Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

The worst cyberattacks undertaken by nation-state hackers

1 of 12 NEXT PREV
  • WannaCry

    WannaCry

    The WannaCry ransomware campaign hit hundreds of thousands of computer systems worldwide in one fell swoop, causing disruption to countless organizations including the UK's National Health Service (NHS), US hospitals, Nissan, and Russian banks.


    The ransomware spread, made possible through a leaked NSA hacking tool and Windows exploit Eternal Blue, is believed to be the work of North Korea.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • NotPetya

    NotPetya

    NotPetya, another global malware campaign which claimed victims in Ukraine, Russia, Denmark, the UK, and the United States in 2017, caused chaos at everything from banks to shipping companies and nuclear facilities.

    Originally, NotPetya was believed to be a kind of ransomware, but further analysis revealed the malware's true destructive purposes.

    UK officials have blamed the Russian military for the cyberattack.

    See also: Cybersecurity: Nation-state cyber attacks threaten everyone, warns ex-GCHQ boss

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Turla

    Turla

    An advanced persistent threat (APT) group believed to be backed by the Russian government, Turla has been quietly attacking political targets for many years.

    Turla, active for at least a decade, has been connected to cyberattacks launched against European government organizations, including consulates and embassies.

    The group uses the Gazer malware family, watering hole attacks, and phishing campaigns.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Stuxnet

    Stuxnet

    Back in 2010, the Stuxnet worm infiltrated an Iranian nuclear power facility, inserting itself into SCADA systems and affecting uranium centrifuges. While never admitted, the worm is generally believed to be the work of the US government's National Security Agency (NSA) with the assistance of Israel.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Skulls in South Korea

    Skulls in South Korea

    In 2013, a number of major South Korean banks and a local broadcaster were faced with files vanishing before their eyes and images of leering skulls posted on computer screens.

    The coordinated attack crashed systems for the best part of a day, causing widespread disruption. It is believed the outage was due to North Korean state-sponsored hackers.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • A string of attacks

    A string of attacks

    China has been blamed as the suspected source of a cyberattack launched against the US Office of Personnel Management (OPM) which led to the leak of sensitive information belonging to nearly four million government workers.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Sony's suffering

    Sony's suffering

    A devastating attack launched against Sony Pictures in 2014 resulted in internal systems being crippled, terabytes of data being leaked online, and the sensitive information of celebrities and staff being compromised.

    While attribution was difficult beyond a message which suggested the hack was the work of "Guardians of the Peace," the cyberattack has now been formally laid at North Korea's door in the form of Pak Jin Hyok, who was reportedly an intelligence officer for the Reconnaissance General Bureau, North Korea's military intelligence agency.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • The bank heist of the century

    The bank heist of the century

    The Bangladesh Bank was the victim of an insidious cyberattack which relieved the organization of $80 million in funds. Malware was used to infiltrate the bank's networks in order for threat actors to learn how the institution used the SWIFT financial messaging system, and this knowledge was then used to make a series of rapid, fraudulent transactions.

    North Korea was later linked to the bold bank heist due to similarities which connected the threat actors to the 2014 Sony cyberattack.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Routers worldwide

    Routers worldwide

    Earlier this year, US and UK law enforcement warned of a mass cybercampaign against home routers, ISPs, and firewall systems. Authorities say the compromised systems were not only offering valuable information to state-sponsored groups but could also pave the way for attacks in the future.

    The coordinated attack used Man-in-The-Middle (MiTM) attacks to conduct covert surveillance using the VPNFilter malware.

    It is believed Russian, Kremlin-based hackers are behind the campaign.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Elections

    Elections

    In 2018, the US Department of Justice (DoJ) indicted 12 Russians, accused of interfering with the US general election due to the Russian government's wishes.

    The hackers launched a spearphishing campaign against senior officials for the Hillary Clinton campaign and later leaked close to 20,000 confidential emails and files relating to the Democratic National Committee (DNC).

    See also: Russia 'front of the queue' when it comes to hacking, says security minister

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Power plants in turmoil

    Power plants in turmoil

    Iran is suspected to be behind the deployment of Triton malware in Saudi Arabia. The malware, which displayed a "Stuxnet level of sophistication," was launched against power plants, and in particular, Schneider Electric devices.

    Triton's main focus was to tamper with emergency shutdown systems.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

  • Industroyer

    Industroyer

    In 2016, the city of Kiev in Ukraine suddenly found itself without power. While energy was restored an hour later, but it emerged the reason for the unexpected blackout was not due to a glitch in the system, but rather, malware.

    Dubbed Industroyer, the malware -- considered the "biggest threat to industrial control systems since Stuxnet" -- was able to wipe systems and cause industrial services to crash.

    Ukrainian officials have blamed Russian state-sponsored hackers for the attack as part of an ongoing "cyberwar" against the country.

    Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

    Caption by: Charlie Osborne

1 of 12 NEXT PREV
Charlie Osborne

By Charlie Osborne | September 7, 2018 -- 09:16 GMT (02:16 PDT) | Topic: Security

  • WannaCry
  • NotPetya
  • Turla
  • Stuxnet
  • Skulls in South Korea
  • A string of attacks
  • Sony's suffering
  • The bank heist of the century
  • Routers worldwide
  • Elections
  • Power plants in turmoil
  • Industroyer

These are the worst known cyberattacks which are believed to be the work of hackers backed by governments and ruling parties worldwide.

Read More Read Less

WannaCry

The WannaCry ransomware campaign hit hundreds of thousands of computer systems worldwide in one fell swoop, causing disruption to countless organizations including the UK's National Health Service (NHS), US hospitals, Nissan, and Russian banks.


The ransomware spread, made possible through a leaked NSA hacking tool and Windows exploit Eternal Blue, is believed to be the work of North Korea.

Published: September 7, 2018 -- 09:16 GMT (02:16 PDT)

Caption by: Charlie Osborne

1 of 12 NEXT PREV

Related Topics:

Security Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | September 7, 2018 -- 09:16 GMT (02:16 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums