Cybersecurity Breach Tier List 2024

Mad Hat
17 Aug 202427:11

Summary

TLDRThis video script explores the most significant cybersecurity incidents since the internet's inception, using 'The Mad Hat metrics' to rank their severity. It delves into major breaches like Marriott's 500 million user data exposure, Adobe's 153 million account compromise, and the widespread damage of NotPetya and WannaCry ransomware. The script also examines the 2014 Yahoo data breach affecting all 3 billion users and the 2024 CrowdStrike incident that led to millions of computers crashing, resulting in billions in losses. The analysis highlights the importance of security measures and the catastrophic consequences of their neglect.

Takeaways

  • 😱 The CrowdStrike incident in July 2024 caused an estimated 8.5 million Windows computers to crash globally, leading to significant disruptions and billions in losses.
  • 📉 CrowdStrike's market value plummeted by $25 billion following the incident, highlighting the severe impact on the company's reputation and financial standing.
  • 🛑 Major disruptions included cancelled flights, hospital surgeries, and 911 system outages, demonstrating the far-reaching consequences of such a cybersecurity event.
  • 💡 The incident was attributed to an update by CrowdStrike that led to null pointers and kernel issues, resulting in the widespread blue screen of death for Windows users.
  • 💸 Fortune 500 companies faced an estimated loss of $5.4 billion, with Delta Airlines alone reporting $500 million in losses due to the outage, underscoring the massive economic impact.
  • 🔒 The Marriott data breach in 2018 affected 500 to 600 million accounts, with sensitive information including passport numbers and encrypted payment card details being compromised.
  • 🤔 The true cause of the Marriott breach remains unclear, but it is suspected that nation-state actors were involved, indicating the potential for geopolitical motivations behind cyber attacks.
  • 💳 The Target data breach in 2013 involved the theft of credit card numbers from nearly 40 million customers, followed by the theft of PII data of up to 70 million customers, showing the vulnerability of retail giants.
  • 🛑 The Equifax data breach in 2017 exposed personal identifying information of approximately 143 million US consumers, including Social Security numbers and driver's license numbers, leading to a $1.38 billion settlement.
  • 🚫 The WannaCry ransomware attack in 2017 rapidly spread to over 200,000 computers in 150 countries, exploiting the EternalBlue vulnerability and causing an estimated $4 billion in damages.
  • 🌐 The NotPetya malware attack in 2017 was one of the most destructive, primarily targeting Ukraine but spreading to 60 countries, causing over $10 billion in losses and被认为是 a state-sponsored attack by Russia.

Q & A

  • What was the impact of the Marriott data breach in 2018?

    -The Marriott data breach in 2018 impacted an estimated 500 to 600 million accounts, with personal information including names, mailing addresses, phone numbers, email addresses, passport numbers, and more being exposed. Some accounts also had payment card information compromised, although it was encrypted using AES 128.

  • What is the significance of the Adobe breach in 2013?

    -The Adobe breach in 2013 affected 153 million Adobe accounts, exposing sensitive data such as user IDs, encrypted passwords, names, email addresses, and credit card information. The breach was significant due to the exploitation of vulnerabilities in Adobe's ColdFusion servers and poor security practices.

  • What was the Stuxnet worm and how did it affect Iran's nuclear program?

    -Stuxnet was the world's first known digital weapon, specifically designed to disrupt Iran's nuclear program by targeting the country's uranium enrichment centrifuges. It was discovered after inspectors noticed rapid failures of centrifuges at Iran's Natanz facility. The worm spread globally but primarily impacted the intended target, causing an estimated monetary loss of over $50 million.

  • What were the consequences of the Sony PlayStation Network attack by Anonymous in 2011?

    -The attack by Anonymous disrupted the PlayStation Network for three days before Sony suspended it. The security breach affected 77 million users, exposing personal information such as names, addresses, email addresses, birth dates, and possibly credit card information. Sony's response cost an estimated $171 million, but its stock price rebounded after the incident.

  • What was the cause of the Equifax data breach in 2017?

    -The Equifax data breach in 2017 was caused by a severe security vulnerability and an unpatched Apache Struts software flaw. Attackers exploited this to gain unauthorized access to the personal identifying information of approximately 143 million US consumers, including Social Security numbers and driver's license numbers.

  • What was the impact of the Target data breach in 2013 on the company and its customers?

    -The Target data breach in 2013 resulted in the theft of credit card numbers from nearly 40 million customers and personal identifiable information of up to 70 million customers. The breach occurred through a third-party vendor and involved a phishing attack and the installation of malware. Despite the breach, Target's stock price remained largely unaffected, indicating that customers continued to shop at the retailer.

  • What is the significance of the WannaCry ransomware attack in 2017?

    -The WannaCry ransomware attack in 2017 was significant due to its rapid spread to over 200,000 computers in more than 150 countries within a few days. It exploited the NSA vulnerability EternalBlue and primarily affected Windows 7 devices. The attack resulted in an estimated $4 billion in damages and highlighted the importance of timely security updates.

  • What was the NotPetya malware attack, and what were its effects?

    -NotPetya was a malware attack that masqueraded as ransomware but was actually designed to destroy computer systems. It spread quickly using the EternalBlue exploit and primarily affected Ukraine but impacted over 60 countries. The attack resulted in an estimated $10 billion in losses, making it one of the most costly cyber attacks in history.

  • What were the Yahoo data breaches in 2013 and 2014, and what was their impact?

    -Yahoo faced two massive data breaches in 2013 and 2014, which led to the theft of sensitive information from all three billion of its users. This included usernames, email addresses, birth dates, phone numbers, and encrypted passwords. The breaches significantly impacted Yahoo's reputation and resulted in a reduced sale price to Verizon and settlement fees of around $150 million.

  • What was the CrowdStrike incident in 2024, and how did it compare to other major cybersecurity incidents?

    -The CrowdStrike incident in 2024 involved an update that caused an estimated 8.5 million Windows computers worldwide to crash, resulting in significant disruptions and an estimated $5.4 billion in losses for Fortune 500 companies. CrowdStrike's market value dropped by $25 billion as a result. The incident was considered 'simply stupid' due to its preventability and the scale of its impact compared to other major cybersecurity incidents.

Outlines

00:00

🐉 Cybersecurity Catastrophes: The Big Ones

This paragraph delves into the most significant cybersecurity incidents in history, prompted by recent turmoil in the cybersecurity realm. The speaker aims to evaluate these events using the 'Mad Hat metrics' from the Mad Hat Labs, focusing on the impact, victims, duration, financial losses, and the complexity of the incidents. The tier list of the top 10 breaches is introduced, ranging from minor fails to those so severe they're considered 'plain stupid.' The paragraph sets the stage for a detailed examination of each incident, starting with the Marriott data breach of 2018, which affected 500 million accounts and included sensitive personal information. The breach was traced back to 2014, highlighting a lack of security and the acquisition of Starwood by Marriott, which left the database vulnerable. The incident's financial repercussions and the speculation of nation-state involvement are also discussed.

05:00

🛡️ Adobe's Security Oversight and the Stuxnet Attack

The second paragraph discusses the 2013 Adobe security breach, where unauthorized intruders accessed 153 million Adobe accounts, exposing user IDs, encrypted passwords, names, email addresses, and credit card information. The breach was linked to vulnerabilities in Adobe's ColdFusion servers and potentially a spear-phishing campaign. The response to the breach and the financial implications for Adobe are outlined, with the company's stock value remaining unaffected. The paragraph also covers the Stuxnet worm discovered in 2010, which targeted Iran's nuclear program by disrupting uranium enrichment centrifuges. The worm's delivery method and the estimated costs of the damage are explored, along with the attribution of the attack to the US and Israel.

10:02

🎮 Sony's PlayStation Network Breach and Equifax Fiasco

This section covers the 2011 cyber-attack on Sony's PlayStation Network by the activist group Anonymous, which led to a significant security breach affecting 77 million users. The breach exposed personal information and possibly credit card details. The methods used in the attack and Sony's response are discussed, highlighting the relatively low cost to the company and the quick recovery of its reputation. The paragraph then shifts to the 2017 Equifax data breach, one of the most severe in US history, where personal identifying information of 143 million US consumers was stolen. The breach occurred due to an unpatched vulnerability and the attackers' ability to exploit the company's online dispute portal. The aftermath, including the settlement costs and the impact on Equifax's market value, is also examined.

15:04

🛑 The Infamous Target Breach and the WannaCry Ransomware

The fourth paragraph details the 2013 Target data breach, which saw the theft of credit card numbers and personal identifiable information of millions of customers. The breach was facilitated through a third-party vendor and involved the use of malware like Citadel. The failure of Target's security team to act on alerts and the use of a free version of Malwarebytes are highlighted. The paragraph then discusses the WannaCry ransomware attack of 2017, which affected over 200,000 computers globally, including major companies and the UK's National Health Service. The use of the EternalBlue exploit by the ransomware and the estimated damages are covered, along with the role of a cybersecurity researcher who helped stop the spread of the malware.

20:07

💥 NotPetya's Global Rampage and Yahoo's Historical Breaches

This section examines the NotPetya malware attack of June 2017, which was more destructive than WannaCry and primarily targeted Ukraine but spread to over 60 countries. The attack utilized the EternalBlue exploit and caused widespread damage, with companies like Maersk, Mondelez International, and FedEx incurring significant losses. The paragraph also revisits Yahoo's data breaches of 2013 and 2014, which affected all three billion of its users, making it the largest breach in history. The impact on Yahoo's sale to Verizon and the overall consequences of the breaches are discussed.

25:08

🚨 The CrowdStrike Incident: A Costly Misstep

The final paragraph discusses the CrowdStrike incident of July 2014, where an update to a file caused an estimated 8.5 million Windows computers to crash, leading to significant disruptions and financial losses. The incident resulted in flight cancellations, hospital surgeries being postponed, and 911 system outages. The financial impact on Fortune 500 companies and Delta Airlines is highlighted, with the incident causing a loss in CrowdStrike's market value. The paragraph emphasizes the severity of the incident and the potential for even greater damage had it been a malicious attack.

Mindmap

Keywords

💡Cybersecurity Incidents

Cybersecurity incidents refer to events that compromise the availability, integrity, or confidentiality of computer systems or networks. In the video, the term is used to describe major historical breaches that have had significant impacts, such as the Marriott and Adobe breaches, which are part of the narrative to illustrate the severity and consequences of such events.

💡Data Breach

A data breach occurs when unauthorized individuals gain access to sensitive information. The video discusses several data breaches, including the one at Marriott, where millions of customer records were compromised, highlighting the importance of robust data protection measures.

💡Ransomware

Ransomware is a type of malicious software that encrypts a victim's data and demands payment to restore access. The script mentions WannaCry and NotPetya, emphasizing the widespread disruption and financial loss caused by these ransomware attacks, which are central to the video's theme of catastrophic cybersecurity events.

💡Nation-State Actors

Nation-state actors are entities that conduct cyber operations on behalf of a country. The video suggests that nation-state actors may have been involved in the Marriott breach, indicating the complex geopolitical dimensions of cybersecurity incidents.

💡Zero-Day Exploit

A zero-day exploit is a cyberattack that takes advantage of a previously unknown vulnerability in software. The term is used in the video to describe the potential sophistication of attacks, such as the one that may have been used in the Adobe breach.

💡Encryption

Encryption is the process of encoding data to ensure secure communication and storage. The video discusses the use of AES 128 encryption in the context of the Marriott breach, where the encryption keys were also compromised, demonstrating the need for comprehensive security practices.

💡Malware

Malware, short for malicious software, is used to disrupt, damage, or gain unauthorized access to a computer system. The script mentions various types of malware, such as the Remote Access Trojan (RAT) and MIMcats, which were involved in the breaches, illustrating the diverse tools attackers use in cybersecurity incidents.

💡Patch

In the context of cybersecurity, a patch is a piece of software designed to fix problems or vulnerabilities. The video discusses the failure to apply patches in a timely manner, as seen in the Equifax and Yahoo breaches, underscoring the critical nature of timely security updates in preventing incidents.

💡Distributed Denial of Service (DDoS)

A DDoS attack is an attempt to overwhelm a target with a flood of internet traffic, causing it to crash. The video references the DDoS attack on Sony's PlayStation Network by the activist group Anonymous, showing how such attacks can have significant impacts on services and consumers.

💡Cyber Insurance

Cyber insurance is an insurance product that provides coverage for losses resulting from cyber incidents. The video mentions the impact of the CrowdStrike incident on cyber insurance, with insured losses ranging from $540 million to $1.08 billion, highlighting the financial implications of cybersecurity events.

💡Blue Screen of Death (BSOD)

The Blue Screen of Death is an error screen displayed by the Windows operating system due to a critical system error. The video uses the term to describe the widespread impact of the CrowdStrike incident, where millions of Windows computers crashed, demonstrating the real-world consequences of a software update failure.

Highlights

A giant monster is attacking cybersecurity, causing major shutdowns globally in a historically significant incident.

The video compares the CrowdStrike incident with other major cybersecurity breaches using the 'Mad Hat metrics'.

Marriott's data breach affected 500 million accounts, with personal details and payment card information at risk.

Adobe's 2013 breach exposed 153 million accounts, including encrypted passwords and credit card information.

Stuxnet, the first digital weapon, targeted Iran's nuclear program, causing significant damage to centrifuges.

The 2011 PlayStation Network attack by Anonymous disrupted services for millions of users.

Equifax's 2017 breach exposed sensitive data of 143 million US consumers, including Social Security numbers.

Target's 2013 data breach involved the exploitation of a third-party vendor and resulted in the theft of 40 million credit card numbers.

WannaCry ransomware in 2017 affected over 200,000 computers, demonstrating the dangers of self-replicating malware.

NotPetya malware was deployed in 2017, causing over $10 billion in damages and targeting Ukraine primarily.

Yahoo's 2013-2014 data breaches were the largest in history, affecting all three billion of its users.

The CrowdStrike incident in 2024 led to 8.5 million Windows computers crashing globally due to an update error.

The impact of the CrowdStrike incident was unprecedented, with billions of dollars in losses.

Cybersecurity incidents can be ranked from 'fail' to 'apocalyptic' based on their impact and handling.

Many breaches were due to unpatched vulnerabilities and lack of timely security updates.

The video emphasizes the importance of proper cybersecurity measures and the consequences of neglecting them.

Transcripts

play00:00

inspired by the recent events in the

play00:02

cyber security space that caused

play00:04

absolute pandemonium a giant monster is

play00:07

attacking bikini botom major shutdowns

play00:11

globally in what might arguably be

play00:13

considered the biggest cyber security

play00:15

incident in all of history and I want to

play00:18

take a look at the biggest cyber

play00:19

security incidents SL breaches SL big

play00:22

boo boos to have occurred since the

play00:25

birth of the internet and the rapidly

play00:27

growing technology that we've seen so

play00:28

I've done some majorly salty late night

play00:30

research all to answer the question

play00:32

looming in all of our minds was the

play00:34

crowd strike incident really all that

play00:36

bad well let's compare and contrast the

play00:38

[ __ ] out of it using The Mad Hat metrics

play00:41

of course that I brewed together in The

play00:42

Mad Hat Labs just for this video impact

play00:45

how widespread were the effects of the

play00:47

incident who was affected and for how

play00:49

long total losses you know money

play00:52

estimated obviously and the difficulty

play00:54

of the incident how complicated was it

play00:56

are we talking about an expensive ass

play00:58

zero day exploit carried out by a nation

play01:00

State actor or was it just someone too

play01:03

stupid to have realized what they gone

play01:05

done did before it was too late or my

play01:07

favorite was it just some kid bored on a

play01:10

Tuesday afternoon in the UK a big like

play01:14

game I suppose it was see who would who

play01:16

who could be better a multi-billion

play01:19

dollar you know agency or a 14y sitting

play01:22

in his bedroom doing as they saying

play01:24

around and finding out but for the sake

play01:26

of all of our sanity I'm going to limit

play01:28

this tier list to the major 10 incidents

play01:31

breaches of all time and that should be

play01:33

enough to compare and place all of these

play01:35

incidents on the tier list of

play01:38

imp ranking them from fail to so bad

play01:41

that it's just plain stupid let's begin

play01:44

on September 8th 2018 Marriott received

play01:48

an alert from an internal security tool

play01:50

regarding an attempt to access the

play01:53

Starwood guest reservation database in

play01:56

the US which flagged on an unusual

play01:58

database query upon investigating the

play02:00

alert they come to find out there had

play02:02

been unauthorized access to the Starwood

play02:05

Network since 2014 the breach impacted

play02:08

an estimated 500 to 600 million accounts

play02:12

with an estimated 300 million containing

play02:15

name mailing address phone number email

play02:18

address passport number Starwood

play02:20

Preferred Guest SG account information

play02:23

date of birth gender arrival and

play02:25

departure information reservation date

play02:28

and communication preferences that's a

play02:30

lot of data some even included payment

play02:32

card information card number and

play02:34

expiration but don't worry folks it was

play02:37

encrypted using the unbreakable AES 128

play02:40

encryption algorithm which has never

play02:42

been broken into before oh they had the

play02:45

encryption Keys too patience ising is

play02:50

[Music]

play02:52

theing okay so lots of people were

play02:54

affected globally all and I mean all of

play02:56

their data which was readily available

play02:58

in clear text but how did they they do

play03:00

it now Marriott has not made any of that

play03:02

publicly available information so we

play03:04

don't know exactly what happened but we

play03:07

do know that Starwood had been

play03:08

compromised since 2014 back before

play03:11

Marriott acquired it in 2016 and it took

play03:14

an additional 2 years for Marriott to

play03:18

detect any malicious

play03:22

activity now I'm not sure about that one

play03:24

I don't know if that checks out because

play03:27

Marriott was not equipped to handle the

play03:29

reservations it had just acquired so in

play03:31

true company merger fashion they left

play03:33

this largely unsecured database continue

play03:36

operating which was confirmed later to

play03:38

contain a remote access Trojan a rat and

play03:41

MIM cats a tool for sniffing outs

play03:44

username password combos in system

play03:46

memory we can only guess that this is

play03:48

what allowed the malicious Bad actors to

play03:50

gain admin privileges and query the

play03:52

database and as of today we still don't

play03:54

know who actually did it but government

play03:56

sources speculates that it was in fact

play03:59

nation state actors part of a broader

play04:01

Chinese effort to gain information on

play04:03

American government employees and

play04:05

Intelligence Officers their reasoning

play04:07

the code and attack patterns matched up

play04:09

with techniques employed by state

play04:11

sponsored Chinese hackers when in doubt

play04:13

blame nation state actors the overall

play04:15

difficulty here was low as it was rooted

play04:17

in what I like to call security comes

play04:20

last and the Legacy system was unsecured

play04:22

long enough to allow for a breach now

play04:24

there are currently class action

play04:25

lawsuits against the company which are

play04:27

still ongoing it seems my dog stepped on

play04:29

a be total estimated losses and fines

play04:32

combined from what I can tell are

play04:34

roughly 150 million but supposedly could

play04:36

reach as high as $ 12.5 billion after

play04:40

the class action lawsuit with Marriott's

play04:42

net market cap of 62.4 n billion that's

play04:45

a significant hit but we'll see if we

play04:47

actually get anywhere near that after

play04:49

the class action lawsuit completes

play04:51

catastrophic the total impact was very

play04:53

high however the losses for the company

play04:55

are basically nothing which is

play04:57

ridiculous look at their stock I think

play05:00

it's safe to say their reputation is

play05:01

unaffected and the hack was probably as

play05:03

easy as sending a fishing email probably

play05:05

and poking around undetected for 4 years

play05:07

the hacker had time to graduate college

play05:09

before they found

play05:11

them in October of 2013 Adobe received

play05:15

an alert that the hard drive for one of

play05:17

its application servers was nearing

play05:19

capacity further investigation

play05:21

discovered that one or more unauthorized

play05:23

Intruders had compromised a public

play05:25

facing web server and used it to access

play05:28

other servers on adobe's network

play05:30

including areas where Adobe stored

play05:32

consumer data okay okay exploiting a

play05:35

public facing server that's difficult

play05:37

right now Adobe being a leading software

play05:39

company known for products like

play05:41

Photoshop and Adobe Acrobat Reader the

play05:43

thing I had to troubleshoot a stupid

play05:45

amount of times to complete Dunces who

play05:47

didn't know how to click the signin

play05:49

button hey how about you smash right

play05:53

there smash right there come on smash

play05:58

smash yes they immediately announced a

play06:01

massive security breach the breach

play06:04

impacted 153 million Adobe accounts not

play06:08

as much as Maria the data exposed in the

play06:10

breach included user IDs encrypted

play06:12

passwords names email addresses and of

play06:15

course credit card info so how did it

play06:17

happen well this is somewhat unclear

play06:19

with the information available the

play06:21

attackers reportedly gained access by

play06:23

targeting a backup server which was due

play06:25

to be decommissioned sure due to be

play06:29

decom missioned huh that's company speak

play06:31

for we'll replace it when it becomes a

play06:33

problem good afternoon Bob I was

play06:35

wondering if I could have $500,000 to

play06:37

upgrade our call Center

play06:44

Technology you

play06:47

serious and the server only had

play06:49

customers passwords and credit card

play06:50

information encrypted but of course the

play06:53

report said Adobe had used a single

play06:55

block Cipher through the database

play06:58

resulting in identical p passwords

play07:00

having the same Cipher text in the

play07:02

database which became a bigger issue

play07:04

when the password hints not encrypted

play07:06

were the literal password or obvious

play07:09

enough to guess the password hints have

play07:10

since been removed which is probably for

play07:13

the best how do they gain access to the

play07:14

server you might ask H Doby didn't say

play07:17

of course but the most likely cause of

play07:19

the breach was the vulnerability in the

play07:21

cold fusion servers being deployed by

play07:24

Adobe and hackers abusing that to

play07:26

remotely control web servers running the

play07:28

software a vulnerability ability by the

play07:30

way that adobe knew about that

play07:32

supposedly pushed an update but

play07:34

conveniently these servers had not

play07:36

gotten that update shocking or you know

play07:38

it could have been a spear fishing

play07:40

campaign equally as likely get a really

play07:42

catchy subject line something like hey

play07:46

I'm probably going to open that up with

play07:47

roughly $1.1 million in attorney fees

play07:51

and undisclosed sums of money to

play07:52

affected users and having its stock

play07:54

value unaffected this is sadly ranked as

play07:57

just a fail on adobe's part and the sad

play08:00

history of breaches but they did respond

play08:02

relatively quickly to the breach with

play08:03

roughly a couple months spanning in

play08:05

between when hackers were first

play08:06

confirmed to have access to when they

play08:08

finally detected them in actioned on and

play08:10

announced to the public about the breach

play08:12

not an epic failure by any means but

play08:15

still they a failure now we still don't

play08:17

know who gondon did it but security

play08:19

researchers are guessing that the

play08:20

attackers were somewhere in Eastern

play08:21

Europe or Russia based on the language

play08:23

and location of some of the underground

play08:25

forums where the stolen data was traded

play08:27

I can smell the failure January 2010

play08:31

inspectors visiting natan's uranium

play08:33

enrichment plant in Iran noticed that

play08:36

centrifuges using two enrich uranium gas

play08:38

were failing and they were failing fast

play08:41

replacing the centrifuges did not fix

play08:43

the issue as there was something more

play08:45

Sinister at play 5 months later some it

play08:49

nerds finally found the culprit after

play08:50

troubleshooting computers that had been

play08:52

randomly crashing and rebooting they

play08:55

discovered the world's first digital

play08:57

weapon infamously known as stucks net a

play09:00

worm specifically designed to disrupt

play09:03

Iran's nuclear program now obviously the

play09:05

impact here was to Iran's ska system but

play09:08

by Nature a worm tries to infect

play09:10

everything and anything around it so

play09:12

that's what it did traces of this worm

play09:14

can be seen globally but the only real

play09:17

impact was to what the worm was intended

play09:19

to do and hardcoded to actually attack

play09:22

Seamans step seven software a

play09:25

windows-based software used to program

play09:27

industrial control systems that operate

play09:29

specific equipment in Iran's case

play09:31

specifically the operation of the

play09:32

centrifuges now monetary loss is kind of

play09:34

hard to gauge here since Iran didn't

play09:36

release numbers as far as I could find

play09:38

but if we lowball the estimate costs of

play09:40

repairs about 1,000 replaced centrifuges

play09:43

it's probably $50 million or more now

play09:45

how did stuck net infiltrate Iran's

play09:47

airgap systems originally it was thought

play09:49

to have been delivered via a USB stick

play09:51

that someone just tossed and hoped it

play09:53

would get plugged in

play09:59

but new information has surfaced January

play10:02

of this year that stuck net was instead

play10:04

loaded into a water pump near the

play10:06

Iranian Nan's nuclear facility simple

play10:09

yet effective and with reports stating

play10:11

that this worm cost upwards of a billion

play10:14

dollars to create this was one

play10:15

sophisticated and expensive Cyber attack

play10:18

to carry out this was no script Kitty

play10:20

and no one's taking the WAP for this but

play10:21

a lot of places are pointing fingers at

play10:23

the US and Israel for doing it now if

play10:25

the worm targeted more than plc's this

play10:28

would have been a apocalyptic but

play10:30

because the impact was relatively low

play10:32

and contained within Iran's nuclear

play10:34

facility got to drop it down a notch to

play10:36

blighting which is fitting for a worm as

play10:39

it did in fact spread quite like a

play10:46

blight on April 4th 2011 the activist

play10:49

group Anonymous launched a targeted

play10:51

distributed denial of service attack on

play10:53

Sony's Playstation network in

play10:56

retaliation for Sony's legal actions

play10:58

against hack known as geohot and graph

play11:01

cholo Cho the attack by Anonymous

play11:03

disrupted the PlayStation Network for 3

play11:05

days before they suspended it realizing

play11:07

that it was negatively impacting

play11:09

consumers which is not who they were

play11:11

targeting Sony experienced additional

play11:12

issues on April 19th when the

play11:14

PlayStation Network went down again

play11:16

revealing a significant security breach

play11:19

affecting 77 million users Sony said in

play11:23

illegal and unauthorized person quote

play11:25

unquote got access to people's names

play11:28

addresses email addresses birth dates

play11:30

usernames passwords logins security

play11:33

questions and probably credit card info

play11:35

now the company did say it saw no

play11:36

evidence that credit cards were stolen

play11:38

but it did add out of an abundance of

play11:40

caution we are advising you that your

play11:42

credit card number excluding security

play11:44

code and expiration date may have been

play11:47

obtained right sounds like you just

play11:49

don't want to say that it was taken now

play11:51

the exact methods and tools used by the

play11:53

hackers is still unknown with no

play11:55

specific Mal mentioned anywhere but

play11:57

Sony's Chief Information officer CIO

play12:00

this dude believed that the application

play12:01

server was the weakest link with the Le

play12:04

hacker able to exploit vulnerabilities

play12:06

on it sounds complicated but from the

play12:07

sounds of it the application server was

play12:09

poorly secured and the database as well

play12:11

as far as I can tell with reports

play12:13

stating the hack was performed via very

play12:16

simple single SQL injection methods by a

play12:19

hacker group named L SEC o you hate to

play12:22

see that but I'm not surprised packs are

play12:24

rarely sophisticated it seems and sonyy

play12:26

stated that the outage costs roughly 171

play12:30

million peanuts to Sony really and while

play12:32

we can see a small drop in their stock

play12:34

price after the breach it has since

play12:36

rebounded and rebuilt its reputation and

play12:38

considering this was done from some

play12:40

random hacker group who appeared to have

play12:42

just been bored and Sony was just

play12:43

coincidentally their target that they

play12:45

used as their playground for fun and the

play12:47

relatively low costes to the company and

play12:50

total users impacted sad that 77 million

play12:52

users is low but here we are this is our

play12:55

life now I'd rank it as disastrous since

play12:58

it was far more impact F in adobe's

play12:59

breach in March 2017 personal

play13:02

identifying data of hundreds of millions

play13:05

of people were stolen from Equifax one

play13:07

of the credit reporting agencies that

play13:10

assessed the Financial Health of nearly

play13:12

everyone in the United States and

play13:14

shortly after on September 7th 2017

play13:17

Equifax announced that someone had

play13:19

breached the data of

play13:21

approximately 143 million us consumers

play13:25

the hackers did not access the data from

play13:27

equifax's core Consumer Credit credit

play13:29

reporting databases but from the

play13:31

company's Us online dispute portal web

play13:34

application I guess that's not as bad

play13:36

then oh [ __ ] that's 40% of Americans oh

play13:39

[ __ ] the data included names Social

play13:40

Security numbers birth dates addresses

play13:43

and driver's license numbers you know

play13:45

everything that you would need to know

play13:46

to open up a new credit line identity

play13:48

theft is not a joke Jim millions of

play13:50

families suffer every year nice I've

play13:53

always said at this point if someone

play13:55

wants that information on you and they

play13:56

give a [ __ ] enough to look for it

play13:58

they're going to find online somewhere

play13:59

the attackers were active with equifax's

play14:02

networks for 76 days without being

play14:06

discovered bruh the breach was caused by

play14:08

a severe security vulnerability and

play14:10

apatchy struts that allowed the

play14:12

attackers to exploit unpatched systems

play14:14

and unsurprisingly enough they had a

play14:16

patch released on March 7th and Equifax

play14:19

was instructed to apply it following a

play14:21

penetration test but the patch was never

play14:23

implemented by the IT team come on what

play14:25

the having worked in security for a

play14:27

minute now I'm sensing a pattern and

play14:29

patching policies getting told to update

play14:31

not updating and this goes on endlessly

play14:33

so some hacker discovered the unpatched

play14:36

version of Apache strut software running

play14:38

on a server in equifax's DMZ an internet

play14:42

facing server and went to town using

play14:44

what is considered to be beginner or

play14:47

novice level hacking why did it take so

play14:49

long to detect the exfiltration well

play14:51

equifax's failure to renew a crucial

play14:54

public key certificate meant that their

play14:56

data exfiltration detection tools were

play14:59

unable to inspect encrypted traffic

play15:01

allowing the hackers to operate

play15:03

undetected now Equifax has since agreed

play15:05

to a settlement that will cost them

play15:07

$1.38 billion and that's not including

play15:11

the over $1 billion they've already

play15:13

spent upgrading their security holy look

play15:16

at all this damage which isn't really a

play15:18

cost induced by the breach or created by

play15:20

it really but something that they should

play15:22

have spent before to secure their sh and

play15:24

ultimately the US government blamed

play15:26

Chinese military backed hackers and

play15:29

charge them in 2020 you just can't make

play15:31

this up these little bits of update

play15:33

security policies get overlooked and all

play15:35

of a sudden you have an apocalyptic

play15:38

breach definitely one for the record

play15:39

books for overall impact for such little

play15:42

hacking knowledge needed in December of

play15:44

2013 credit card numbers of almost 40

play15:48

million customers were stolen from a

play15:50

retail giant known as Target which led

play15:52

into another announcement in January

play15:54

2014 where Target announced that

play15:57

personal identifiable information Pi

play15:59

data in the form of names phone numbers

play16:01

addresses email addresses of up to 70

play16:05

million customers were stolen as well

play16:07

how'd that happen well in early 2013

play16:10

attackers conducted extensive

play16:12

reconnaissance On Target and its vendors

play16:14

uncovering details about Target's

play16:16

technical infrastructure through a

play16:18

Microsoft case study they exploited

play16:20

vulnerabilities in third-party vendor

play16:22

Fazio mechanical some HVAC company using

play16:25

a fishing attack to install Citadel

play16:27

malor and gain access to targets Network

play16:29

on November 12th 20133 now the company

play16:32

could have prevented this if they had

play16:33

realtime detection but instead they were

play16:35

using a free version of malware bites oh

play16:38

my God the attacker is used an

play16:41

administrative account to navigate to

play16:42

Target's Network eventually finding an

play16:44

exploiting a vulnerability in a Windows

play16:46

domain controller to access the point of

play16:49

sale systems by November 30th a custom

play16:51

black point of sale malware was

play16:53

installed on most point of sale systems

play16:56

and funny enough this malware is

play16:57

available for sale in the online black

play16:59

market for roughly $2,000 just goes to

play17:02

show you you don't need to know how to

play17:04

write malware or hack like a pro just a

play17:06

little money on the black market and

play17:08

basic hacking can get you into pretty

play17:09

much anywhere these days or at least

play17:11

back then the saddest bit of all that

play17:12

despite major alerts firing off in

play17:15

Target's environment their intrusion

play17:17

detection system and detection of

play17:18

malicious behavior by their semantic

play17:21

antivirus no action was taken by the

play17:23

security team what the hackers even

play17:25

managed to update the Mal a few times

play17:27

which fired off even more alert and on

play17:29

December 2nd hackers exfiltrated data to

play17:32

servers in Eastern

play17:35

Europe with another security tool called

play17:38

fireye detecting the breach and

play17:39

notifying staff in India who then

play17:42

relayed the alerts to the staff in the

play17:44

US who did nothing again the deed was

play17:47

done with stolen credit card information

play17:49

sold on the black market these people

play17:51

were literally kicking back casually

play17:52

breaking and messing around and copy

play17:54

posting data overseas now this is an

play17:57

interesting case because it involves a

play17:58

third-party vendor breach and failure

play18:01

combined with some major no shits given

play18:03

to the alerts that triggered in targets

play18:05

network with an estimated 200 million

play18:07

and Target stock doing just fine it's

play18:10

almost as if customers didn't care about

play18:11

this breach they just kept on going with

play18:13

their tar trips and sipping on their

play18:15

Starbucks waps not a care in the world

play18:17

now I'd say given the sophistication of

play18:19

the attack all the Recon involved and

play18:21

exploitation of technical

play18:22

vulnerabilities paired with evading

play18:24

their detection

play18:27

systems sort of this was pretty

play18:29

catastrophic if there was more data

play18:31

available to the hackers I'm sure they

play18:32

would have taken it luckily they were

play18:34

limited to what Target had otherwise

play18:36

we'd be looking at an apocalyptic breach

play18:38

on May 12th 2017 a worm spread to more

play18:41

than 200,000 computers in over 150

play18:45

countries stuck net 2.0 nah this was

play18:47

none other than the one a cry ransomware

play18:50

affecting companies like FedEx Honda

play18:52

Nissan and the UK's National Health

play18:54

Service the NHS ambulances were having

play18:56

to be rerouted absolute Pandemonium the

play18:59

one a cry attack occurred in the span of

play19:02

4 days but it left people with a lot of

play19:04

work on their hands while infected

play19:05

systems in over 150 countries resulted

play19:08

in roughly $100,000 payout for the

play19:10

attackers North Korea duh who else would

play19:13

want to send out that kind of ransomware

play19:15

worm that could take out country's

play19:16

infrastructure this guy would now the

play19:18

actual damages induced were reported in

play19:20

the $4 billion range damn that's a lot

play19:22

of wow subscriptions now this of course

play19:24

spread across multiple countries and

play19:26

agencies but still God Dam damn now how

play19:29

did all this happen imagine a plague but

play19:31

instead of humans it's Windows 7

play19:35

machines scary times now W cry was

play19:37

unique due to its wormlike nature

play19:40

allowing it to self-replicate and spread

play19:41

rapidly across networks from infected

play19:43

computers but unlike typical ransomware

play19:46

that infects devices via malicious sites

play19:48

or links one cry used infected devices

play19:51

to propagate itself it exploited an NSA

play19:54

discovered vulnerability Eternal blue

play19:56

thanks guys appreciate it and another

play19:58

back door double Pulsar to infect

play20:01

primarily Windows 7 devices the attack

play20:03

began in April 2017 in Asia spreading

play20:06

quickly through network devices and if

play20:09

not for the quick thinking of this guy

play20:12

Marcus hutkins a cyber security

play20:14

researcher who is working in loose

play20:16

collaboration with the UK's National

play20:18

cyber security Center saying that I'm a

play20:19

hero I mean I sort of just registered

play20:21

this domain for tracking researched the

play20:23

Mau and discovered a kill switch which

play20:25

more or less just stopped the ransomware

play20:27

entirely I'm screwing over over the rest

play20:29

of the world that it had not yet had

play20:30

time to reach at 22 he single-handedly

play20:34

put a stop to the worst cyber attch the

play20:36

world had ever seen what have you done

play20:38

with your life you stop a national Cyber

play20:40

attack yet that's what I thought get to

play20:42

work anyways this went full blight on us

play20:44

so naturally it's blighting for this

play20:46

Cyber attack in June 2017 the world was

play20:49

introduced to the most destructive Mal

play20:53

ever deployed we had just we just got we

play20:55

just got one a cry damn 2017 was a fun

play20:58

year I had no clue I was in my second

play21:00

year of my cyber security program

play21:01

ignoring my assignments to play League

play21:03

of Legends pter games now while Ukraine

play21:05

was the primary target here not Peta

play21:07

quickly spread to more than 60 countries

play21:10

destroying the computer systems of

play21:12

thousands of multinationals between one

play21:14

a cry in this system admins and security

play21:16

analysts at the time must have had their

play21:18

hands full full of resignations [ __ ]

play21:21

this [ __ ] I'm out cuz you know security

play21:24

kind of is and always has been the last

play21:26

thing on the sea su's mind first thing

play21:28

being

play21:29

money I wouldn't what a million dollars

play21:31

even smells like now much like the one

play21:34

cry attack it also used the

play21:35

vulnerability exploit known as Eternal

play21:37

blue do spread like crazy because people

play21:39

didn't install the fix to the Eternal

play21:42

blue patch when it was first available

play21:44

that's what you get not Peta spread

play21:46

through the network on its own

play21:48

extracting admin credentials and

play21:49

schedules of tasks to reboot the machine

play21:52

as soon as a victim reboots their

play21:53

machine not Peta overwrites the master

play21:55

boot record with a malicious payload

play21:57

that encrypts the full disc now it asks

play22:00

for a ransom but it doesn't actually

play22:01

have a decryption key because this was

play22:03

not a financially driven attack it was

play22:05

Russia but you move attempting to more

play22:08

or less [ __ ] over Ukraine what you

play22:10

thought the war in Ukraine was a new

play22:12

thing nah there's always been beef a one

play22:13

affected company was Global Transport

play22:16

and Logistics Giant M where not Peta

play22:18

destroyed all end user devices including

play22:22

49,000 laptops because this was not a

play22:24

traditional ransomware that would

play22:26

actually release your files if you paid

play22:27

the ransom it was designed to Brick

play22:31

everything a wiper as they're called in

play22:33

total with companies RIT bener mandes

play22:36

International Nuance Communications

play22:38

FedEx did you not learn your lesson the

play22:40

first time with one cry honestly this

play22:42

doesn't surprise me FedEx kind of sucks

play22:43

as a reason this meme

play22:48

exists $10 billion in estimated losses

play22:52

later due to this malware I'm sorry but

play22:54

God damn that's a step above one or cry

play22:56

we' reached apocalyptic levels of damage

play22:59

and all of this could have been avoided

play23:01

if you just pushed the update to all

play23:03

devices [ __ ] don't no don't do that test

play23:05

the update then push it we'll see why

play23:08

that's important in a minute here now I

play23:09

know what you're thinking it can't

play23:11

possibly get any worse than the ones

play23:12

I've covered right it can and it it did

play23:15

in 2013 and 2014 a major internet

play23:19

service provider Yahoo faced two massive

play23:21

data breaches that led to the theft of

play23:24

sensitive information from billions of

play23:27

its users three billion users all of its

play23:31

users the largest breach in history the

play23:33

compromised data included usernames

play23:35

email addresses birth dates phone

play23:37

numbers and encrypted passwords credit

play23:39

cards too no luckily not but I wouldn't

play23:41

put it past these regular users to reuse

play23:44

their passwords I don't know in

play23:46

something like their login for their

play23:47

Bank nah n there's no way people do that

play23:50

how was Yahoo affected you ask well it

play23:52

paid around 150 million in settlement

play23:55

and fees and reduced its sale price to

play23:58

to Verizon by $350 million okay okay

play24:02

that they should feel that right oh [ __ ]

play24:05

it's sold for 4.8 billion my

play24:08

disappointment is

play24:10

immeasurable and my day is ruined leak

play24:13

every bit of your users's data and still

play24:15

get paid this is the world we live in

play24:17

that is some grade a apocalypse right

play24:20

there so at long last how does crowd

play24:23

strike incident compare to all these and

play24:25

rank on our wonderful tier list of of

play24:28

infamy well on July 19th 2024 an

play24:32

estimated

play24:34

8.5 million Windows computers worldwide

play24:39

crashed and were unable to reboot stuck

play24:42

in a blue screen of death that regular

play24:45

users had no hope of fixing all because

play24:48

crowd strike released an update to a

play24:51

file that the colonel communicates with

play24:53

so after the update the colonel was like

play24:56

yo file what's up and the file was was

play24:58

like I got nothing literally it had

play25:00

nothing it had null pointers so

play25:03

combining that with other issues

play25:04

involved in the update it bricked the

play25:07

kernel more or less and you get the blue

play25:09

screen now I will say it was an easy fix

play25:12

but one that required system admins and

play25:14

it professionals to more or less

play25:17

manually fix and it's basically

play25:19

impossible to estimate the amount of

play25:21

people that were affected by this no

play25:22

longer people in the company that were

play25:24

affected but it's disruptions everywhere

play25:26

disruptions included cancelled flights

play25:29

Hospital surgeries and 911 system

play25:32

outages Fortune 500 companies are

play25:34

estimated at 5.4 billion in losses

play25:39

excluding Microsoft share God damn it I

play25:42

try indicating a significant operation

play25:45

cost insured losses through cyber

play25:47

insurance from 540 million to

play25:51

1.08 billion covering only 10 to 20% of

play25:56

the total impact to these for 500

play25:58

companies Delta Airlines alone reported

play26:01

$500 million in losses over the 5 days

play26:05

of this outage and that's not including

play26:08

what the people lost by not being able

play26:10

to get on their flights That's not

play26:12

including hotels their Reserve

play26:14

Transportation none of that it's it's

play26:17

it's it's huge it's massive just this is

play26:20

unprecedented size that's what she said

play26:23

and you know we don't have to estimate

play26:25

this [ __ ] crowd strike lost its market

play26:27

value by $25 billion as a result and it

play26:33

still looks like it's going down so we

play26:35

have millions of Windows computers blue

play26:37

screening and we have billions of

play26:40

dollars in losses now I ain't no math

play26:42

wizard but them numbers are anomalous we

play26:45

haven't seen this kind of [ __ ] in an

play26:47

incident ever now now think about if

play26:51

crowd strike had been breached and

play26:53

someone was able to push out something

play26:55

truly malicious to all of its wonderful

play26:58

ful customers unimaginable this incident

play27:01

was simply

play27:05

stupid you treat me like you

play27:09

do when you play your

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
Cybersecurity BreachesData TheftHacking IncidentsSecurity VulnerabilitiesNotPetyaWannaCryYahoo BreachEquifax BreachTarget BreachAdobe BreachMarriott Breach
هل تحتاج إلى تلخيص باللغة الإنجليزية؟