea-border row. | 2011-06-01 | 2011-06-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system']] | null | null | ['Vietnam'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Vietnam | Non-state-group | Hacktivist(s) | [] | System / ideology; Territory | Territory; Resources | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
211 | Strider attack against various countries through Remsec malware | A previously unknown hacking group known as "Strider" or "ProjectSauron" has carried out a cyber espionage campaign against targets in Russia, Belgium, China, Iran, Sweden and Rwanda. The Strider crew has apparently been active since at least 2011. Their capabilities and the nature of the targets prompts experts to suspect that it is a nation-state group. The Strider group is using a sophisticated strain of malware dubbed Remsec. | 2011-06-01 | 2016-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Iran, Islamic Republic of', 'Sweden', 'China', 'Russia', 'Belgium'] | [['ASIA', 'MENA', 'MEA'], ['EUROPE', 'EU', 'NORTHEU'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['EUROPE', 'EU', 'NATO', 'WESTEU']] | [['State institutions / political system', 'Critical infrastructure', 'Other', 'State institutions / political system', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Other', 'State institutions / political system', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Other', 'State institutions / political system', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Other', 'State institutions / political system', 'Critical infrastructure'], ['State institutions / political system', 'Critical infrastructure', 'Other', 'State institutions / political system', 'Critical infrastructure']] | [['Government / ministries', 'Telecommunications', '', 'Military', 'Finance'], ['Government / ministries', 'Telecommunications', '', 'Military', 'Finance'], ['Government / ministries', 'Telecommunications', '', 'Military', 'Finance'], ['Government / ministries', 'Telecommunications', '', 'Military', 'Finance'], ['Government / ministries', 'Telecommunications', '', 'Military', 'Finance']] | ['Strider/Project Sauron'] | ['Unknown'] | ['State'] | null | 1 | 2016-01-01 00:00:00 | Statement in media report and political statement/technical report | IT-security community attributes attacker | null | null | null | Strider/Project Sauron | Unknown | State | null | ['https://securityaffairs.co/wordpress/50119/intelligence/projectsauron-apt-stride.html'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://securelist.com/faq-the-projectsauron-apt/75533/', 'https://securityaffairs.co/wordpress/50119/intelligence/projectsauron-apt-stride.html'] |
212 | Syria information war | Release of dozens of revealing Syrian messages points to a newer a of information warfare | 2011-06-01 | 2012-02-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source) | Data theft & Doxing | null | ['Syria'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Syria'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Syria | Unknown - not attributed | null | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/us-syria-assads-emails-naked/sexy-photo-in-hacked-assad-e-mails-causes-comment-idUSBRE82G09L20120317', 'https://in.reuters.com/article/syria-hacking/syria-e-mail-hack-points-to-new-information-war-idINDEE82F0HX20120316'] |
213 | Anonymous vs. Indian National Informatics Centre | Anonymous defaces the website of the Indian National Informatics Centre to protest government corruption. | 2011-06-05 | 2011-06-05 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Civil service / administration']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/06/national-informatics-centre-nic-india.html'] |
214 | Zcompany HackingCrew UNICEF Defacement | Pakistani hackers deface the website of UNICEF and leave political messages on Kashmir and in support of Palestinians. | 2011-06-07 | 2011-06-07 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['International / supranational organization']] | null | ['Zcompany Hacking Crew'] | ['Pakistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Zcompany Hacking Crew | Pakistan | Non-state-group | Hacktivist(s) | [] | System / ideology; Territory; International power | System/ideology; Territory; International power; Secession | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/06/united-nations-childrens-fund-unicef.html'] |
215 | Anonymous vs. Turkey 2011 | Official Turkish websites were attacked by Internet vigilante group Anonymous on Thursday as part of a protest against what it says is government Internet censorship. | 2011-06-09 | 2011-06-09 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/us-turkey-election-internet/turkish-websites-attacked-by-anonymous-before-vote-idUSTRE7583DV20110609'] |
216 | Anonymous vs. Spain National Police | The website of Spain's national police force has been briefly knocked offline by hacker collective Anonymous, in protest against the arrest of three hackers. | 2011-06-12 | 2011-06-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Spain'] | [['EUROPE', 'NATO', 'EU']] | [['State institutions / political system']] | [['Police']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.bbc.com/news/technology-13749181'] |
217 | LulzSec access to Senate | LulzSec broke into the Senate's Website and was able to gain access to the server's directory and file structure, the contents of which the group published on ist own site. | 2011-06-13 | 2011-06-13 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Legislative']] | ['LulzSec'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | LulzSec | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.cnet.com/news/lulzsec-hackers-attack-senate-site/'] |
218 | LulzSec takes down the CIA page | The public website of the US Central Intelligence Agency has gone down after the hackergroup LulzSecurity said it had launched an attack. | 2011-06-15 | 2011-06-15 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Intelligence agencies']] | ['LulzSec'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | LulzSec | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.telegraph.co.uk/news/worldnews/northamerica/usa/8578704/CIA-website-hacked-by-Lulz-Security.html'] |
219 | Anonymous vs. Censorship in Malaysia | Hackers have attacked dozens of government websites in Malaysia, days after a hacking group criticised the country over censorship. | 2011-06-15 | 2011-06-15 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Malaysia'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.bbc.com/news/world-asia-pacific-13788817'] |
220 | Ktoki defacement of Lybian Sites | Several Libyan private and public media outlets are in accessible, websites defaced with message against Gaddafi. | 2011-06-18 | 2011-06-18 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Libya'] | [['AFRICA', 'MENA', 'MEA', 'NAF']] | [['State institutions / political system', 'Media']] | null | ['Ktoki'] | ['Libya'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Ktoki | Libya | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/06/libyan-satellite-tv-website-hacked-by.html'] |
299 | Leviathan vs. Maritime & Defense Targets | Chinese APT Leviathan targets defense contractors, universities (particularly those with military research ties), legal organizations and government agencies. The actor has particular interest in naval industries including shipbuilding and related research. | 2011-01-01 | 2018-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by authorities of victim state | Data theft; Hijacking with Misuse | null | ['United States', 'Austria', 'Cambodia', 'Canada', 'Germany', 'India', 'Malaysia', 'Norway', 'Saudi Arabia', 'United Kingdom'] | [['NATO', 'NORTHAM'], ['EUROPE', 'EU', 'WESTEU'], ['ASIA', 'SEA'], ['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SCS', 'SEA'], ['EUROPE', 'NATO', 'NORTHEU'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | [['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', ''], ['Government / ministries', '', '']] | ['APT40/Leviathan/TEMP.Periscope/TEMP.Jumper/GADOLINIUM/BRONZE MOHAWK/MUDCARP/KRYPTONITE PANDA/TA423/G0065 (MSS, Hainan State Security Department/Hainan Xiandun Technology Company)', 'Hainan Xiandun Company/MSS'] | ['China', 'China'] | ['Non-state actor, state-affiliation suggested', 'Non-state actor, state-affiliation suggested'] | null | 2 | 2020-01-01; 2020-01-01; 2020-01-01; 2020-01-01 | Domestic legal action; Domestic legal action; Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; Attribution by receiver government / state entity; IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | APT40/Leviathan/TEMP.Periscope/TEMP.Jumper/GADOLINIUM/BRONZE MOHAWK/MUDCARP/KRYPTONITE PANDA/TA423/G0065 (MSS, Hainan State Security Department/Hainan Xiandun Technology Company); Hainan Xiandun Company/MSS; APT40/Leviathan/TEMP.Periscope/TEMP.Jumper/GADOLINIUM/BRONZE MOHAWK/MUDCARP/KRYPTONITE PANDA/TA423/G0065 (MSS, Hainan State Security Department/Hainan Xiandun Technology Company); Hainan Xiandun Company/MSS | China; China; China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://www.justice.gov/opa/pr/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion', 'https://www.proofpoint.com/us/threat-insight/post/leviathan-espionage-actor-spearphishes-maritime-and-defense-targets', 'https://www.fireeye.com/blog/threat-research/2019/03/APT 40-examining-a-china-nexus-espionage-actor.html'] | International power | International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.justice.gov/opa/pr/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion', 'https://www.proofpoint.com/us/threat-insight/post/leviathan-espionage-actor-spearphishes-maritime-and-defense-targets', 'https://www.fireeye.com/blog/threat-research/2019/03/APT 40-examining-a-china-nexus-espionage-actor.html'] |
221 | Operation AntiSec | As part of Operation AntiSec, the related hackergroups Anonymous and LulzSec take down several websites with DDoS attacks, including Tunisian, Turkish and Brazilian government websites and the websites of a US Court of Appeals, a Chinese government district and the British Serious Organised CrimeAgency. | 2011-06-20 | 2011-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['Tunisia', 'United Kingdom', 'China', 'Brazil', 'United States', 'Turkey'] | [['AFRICA', 'NAF', 'MENA'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO'], ['SOUTHAM'], ['NATO', 'NORTHAM'], ['ASIA', 'NATO', 'MEA']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Judiciary', 'Police', ''], ['Government / ministries', 'Judiciary', 'Police', ''], ['Government / ministries', 'Judiciary', 'Police', ''], ['Government / ministries', 'Judiciary', 'Police', ''], ['Government / ministries', 'Judiciary', 'Police', ''], ['Government / ministries', 'Judiciary', 'Police', '']] | ['Anonymous', 'LulzSec'] | ['Unknown', 'Unknown'] | ['Non-state-group', 'Non-state-group'] | ['Hacktivist(s)', 'Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms; Attacker confirms | null | null | null | Anonymous; LulzSec | Unknown; Unknown | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.webcitation.org/5zxp1vmNv', 'https://uk.pcmag.com/news/107520/anonymous-antisec-operation-targets-viacom-universal-music', 'https://www.pcworld.com/article/235184/Anonymous_Attacks_Turkish_Websites_Again.html', 'https://www.bbc.com/news/technology-13878888', 'http://www.gmanetwork.com/news/scitech/content/224612/hacktivist-spree-continues-tunisian-govt-site-latest-target/story/', 'https://www.webcitation.org/5zbHJFF18', 'https://www.webcitation.org/61TbdSoz8', 'https://www.webcitation.org/5zdkR3nOy', 'https://www.theinquirer.net/inquirer/news/2082148/anonymous-hacks-anguilla-brazil-zimbabwe-australia-governments', 'https://www.cnet.com/news/lulzsec-takes-down-brazil-government-sites/', 'https://www.webcitation.org/5zaPT1ekX'] |
223 | Operation AntiSec | As part of Operation AntiSec, the related hackergroups Anonymous and LulzSec hack several political and commercial entities and publish data, often times including confidential information. The hacked organisations include police and cyberterrorism agencies in the USA, Italy and Brazil, US government contractors and multinational businesses. | 2011-06-20 | 2011-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States', 'Brazil', 'Italy', 'Anguilla', 'Zimbabwe', 'Australia'] | [['NATO', 'NORTHAM'], ['SOUTHAM'], ['EUROPE', 'NATO', 'EU'], [], ['AFRICA', 'SSA'], ['OC']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Judiciary', 'Police', 'Political parties', ''], ['Government / ministries', 'Judiciary', 'Police', 'Political parties', ''], ['Government / ministries', 'Judiciary', 'Police', 'Political parties', ''], ['Government / ministries', 'Judiciary', 'Police', 'Political parties', ''], ['Government / ministries', 'Judiciary', 'Police', 'Political parties', ''], ['Government / ministries', 'Judiciary', 'Police', 'Political parties', '']] | ['Anonymous', 'LulzSec'] | ['Unknown', 'Unknown'] | ['Non-state-group', 'Non-state-group'] | ['Hacktivist(s)', 'Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms; Attacker confirms | null | null | null | Anonymous; LulzSec | Unknown; Unknown | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/08/another-government-contractor-pcs.html', 'https://uk.pcmag.com/news/107504/lulzboat-sails-on-anonymous-dumps-more-arizona-data', 'https://www.webcitation.org/5zijhtzV4', 'https://www.webcitation.org/5zwEwc1It', 'https://www.webcitation.org/5zxoSRQ4X', 'https://www.theinquirer.net/inquirer/news/2082148/anonymous-hacks-anguilla-brazil-zimbabwe-australia-governments', 'https://www.webcitation.org/5zxp1vmNv', 'https://www.hackmageddon.com/2011/08/07/the-lulz-boat-sails-to-brazil-and-leaks-8-gb-of-data/', 'https://thehackernews.com/2011/07/italys-police-it-network-vitrocisetit.html', 'https://www.webcitation.org/5zxppc1WY', 'https://www.webcitation.org/612Cy17OA', 'https://thehackernews.com/2011/08/operation-satiagraha-brazil-corruption.html', 'https://www.cnet.com/news/anonymous-ready-to-roll-in-post-lulzsec-world/', 'https://www.cyberwarnews.info/2011/12/25/new-york-city-public-advocate-hacked-and-database-dumped-by-anonymous/', 'https://www.hackmageddon.com/2011/10/22/another-friday-another-dump/', 'https://www.hackmageddon.com/2011/08/06/i-shot-the-sheriff/', 'https://www.webcitation.org/61TbdSoz8'] |
222 | Operation AntiSec | As part of Operation AntiSec, the related hackergroups Anonymous and LulzSec deface several websites with their logo and political messages, including the websites of the British newspaper The Sun, of the Australian Casino, Liquor and Gaming Control Authority, of an Italian Prison Agency and of several Turkish businesses and governmental websites. | 2011-06-20 | 2011-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['United Kingdom', 'Turkey', 'Australia', 'Italy'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['ASIA', 'NATO', 'MEA'], ['OC'], ['EUROPE', 'NATO', 'EU']] | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | [['Civil service / administration', 'Police', '', ''], ['Civil service / administration', 'Police', '', ''], ['Civil service / administration', 'Police', '', ''], ['Civil service / administration', 'Police', '', '']] | ['Anonymous', 'LulzSec'] | ['Unknown', 'Unknown'] | ['Non-state-group', 'Non-state-group'] | ['Hacktivist(s)', 'Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms; Attacker confirms | null | null | null | Anonymous; LulzSec | Unknown; Unknown | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackmageddon.com/2011/08/05/italian-prison-guards-hacked/', 'https://www.webcitation.org/60HMbQTWj', 'https://www.cyberwarnews.info/2011/11/27/australian-government-website-defaced-by-anonymous/'] |
225 | Attack on Al-Qaida Comm-Systems | Communication networks of Al Qaida are disrupted for severeal days by unknown hacker. | 2011-06-29 | 2011-07-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Unknown'] | null | [['Social groups']] | [['Terrorist']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/06/hackers-target-al-qaida-internet.html'] |
226 | Operation BlackTulip | Presumably Iranian hackers gain access to a DutchSSL certificate supplier, is suing fraudulent certificates and thus gaining access to more than 300000 Iranian Google-Mail-Accounts. | 2011-07-01 | 2011-09-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by victim | Data theft | null | ['Iran, Islamic Republic of', 'Netherlands'] | [['ASIA', 'MENA', 'MEA'], ['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Advocacy / activists (e.g. human rights organizations)', ''], ['Advocacy / activists (e.g. human rights organizations)', '']] | null | ['Iran, Islamic Republic of'] | ['Non-state actor, state-affiliation suggested'] | null | 2 | 2011-01-01; 2011-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | IT-security community attributes attacker; Media-based attribution | null | null | null | null | Iran, Islamic Republic of; Iran, Islamic Republic of | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://bits.blogs.nytimes.com/2013/06/12/google-says-it-has-uncovered-iranian-spy-campaign/', 'https://nakedsecurity.sophos.com/2011/09/05/operation-black-tulip-fox-its-report-on-the-diginotar-breach/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2011/08/31/technology/internet/hackers-impersonate-google-to-snoop-on-users-in-iran.html?_r=3', 'https://spectrum.ieee.org/riskfactor/telecom/security/diginotar-certificate-authority-breach-crashes-egovernment-in-the-netherlands', 'https://bits.blogs.nytimes.com/2013/06/12/google-says-it-has-uncovered-iranian-spy-campaign/', 'https://nakedsecurity.sophos.com/2011/09/05/operation-black-tulip-fox-its-report-on-the-diginotar-breach/'] |
227 | LulzSec attack FoxNews Twitter | LuzSec hackers take control of @fox newspolitics, post tweets about death of Barack Obama. | 2011-07-04 | 2011-07-04 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['LulzSec'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | LulzSec | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/technology/2011/jul/04/hacking-twitter-feed-fix-news'] |
228 | Energy Labs breached | The Websites of the Energy Department's Pacific Northwest National Lab and Jefferson National Lab were down today in the after math of "sophisticated" attacks, no classified information has been stolen. | 2011-07-06 | 2011-07-06 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | null | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.cnet.com/news/sophisticated-attack-targets-two-energy-dept-labs/'] |
229 | Moodys Defaced | Portuguese hackers responded to a negative assessment of the country's ability to repay loans by defacing the website of credit reference agency Moody's. | 2011-07-08 | 2011-07-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | null | ['Portugal'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Portugal | Non-state-group | Hacktivist(s) | [] | System / ideology; Other | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theregister.co.uk/2011/07/08/patriotic_portuguese_hackers_hit_moody/'] |
230 | NN-Crew | A group calling itself NN-Crew says it has broken into a server used by Germany's Federal Police and stole thousands of data used to GPS-track suspects under surveillance. The police apparently used the hacked server as a datapool and server to download GPS tracking software; it also contained instructions for installation and operation of that software, several usernames and passwords along with telephone numbers , licenseplate numbers, locations, and coordinates.Numerous internal documents used by the authorities were also stored on the server. | 2011-07-08 | 2011-07-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Germany'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system']] | [['Police']] | ['NN-Crew'] | ['Germany'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | NN-Crew | Germany | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.h-online.com/security/news/item/German-Federal-Police-servers-compromised-1276115.html'] |
231 | Anonymous breach of Defense Contractor | Anonymous announced that it had penetrated a server belonging to the defense contractor Booz Allen Hamilton and released what it claims are 90,000 military email addresses, encrypted passwords and an assortment of data related to other companies and government networks. | 2011-07-11 | 2011-07-11 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.forbes.com/sites/andygreenberg/2011/07/11/anonymous-hackers-breach-booz-allen-hamilton-dump-90000-military-email-addresses/#597956a376bb'] |
232 | InjectorTeam vs. IOM | The website of the International Organization for Migration is defaced by Libyanhackers, who leave a political message about the Libyan civilwar. | 2011-07-12 | 2011-07-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Switzerland'] | [['EUROPE', 'WESTEU']] | [['International / supranational organization']] | null | ['Inj3ct0rTeam'] | ['Libya'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Inj3ct0rTeam | Libya | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/07/international-organization-for.html'] |
233 | Anonymous vs. GEMA | German creative author's society GEMA is hacked, log-in credentials are leaked and the website is later replaced with political message. | 2011-07-13 | 2011-08-24 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Germany'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['Media']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.heise.de/security/meldung/Anonymous-legt-GEMA-Seite-lahm-1327285.html', 'https://www.heise.de/security/meldung/Gema-offenbar-gleich-mehrfach-gehackt-1328737.html'] |
234 | Information Theft US Military | The US Deputy Defense Secretary William Lynn has revealed that a foreign intelligence agency was behind a hackattack that stole classified information about a topsecret weapons system which now has to be redesigned. | 2011-07-13 | 2011-07-13 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Defence industry']] | null | ['Unknown'] | ['State'] | null | 1 | 2011-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by receiver government / state entity | null | null | null | null | Unknown | State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://nakedsecurity.sophos.com/2011/07/15/hackers-governmentsecret-plans-pentagon/'] |
235 | Israeli Websites hacked by Palestinian Hackers | Palestinian hackers defaces several Israeli websites, demanding freedom for Palestine. | 2011-07-18 | 2011-07-18 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | null | ['Dr. Torjan', 'Code 5'] | ['Palestine', 'Palestine'] | ['Non-state-group', 'Non-state-group'] | ['Hacktivist(s)', 'Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms; Attacker confirms | null | null | null | Dr. Torjan; Code 5 | Palestine; Palestine | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | [] | System / ideology; Secession | System/ideology; Secession | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/07/israel-web-hosting-server-hacked-for.html'] |
236 | Taliban Networks hacked | The Taliban said their phones, email and website had been hacked to spread a false report that the movement’s spiritual leader, Mullah Omar, was dead. They identify US intelligence services behind the attack. | 2011-07-20 | 2011-07-20 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Disruption | null | ['Afghanistan'] | [['ASIA', 'SASIA']] | [['Social groups']] | [['Terrorist']] | null | ['United States'] | ['State'] | null | 1 | 2011-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker | null | null | null | null | United States | State | null | [] | System / ideology | System/ideology; National power; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/us-afghanistan-taliban-technology/tech-savvy-taliban-fights-war-in-cyberspace-idUSTRE76J1IL20110720'] |
237 | Anonymous vs. NATO 2011 | Anonymous claimed credit Thursday for hacking into NATO servers and stealing 1 gigabyte of sensitive information | 2011-07-21 | 2011-07-21 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['NATO (region)'] | null | [['International / supranational organization']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.washingtonpost.com/world/national-security/nato-web-site-hacked-by-anonymous/2011/07/21/gIQACLFCSI_story.html?noredirect=on&utm_term=.f3d9e4435ee6'] |
238 | Anonymous vs. Public Broadcaster | Anon Austria hack data base of public broadcaster (GIS), leak personal information and bank details of 100 employees of police ministry of the interior. | 2011-07-22 | 2011-07-22 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Austria'] | [['EUROPE', 'EU', 'WESTEU']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | null | ['Anonymous'] | ['Austria'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Austria | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://diepresse.com/home/techscience/internet/sicherheit/680144/GIS-gehackt_Anonymous-kapern-95954-Bankdaten'] |
239 | Anonymous vs. Colombia National Police | Colombian hackers spambomb several addresses of the Colombian police and leak personal information on police officers. | 2011-07-23 | 2011-07-23 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Colombia'] | [['SOUTHAM']] | [['State institutions / political system']] | [['Police']] | ['Anonymous'] | ['Colombia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Colombia | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/07/colombian-anonymous-hackers-reveal.html'] |
240 | Defacing Anonymous | Unidentified hackers deface Anonplus, the social network of hacker group Anonymous, in retaliation against Turkish government websites earlier in July. | 2011-07-23 | 2011-07-24 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Unknown'] | null | [['Social groups']] | [['Hacktivist']] | ['Akincilar'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Akincilar | Turkey | Non-state-group | Hacktivist(s) | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://gizmodo.com/5823351/hackers-hacked-the-hackers-anonplus-social-network'] |
241 | Chinese Trojan Horse in Japan | Computers and servers in the lower house of Japan's parliament became infected by a Trojan horse virus after one politician opened an email attachment. Computer IDs and passwords of all the lawmakers in the House of Representatives were leaked, e-mails sent to its lawmakers might have been accessible to hackers for a maximum of 15 days and computers were found to have made improper communications with overseas Websites | 2011-07-25 | 2011-10-31 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft; Hijacking with Misuse | null | ['Japan'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system']] | [['Legislative']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Receiver attributes attacker | null | null | null | null | China | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.asiaone.com/News/Latest%2BNews/Asia/Story/A1Story20111116-310940.html', 'https://nakedsecurity.sophos.com/2011/10/25/japanese-parliament-hit-by-cyber-attack/', 'https://thenextweb.com/asia/2011/10/25/japanese-government-hit-by-chinese-trojan-horse-attack/'] |
242 | Anonymous vs. Italian Cyber Police | Anonymous leaks webpage data of Italian cyber police unit (CNAIPIC). | 2011-07-25 | 2011-07-25 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Italy'] | [['EUROPE', 'NATO', 'EU']] | [['State institutions / political system']] | [['Police']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.computerworld.com/article/2509444/government-it/anonymous-hacks-italy-s-cybercrime-police.html'] |
243 | Anonymous vs. ManTech | Anonymous hacks ManTech, a contractor that provides cyber security services to the FBI, releases 500mb of internal data. | 2011-07-28 | 2011-07-28 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['End user(s) / specially protected groups']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.securityweek.com/anonymous-claims-it-hacked-mantech-fbi-cybersecurity-contractor'] |
244 | Get Him Outgame | Hackers have attacked Nicolas Sarkozy's official Elysee Palace website to create a video game called 'GetHimOut'. Under the formal banner introducing the site, a cartoon image of the French president was pictured on a go-kart heading towards the gates of the palace. For each click on a Facebook 'like' button beside the game, the French leader moved one step closer out into the street | 2011-07-28 | 2011-07-28 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['France'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | National power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/07/nicolas-sarkozys-official-elysee-palace.html'] |
245 | Anonymous vs. SpecialForces.com | Members of the hacker collective Anonymous claim they have stolen about 14,000 user passwords and 8,000 credit card numbers from SpecialForces.com, a military and law enforcement equipment retailer. The data breach occurred several months ago, according to Anonymous, but the group only now decided to post the data online. The purloined password list had reportedly been posted online several weeks ago as well. | 2011-08-01 | 2011-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.pcworld.com/article/247072/anonymous_hacks_specialforces_com_posts_passwords_and_credit_card_data.html'] |
246 | Chinese Hack Japanese Defense Contractor | Allegedly Chinese hackers gain access to 85 computers of Mitsubishi Heavy Industries, a Japanese defence supplier, stealing classified information. | 2011-08-01 | 2011-09-01 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by media (without further information on source) | Data theft | null | ['Japan'] | [['ASIA', 'SCS', 'NEA']] | [['Critical infrastructure']] | [['Defence industry']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Receiver attributes attacker | null | null | null | null | China | Unknown - not attributed | null | [] | Decolonization | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/world/2011/sep/20/china-denies-hacking-attack-japan', 'https://nakedsecurity.sophos.com/2011/09/19/mitsubishi-defense-contractor-hack/'] |
247 | Attack against Endusers in ISR-EGY Cyberwar | Egyptian hackers release a computer worm to US American and Israeli users condemning Israel's foreign policy, especially towards Egypt. | 2011-08-01 | 2011-08-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Israel', 'United States'] | [['ASIA', 'MENA', 'MEA'], ['NATO', 'NORTHAM']] | [['End user(s) / specially protected groups'], ['End user(s) / specially protected groups']] | null | null | ['Egypt'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Egypt | Unknown - not attributed | null | [] | System / ideology; Territory; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/08/cyber-war-against-israel-have-taken.html'] |
248 | Operation Defense | Anonymous and colombian hackers spambomb several addresses of the Colombian police and leak personal information on police officers. | 2011-08-02 | 2011-08-02 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Colombia'] | [['SOUTHAM']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Intelligence agencies', 'Political parties']] | ['Anonymous'] | ['Colombia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Colombia | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/08/operation-defense-anonymous-shut-down.html'] |
249 | Alexploiter hacks website of Yemens customs authority | Hacktivists defaces the website of Yemen's customs authority to protest the government. | 2011-08-05 | 2011-08-05 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Yemen'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | null | ['Alexploiter'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Alexploiter | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | System/ideology; National power; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/08/customs-authority-of-yemen-hacked-for.html'] |
250 | Anonymous takes down Syrian defense ministry website | The Syrian Ministry of Defense's website was inaccessible after it was hacked by Anonymous, which replaced its content by an anti-government message. | 2011-08-07 | 2011-08-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Syria'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://edition.cnn.com/2011/WORLD/meast/08/08/syria.ministry.site.hacked/index.html', 'https://thehackernews.com/2011/08/syrian-ministry-of-defense-hacked-by.html'] |
251 | Syrian ElectronicArmy vs. AnonPlus | In retaliation for the defacement of the Syrian Ministry of Defense's website, the Syrian Electronic Army hacks and defaces AnonPlus, an alternative social network of Anonymous | 2011-08-08 | 2011-08-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by attacker | Disruption | null | ['Unknown'] | null | [['Social groups']] | [['Hacktivist']] | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2011-01-01; 2011-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | IT-security community attributes attacker; Attacker confirms | null | null | null | Syrian Electronic Army; Syrian Electronic Army | Syria; Syria | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] | System / ideology; National power; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.computerworld.com/article/2510039/cybercrime-hacking/syrian-hackers-retaliate--deface-anonymous--social-network.html', 'https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] |
252 | Team P0ison vs. BlackBerry | Hacktivists left their mark of dissatisfaction on Blackberry's website after it announced that they would help police track down rioters in London | 2011-08-09 | 2011-08-09 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Canada'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Team P0ison'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Team P0ison | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.businessinsider.com/blackberry-hacked-london-riots-2011-8?IR=T'] |
253 | Egyptian Hacker Defacement of Page of Israeli Prime Minister | An Egyptian hacker managed on Sunday to hack into the website of Israeli Prime Minister, Benjamin Netanyahu, and placed a picture of Egyptian soldiers raising the Egyptian flag in Sinai during the October,6 , 1973, on the sites’ homepage. The hacker who managed to penetrate the webpage of Netanyahu wrote “AntiZionism”, the site was then gradually taken offline. | 2011-08-21 | 2011-08-21 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Egyptian Hacker'] | ['Egypt'] | ['Non-state-group'] | ['Ethnic actors'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Egyptian Hacker | Egypt | Non-state-group | Ethnic actors | [] | System / ideology; Territory; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/08/israeli-prime-minister-netanyahus.html'] |
254 | Electr0nde faces NIC | Hackers calling themselves “Electr0n”have defaced the nic.ly website, the main registry which administers .ly domainnames and replaced it with an anti-Gaddhafi message | 2011-08-22 | 2011-08-22 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Libya'] | [['AFRICA', 'MENA', 'MEA', 'NAF']] | [['State institutions / political system']] | null | ['Electr0n'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Electr0n | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://nakedsecurity.sophos.com/2011/08/22/hackers-deface-libya-anti-gadaffi/'] |
255 | Breach of US contractor | An admirer of Anonymous acted independently to breach an outsourced provider and steal a customer list with log-in credentials. Many on the list were U.S. government employees. | 2011-08-24 | 2011-08-24 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | null | null | ['Unknown'] | ['Individual hacker(s)'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Unknown | Individual hacker(s) | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.eweek.com/security/cyber-attacker-dumps-log-ins-for-20-000-customers-u.s.-employees'] |
256 | PrivateX vs. PNRI | Private Xhackers defaced the website of the Philippine Nuclear Research Institute (PNRI) and left a message accusing another government agency of corruption, to support President Benigno AquinoIII and his State of the Nation Address | 2011-08-25 | 2011-08-25 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Philippines'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system', 'Science']] | null | ['PrivateX'] | ['Philippines'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | PrivateX | Philippines | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/08/philippine-nuclear-research-institute.html'] |
257 | DDOS vs. Wikileaks | Website of WikiLeaks is disabled with a major DDoS attack, hours after classified documents of the USA find their way online. | 2011-08-30 | 2011-08-30 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['Unknown'] | null | [['Media']] | null | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.techspot.com/news/45314-wikileaks-website-targeted-by-hackers.html'] |
258 | North Korea vs. Inche on Airport | The south Korean police suspects that the North’s Reconnaissance General Bureau is behind a technical glitch in the flight data process or that paralyzed airtraffic control at Inche on International Airport for nearly an hour last Sept.15. It was presumably enabled by a botnet of south Korean computers, which have been infected by a compromised pc gaming version, distributed by a southKorean citizen, which was instructed by the Reconnaissance General Bureau of the Norths Military. | 2011-09-01 | 2011-09-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by media (without further information on source); Incident disclosed by authorities of victim state | Disruption | null | ['Korea, Republic of'] | [['ASIA', 'SCS', 'NEA']] | [['Critical infrastructure']] | [['Transportation']] | ['South Korean Citizen', 'Reconnaissance General Bureau'] | ["Korea, Democratic People's Republic of", "Korea, Democratic People's Republic of"] | ['Non-state actor, state-affiliation suggested', 'Non-state actor, state-affiliation suggested'] | null | 1 | 2012-01-01; 2012-01-01 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by receiver government / state entity; Attribution by receiver government / state entity | null | null | null | South Korean Citizen; Reconnaissance General Bureau | Korea, Democratic People's Republic of; Korea, Democratic People's Republic of | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://threatpost.com/report-north-korea-accused-ddos-attack-south-korean-airport-060712/76664/'] | System / ideology | System/ideology; Territory; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://koreajoongangdaily.joins.com/2012/06/04/socialAffairs/Incheon-Airport-cyberattack-traced-to-Pyongyang/2953940.html', 'https://threatpost.com/report-north-korea-accused-ddos-attack-south-korean-airport-060712/76664/'] |
259 | Chinese Phishing vs. US Gas Companies | Allegedly Chinese cyberspies targeted 23 US American gas pipeline companies with e-mails crafted to deceive key personnel into clicking on malicious links or file attachments that let the attackers slip into company networks and obtain information,that would enable them to attack the country's whole gas system easily. | 2011-09-01 | 2012-06-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by media (without further information on source); Incident disclosed by authorities of victim state | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Energy']] | ['APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398)', 'PLA Unit 61398'] | ['China', 'China'] | ['State', 'State'] | null | 2 | 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.); Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity; Attribution by receiver government / state entity; IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398; APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398 | China; China; China; China | State; State; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | [] | International power | International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.csmonitor.com/Environment/2013/0227/Exclusive-Cyberattack-leaves-natural-gas-pipelines-vulnerable-to-sabotage', 'https://www.recordedfuture.com/from-coercion-to-invasion-the-theory-and-execution-of-china-cyber-activity'] |
260 | Gauss | Gauss, a Stuxnet-related malware was created to steal sensitive information mainly from Lebanon Banking Sector. | 2011-09-01 | 2012-01-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Lebanon'] | [['ASIA', 'MENA', 'MEA']] | [['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Defence industry', '']] | ['NSA/Equation Group'] | ['United States'] | ['Non-state actor, state-affiliation suggested'] | null | 2 | 2012-01-01; 2012-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Media report (e.g., Reuters makes an attribution statement, without naming further sources) | IT-security community attributes attacker; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | Non-state actor, state-affiliation suggested; State | null | ['https://bits.blogs.nytimes.com/2012/08/09/researchers-find-possible-state-sponsored-virus-in-mideast/?mtrref=undefined', 'https://www.golem.de/news/kaspersky-lab-gauss-ist-staatliche-malware-zum-kontenraub-1208-93780.html', 'https://de.securelist.com/kaspersky-security-bulletin-2012-cyberwaffen/59256/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | Yes | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.rsaconference.com/writable/presentations/file_upload/br-208_bencsath.pdf', 'https://bits.blogs.nytimes.com/2012/08/09/researchers-find-possible-state-sponsored-virus-in-mideast/?mtrref=undefined', 'https://www.golem.de/news/kaspersky-lab-gauss-ist-staatliche-malware-zum-kontenraub-1208-93780.html', 'https://de.securelist.com/kaspersky-security-bulletin-2012-cyberwaffen/59256/'] |
261 | Inj3ct0r Team vs. European Comission | Hackinggroup Inj3ct0rTeam deface the website of the European Commission's Joint Research Service, leave political messages and publish server data. | 2011-09-04 | 2011-09-04 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Belgium'] | [['EUROPE', 'EU', 'NATO', 'WESTEU']] | [['International / supranational organization']] | null | ['Inj3ct0rTeam'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | null | null | null | Inj3ct0rTeam | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/09/european-union-hacked-by-inj3ct0r-team.html'] |
262 | Akincilar vs. Israel | Several Israeli websites are defaced by Turkish hackers who oppose Israel's foreign policy and its tensions with Turkey. | 2011-09-04 | 2011-09-04 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | null | ['Akincilar'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | null | null | null | Akincilar | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/09/100s-of-israel-websites-hacked-by-cyber.html'] |
263 | ScriptKiddies vs. NBC | Hackergroup the ScriptKiddies gain access to the NBC News Twitteraccount and post false tweets on terrorist attacks at Ground Zero. | 2011-09-09 | 2011-09-09 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['ScriptKiddies'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | null | null | null | ScriptKiddies | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackmageddon.com/2011/09/11/an-e-mail-attack-to-ground-zero/'] |
264 | Muslim Liberation Army vs. Christian Sites | 20 Churches websites and Truth Alliance Network defaced by Muslim Liberation Army in support of Muslims in ongoing international conflicts and to protest against burings of Quran. | 2011-09-11 | 2011-09-11 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Social groups']] | [['Religious']] | ['Muslim Liberation Army'] | ['Unknown'] | ['Non-state-group'] | ['Religious actors'] | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | null | null | null | Muslim Liberation Army | Unknown | Non-state-group | Religious actors | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/09/truth-alliance-network-and-20-churches.html'] |
265 | FatalErrorCrew vs. Nigeria | Fatal Error Crew deface the official website of the Nigerian government with a message in Portuguese. | 2011-09-12 | 2011-09-12 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Nigeria'] | [['AFRICA', 'SSA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Fata Error Crew'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | Fata Error Crew | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://nakedsecurity.sophos.com/2011/09/12/nigerian-government-website-defacement/'] |
266 | Protest vs. David Camerons visit to Russia | Unknown hackers take down the website of the Russian Embassy in the United Kingdom, presumably to protest the visit of PM David Cameron to Russia. | 2011-09-12 | 2011-09-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Disruption | null | ['Russia'] | [['EUROPE', 'EASTEU', 'CSTO', 'SCO']] | [['State institutions / political system']] | null | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/DDoS-Attack-Targets-Russian-Embassy-Website-221257.shtml'] |
267 | Anonymous vs. INSA | United States trade association for intelligence contractors Intelligence and National Security Association (INSA) was hacked, and personal information of its 3000 members, including e-mail and home addresses is leaked. | 2011-09-14 | 2011-09-14 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system']] | [['', 'Government / ministries', 'Police', 'Intelligence agencies']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.computerworld.com/article/2471073/endpoint-security/3-000-intelligence-officials--names--emails-leaked-as--insa-spies-.html', 'https://thehackernews.com/2011/09/intelligence-and-national-security.html'] |
268 | Mexican Independence Day Hack | Anonymous takes down several Mexican government websites on Mexico's Independence Day. | 2011-09-15 | 2011-09-15 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Mexico'] | null | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/09/operation-opindependencia-anonymous-hit.html'] |
269 | Trick(ing) the City of Rennes | Website of the City of Rennes is defaced in protest against Anti-Islam policies. | 2011-09-19 | 2011-09-19 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['France'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system']] | [['Government / ministries']] | ['Trick'] | ['Unknown'] | ['Non-state-group'] | ['Religious actors'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Trick | Unknown | Non-state-group | Religious actors | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/09/city-of-rennes-france-hacked-against.html'] |
270 | Anonymous Austria leaks Police Data | AnonAustria publishes personal information of almost 25000 police officials in protest against a draft law which would require telecommunications companies to store details of all telephone and internet traffic for six months and make them available to the police | 2011-09-26 | 2011-09-26 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Austria'] | [['EUROPE', 'EU', 'WESTEU']] | [['State institutions / political system']] | [['Police']] | ['Anonymous'] | ['Austria'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Austria | Non-state-group | Hacktivist(s) | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://nakedsecurity.sophos.com/2011/09/28/names-addresses-25000-police-officers-anonymous-cell/', 'https://www.bbc.co.uk/news/world-europe-15065931'] |
271 | Anonymous and RevoluSec Deface Syrian government pages | Hackers of Anomyous and RevoluSec deface websites of several Syrian government websites in support of the Syrian opposition. | 2011-09-26 | 2011-09-26 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Syria'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous', 'RevoluSec'] | ['Unknown', 'Unknown'] | ['Non-state-group', 'Non-state-group'] | ['Hacktivist(s)', 'Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms; Attacker confirms | null | null | null | Anonymous; RevoluSec | Unknown; Unknown | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.aljazeera.com/news/middleeast/2011/09/201192692416534215.html'] |
272 | SEA hacks Harvard page | Syrian Electronic Army hacks the website of Harvard University and leaves pro-Assad and anti-USA message. | 2011-09-26 | 2011-09-26 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Science']] | null | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 1 | 2013-01-01 00:00:00 | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Syrian Electronic Army | Syria | Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://threatpost.com/pro-syrian-electronic-army-hacks-harvard-university-site-092711/75695/'] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/09/harvard-university-website-hacked-by.html', 'https://www.bbc.com/news/education-15061377', 'https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://threatpost.com/pro-syrian-electronic-army-hacks-harvard-university-site-092711/75695/'] |
273 | Zombie_Ksa vs. SupremeCourtofPakistan | Website of the Supreme Court of Pakistan is hacked and political remarks are left. | 2011-09-28 | 2011-09-28 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Judiciary']] | ['Zombie_Ksa'] | ['Saudi Arabia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Zombie_Ksa | Saudi Arabia | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/09/supreme-court-of-pakistan-website.html'] |
274 | Twitter of Thai PM hacked | Thailand’s PrimeMinister, Yingluck Shinawatra, had her Twitter account hacked this weekend–meaning that her followers saw a stream of messages criticising her leadership. | 2011-10-03 | 2011-10-03 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Thailand'] | [['ASIA', 'SEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Thailand'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Thailand | Non-state-group | Hacktivist(s) | [] | System / ideology; Other | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://metro.co.uk/2011/10/03/thailands-prime-minister-yingluck-shinawatra-targeted-by-twitter-hackers-170901/', 'https://nakedsecurity.sophos.com/2011/10/03/thai-pm-is-twitter-hacked/'] |
275 | Iron Dome Hack | Three Israeli defense contractors responsible for building the “Iron Dome” missile shield currently protecting Israel from a barrage of rocket attacks were compromised by hackers and robbed of huge quantities of sensitive documents pertaining to the shield technology. | 2011-10-10 | 2012-08-13 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by media (without further information on source) | Data theft | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['Critical infrastructure']] | [['Defence industry']] | ['APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398)', 'PLA Unit 61398'] | ['China', 'China'] | ['Non-state actor, state-affiliation suggested', 'Non-state actor, state-affiliation suggested'] | null | 1 | 2014-01-01; 2014-01-01 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | APT1/Comment Crew/Comment Panda/Byzantine Candor/Group 3/ TG-8223/BrownFox/G0006 (PLA, Unit 61398); PLA Unit 61398 | China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | [] | Resources | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://krebsonsecurity.com/2014/07/hackers-plundered-israeli-defense-firms-that-built-iron-dome-missile-defense-system/'] |
276 | MNDF Website Hacked | The Maldives National Defence Force (MNDF) has confirmed that its website was hacked last night by an unknown attacker. | 2011-10-16 | 2011-10-16 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Disruption | null | ['Maldives'] | [['ASIA', 'SASIA']] | [['State institutions / political system']] | [['Military']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/02/maldives-national-defence-force-mndf.html'] |
277 | ZHC defaces page of Indian National Congress | Pakistani hackers deface the website of the Indian National Congress and leave political remarks on the Kashmir conflict. | 2011-10-18 | 2011-10-18 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Political parties']] | ['Zcompany Hacking Crew'] | ['Pakistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Zcompany Hacking Crew | Pakistan | Non-state-group | Hacktivist(s) | [] | System / ideology; International power; Cyber-specific | Territory; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/10/indian-national-congress-party-official.html'] |
278 | CabinCr3w vs. Citigroup | Hackers of CabinCr3w leak sensitive personal information of CitiGroup's CEO in support of the OccupyWallstreet movement. | 2011-10-21 | 2011-10-21 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | null | ['CabinCr3w'] | ['United States'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | CabinCr3w | United States | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/10/hackers-leak-citigroup-ceos-personal.html'] |
279 | DDOS on Korean By-Election | Associates of the ruling party attacked the servers of the national electoral commision on the day of the 2011 Seoul-by-election | 2011-10-26 | 2011-10-26 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Not available | Disruption | null | ['Korea, Republic of'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system']] | [['Election infrastructure / related systems']] | null | ['Korea, Republic of'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2011-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by receiver government / state entity | null | null | null | null | Korea, Republic of | Non-state actor, state-affiliation suggested | null | [] | National power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://web.archive.org/web/20120108030022/http://koreatimes.co.kr/www/news/nation/2012/01/117_102260.html', 'http://www.koreatimes.co.kr/www/nation/2018/12/113_100097.html'] |
280 | Anonymous vs. Oakland | Cyber activists associated with Anonymous have targeted the Oakland Police Department (OPD) and other law enforcement agencies that participated in a controversial crackdown against OccupyOakland protestors, taking down their websites with DDoS attacks. | 2011-10-27 | 2011-10-27 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Police']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/10/anonymous-ddos-oakland-police-site.html'] |
281 | Anonymous defaces Website of Political Candidate that colloborates with Cartels | In a slate against the Mexican Drug Cartel Los Zetas, Anonymous Mexico defaces the website of the politician Gustavo Rosario Torres, claiming that he collaborates with the cartel. | 2011-10-29 | 2011-10-29 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Mexico'] | null | [['State institutions / political system']] | null | ['Anonymous'] | ['Mexico'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Mexico | Non-state-group | Hacktivist(s) | [] | System / ideology | Subnational predominance; Resources; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/10/anonymous-hackers-threatening-mexican.html'] |
282 | DDOS vs. Palestinian Pages | Internet services in the WestBank and Gaza have come under "sustained attack" in multiple locations, a day after Palestine's accession to the UNESCO. Palestinian officials hint at Israel as the inititator. | 2011-11-01 | 2011-11-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by victim | Disruption | null | ['Palestine'] | [['ASIA', 'MENA', 'MEA']] | [['Critical infrastructure']] | [['Telecommunications']] | null | ['Israel'] | ['State'] | null | 1 | 2011-01-01 00:00:00 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity | null | null | null | null | Israel | State | null | [] | System / ideology; Territory; Secession | System/ideology; Secession | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.aljazeera.com/indepth/opinion/2011/11/2011117151559601957.html', 'https://www.theguardian.com/world/2011/nov/01/palestinians-hit-cyber-attack-unesco'] |
283 | Anonymous vs. El Salvador | The Anonymous hacking group launched an online strike against government websites in El Salvador last Saturday, forcing several of them to shut down to prevent the theft of high-ranking officials' personal information. | 2011-11-05 | 2011-11-05 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['El Salvador'] | [['CENTAM']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Legislative', 'Police']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.nbcnews.com/id/45214010/ns/technology_and_science-security/t/hackers-hit-el-salvador-government-sites/#.W4k_4ScVREY'] |
284 | Anonymous leaks finish Neo-Nazi site data | Anonymous hacks the database of a Finnish neo-nazi group and leaks data of 16000 members. | 2011-11-08 | 2011-11-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Finland'] | [['EUROPE', 'EU', 'NORTHEU']] | [['Social groups']] | [['Political opposition / dissidents / expats']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/11/anonymous-hackers-hack-neo-nazis.html'] |
285 | DDOS in the preceding days of the russian parliament election | DDoS have in the days preceding parliamentary elections shutdown a large number of media websites. Russia’s most popular bloggingsite, LiveJournal, was hobbled. The cyberattack also simultaneously crippled the websites of leading radio station EkhoMoskvy-owned by state energy monopoly Gazprom-Kommersant newspaper and other topmedia outlets. Russia’s main independent vote monitor, Golos, was another target. | 2011-11-08 | 2011-11-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by attacker | Disruption | null | ['Russia'] | [['EUROPE', 'EASTEU', 'CSTO', 'SCO']] | [['Media']] | null | null | ['Russia'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2011-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker | null | null | null | null | Russia | Non-state actor, state-affiliation suggested | null | ['https://www.bbc.com/news/technology-16032402?print=true'] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.ccdcoe.org/publications/2012proceedings/2_1_Giles_RussiasPublicStanceOnCyberInformationWarfare.pdf', 'https://www.reuters.com/article/us-russia-protests-socialmedia/insight-social-media-makes-anti-putin-protests-snowball-idUSTRE7B60R720111207', 'https://www.bbc.com/news/technology-16032402?print=true'] |
286 | Q!sRQaTaR-Hacker Alajman vs. Ankara Government | Qatari hacker defaces several websites belonging to the Turkish government. | 2011-11-10 | 2011-11-10 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Q!sRQaTaR - Hacker Alajman'] | ['Qatar'] | ['Individual hacker(s)'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Q!sRQaTaR - Hacker Alajman | Qatar | Individual hacker(s) | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Turkish-Government-Websites-Defaced-by-Qatar-Hacker-226486.shtml'] |
287 | 3xp1r3 Cyber Army vs. Supreme Court of Bangladesh | The website of the Supreme Court of Bangladesh is defaced with crude political messages. | 2011-11-10 | 2011-11-10 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Bangladesh'] | [['ASIA', 'SASIA']] | [['State institutions / political system']] | [['Judiciary']] | ['3xp1r3 Cyber Army'] | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | 3xp1r3 Cyber Army | Unknown | Unknown - not attributed | null | ['https://www.thedailystar.net/news-detail-209824'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/11/bangladesh-supreme-court-website-hacked.html', 'https://www.thedailystar.net/news-detail-209824'] |
288 | Anonymous vs. The Muslim Brotherhood | Anonymous Hackers take down the The Muslim Brotherhood websites. | 2011-11-11 | 2011-11-11 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Unknown'] | null | [['State institutions / political system']] | [['Political parties']] | ['Anonymous'] | ['France', 'Germany', 'Slovakia', 'United States'] | ['Non-state-group'] | ['Hacktivist(s)'] | 2 | null | Political statement / report (e.g., on government / state agency websites); Political statement / report (e.g., on government / state agency websites); Political statement / report (e.g., on government / state agency websites); Political statement / report (e.g., on government / state agency websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Receiver attributes attacker; Receiver attributes attacker; Receiver attributes attacker; Receiver attributes attacker; Attacker confirms; Attacker confirms; Attacker confirms; Attacker confirms | null | null | null | Anonymous; Anonymous; Anonymous; Anonymous; Anonymous; Anonymous; Anonymous; Anonymous | France; Germany; Slovakia; United States; France; Germany; Slovakia; United States | Non-state-group; Non-state-group; Non-state-group; Non-state-group; Non-state-group; Non-state-group; Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s); Hacktivist(s); Hacktivist(s); Hacktivist(s); Hacktivist(s); Hacktivist(s); Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/11/operation-brotherhood-shutdown-by.html'] |
289 | Anonymous vs. Israeli Foreign Ministry | To protest what they call the "barbaric, brutal and despicable treatment of the Palestinian people," hackers from the collective Anonymous have been attacking a number of Israeli Web sites, including Israel’s Foreign Ministry and the municipal Web site for Tel Aviv.The group has also deleted the databases of the Israel Ministry of Foreign Affairs and Bank of Jerusalem, and leaked e-mail addresses and passwords for other sites. | 2011-11-17 | 2011-11-18 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft; Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Military', '']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Secession | System/ideology; Secession | null | Yes / HIIK intensity | HIIK 4 | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.washingtonpost.com/news/worldviews/wp/2012/11/17/anonymous-is-hacking-israeli-web-sites/?noredirect=on&utm_term=.eb177b12241b'] |
290 | TeamP0ison leaks UN login data | The TeaM p0isoN hacking gang has leaked over one hundred usernames, email addresses and passwords that appear to belong to individuals at the United Nations Development Programme (UNDP), Organisation for Economic Co-operation and Development (OECD), UNICEF, World Health Organisation(WHO) and other groups. The UN states that an old server had been compromised, and that the passwords would be outdated. | 2011-11-29 | 2011-11-29 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States', 'France', 'Switzerland'] | [['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['EUROPE', 'WESTEU']] | [['International / supranational organization'], ['International / supranational organization'], ['International / supranational organization']] | null | ['Team P0ison'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Team P0ison | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.bbc.com/news/technology-15951883', 'https://nakedsecurity.sophos.com/2011/11/29/united-nations-hacked-email-addresses-and-passwords-leaked/'] |
291 | Attack on the Syrian MFA | An unknown actor attacked the Syrian MFA via a spear-phishing attack | 2011-12-05 | 2011-12-05 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Syria'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://securelist.com/a-targeted-attack-against-the-syrian-ministry-of-foreign-affairs/34742/'] |
292 | Indishell vs. Dawrn | Indian hackers deface a big Pakistani news page and leak its database, presumably relating to Kashmeer conflict. | 2011-12-08 | 2011-12-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Indishell'] | ['India'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Indishell | India | Non-state-group | Hacktivist(s) | [] | Territory; International power | Territory; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/12/biggest-pakistan-news-site-dawncom.html'] |
293 | Anonymous vs. Coalition of Law Enforcement | Hacktivists leak the database with log-in credentials of the US Coalition of Law Enforcement and Retail in support of Occupy protests. | 2011-12-12 | 2011-12-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Media']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | ['https://www.csoonline.com/article/2221299/lulzlover-hacked-coalition-of-law-enforcement--data-dumped-for-2-400-cops-and-feds.html'] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/12/coalition-of-law-enforcement-hacked.html', 'https://www.csoonline.com/article/2221299/lulzlover-hacked-coalition-of-law-enforcement--data-dumped-for-2-400-cops-and-feds.html'] |
294 | Anti-Israel Hack of Guyana | Hacker defaces the website of the President of Guyana and leaves anti-Israel messages. | 2011-12-12 | 2011-12-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Guyana'] | null | [['State institutions / political system']] | [['Government / ministries']] | ['The Hacker Team'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | The Hacker Team | Unknown | Non-state-group | Hacktivist(s) | ['https://news.softpedia.com/news/Presidency-of-Guyana-and-Anonymous-Websites-Defaced-by-Tha-Disaster-240003.shtml'] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/12/president-of-guyanas-website-defaced-by.html', 'https://news.softpedia.com/news/Presidency-of-Guyana-and-Anonymous-Websites-Defaced-by-Tha-Disaster-240003.shtml'] |
295 | Anonymous leaks Senate Data | Right after the National Defense Authorization Act (NDAA) passed through the Senate, hackers who operate under the name Anonymous leaked detailed information on many of the politicians. | 2011-12-19 | 2011-12-19 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Legislative']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Anonymous-Leaks-Information-on-Senators-who-Passed-NDAA-241675.shtml'] |
296 | Revenge for Bradley Menning | Anonymous hacks the US American intelligence company Stratfor, leaking personal and creditcard information of its customers and donating over 500$ from said credit cards to charity. Action was supposedly motivated by frustration over treatment of US whistleblower Bradley Manning. | 2011-12-24 | 2011-12-25 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://venturebeat.com/2011/12/25/anonymous-hackers-steals-data-stratfor-security/', 'https://venturebeat.com/2011/12/27/anonymous-stole-9k-credit-cards-stratfor-hack/', 'https://www.theguardian.com/technology/2011/dec/27/security-stratfor-hackers-credit-cards'] |
297 | Hack of french MP | Turkish hackers deface the website of French parliamentarian Valerie Boyer, the author of a bill criminalizing the denial of the Armenian genocide, that had been adopted a couple of days earlier by the French National Assembly. | 2011-12-26 | 2011-12-26 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['France'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system']] | [['Legislative']] | ['Turkish Hackers'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Turkish Hackers | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology | International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/12/french-mp-valerie-boyers-website-hacked.html'] |
298 | XDSpy Espionage campaign | New hacking group XDSpy got discovered stealing government secrets in Eastern Europe and the Balkans since 2011 | 2011-01-01 | 2020-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Eastern Europe', 'Balkans (region)'] | null | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Military', ''], ['Government / ministries', 'Military', '']] | ['XDSpy'] | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | XDSpy | Unknown | Unknown - not attributed | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.welivesecurity.com/2020/10/02/xdspy-stealing-government-secrets-since-2011/', 'https://www.eset.com/us/about/newsroom/press-releases/eset-researchers-discover-xdspy-an-apt-group-stealing-government-secrets-in-europe-since-2011-2/'] |
224 | Team P0ison leaks Tony Blairs AdressBook | Pakistani hacker allegedly accessed Tony Blair's e-mail account and leak his addressbook. | 2011-06-24 | 2011-06-24 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United Kingdom'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system']] | [['Legislative', 'Political parties', '']] | ['Team P0ison'] | ['Pakistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Team P0ison | Pakistan | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thehackernews.com/2011/06/teamp0ison-leak-former-british-pm-tony.html'] |
300 | Operation Quantum Entanglement/Dragon OK | The attack group “Dragon OK” (named after an event name in one of their payload executables 6) appears to operate out of the Jiangsu province in China, and is known to target high-tech and manufacturing companies in Japan and Taiwan | 2012-01-01 | 2000-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by IT-security company | Data theft | null | ['Japan', 'Taiwan'] | [['ASIA', 'SCS', 'NEA'], ['ASIA', 'SCS']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['DragonOk'] | ['China'] | ['Unknown - not attributed'] | null | 1 | 2014-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | DragonOk | China | Unknown - not attributed | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-quantum-entanglement.pdf'] |
301 | Molerats aka Gaza Cybergang 2012 | Spear-Phishing campaign by the Group Molerats aka Gaza Cybergang against Israeli, US and UK government. The group has been later attributed to Hamas. | 2012-01-01 | 2012-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['United States', 'United Kingdom', 'Israel'] | [['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'Media'], ['State institutions / political system', 'Media'], ['State institutions / political system', 'Media']] | [['Government / ministries', ''], ['Government / ministries', ''], ['Government / ministries', '']] | ['Molerats/Extreme Jackal', 'Gaza Cybergang 1 /Hamas'] | ['Unknown', 'Unknown'] | ['Unknown - not attributed', 'Unknown - not attributed'] | null | 1 | 2016-01-01; 2016-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | Molerats/Extreme Jackal; Gaza Cybergang 1 /Hamas | Unknown; Unknown | Unknown - not attributed; Unknown - not attributed | null | ['https://www.clearskysec.com/wp-content/uploads/2016/06/Operation-DustySky2_-6.2016_TLP_White.pdf', 'https://www.securityweek.com/gaza-cybergang-attacks-attributed-hamas', 'https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html', 'https://www.cybereason.com/blog/new-cyber-espionage-campaigns-targeting-palestinians-part-one#conclusion'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://blog.trendmicro.com/trendlabs-security-intelligence/new-xtreme-rat-attacks-on-usisrael-and-other-foreign-governments/', 'https://www.clearskysec.com/wp-content/uploads/2016/06/Operation-DustySky2_-6.2016_TLP_White.pdf', 'https://www.securityweek.com/gaza-cybergang-attacks-attributed-hamas', 'https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html', 'https://www.cybereason.com/blog/new-cyber-espionage-campaigns-targeting-palestinians-part-one#conclusion'] |
302 | SpringDragon aka LotusBlossom | Since as early as 2012, the maintargets of SpringDragon attacks are high profile governmental organizations and political parties, education institutions such as universities, as well as companies from the telecommunications sector. | 2012-01-01 | 2017-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Taiwan', 'Indonesia', 'Philippines', 'Vietnam', 'Thailand'] | [['ASIA', 'SCS'], ['ASIA', 'SCS', 'SEA'], ['ASIA', 'SCS', 'SEA'], ['ASIA', 'SCS', 'SEA'], ['ASIA', 'SEA']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Science'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Science'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Science'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Science'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Science']] | [['Government / ministries', 'Legislative', 'Political parties', 'Telecommunications', ''], ['Government / ministries', 'Legislative', 'Political parties', 'Telecommunications', ''], ['Government / ministries', 'Legislative', 'Political parties', 'Telecommunications', ''], ['Government / ministries', 'Legislative', 'Political parties', 'Telecommunications', ''], ['Government / ministries', 'Legislative', 'Political parties', 'Telecommunications', '']] | ['Lotus Blossom/Spring Dragon/ST Group/DRAGONFISH/G0030'] | ['Unknown'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Lotus Blossom/Spring Dragon/ST Group/DRAGONFISH/G0030 | Unknown | Non-state actor, state-affiliation suggested | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf', 'https://unit42.paloaltonetworks.com/operation-lotus-blossom/'] | Resources | Territory; Resources; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf', 'https://securelist.com/spring-dragon-updated-activity/79067/', 'https://unit42.paloaltonetworks.com/operation-lotus-blossom/'] |
303 | Dark Caracal | Look out and EFF revealed a worldwide cyber-espionage-campaign, allegedly sponsored or conducted by Lebanon. | 2012-01-01 | 2018-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by IT-security company; Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft; Hijacking with Misuse | null | null | null | null | null | ['Dark Carceral'] | ['Lebanon'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2018-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Dark Carceral | Lebanon | Non-state actor, state-affiliation suggested | null | ['https://www.vice.com/en_us/article/gyw3n9/lebanese-government-hackers-hit-thousands-of-victims-with-incredibly-simple-campaign'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.vice.com/en_us/article/gyw3n9/lebanese-government-hackers-hit-thousands-of-victims-with-incredibly-simple-campaign'] |
316 | OperationCleaver/CuttingKitten | Iranian hackers were identified in a report released Tuesday as the source of coordinated attacks against more than 50 targets in 16 countries, many of them corporate and government entities that manage critical energy, transportation and medical services. | 2012-01-01 | 2014-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking without Misuse | null | ['United States', 'Canada', 'Israel', 'Germany', 'Saudi Arabia', 'Turkey', 'United Arab Emirates', 'United Kingdom', 'France', 'China'] | [['NATO', 'NORTHAM'], ['NATO', 'NORTHAM'], ['ASIA', 'MENA', 'MEA'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['ASIA', 'NATO', 'MEA'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', ''], ['Civil service / administration', 'Military', '', 'Energy', 'Transportation', 'Defence industry', '']] | ['Magic Hound/APT35/Cobalt Gypsy'] | ['Iran, Islamic Republic of'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2014-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Magic Hound/APT35/Cobalt Gypsy | Iran, Islamic Republic of | Non-state actor, state-affiliation suggested | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf', 'https://www.nytimes.com/2014/12/03/world/middleeast/report-says-cyberattacks-originated-inside-iran.html', 'https://www.cylance.com/content/dam/cylance/pages/operation-cleaver/Cylance_Operation_Cleaver_Report.pdf'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf', 'https://www.nytimes.com/2014/12/03/world/middleeast/report-says-cyberattacks-originated-inside-iran.html', 'https://www.cylance.com/content/dam/cylance/pages/operation-cleaver/Cylance_Operation_Cleaver_Report.pdf'] |