ID
int64 2
2.11k
| name
stringlengths 4
279
| description
stringlengths 19
3.75k
| start_date
stringlengths 10
10
⌀ | end_date
stringlengths 10
10
⌀ | inclusion_criteria
stringclasses 22
values | inclusion_criteria_subcode
stringclasses 2
values | source_incident_detection_disclosure
stringclasses 26
values | incident_type
stringclasses 23
values | receiver_name
stringclasses 172
values | receiver_country
stringlengths 8
438
⌀ | receiver_region
stringlengths 8
1.24k
⌀ | receiver_category
stringlengths 11
3.52k
⌀ | receiver_category_subcode
stringlengths 11
1.32k
⌀ | initiator_name
stringlengths 7
480
⌀ | initiator_country
stringclasses 131
values | initiator_category
stringclasses 25
values | initiator_category_subcode
stringclasses 23
values | number_of_attributions
int64 0
10
| attribution_date
stringclasses 232
values | attribution_type
stringclasses 127
values | attribution_basis
stringclasses 101
values | attributing_actor
stringclasses 135
values | attribution_it_company
stringclasses 7
values | attributing_country
stringclasses 79
values | attributed_initiator
stringlengths 3
7.87k
⌀ | attributed_initiator_country
stringclasses 195
values | attributed_initiator_category
stringclasses 75
values | attributed_initiator_subcategory
stringclasses 50
values | sources_attribution
stringlengths 2
1.25k
| cyber_conflict_issue
stringclasses 56
values | offline_conflict_issue
stringclasses 62
values | offline_conflict_name_HIIK
stringclasses 21
values | offline_conflict_intensity
stringclasses 3
values | offline_conflict_intensity_subcode
stringclasses 5
values | number_of_political_responses
int64 0
7
| political_response_date
stringclasses 41
values | political_response_type
stringclasses 20
values | political_response_type_subcode
stringclasses 23
values | political_response_country
stringclasses 31
values | political_response_actor
stringclasses 41
values | zero_days
stringclasses 4
values | zero_days_subcode
stringclasses 2
values | MITRE_initial_access
stringclasses 20
values | MITRE_impact
stringclasses 28
values | user_interaction
stringclasses 2
values | has_disruption
bool 2
classes | data_theft
stringclasses 4
values | disruption
stringclasses 4
values | hijacking
stringclasses 4
values | physical_effects_spatial
stringclasses 4
values | physical_effects_temporal
stringclasses 4
values | unweighted_cyber_intensity
int64 0
7
| target_multiplier
stringclasses 3
values | weighted_cyber_intensity
float64 0
10
⌀ | impact_indicator
stringclasses 4
values | impact_indicator_value
float64 0
13
⌀ | functional_impact
stringclasses 6
values | intelligence_impact
stringclasses 6
values | political_impact_affected_entities
stringclasses 5
values | political_impact_affected_entities_exact_value
float64 0
150
⌀ | political_impact_third_countries
stringclasses 4
values | political_impact_third_countries_exact_value
float64 0
6
⌀ | economic_impact
stringclasses 2
values | economic_impact_exact_value
float64 0
100M
⌀ | economic_impact_currency
stringclasses 2
values | state_responsibility_indicator
stringclasses 4
values | IL_breach_indicator
stringclasses 32
values | IL_breach_indicator_subcode
stringclasses 21
values | evidence_for_sanctions_indicator
stringclasses 3
values | number_of_legal_responses
int64 0
3
| legal_response_date
stringclasses 18
values | legal_response_type
stringclasses 8
values | legal_response_type_subcode
stringclasses 4
values | legal_response_country
stringclasses 15
values | legal_response_actor
stringclasses 20
values | legal_attribution_reference
stringclasses 11
values | legal_attribution_reference_subcode
stringclasses 5
values | legal_response_indicator
stringclasses 4
values | casualties
float64 | sources_url
stringlengths 2
9.44k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
405 | Anonymous Cyberwar vs. Israel | Anonymous declares 'cyberwar' on Israel | 2012-11-12 | 2012-11-20 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | [['Government / ministries', 'Intelligence agencies', '', '']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | none | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.huffingtonpost.com/2012/11/17/anonymous-hacks-israel-all-your-base_n_2150881.html', 'https://edition.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/index.html', 'https://www.hackread.com/anonymous-destroys-israel-by-hacking-websites-destroying-databases-leaking-emails-passwords-for-opisrael/'] |
406 | Accidental Syrian Internet Blackout | The NSA accidentally took down the syrian internet in an attempt to infiltrate the syrian telecommunication provider. | 2012-11-29 | 2012-11-29 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Disruption | null | ['Syria'] | [['ASIA', 'MENA', 'MEA']] | [['Critical infrastructure']] | [['Telecommunications']] | ['NSA/Equation Group'] | ['United States'] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party; Media-based attribution | null | null | null | NSA/Equation Group; NSA/Equation Group | United States; United States | State; State | null | [] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/world/2014/aug/13/snowden-nsa-syria-internet-outage-civil-war#maincontent'] |
407 | Pakistan CyberArmy vs. Bangladesh | Pakistan CyberArmy declares war on Chinese, Bangladeshi sites | 2012-12-01 | 2012-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['China', 'Bangladesh'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO'], ['ASIA', 'SASIA']] | [['State institutions / political system'], ['State institutions / political system']] | [['Government / ministries'], ['Government / ministries']] | ['Bangladesh Cyber Army'] | ['Pakistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Bangladesh Cyber Army | Pakistan | Non-state-group | Hacktivist(s) | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theregister.co.uk/2012/12/10/pakistan_cyber_army_hack_bangladesh_china/'] |
408 | MoroccanGhosts attack South Africa | 100 South African Websites hacked by MoroccanGhosts | 2012-12-01 | 2012-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['South Africa'] | [['AFRICA', 'SSA']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | null | ['Moroccan Ghosts'] | ['Morocco'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Moroccan Ghosts | Morocco | Non-state-group | Hacktivist(s) | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/100-south-african-websites-hacked-by-moroccan-ghosts/'] |
409 | BGHH vs. Sri Lanka | 22 Sri Lankan Ministry Websites Hacked by Bangladesh Gray Hat Hackers | 2012-12-01 | 2012-12-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Sri Lanka'] | [['ASIA', 'SASIA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Bangladesh Grey Hat Hackers'] | ['Bangladesh'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Bangladesh Grey Hat Hackers | Bangladesh | Non-state-group | Hacktivist(s) | [] | Other | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/22-srilankan-ministry-websites-hacked-by-bangladesh-gray-hat-hackers/'] |
410 | BGHH vs. Pakistan | Bangladeshi Hackers Fight Back, Hack Pakistani Government Sites | 2012-12-01 | 2012-12-10 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'Media']] | [['Judiciary', 'Military', 'Government / ministries', '']] | ['Bangladesh Grey Hat Hackers'] | ['Bangladesh'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Bangladesh Grey Hat Hackers | Bangladesh | Non-state-group | Hacktivist(s) | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Bangladeshi-Hackers-Fight-Back-Hack-Pakistani-Government-Sites-313309.shtml'] |
411 | H4ksniper vs. SouthAfrica | Three SA government websites hacked | 2012-12-09 | 2012-12-09 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['South Africa'] | [['AFRICA', 'SSA']] | [['State institutions / political system']] | [['Government / ministries']] | ['H4ksniper'] | ['Morocco'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | H4ksniper | Morocco | Non-state-group | Hacktivist(s) | [] | Subnational predominance | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://mg.co.za/article/2012-12-09-three-government-websites-hacked'] |
412 | OP India | #Op India: BSNL Server Hacked, Database Leaked by Anonymous India | 2012-12-13 | 2012-12-13 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['Media']] | null | ['Anonymous'] | ['India'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | India | Non-state-group | Hacktivist(s) | [] | Other | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/op_india-bsnl-server-hacked-database-leaked-by-anonymous-india/'] |
413 | Brazil HackTeam vs. Interpol | Interpol Indonesia Hacked and Defaced by HighTech Brazil HackTeam | 2012-12-25 | 2012-12-25 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Indonesia'] | [['ASIA', 'SCS', 'SEA']] | [['International / supranational organization']] | null | ['Brazil Hack Team'] | ['Brazil'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Brazil Hack Team | Brazil | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/interpol-indonesia-hacked-and-defaced-by-hightech-brazil-hackteam/'] |
414 | Guatemala state surveillance | The Guatemalan government purchased surveillance tools (Pegasus, Circles) in order to monitor political opponents, activists and journalists. | 2012-01-01 | 2015-05-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source) | Data theft; Hijacking with Misuse | null | ['Guatemala'] | [['CENTAM']] | [['Social groups', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | [['Political opposition / dissidents / expats', '', '']] | ['General Directoral of Civil Intelligence (DIGICI)'] | ['Guatemala'] | ['State'] | null | 2 | 2018-01-01; 2018-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Media report (e.g., Reuters makes an attribution statement, without naming further sources) | Attribution by third-party; Media-based attribution | null | null | null | General Directoral of Civil Intelligence (DIGICI); General Directoral of Civil Intelligence (DIGICI) | Guatemala; Guatemala | State; State | null | ['https://translate.google.com/translate?sl=auto&tl=de&u=https%3A%2F%2Fnomada.gt%2Fpais%2Fla-corrupcion-no-es-normal%2Fespionaje-ilegal-del-gobierno-aqui-esta-la-investigacion-de-nuestro-diario-parte-i%2F'] | System / ideology | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://citizenlab.ca/2020/12/running-in-circles-uncovering-the-clients-of-cyberespionage-firm-circles/', 'https://translate.google.com/translate?sl=auto&tl=de&u=https%3A%2F%2Fnomada.gt%2Fpais%2Fla-corrupcion-no-es-normal%2Fespionaje-ilegal-del-gobierno-aqui-esta-la-investigacion-de-nuestro-diario-parte-i%2F'] |
415 | Moroccan government vs. Human rights organization | The Moroccan human rights activist Hisham Almiraat accuses the moroccan government of compromising his organization "Mamfakinch" after it won the Google-Global Voices Breaking Border award for promoting dialogue and democratic values. | 2012-07-01 | 2012-07-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies) | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft; Hijacking with Misuse | null | ['Morocco'] | [['AFRICA', 'NAF', 'MENA']] | [['Social groups']] | [['Advocacy / activists (e.g. human rights organizations)']] | null | ['Morocco'] | ['State'] | null | 2 | 2016-01-01; 2016-01-01 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Receiver attributes attacker; Attribution by third-party | null | null | null | null | Morocco; Morocco | State; State | null | ['https://www.amnesty.org/en/latest/research/2016/12/how-a-hacking-campaign-helped-shut-down-an-award-winning-news-site/'] | System / ideology | System/ideology; National power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.amnesty.org/en/latest/research/2016/12/how-a-hacking-campaign-helped-shut-down-an-award-winning-news-site/'] |
416 | North Korea espionage campaign | North Korean state-sponsored hacking group APT37 conducted a perennial espionage campaign on South Korea, Japan, Vietnam and the Middle East. | 2012-01-01 | 2017-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Korea, Republic of', 'Japan', 'Vietnam', 'Middle East (region)'] | [['ASIA', 'SCS', 'NEA'], ['ASIA', 'SCS', 'NEA'], ['ASIA', 'SCS', 'SEA'], []] | [['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Social groups', 'Media'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Critical infrastructure', 'Social groups', 'Social groups', 'Media']] | [['Government / ministries', 'Military', 'Transportation', 'Health', 'Telecommunications', 'Finance', 'Defence industry', 'Advocacy / activists (e.g. human rights organizations)', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Transportation', 'Health', 'Telecommunications', 'Finance', 'Defence industry', 'Advocacy / activists (e.g. human rights organizations)', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Transportation', 'Health', 'Telecommunications', 'Finance', 'Defence industry', 'Advocacy / activists (e.g. human rights organizations)', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Military', 'Transportation', 'Health', 'Telecommunications', 'Finance', 'Defence industry', 'Advocacy / activists (e.g. human rights organizations)', 'Political opposition / dissidents / expats', '']] | ['APT37/Richochet Chollima/Red Eyes/InkySquid/ScarCruft/Reaper/Group123/TEMP.Reaper/Venus 121/G0067'] | ["Korea, Democratic People's Republic of"] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2018-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | APT37/Richochet Chollima/Red Eyes/InkySquid/ScarCruft/Reaper/Group123/TEMP.Reaper/Venus 121/G0067 | Korea, Democratic People's Republic of | Non-state actor, state-affiliation suggested | null | ['https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf'] | System / ideology; International power | System/ideology; Territory; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | Yes | multiple | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf'] |
417 | ShiqiangGroup vs. Taiwan | Targeted Attack On Taiwanese Government & Tibetan Activists Open, allegedly by the Chinese Shiqianggang. | 2013-01-01 | 2014-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Taiwan', 'China'] | [['ASIA', 'SCS'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', ''], ['Government / ministries', '']] | ['Shiqiang Group'] | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Shiqiang Group | China | Unknown - not attributed | null | ['https://www.nytimes.com/2014/05/23/world/asia/us-case-offers-glimpse-into-chinas-hacker-army.html', 'https://www.fireeye.com/blog/threat-research/2013/04/new-targeted-attack-on-taiwanese-government-tibetan-activists-open-up-a-can-of-worms-graypigeon-hangame-shiqiang-gang.html'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nytimes.com/2014/05/23/world/asia/us-case-offers-glimpse-into-chinas-hacker-army.html', 'https://www.fireeye.com/blog/threat-research/2013/04/new-targeted-attack-on-taiwanese-government-tibetan-activists-open-up-a-can-of-worms-graypigeon-hangame-shiqiang-gang.html'] |
418 | Operation WiltedTulip | Espionage Campaign by the allegedly Iranian APT Copykittens | 2013-01-01 | 2017-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Israel', 'United States', 'Turkey', 'Saudi Arabia', 'Germany', 'Jordan'] | [['ASIA', 'MENA', 'MEA'], ['NATO', 'NORTHAM'], ['ASIA', 'NATO', 'MEA'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | [['Government / ministries', 'Military', 'Defence industry', '', ''], ['Government / ministries', 'Military', 'Defence industry', '', ''], ['Government / ministries', 'Military', 'Defence industry', '', ''], ['Government / ministries', 'Military', 'Defence industry', '', ''], ['Government / ministries', 'Military', 'Defence industry', '', ''], ['Government / ministries', 'Military', 'Defence industry', '', '']] | ['CopyKittens/Slayer Kitten/G0052'] | ['Iran, Islamic Republic of'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | CopyKittens/Slayer Kitten/G0052 | Iran, Islamic Republic of | Unknown - not attributed | null | ['https://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.ibtimes.co.uk/copykittens-iran-linked-cyber-espionage-group-lacks-sophistication-still-successful-1632024', 'https://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf'] |
419 | ThripGroup | A sophisticated hacking campaign launched from computers in China burrowed deeply into satellite operators, defense contractors and telecommunications companies in the United States and southeast Asia, security researchers at Symantec Corp said. | 2013-01-01 | 2018-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by IT-security company | Hijacking without Misuse | null | ['Southeast Asia (region)', 'United States'] | [[], ['NATO', 'NORTHAM']] | [['Critical infrastructure'], ['Critical infrastructure']] | [['Telecommunications'], ['Telecommunications']] | ['Thrip'] | ['China'] | ['Unknown - not attributed'] | null | 1 | 2018-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Thrip | China | Unknown - not attributed | null | ['https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | none | none | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/us-china-usa-cyber/china-based-campaign-breached-satellite-defense-companies-symantec-idUSKBN1JF2X0', 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets'] |
420 | Operation Iron Tiger Part2/Emissary Panda | In 2013, Iron Tiger’s targets individuals in US defense-and technology-related fields like a erospace, energy, etc. It’s important to note that research has not shown an explicit, state-sponsored connection but the case shows that attackers don’t need to be connected to a state to engage in politically motivated activities. | 2013-01-01 | 2015-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Telecommunications', 'Defence industry', '']] | ['Emissary Panda/APT27/Lucky Mouse/BRONZE UNION/TEMP.Hippo/Group 35/TG-3390/Iron Tiger/ZipToken/G0027'] | ['China'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 1 | 2015-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | IT-security community attributes attacker | null | null | null | Emissary Panda/APT27/Lucky Mouse/BRONZE UNION/TEMP.Hippo/Group 35/TG-3390/Iron Tiger/ZipToken/G0027 | China | Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.cbc.ca/news/canada/montreal/emissary-panda-chinese-hackers-cyberattack-icao-1.5034177', 'https://newsroom.trendmicro.com/blog/operation-iron-tiger-attackers-shift-east-asia-united-states'] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.erai.com/CustomUploads/ca/wp/2015_12_wp_operation_iron_tiger.pdf', 'https://www.cbc.ca/news/canada/montreal/emissary-panda-chinese-hackers-cyberattack-icao-1.5034177', 'https://newsroom.trendmicro.com/blog/operation-iron-tiger-attackers-shift-east-asia-united-states'] |
421 | Ajax Security Team aka Rocket Kitten 2013-2014 | With the aim of cyber-espionage the at least state-encouraged Iranian hacking group Ajax Security Team have attacked companies in the U.S. and domestic users of anti-censorship technology. | 2013-01-01 | 2014-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['United States', 'Iran, Islamic Republic of'] | [['NATO', 'NORTHAM'], ['ASIA', 'MENA', 'MEA']] | [['Critical infrastructure', 'End user(s) / specially protected groups'], ['Critical infrastructure', 'End user(s) / specially protected groups']] | [['Defence industry', ''], ['Defence industry', '']] | ['Flying Kitten/Ajax Security Team/Rocket Kitten/Saffron Rose/G0130', 'Flying Kitten/Ajax Security Team/Rocket Kitten/Saffron Rose/G0130'] | ['Iran, Islamic Republic of', 'Iran, Islamic Republic of'] | ['Non-state actor, state-affiliation suggested', 'Non-state actor, state-affiliation suggested'] | null | 1 | 2013-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Flying Kitten/Ajax Security Team/Rocket Kitten/Saffron Rose/G0130 | Iran, Islamic Republic of | Non-state actor, state-affiliation suggested | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf'] | System / ideology; National power; International power | International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.thaicert.or.th/downloads/files/A_Threat_Actor_Encyclopedia.pdf', 'https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-operation-saffron-rose.pdf'] |
422 | Operation SnowMan-->DeputyDog aka APT 17 | Hackers from APT 17, an alleged Chinese state-proxy, according to Proofpoint and Intrusion Truth years later, are using a zero day vulnerability in Microsoft's Internet Explorer webbrowser and targeting US military personnels in an active attack campaign via the US Veterans of Foreign Wars website. | 2013-01-01 | 2014-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Hijacking without Misuse | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'End user(s) / specially protected groups']] | [['Military', '']] | ['Axiom/APT17/Tailgater Team/Group 72/Dogfish/G0001 (MSS, Jinan Bureau) <\xa0Winnti Umbrella/G0044\xa0'] | ['China'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2014-01-01; 2014-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker; Attribution by third-party | null | null | null | Axiom/APT17/Tailgater Team/Group 72/Dogfish/G0001 (MSS, Jinan Bureau) < Winnti Umbrella/G0044 ; Axiom/APT17/Tailgater Team/Group 72/Dogfish/G0001 (MSS, Jinan Bureau) < Winnti Umbrella/G0044 | China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://intrusiontruth.wordpress.com/2019/07/24/APT 17-is-run-by-the-jinan-bureau-of-the-chinese-ministry-of-state-security/', 'https://www.proofpoint.com/us/threat-insight/post/operation-rat-cook-chinese-APT -actors-use-fake-game-thrones-leaks-lures'] | System / ideology | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | Yes | One | null | null | null | false | none | none | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.fireeye.com/blog/threat-research/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html', 'https://intrusiontruth.wordpress.com/2019/07/24/APT 17-is-run-by-the-jinan-bureau-of-the-chinese-ministry-of-state-security/', 'https://www.proofpoint.com/us/threat-insight/post/operation-rat-cook-chinese-APT -actors-use-fake-game-thrones-leaks-lures'] |
423 | Operation“Kimsuky” | The Kimsuky cyberespionage campaign appears to be originated in NorthKorea and hit numerous organizations, eleven of which located in the South Korea and two in China. The attackers infected victims with a malware able to remote controls the PC, loggingkey strokes, stealing HWP documents. | 2013-01-01 | 2013-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Korea, Republic of', 'China'] | [['ASIA', 'SCS', 'NEA'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | [['Government / ministries', 'Government / ministries', '', ''], ['Government / ministries', 'Government / ministries', '', '']] | ['Kimsuky/Velvet Chollima/STOLEN PENCIL/Thallium/Black Banshee/G0094'] | ["Korea, Democratic People's Republic of"] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Kimsuky/Velvet Chollima/STOLEN PENCIL/Thallium/Black Banshee/G0094 | Korea, Democratic People's Republic of | Unknown - not attributed | null | ['https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/'] |
424 | APT 41 | FireEye Intelligence released a comprehensive report detailing APT 41, a prolific Chinese cyber threat group that carries out state-sponsored espionage activity in parallel with financially motivated operations. | 2013-01-01 | 2019-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Unknown'] | null | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['APT41/BARIUM/Wicked Panda/G0096 (Chengdu 404 Network Technology) <\xa0Winnti Umbrella/G0044'] | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2019-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | APT41/BARIUM/Wicked Panda/G0096 (Chengdu 404 Network Technology) < Winnti Umbrella/G0044 | China | Non-state actor, state-affiliation suggested | null | ['https://content.fireeye.com/APT -41/website-APT 41-blog'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://content.fireeye.com/APT-41/website-APT41-blog', 'https://content.fireeye.com/APT -41/website-APT 41-blog'] |
425 | Attor Spyplatform | Unknown actors developed an spyplatform that managed to misuse various sites in the Russian language space, to force an targeted espionage campaign | 2013-01-01 | 2019-01-01 | Attack on (inter alia) political target(s), not politicized; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Russia', 'Ukraine', 'Slovakia'] | [['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['EUROPE', 'EASTEU'], ['EUROPE', 'NATO', 'EU', 'EASTEU']] | [['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Telecommunications', ''], ['Government / ministries', 'Telecommunications', ''], ['Government / ministries', 'Telecommunications', '']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.welivesecurity.com/2019/10/10/eset-discovers-attor-spy-platform/'] |
426 | Finnish MFA Hacked by Turla | Finnish Foreign Ministry hacked by Turla | 2013-01-01 | 2016-03-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by victim | Data theft | null | ['Finland'] | [['EUROPE', 'EU', 'NORTHEU']] | [['State institutions / political system']] | [['Government / ministries']] | ['Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center)'] | ['Russia'] | ['Non-state actor, state-affiliation suggested'] | null | 2 | 2016-01-01; 2016-01-01 | Political statement / report (e.g., on government / state agency websites); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by receiver government / state entity; IT-security community attributes attacker | null | null | null | Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center); Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center) | Russia; Russia | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://yle.fi/uutiset/osasto/news/russian_group_behind_2013_foreign_ministry_hack/8591548'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.scmagazine.com/finlands-foreign-ministry-hacked-by-russian-or-chinese-spies/article/528907/', 'https://yle.fi/uutiset/osasto/news/russian_group_behind_2013_foreign_ministry_hack/8591548'] |
427 | Anonymous vs. Azerbaijani Government | Anonymous leaked internal data of the Special State Protection Service of Azerbaijan | 2013-01-01 | 2013-01-19 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Azerbaijan'] | [['ASIA', 'CENTAS']] | [['State institutions / political system', 'State institutions / political system']] | [['Police', 'Intelligence agencies']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.databreaches.net/1-7gb-documents-leaked-from-special-state-protection-service-of-azerbaijan/'] |
428 | Operation Toohash | Targeted attack campaign against various governments and companies in the Great Chinese Area, reported by German IT Company G data. | 2013-01-01 | 2014-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Unknown'] | null | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://public.gdatasoftware.com/Presse/Publikationen/Whitepaper/EN/GDATA_TooHash_CaseStudy_102014_EN_v1.pdf'] |
429 | Guccifer Affair Leak | The Romanian Hacker Guccifer leaked Emails between Colin Powell and MEP Corina Cretu | 2013-01-01 | 2013-01-01 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States', 'Romania'] | [['NATO', 'NORTHAM'], ['EUROPE', 'BALKANS', 'NATO', 'EU']] | [['State institutions / political system', 'End user(s) / specially protected groups'], ['State institutions / political system', 'End user(s) / specially protected groups']] | [['Legislative', ''], ['Legislative', '']] | ['Guccifer'] | ['Romania'] | ['Individual hacker(s)'] | null | 2 | null | Domestic legal action; Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attribution by receiver government / state entity; Attacker confirms | null | null | null | Guccifer; Guccifer | Romania; Romania | Individual hacker(s); Individual hacker(s) | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.nbcnews.com/news/world/guccifer-hacker-who-leaked-bush-paintings-sentenced-jail-n124556'] |
430 | Cobalt Dickens (Mabna Institute) | US Department of Justice accuses Iranian hackers going by the handle "Cobalt Dickens"(Secure works) of stealing data from universities in the US, Germany and 20 other countries. | 2013-01-01 | 2017-12-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by authorities of victim state | Data theft | null | ['United States', 'Germany', 'Australia', 'Canada', 'China', 'Denmark', 'Israel', 'Italy', 'Japan', 'United Kingdom'] | [['NATO', 'NORTHAM'], ['EUROPE', 'NATO', 'EU', 'WESTEU'], ['OC'], ['NATO', 'NORTHAM'], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO'], ['EUROPE', 'NATO', 'EU', 'NORTHEU'], ['ASIA', 'MENA', 'MEA'], ['EUROPE', 'NATO', 'EU'], ['ASIA', 'SCS', 'NEA'], ['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | null | ['COBALT DICKENS/Silent Librarian/TA407/G0122 (Mabna Institute)', 'Islamic Revolutionary Guard Corps (IRGC)'] | ['Iran, Islamic Republic of', 'Iran, Islamic Republic of'] | ['Non-state actor, state-affiliation suggested', 'Non-state actor, state-affiliation suggested'] | null | 2 | 2018-01-01; 2018-01-01; 2018-01-01; 2018-01-01 | Domestic legal action; Domestic legal action; Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; Attribution by receiver government / state entity; IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | COBALT DICKENS/Silent Librarian/TA407/G0122 (Mabna Institute); Islamic Revolutionary Guard Corps (IRGC); COBALT DICKENS/Silent Librarian/TA407/G0122 (Mabna Institute); Islamic Revolutionary Guard Corps (IRGC) | Iran, Islamic Republic of; Iran, Islamic Republic of; Iran, Islamic Republic of; Iran, Islamic Republic of | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities', 'https://www.justice.gov/opa/pr/nine-iranians-charged-conducting-massive-cyber-theft-campaign-behalf-islamic-revolutionary'] | International power | International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.heise.de/newsticker/meldung/US-Justizministerium-beschuldigt-Iraner-massiver-Hackerangriffe-4003100.html', 'https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities', 'https://www.justice.gov/opa/pr/nine-iranians-charged-conducting-massive-cyber-theft-campaign-behalf-islamic-revolutionary'] |
431 | OPM Hack | US Office of Personal Management is hacked twice by Chinese hackers. Personal information of about 21 million US government employees and former applicants is compromised, including fingerprints. The APT Group DeepPanda has been blamed for it, Fire Eye however, claimed that DeepPanda was not responsible for the OPM Hack, but another Chinese group, later be named as Turbine Panda. Hackers involved have been arrested by the FBI in 2017. | 2013-01-01 | 2015-03-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by media (without further information on source) | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Civil service / administration']] | ['APT26/TURBINE PANDA/Hippo Team/JerseyMikes (MSS, Jiangsu Bureau)', 'MSS/JSSD'] | ['China', 'China'] | ['Non-state actor, state-affiliation suggested', 'Non-state actor, state-affiliation suggested'] | null | 3 | 2015-01-01; 2015-01-01; 2015-01-01; 2015-01-01; 2015-01-01; 2015-01-01 | Domestic legal action; Domestic legal action; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Not available; Not available | Attribution by receiver government / state entity; Attribution by receiver government / state entity; IT-security community attributes attacker; IT-security community attributes attacker; Contested attribution; Contested attribution | null | null | null | APT26/TURBINE PANDA/Hippo Team/JerseyMikes (MSS, Jiangsu Bureau); MSS/JSSD; APT26/TURBINE PANDA/Hippo Team/JerseyMikes (MSS, Jiangsu Bureau); MSS/JSSD; APT26/TURBINE PANDA/Hippo Team/JerseyMikes (MSS, Jiangsu Bureau); MSS/JSSD | China; China; China; China; China; China | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | ; ; Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); ; | ['https://www.zdnet.com/article/building-chinas-comac-c919-airplane-involved-a-lot-of-hacking-report-says/', 'https://freebeacon.com/national-security/fbi-alert-reveals-groups-behind-opm-hack/', 'https://www.vox.com/2015/6/19/11563730/fireeye-identifies-chinese-group-behind-federal-hack', 'https://australiancybersecuritymagazine.com.au/new-intelligence-report-from-crowdstrike-turbine-panda/', 'https://securityaffairs.co/wordpress/92649/APT /turbine-panda-aerospace-espionage.html', 'https://edition.cnn.com/2017/08/24/politics/fbi-arrests-chinese-national-in-opm-data-breach/index.html'] | International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://therecord.media/us-marshals-service-becomes-latest-law-enforcement-agency-hit-by-hackers/', 'https://www.zdnet.com/article/building-chinas-comac-c919-airplane-involved-a-lot-of-hacking-report-says/', 'https://abcnews.go.com/US/exclusive-25-million-affected-opm-hack-sources/story?id=32332731#:~:text=The%20attack%20on%20OPM%20began%20in%20late%202013%2C,to%20two%20days%20of%20testimony%20on%20Capitol%20Hill.', 'https://freebeacon.com/national-security/fbi-alert-reveals-groups-behind-opm-hack/', 'https://www.vox.com/2015/6/19/11563730/fireeye-identifies-chinese-group-behind-federal-hack', 'https://australiancybersecuritymagazine.com.au/new-intelligence-report-from-crowdstrike-turbine-panda/', 'https://securityaffairs.co/wordpress/92649/APT /turbine-panda-aerospace-espionage.html', 'https://edition.cnn.com/2017/08/24/politics/fbi-arrests-chinese-national-in-opm-data-breach/index.html', 'https://www.theguardian.com/technology/2015/jun/04/us-government-massive-data-breach-employee-records-security-clearances', 'https://www.cyberscoop.com/china-hacking-talent-xi-jinping-education-policies/', 'https://unit42.paloaltonetworks.com/plugx-variants-in-usbs/'] |
432 | APT32/Ocean Lotus Group | Espionage-Hacks against Vietnamese Dissidents and Journalists, as well as foreign governments. | 2013-01-01 | 2017-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft | null | ['Vietnam', 'Southeast Asia (region)', 'China'] | [['ASIA', 'SCS', 'SEA'], [], ['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system', 'Social groups', 'Media'], ['State institutions / political system', 'Social groups', 'Media'], ['State institutions / political system', 'Social groups', 'Media']] | [['Government / ministries', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Political opposition / dissidents / expats', ''], ['Government / ministries', 'Political opposition / dissidents / expats', '']] | ['APT32/Ocean Lotus/Sea Lotus'] | ['Vietnam'] | ['Non-state actor, state-affiliation suggested'] | null | 2 | 2014-01-01; 2014-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker; Attribution by third-party | null | null | null | APT32/Ocean Lotus/Sea Lotus; APT32/Ocean Lotus/Sea Lotus | Vietnam; Vietnam | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html', 'https://www.eff.org/deeplinks/2014/01/vietnamese-malware-gets-personal'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html', 'https://www.eff.org/deeplinks/2014/01/vietnamese-malware-gets-personal'] |
433 | National Inventory of Dams Hack | U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database on vulnerabilities of US Dams to the Chinese government or military cyberwarriors, according to U.S.officials. | 2013-01-01 | 2013-04-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Military']] | null | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2013-01-01 00:00:00 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity | null | null | null | null | China | Non-state actor, state-affiliation suggested | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.washingtontimes.com/news/2013/may/1/sensitive-army-database-us-dams-compromised-chines/', 'https://securityaffairs.co/wordpress/14089/security/us-army-corps-engineers-national-inventory-of-dams-nid-hacked.html'] |
434 | DOE breach | US Energy Department was breached, no sensitive data stolen. | 2013-01-01 | 2013-02-01 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['China'] | ['State'] | null | 1 | 2013-01-01 00:00:00 | Media report (e.g., Reuters makes an attribution statement, without naming further sources) | Media-based attribution | null | null | null | null | China | State | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.businessinsider.com/doe-attack-by-chinese-hackers-2013-2?IR=T'] |
435 | Iron Tiger Attack(related to OPMhack) | Chinese HackerGroup IronTiger leakes sensitive data from several defence contractors | 2013-01-01 | 2015-09-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Defence industry']] | ['Emissary Panda/APT27/Lucky Mouse/BRONZE UNION/TEMP.Hippo/Group 35/TG-3390/Iron Tiger/ZipToken/G0027'] | ['China'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 1 | 2015-01-01 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | Emissary Panda/APT27/Lucky Mouse/BRONZE UNION/TEMP.Hippo/Group 35/TG-3390/Iron Tiger/ZipToken/G0027 | China | Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://threatpost.com/APT -group-gets-selective-about-data-it-steals/114103/'] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 1 | 0 | null | null | null | null | null | Yes | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.forbes.com/sites/lisabrownlee/2015/09/17/chinese-cyber-attacks-on-us-military-interests-confirmed-as-advanced-persistent-and-ongoing/#28d21d12694f%C2%A0', 'https://threatpost.com/APT -group-gets-selective-about-data-it-steals/114103/'] |
436 | Bangladesh Cyber Army vs. India | The Bangladesh Cyber Army claims to have defaced over 1,000 Indian websites, including India's biggest telecommunications providers BSNL, as a form of protest against the country’s Border Security Force (BSF). | 2013-01-07 | 2013-01-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Bangladesh Cyber Army'] | ['Bangladesh'] | ['Non-state-group'] | ['Ethnic actors'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Bangladesh Cyber Army | Bangladesh | Non-state-group | Ethnic actors | [] | Subnational predominance; Territory | Subnational predominance | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/Bangladesh-Cyber-Army-Attacks-Indian-Sites-in-Memory-of-15-Year-Old-Girl-Video-319234.shtml'] |
437 | RedHack vs. Turkish Council of Higher Education | Turkish hackergroup RedHack gains access to a database of Turkey's Council of Higher Education. They publish data which they claim proves corruption incidents at several Turkish universities. | 2013-01-10 | 2013-01-10 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['Science']] | null | ['RedHack'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | RedHack | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Turkey-s-Council-of-Higher-Education-Hacked-by-RedHack-60-000-Documents-Leaked-319958.shtml'] |
438 | LulzSec Peru vs. Chilean Army | Hackergroup LulzSec Peru hacks the website of the Chilean army. | 2013-01-15 | 2013-01-15 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Chile'] | [['SOUTHAM']] | [['State institutions / political system']] | [['Military']] | ['LulzSec Peru'] | ['Peru'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | LulzSec Peru | Peru | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Army-of-Chile-Website-Hacked-by-LulzSec-Peru-321097.shtml'] |
439 | DavyJones vs. Government of SriLanka | Website of Sri Lankan Minister of Sports hacked,website data published. | 2013-01-26 | 2013-01-26 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Sri Lanka'] | [['ASIA', 'SASIA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Davy Jones'] | ['Unknown'] | ['Individual hacker(s)'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Davy Jones | Unknown | Individual hacker(s) | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/sri-lankas-minister-of-sports-website-hacked-data-leaked-by-davy-jones/'] |
440 | Japan MFA leak | Unidentified hackers steal non-confidential data from Japan's Ministry of Foreign Affairs. | 2013-01-28 | 2013-01-28 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['Japan'] | [['ASIA', 'SCS', 'NEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/20-Documents-Stolen-by-Hackers-from-Japan-s-Ministry-of-Foreign-Affairs-327205.shtml'] |
441 | Anonymous vs. Egypt government Part II | Hacker collective Anonymous takes down several Egyptian government websites with DDoS attacks to protest police violence against protesters. | 2013-02-03 | 2013-02-04 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Egypt'] | [['MENA', 'MEA', 'AFRICA', 'NAF']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.ehackingnews.com/2013/02/opegypt-egyptian-government-websites.html'] |
442 | Anonymous leaks Data of Fed | The hacker collective Anonymous obtains and publishes personal data of 4000 employees of the US central bank 'Federal Reserve Bank'. | 2013-02-03 | 2013-02-03 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | [['Federal Reserve Bank (United States)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Finance']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/net-us-usa-fed-hackers/fed-says-internal-site-breached-by-hackers-no-critical-functions-affected-idUSBRE91501920130206'] |
443 | Anonymous vs. Mongolian National Police | Anonymous-affiliated hacker defaces website of the Mongolian National Police. | 2013-02-16 | 2013-02-16 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Mongolia'] | [['ASIA', 'EASIA', 'NEA']] | [['State institutions / political system']] | [['Police']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Website-of-Mongolian-National-Police-Hacked-by-Viru-Noir-330201.shtml'] |
444 | Malaysia Deparment of Information attacked by Hacker | Hackers gain access to the Malaysian Department of Information and post a notice on the PM's resignation. | 2013-02-18 | 2013-02-18 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Malaysia'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Hackers-Publish-PM-Resignation-Notice-on-Malaysian-Government-Website-330327.shtml'] |
445 | Anonymous vs. US State Department | Anonymous hacks and publishes data from the US State Department's website, defaces the website of George K. Baum & Company, in anti-US offensive. | 2013-02-19 | 2013-02-19 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', '']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.rt.com/usa/anonymous-hacks-state-department-617/'] |
446 | Kuwaiti Hackers vs. Lebanese Parliaments | Hacking team KuwaitiHackers defaces webpage of the Lebanese parliament, accusing the government of supporting Assad in the Syrian civilwar. | 2013-02-23 | 2013-02-23 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Lebanon'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Legislative']] | ['Kuwaiti Hackers'] | ['Kuwait'] | ['Non-state-group'] | ['Ethnic actors'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Kuwaiti Hackers | Kuwait | Non-state-group | Ethnic actors | [] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.dailystar.com.lb/News/Local-News/2013/Feb-23/207634-lebanese-parliament-website-hacked.ashx', 'https://www.hackread.com/lebanon-parliament-website-hacked-by-team-kuwaiti-hackers/'] |
447 | Chinese Attack on DRDO | Indian Defence Research and Development Organization (DRDO,part of the Ministry of Defense) was hacked.Highly sensitive , strategic data was stolen and collected on a server in China. | 2013-03-01 | 2014-03-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system', 'State institutions / political system', 'Science']] | [['Government / ministries', 'Military', '']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | China | Unknown - not attributed | null | [] | International power | Territory; Resources; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.newindianexpress.com/nation/2013/mar/14/chinese-hack-drdo-computers-antony-seeks-report-458371.html', 'https://www.hackread.com/indian-defence-organisation-drdo-servers-hacked-china-among-the-suspects/', 'https://timesofindia.indiatimes.com/india/DRDO-computers-hacked/articleshow/18955837.cms'] |
448 | phr0zen myst pakistani dataleak | Hacker publishes databases and login data,after breaching the websites of the Bangladeshi Ministry of Agriculture and the Supreme Court, in protest against violence at demonstrations. | 2013-03-06 | 2013-03-06 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Bangladesh'] | [['ASIA', 'SASIA']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Judiciary']] | ['phr0zenmyst'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | phr0zenmyst | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | System/ideology; Other | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/bangladeshi-supreme-court-ministry-of-agriculture-websites-breached-user-accounts-leaked-phr0zenmyst/'] |
449 | OP BlackSummer | With support of Chinese hackers, hackers of the Tunisian CyberArmy and the Al-Qaeda ElectronicArmy steal data from the website of the Pentagon and other US-American government websites. | 2013-03-10 | 2013-03-12 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | ['Tunisian Cyber Army', 'Al-Qaeda Electronic Army'] | ['China', 'Tunisia', 'China', 'Tunisia'] | ['Non-state-group', 'Non-state-group'] | ['Hacktivist(s)', 'Hacktivist(s)'] | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms; Attacker confirms; Attacker confirms; Attacker confirms | null | null | null | Tunisian Cyber Army; Tunisian Cyber Army; Al-Qaeda Electronic Army; Al-Qaeda Electronic Army | China; Tunisia; China; Tunisia | Non-state-group; Non-state-group; Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s); Hacktivist(s); Hacktivist(s) | ['https://blog.sensecy.com/tag/opblacksummer/'] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.ehackingnews.com/2013/03/al-qaeda-electronic-army-hack-us-government.html', 'http://www.ehackingnews.com/2013/03/hackers-infect-pentagon-admin-by.html', 'https://blog.sensecy.com/tag/opblacksummer/'] |
450 | Godzilla vs. Pakistani Government | After gaining access to an important government server, an Indian hacker shuts down several Pakistani government websites. He later also publishes admin login data for several servers. He accuses Pakistan of supporting and executing terrorism. | 2013-03-11 | 2013-03-13 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Government / ministries']] | ['Godzilla'] | ['India'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Godzilla | India | Non-state-group | Hacktivist(s) | [] | System / ideology; International power | Territory; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Indian-Hacker-Causes-Several-Pakistani-Government-Sites-to-Become-Inaccessible-336159.shtml'] |
451 | Anti-NK DDOS | North Korea has been hit by a massive cyber attack according the declaration of a South Korean government official that also added the government of Seoul is investigating on the event denying every responsibility. Russia’s ITAR-TASS news agency, which has an office in Pyongyang, reported the events on Wednesday night, all web sites of the country went offline until late Thursday afternoon. | 2013-03-13 | 2013-03-14 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by media (without further information on source) | Disruption | null | ["Korea, Democratic People's Republic of"] | [['ASIA', 'NEA']] | [['Critical infrastructure', 'Media']] | [['Telecommunications', '']] | null | ['Korea, Republic of', 'United States'] | ['State'] | null | 1 | 2013-01-01; 2013-01-01 | Political statement / report (e.g., on government / state agency websites); Political statement / report (e.g., on government / state agency websites) | Attribution by receiver government / state entity; Attribution by receiver government / state entity | null | null | null | null | Korea, Republic of; United States | State; State | null | [] | System / ideology; Territory; International power | System/ideology; Territory; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://securityaffairs.co/wordpress/13005/security/n-korea-hit-by-large-scale-cyber-attackrepercussions-in-cyberspace.html'] |
452 | Anonymous vs. Iranian Parliament | Hacker affiliated with Anonymous takes down Iranian websites of parliament, Economic Research Institute and Aerospace Industries Organization. | 2013-03-14 | 2013-03-15 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Iran, Islamic Republic of'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Science']] | [['Legislative', '', '']] | ['Cyper (Anonymous)'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Cyper (Anonymous) | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | System/ideology; National power; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/OpIran-Hacktivists-Launch-DDOS-Attacks-Against-Major-Iranian-Sites-337585.shtml'] |
453 | Going Greyhat | German hacker publishes login data of Turkish Ministry of Economy and Central Finance and Contracts Unit's websites to show their vulnerabilities. | 2013-03-18 | 2013-03-18 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['D35m0nd142'] | ['Germany'] | ['Non-state-group'] | ['Private technology companies / hacking for hire groups without state affiliation / research entities'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | D35m0nd142 | Germany | Non-state-group | Private technology companies / hacking for hire groups without state affiliation / research entities | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Turkey-s-Ministry-of-Economy-and-Central-Finance-and-Contracts-Unit-Hacked-338107.shtml'] |
454 | Dark Seoul 2013I | Two South Korean banks and television broadcasters experience disruption after"logicbomb" is (allegedly) placed by NorthKorea. | 2013-03-20 | 2013-03-20 | Attack conducted by nation state (generic “state-attribution” or direct attribution towards specific state-entities, e.g., intelligence agencies); Attack on (inter alia) political target(s), politicized | null | Incident disclosed by authorities of victim state | Disruption; Hijacking with Misuse | null | ['Korea, Republic of'] | [['ASIA', 'SCS', 'NEA']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | null | ['Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110)'] | ["Korea, Democratic People's Republic of"] | ['State'] | null | 2 | 2013-01-01; 2013-01-01 | Political statement / report (e.g., on government / state agency websites); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; IT-security community attributes attacker | null | null | null | Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110); Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110) | Korea, Democratic People's Republic of; Korea, Democratic People's Republic of | State; Non-state actor, state-affiliation suggested | null | ['https://www.reuters.com/article/us-sony-cybersecurity-northkorea/for-north-koreas-cyber-army-long-term-target-may-be-telecoms-utility-grids-idUSKBN0JX0JW20141219', 'https://www.wsj.com/articles/SB10001424127887324136204578639540757695644'] | System / ideology | System/ideology; Territory; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.wired.com/2013/03/logic-bomb-south-korea-attack/', 'https://www.reuters.com/article/us-sony-cybersecurity-northkorea/for-north-koreas-cyber-army-long-term-target-may-be-telecoms-utility-grids-idUSKBN0JX0JW20141219', 'https://www.wsj.com/articles/SB10001424127887324136204578639540757695644', 'https://www.theguardian.com/world/2013/mar/20/south-korea-under-cyber-attack', 'https://thediplomat.com/2022/10/the-future-of-south-korea-us-cyber-cooperation/'] |
455 | Syrian Electronic Army vs. BBCs Twitter | Hackers from 'Syrian Electronic Army' post tweets on BBC account apparently backing Basharal-Assad | 2013-03-21 | 2013-03-21 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by attacker | Disruption | null | ['United Kingdom'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['Media']] | null | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | IT-security community attributes attacker; Attacker confirms | null | null | null | Syrian Electronic Army; Syrian Electronic Army | Syria; Syria | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html'] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/media/2013/mar/21/bbc-weather-twitter-syrian-regime', 'https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html'] |
456 | Sector404 vs. Mossad | The hacktivist group "Sector404" has launched a distributed denial-of-service (DDOS) attack against mossad.gov.il, the official website of the Israeli Secret Intelligence Service. | 2013-03-23 | 2013-03-23 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Intelligence agencies']] | ['Sector 404'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Sector 404 | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/Hackers-Take-Down-Official-Mossad-Website-Details-of-30-000-Israeli-Officials-Leaked-339742.shtml'] |
457 | Anonymous and RedHack Leak | Hackers of Anonymous and RedHack published the personal details of more than 30,000 people, including politicians, government employees, military and police officials. | 2013-03-23 | 2013-03-23 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Military', 'Police']] | ['RedHack', 'Anonymous'] | ['Unknown', 'Unknown'] | ['Non-state-group', 'Non-state-group'] | ['Hacktivist(s)', 'Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms; Attacker confirms | null | null | null | RedHack; Anonymous | Unknown; Unknown | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | [] |
458 | Shutdown of Pakistan Electoral Commission | Website of Pakistan's Electoral Commission Website is attacked, probably by"Russian and Asianhackers", and inaccessable. | 2013-03-29 | 2013-03-30 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system', 'State institutions / political system']] | [['Civil service / administration', 'Election infrastructure / related systems']] | ['Not available'] | ['India', 'Russia', 'Asia (region)'] | ['Unknown - not attributed'] | null | 3 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites); Attribution given, type unclear; Attribution given, type unclear; Attribution given, type unclear | Receiver attributes attacker; Receiver attributes attacker; Receiver attributes attacker; Media-based attribution; Media-based attribution; Media-based attribution; Contested attribution; Contested attribution; Contested attribution | null | null | null | null | India; Russia; Asia (region); India; Russia; Asia (region); India; Russia; Asia (region) | Unknown - not attributed; Unknown - not attributed; Unknown - not attributed; Unknown - not attributed; Unknown - not attributed; Unknown - not attributed; Unknown - not attributed; Unknown - not attributed; Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/massive-cyber-attack-on-election-commission-of-pakistan-servers-by-asian-russian-hackers/', 'https://advox.globalvoices.org/2013/04/01/cyber-attack-on-pakistans-electoral-commission-website/'] |
459 | Anonymous vs. North Korea | Hacker collective Anonymous repeatedly hacks into North Korean propaganda websites and online accounts, posts pictures that mock Kim Jong Un. | 2013-04-04 | 2013-04-15 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ["Korea, Democratic People's Republic of"] | [['ASIA', 'NEA']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | null | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.cnet.com/news/anonymous-again-hacks-into-north-korean-web-sites/', 'https://arstechnica.com/information-technology/2013/04/anonymous-hackers-take-control-of-north-korean-propaganda-sites/'] |
460 | Anonymous attack on Israel (Holocaust Remebrance Day) | Anonymous attacks Israeli websites, twitter and bank accounts on Holocaust memorial day, to protest its policy towards Palestine. Israeli officials say that not much damage has been done. | 2013-04-07 | 2013-04-07 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | [['Government / ministries', '', '']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Territory; International power | System/ideology; Resources; Secession; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theatlantic.com/international/archive/2013/04/anonymous-hits-israel-massive-cyber-attack-israel-attacks-back/316538/'] |
461 | Anonymous vs. Gabon Part II | Hacker collective Anonymous takes down webpages of Gabonese government to protest ritual killings. | 2013-04-19 | 2013-04-19 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Gabon'] | [['AFRICA', 'SSA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/OpGabon-Gabon-Ministry-of-Justice-Other-Government-Sites-Attacked-by-Anonymous-346887.shtml'] |
462 | AP Twitter Hack SEA | Hackers of the Syrian Electronic Army prompt a 143-point fall in the Dow Jones industrial average after sending a message from the Twitter feed of the Associated Press, saying the White House had been hit by two explosions and that Barack Obama was injured. The fake tweet, which was immediately corrected by Associated Press employees, caused a sensation on Twitter and in the stock market. Later on, three Members of the SEA have been indicted for the attack by the US. | 2013-04-23 | 2013-04-23 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by victim | Disruption | null | ['United States'] | [['NATO', 'NORTHAM']] | [['Media']] | null | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2013-01-01; 2013-01-01 | Domestic legal action; Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attribution by receiver government / state entity; Attacker confirms | null | null | null | Syrian Electronic Army; Syrian Electronic Army | Syria; Syria | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html', 'https://www.ap.org/ap-in-the-news/2016/us-indicts-3-it-ties-to-syrian-electronic-army-for-hacking'] | System / ideology; International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.securityweek.com/syrian-electronic-army-members-face-hacking-charges', 'https://www.washingtonpost.com/news/worldviews/wp/2013/04/23/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism/?noredirect=on&utm_term=.b4388c4184ad', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html', 'https://www.ap.org/ap-in-the-news/2016/us-indicts-3-it-ties-to-syrian-electronic-army-for-hacking', 'https://www.theguardian.com/business/2013/apr/23/ap-tweet-hack-wall-street-freefall'] |
463 | Syrian Electronic Army vs. Guardian | Syrian Electronic Army hackers capture twitteraccounts of the Guardian ,post pro-Assad messages. | 2013-04-30 | 2013-04-30 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by attacker | Disruption | null | ['United Kingdom'] | [['EUROPE', 'NATO', 'EU', 'NORTHEU']] | [['Media']] | null | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 1 | 2013-01-01 00:00:00 | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Syrian Electronic Army | Syria | Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html'] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.independent.co.uk/news/media/press/syrian-electronic-army-hackers-attack-guardian-twitter-accounts-8597629.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html'] |
464 | Australia Theft of Spy Headquarters | Chinese hackers have stolen the blueprints of a new multi-million-dollar Australian spy headquarters and other confidential information from the Australian Secret Intelligence Service. | 2013-05-01 | 2013-05-01 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by media (without further information on source) | Data theft | null | ['Australia'] | [['OC']] | [['State institutions / political system']] | [['Intelligence agencies']] | null | ['China'] | ['Unknown - not attributed'] | null | 1 | null | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity | null | null | null | null | China | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/us-australia-hacking-idUSBRE94R02A20130528?feedType=RSS', 'https://www.theguardian.com/world/2013/may/28/china-asio-australian-spy-hq-hacking-claims'] |
465 | RedHack vs. Government of Istanbul | Turkish hackergroup RedHack defaces webpage of the Government of Istanbul, leaves anti-government messages. | 2013-05-06 | 2013-05-06 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['RedHack'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | RedHack | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.ehackingnews.com/2013/05/istanbul-government-website-hacked-by.html'] |
466 | Anonymous attacks Romanias Authority for Qualifications | The website of Romania's National Authority for Qualifications is hacked and user and admin passwords are leaked. The website is later defaced by hackers of the hacker collective Anonymous. | 2013-05-11 | 2013-05-11 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Romania'] | [['EUROPE', 'BALKANS', 'NATO', 'EU']] | [['State institutions / political system']] | [['Civil service / administration']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Romania-s-National-Authority-for-Qualifications-Hacked-User-Data-Leaked-352508.shtml'] |
467 | DDOS vs. Phillipines | Taiwanese hackers launch DDoS attacks and deface Philippino websites, leak government data, in response to the Philippino coast guard opening fire on a Taiwanese vessel. | 2013-05-13 | 2013-05-14 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Philippines'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Taiwan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Taiwan | Non-state-group | Hacktivist(s) | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Filipino-Government-Sites-Attacked-After-Philippines-Refuses-to-Apologize-to-Taiwan-352522.shtml'] |
468 | Counter DDOS against Taiwan | Phillipino hackers launch DDoS attacks against Taiwanese government websites in response to Taiwanese hacking attacks. | 2013-05-13 | 2013-05-13 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Taiwan'] | [['ASIA', 'SCS']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Philippines'] | ['Unknown - not attributed'] | null | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker | null | null | null | null | Philippines | Unknown - not attributed | null | [] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/DDOS-Attacks-Launched-by-Filipino-Hackers-Disrupt-Several-Taiwan-Government-Sites-352676.shtml'] |
469 | Anonymous vs. Phillipine National Telecommunication | Filipino hackers, affiliated with Anonymous, deface the website of the Philippines National Telecommunications Commission, urging the government to "defend it s sovereignity against Malaysian airstrikes in Sabah. | 2013-05-18 | 2013-05-18 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Philippines'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Philippines'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Philippines | Non-state-group | Hacktivist(s) | [] | National power | National power; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Philippines-National-Telecommunications-Commission-Defaced-by-Anonymous-Hackers-338062.shtml'] |
470 | Syrian Electronic Army vs. Saudi Arabian Ministry of Defense | Hackers from Syrian Electronic Army known for their hard core support for Syrian President Bashar Ul Assad have claimed to have breached the Saudi Arabian Ministry of Defense Email system and as a result number of secret emails correspondence have been leaked online. | 2013-05-19 | 2013-05-19 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by attacker | Data theft & Doxing | null | ['Saudi Arabia'] | [['ASIA', 'MENA', 'MEA', 'GULFC']] | [['State institutions / political system']] | [['Government / ministries']] | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Syrian Electronic Army | Syria | Non-state-group | Hacktivist(s) | ['https://www.hackread.com/saudi-arabian-defense-ministry-mail-system-breached-secret-emails-leaked-by-syrian-electronic-army/', 'https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/saudi-arabian-defense-ministry-mail-system-breached-secret-emails-leaked-by-syrian-electronic-army/', 'https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] |
471 | Op Saudi | Saudi branch of Anonymous hacktivist has launched cyberattack on Saudi Government websites, the operation has been named as "#Op Saudi". | 2013-05-25 | 2013-05-25 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Saudi Arabia'] | [['ASIA', 'MENA', 'MEA', 'GULFC']] | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Civil service / administration']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Other | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.ehackingnews.com/2013/05/opsaudi-anonymous-launched-cyber-attack.html'] |
472 | HpHack vs. Syrian Ministry of Legal Affairs | Saudi hackergroup Hp-Hack defaces website of Syrian Ministry of Legal Affairs in support of anti-government protests. | 2013-06-01 | 2013-06-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by attacker | Disruption | null | ['Syria'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['HpHack'] | ['Saudi Arabia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | HpHack | Saudi Arabia | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Saudi-Arabian-Hackers-Breach-Syrian-Ministry-of-Legal-Affairs-Website-357738.shtml'] |
473 | Iran vs. USNavy | Iranian hackers enter non-classified navy computer systems. | 2013-06-01 | 2013-10-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source); Incident disclosed by victim | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Military']] | null | ['Iran, Islamic Republic of'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2013-01-01 00:00:00 | Anonymous statement in media report (e.g., Reuters article cites the attribution statements of unnamed officials, or persons with knowledge into the matter etc.) | Attribution by receiver government / state entity | null | null | null | null | Iran, Islamic Republic of | Non-state actor, state-affiliation suggested | null | ['https://www.theverge.com/2013/9/27/4778400/us-officials-say-iranian-hackers-compromised-navy-computers'] | International power | International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theverge.com/2014/2/18/5421636/us-navy-hack-by-iran-lasted-for-four-months-say-officials', 'https://www.theverge.com/2013/9/27/4778400/us-officials-say-iranian-hackers-compromised-navy-computers'] |
474 | Op Turkey | Turkish hackers take down two government websites in solidarity with anti-government protests. | 2013-06-05 | 2013-06-05 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Turk Hack Team'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Turk Hack Team | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/turkish-govt-hacked-by-turk-hack-team/'] |
475 | SEA vs. Turkish Government | Hackergroup Syrian Electronic Army downs Turkish government websites and allegedly obtains personal information on PM staffers. Private e-mail addresses are leaked. | 2013-06-05 | 2013-06-05 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | IT-security community attributes attacker; Attacker confirms | null | null | null | Syrian Electronic Army; Syrian Electronic Army | Syria; Syria | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html'] | System / ideology | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Syrian-Electronic-Army-Hacks-Website-of-Turkish-Ministry-of-Interior-358599.shtml', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0', 'https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html'] |
476 | Anonymous vs. Zimbabwe 2013 | Hacker collective Anonymous Africa attacks Zimbabwean Ministry of Defence, media outlets and South Africa's ANC to protest Robert Mugabe. | 2013-06-14 | 2013-06-14 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Zimbabwe', 'South Africa'] | [['AFRICA', 'SSA'], ['AFRICA', 'SSA']] | [['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', 'Political parties', ''], ['Government / ministries', 'Political parties', '']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Anonymous-Africa-Attacks-African-National-Congress-Website-361073.shtml'] |
477 | Anonymous vs. Phillipine President | Hacker collective Anonymous Philippines publishes unverified phone numbers of the Philippino President. | 2013-06-15 | 2013-06-15 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Philippines'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Philippines'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Philippines | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Anonymous-Hacker-Leaks-Philippine-President-s-Phone-Numbers-361189.shtml'] |
478 | Anonymous vs. Swaziland | Hacker collective Anonymous Africa takes down government websites of Swaziland and Zimbabwe for alleged crimes against democracy. | 2013-06-24 | 2013-06-24 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Swaziland', 'Zimbabwe'] | [['AFRICA', 'SSA'], ['AFRICA', 'SSA']] | [['State institutions / political system'], ['State institutions / political system']] | [['Government / ministries'], ['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://news.softpedia.com/news/Anonymous-Africa-Attacks-Swaziland-Government-Zimbabwe-Ministry-of-Defence-363029.shtml'] |
479 | Dark Seoul 2013 II | NorthKorea launches DDoS attacks against SouthKorea, hitting the websites of the president’s office, National Intelligence Service, the ruling party's website and local newspapers. Data of over 40000 US troops and two million workers of South Korea's ruling party are leaked. | 2013-06-25 | 2013-06-25 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Korea, Republic of', 'United States'] | [['ASIA', 'SCS', 'NEA'], ['NATO', 'NORTHAM']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Political parties', ''], ['Political parties', '']] | ['Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110)', 'Reconnaissance General Bureau'] | ["Korea, Democratic People's Republic of", "Korea, Democratic People's Republic of"] | ['State', 'State'] | null | 3 | 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01; 2013-01-01 | Political statement / report (e.g., on government / state agency websites); Political statement / report (e.g., on government / state agency websites); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; Attribution by receiver government / state entity; Media-based attribution; Media-based attribution; IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110); Reconnaissance General Bureau; Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110); Reconnaissance General Bureau; Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Unit 180, Lab 110); Reconnaissance General Bureau | Korea, Democratic People's Republic of; Korea, Democratic People's Republic of; Korea, Democratic People's Republic of; Korea, Democratic People's Republic of; Korea, Democratic People's Republic of; Korea, Democratic People's Republic of | State; State; State; State; Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | null | ['https://www.bbc.com/news/world-asia-23324172(falseflagVersuchdurchAnonymous-Attribution)'] | System / ideology; International power | System/ideology; Territory; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://thediplomat.com/2013/08/cyber-security-in-south-korea-the-threat-within/', 'https://www.bbc.com/news/world-asia-23324172(falseflagVersuchdurchAnonymous-Attribution)', 'https://thediplomat.com/2022/10/the-future-of-south-korea-us-cyber-cooperation/'] |
480 | Operation Armageddon by GamaredonGroup | “Operation Armageddon,” active since at least mid-2013, exposes a cyberespionage campaign devised to provide a military advantage to Russian leadership by targeting Ukrainian government, law enforcement, and military officials. The Group has been later dubbed "Gamaredon" and seems to be sponsored by or the same as the 16th and 18th center of the FSB. | 2013-06-26 | 2013-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['Ukraine'] | [['EUROPE', 'EASTEU']] | [['State institutions / political system', 'State institutions / political system', 'State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Military', 'Police', 'Political parties']] | ['Gamaredon Group/Shuckworm/BlueAlpha/ACTINIUM/Primitive Bear/Armageddon/DEV-0157, Group G0047 (FSB, 18th Center, Crimea)', 'Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center)'] | ['Russia', 'Russia'] | ['State', 'State'] | null | 2 | 2015-01-01; 2015-01-01; 2015-01-01; 2015-01-01 | Political statement / report (e.g., on government / state agency websites); Political statement / report (e.g., on government / state agency websites); Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attribution by receiver government / state entity; Attribution by receiver government / state entity; IT-security community attributes attacker; IT-security community attributes attacker | null | null | null | Gamaredon Group/Shuckworm/BlueAlpha/ACTINIUM/Primitive Bear/Armageddon/DEV-0157, Group G0047 (FSB, 18th Center, Crimea); Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center); Gamaredon Group/Shuckworm/BlueAlpha/ACTINIUM/Primitive Bear/Armageddon/DEV-0157, Group G0047 (FSB, 18th Center, Crimea); Turla/Waterbug/Venomous Bear/Snake/Uroburos/Group 88/Krypton/G0010 (FSB, 16th / 18th Center) | Russia; Russia; Russia; Russia | State; State; State; State | null | ['https://www.lookingglasscyber.com/wp-content/uploads/2015/08/Operation_Armageddon_Final.pdf', 'https://lookingglasscyber.com/blog/threat-intelligence-insights/operation-armageddon-cyber-espionage-as-a-strategic-component-of-russian-modern-warfare/'] | System / ideology; International power | Territory; Resources; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.lookingglasscyber.com/wp-content/uploads/2015/08/Operation_Armageddon_Final.pdf', 'https://lookingglasscyber.com/blog/threat-intelligence-insights/operation-armageddon-cyber-espionage-as-a-strategic-component-of-russian-modern-warfare/', 'https://ssu.gov.ua/uploads/files/DKIB/Technical%20report%20Armagedon.pdf', 'https://securityaffairs.co/wordpress/129859/apt/armageddon-apt-targets-ukrainian-state-orgs.html', 'https://tarnkappe.info/artikel/hacking/ukraine-warnt-vor-cyber-angriffen-auf-den-telegram-messenger-219440.html', 'https://www.bleepingcomputer.com/news/security/russian-state-hackers-hit-ukraine-with-new-malware-variants/', 'https://blogs.blackberry.com/en/2022/11/gamaredon-leverages-microsoft-office-docs-to-target-ukraine-government'] |
481 | RedHack vs. Istanbul Part II | Turkish hackergroup RedHack hacks into the Istanbul Administration website, claims to have erased citizens' utility debts to government. | 2013-06-28 | 2013-06-28 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Civil service / administration']] | ['RedHack'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | RedHack | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/RedHack-Breaches-Istanbul-Administration-Site-Hackers-Claim-to-Have-Erased-Debts-364000.shtml'] |
482 | SEA vs. Israel | Israeli Defense Forces official Blog Hacked by Syrian Electronic Army | 2013-07-01 | 2013-07-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by attacker | Disruption | null | ['Israel'] | [['ASIA', 'MENA', 'MEA']] | [['State institutions / political system']] | [['Military']] | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | IT-security community attributes attacker; Attacker confirms | null | null | null | Syrian Electronic Army; Syrian Electronic Army | Syria; Syria | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] | System / ideology; Territory; Resources | System/ideology; Territory; Resources | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/syrian-electronic-army-hacks-israeli-defense-forces-blog/', 'https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] |
483 | Turkish Ajan attack on US Air Force Culture Center | Turkish hackers deface the webpage of the US Air Force Culture and Language Center and leak personal data of soldiers. | 2013-07-02 | 2013-07-02 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Military']] | ['Turkish Ajan'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Turkish Ajan | Turkey | Non-state-group | Hacktivist(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/us-air-force-culture-language-hacked-leaked/'] |
484 | RedHack vs. Turkish Directorate of religous affairs | Turkish hackergroup RedHack defaces webpage of the Turkish Directorate of Religious Affairs to protest the government's religion policies. | 2013-07-03 | 2013-07-03 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['Turkey'] | [['ASIA', 'NATO', 'MEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['RedHack'] | ['Turkey'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | RedHack | Turkey | Non-state-group | Hacktivist(s) | [] | System / ideology | System/ideology | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/Turkey-s-Ministry-of-Religious-Affairs-Hacked-by-RedHack-365149.shtml'] |
485 | Turkish Hackers Uyghur Support | Turkish hackers deface 33 Chinese government websites to protest the killing of Uyghur Muslims in China. | 2013-07-04 | 2013-07-04 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['State institutions / political system']] | [['Government / ministries']] | ['Bozkurt', 'De4THBLoW'] | ['Turkey', 'Turkey'] | ['Non-state-group', 'Non-state-group'] | ['Religious actors', 'Religious actors'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms; Attacker confirms | null | null | null | Bozkurt; De4THBLoW | Turkey; Turkey | Non-state-group; Non-state-group | Religious actors; Religious actors | [] | System / ideology | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/33-chinese-govt-sites-hacked-turkish-hacker/'] |
486 | Anonymous Jordan vs. Egyptian Government | Egyptian government websites are defaced by Anonymous Jordan in solidarity with anti-government protesters. | 2013-07-07 | 2013-07-07 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Egypt'] | [['MENA', 'MEA', 'AFRICA', 'NAF']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Jordan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Jordan | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/egyptian-ministry-sites-hacked-anonymous-jordan/'] |
487 | H4x0rHuSsy vs. Government of Goan | The Indian government makes Pakistani hackers responsible for the defacement of several regional government websites. | 2013-07-10 | 2013-07-10 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Government / ministries']] | ['H4x0rHuSsy'] | ['Pakistan'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker | null | null | null | H4x0rHuSsy | Pakistan | Non-state-group | Criminal(s) | [] | International power | Territory; International power | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.zdnet.com/article/india-pins-cyberattacks-on-pakistani-hackers/'] |
488 | Afghan Cyber Army attack on Pakistan | Afghan hackers deface six Pakistani government websites, leaving messages that accuse Pakistan of having orchestrated a suicide bombing in Kabul. | 2013-07-11 | 2013-07-11 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Government / ministries']] | ['Afghan Cyber Army'] | ['Afghanistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Afghan Cyber Army | Afghanistan | Non-state-group | Hacktivist(s) | [] | System / ideology; International power | Territory; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/afghan-cyber-army-hacks-pakistani-ministry-sites/'] |
489 | LulzSecPeru vs. Peruvian Government 2013 | LulzSec Peru defaces me in Peruvian government portal and dumps personal and login data in response to the NSA scandal. | 2013-07-15 | 2013-07-15 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing; Disruption | null | ['Peru'] | [['SOUTHAM']] | [['State institutions / political system']] | [['Civil service / administration']] | ['LulzSec Peru'] | ['Peru'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | LulzSec Peru | Peru | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/lulzsecperu-hacks-leaks-portal-nsa/'] |
490 | SyrianElectronicArmy vs. Truecaller, Tango & Viber | SEA hacked the Swedish site Truecaller, home to the world's largest online telephone directory, with over a billion phone numbers in over 100 countries. SEA claimed this attack also gave it accesscodes to more than a million Facebook, Twitter, LinkedIn, and Gmailaccounts. Other targets of this campaign were the free online calling application Viber as well as the textmessaging service Tango. | 2013-07-16 | 2013-07-16 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by IT-security company | Data theft | null | ['Sweden'] | [['EUROPE', 'EU', 'NORTHEU']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'End user(s) / specially protected groups']] | null | ['Syrian Electronic Army'] | ['Syria'] | ['Unknown - not attributed'] | null | 2 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | IT-security community attributes attacker; Attacker confirms | null | null | null | Syrian Electronic Army; Syrian Electronic Army | Syria; Syria | Unknown - not attributed; Non-state-group | ; Hacktivist(s) | ['https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | none | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] |
491 | Anonymous vs. FEMA | Hacker collective Anonymous hacks into the database of the Federal Emergency Management Agency (FEMA) and allegedly obtains login data of government employees. | 2013-07-17 | 2013-07-17 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Data theft & Doxing | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.pri.org/stories/2013-07-17/fema-hacked-anonymous-hacks-us-server-defense-snowden-and-government-transparency'] |
492 | Defacement of Transport Authority | Saudi hackers deface the page of the United Arab Emirate's National Transport Authority and leave a message accusing the ARE and Qatar of cooperating with Iran and the USA. | 2013-07-20 | 2013-07-20 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['United Arab Emirates'] | [['ASIA', 'MENA', 'MEA', 'GULFC']] | [['State institutions / political system']] | [['Government / ministries']] | null | ['Saudi Arabia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Saudi Arabia | Non-state-group | Hacktivist(s) | [] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/national-transport-authority-uae-hacked/'] |
493 | Anonymous vs. Nauru | Hacker group Anonymous brings down Nauruan government websites and main internet provider in solidarity with a riot at an Australian refugee camp on the island. Government has to be "shut down" for over four hours. | 2013-07-22 | 2013-07-22 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Nauru'] | [['OC']] | [['State institutions / political system', 'Critical infrastructure']] | [['Government / ministries', 'Telecommunications']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theguardian.com/world/2013/jul/22/anonymous-responsibility-nauruan-government-attack'] |
494 | Reuters Hack-Syrian Electronic Army | The Reuters Twitter Account was hacked by the Syrian Electronic Army and broadcasted false tweets for a few hours | 2013-07-29 | 2013-07-29 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Canada'] | [['NATO', 'NORTHAM']] | [['Media']] | null | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Syrian Electronic Army | Syria | Non-state-group | Hacktivist(s) | ['https://www.theatlantic.com/technology/archive/2013/07/thomson-reuters-apparently-latest-pro-assad-twitter-hack-victim/312749/'] | System / ideology; International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.theatlantic.com/technology/archive/2013/07/thomson-reuters-apparently-latest-pro-assad-twitter-hack-victim/312749/'] |
495 | SEA vs. White House | Syrian hackers gain access to three White House E-Mail accounts, send phishing mails to other employees. | 2013-07-29 | 2013-07-29 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Data theft | null | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | ['Syrian Electronic Army'] | ['Syria'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2013-01-01; 2013-01-01 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Self-attribution in the course of the attack (e.g., via defacement statements on websites) | IT-security community attributes attacker; Attacker confirms | null | null | null | Syrian Electronic Army; Syrian Electronic Army | Syria; Syria | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] | International power | System/ideology; International power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.fireeye.com/blog/threat-research/2013/07/syrian-electronic-army-hacks-major-communications-websites.html', 'http://www.ehackingnews.com/2013/07/whitehouse-email-hacked.html', 'https://www.nytimes.com/2013/05/18/technology/financial-times-site-is-hacked.html?pagewanted=all&_r=0'] |
496 | Cyber Jihad in Indonesia | Bangladeshi hackers deface Indonesian commercial and public webpages, in retaliation against small attacks from Indonesia against Bangladeshi sites. | 2013-07-30 | 2013-07-30 | Attack on (inter alia) political target(s), politicized | null | Incident disclosed by attacker | Disruption | null | ['Indonesia'] | [['ASIA', 'SCS', 'SEA']] | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', '']] | ['Bangladesh Grey Hat Hackers'] | ['Bangladesh'] | ['Non-state-group'] | ['Religious actors'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Bangladesh Grey Hat Hackers | Bangladesh | Non-state-group | Religious actors | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.theregister.co.uk/2013/07/30/cyber_war_erupts_between_indonesia_and_bangladesh/'] |
497 | Making the Dalai Lama a Watering hole | A prominent computer security firm warned that the Dalai Lama’s Chinese-language website has been hacked and is infecting visitors’ computers with viruses in what may to be an effort to spy on human rights activists who frequently visit the site. | 2013-08-01 | 2013-08-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | null | ['China'] | [['ASIA', 'SCS', 'EASIA', 'NEA', 'SCO']] | [['Social groups']] | [['Ethnic']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | null | null | null | null | Unknown | Unknown - not attributed | null | ['http://www.bbc.com/news/technology-23680686'] | System / ideology; Autonomy; Territory; Subnational predominance | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | none | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.reuters.com/article/net-us-tibet-cyberattack/dalai-lamas-china-site-hacked-infects-others-expert-idUSBRE97B0QU20130812?feedType=RSS&feedName=worldNews', 'http://www.bbc.com/news/technology-23680686'] |
498 | Op Myanmar | Website of Myanmar's president experiences DDoS attack. | 2013-08-02 | 2013-08-02 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Myanmar'] | [['ASIA', 'SEA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | Cyber-specific | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/Official-Website-of-Myanmar-President-s-Office-Disrupted-by-Anonymous-Hackers-372683.shtml', 'https://twitter.com/780thC/status/1621464181152141312', 'https://twitter.com/Cyber_O51NT/status/1621313406367309825'] |
499 | Afghan Cyber Army attack on Pakistan Part II | Afghan hackers hack the webpage of the Pakistani National Database and Registration Authority in retaliation against airstrikes in Kunar and Jalalabad. | 2013-08-03 | 2013-08-03 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Pakistan'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Civil service / administration']] | ['Afghan Cyber Army'] | ['Afghanistan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Afghan Cyber Army | Afghanistan | Non-state-group | Hacktivist(s) | [] | Territory | Territory; Third-party intervention / third-party affection | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://www.ehackingnews.com/2013/08/nadra-pk-hacked-by-afghan-hackers.html'] |
500 | Hack of TwitterAccount of AEC | Twitter account of the Australian Electoral Commission hacked, phishing messages sent. | 2013-08-06 | 2013-08-06 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Australia'] | [['OC']] | [['State institutions / political system', 'State institutions / political system']] | [['Civil service / administration', 'Election infrastructure / related systems']] | null | ['Unknown'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | null | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Receiver attributes attacker | null | null | null | null | Unknown | Non-state-group | Criminal(s) | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/Twitter-Account-of-Australian-Electoral-Commission-Hacked-373292.shtml'] |
501 | Anonymous vs. Gabon | All government websites of Gabon are disrupted by hacktivists, as part of an offensive against the government. | 2013-08-08 | 2013-08-08 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | null | ['Gabon'] | [['AFRICA', 'SSA']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anonymous'] | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anonymous | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology | National power | null | Yes / HIIK intensity | HIIK 2 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/All-Gabon-Government-Websites-Disrupted-by-Anonymous-374149.shtml'] |
502 | DDOS against Egypt | Several Egyptian government websites were hit by DDoS attacks, with the attackers showing solidarity with anti-government protesters.
Their targets were the websites of the National Bank of Egypt, the State Information Service, the Ministry of Foreign Affairs, the Supreme Constitutional Court of Egypt, the Ministry of Information, the Cabinet Information and Decision Support Centre and the Egyptian Armed Forces. | 2013-07-14 | 2013-08-14 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | null | Incident disclosed by attacker | Disruption | [['National Bank (Egypt)']] | ['Egypt'] | [['MENA', 'MEA', 'AFRICA', 'NAF']] | [['State institutions / political system', 'Critical infrastructure']] | [['Government / ministries', 'Finance']] | null | ['Unknown'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Attribution given, type unclear | Media-based attribution | null | null | null | null | Unknown | Non-state-group | Hacktivist(s) | [] | System / ideology; National power | System/ideology; National power | null | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | 0 | null | null | null | 0 | null | 0 | null | 0 | euro | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/Several-Egyptian-Government-Sites-Disrupted-by-Hackers-as-Violence-Continues-375441.shtml'] |
503 | Hacker disrupt AlQaida Forums | Three Al-Qaida forums are disrupted by DDoS attacks from anonymous attackers. | 2013-08-16 | 2013-08-19 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Unknown'] | null | [['Social groups']] | [['Terrorist']] | null | ['Unknown'] | ['Unknown - not attributed'] | null | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | null | Unknown | Unknown - not attributed | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Long-term disruption (> 24h; incident scores 2 points in intensity) | none | none | none | 2 | Moderate - high political importance | 2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['http://news.softpedia.com/news/Three-Major-Al-Qaida-Forums-Disrupted-by-DDOS-Attack-376443.shtml'] |
504 | Azerbaijan vs. Armenia August | An organization ran by Azerbaijani hackers known as ANTI-ARMENIA.ORG has hacked and defaced high profile Armenian government ministries websites. | 2013-08-23 | 2013-08-23 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | null | ['Armenia'] | [['ASIA', 'CENTAS', 'CSTO']] | [['State institutions / political system']] | [['Government / ministries']] | ['Anti-Armenia Team'] | ['Azerbaijan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | null | Self-attribution in the course of the attack (e.g., via defacement statements on websites) | Attacker confirms | null | null | null | Anti-Armenia Team | Azerbaijan | Non-state-group | Hacktivist(s) | ['https://www.hackread.com/aateam-hacks-armenian-ministries-websites/'] | Territory | Territory | null | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | null | null | null | true | none | Short-term disruption (< 24h; incident scores 1 point in intensity) | none | none | none | 1 | Moderate - high political importance | 1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0 | null | null | null | null | null | null | null | null | null | ['https://www.hackread.com/aateam-hacks-armenian-ministries-websites/'] |