Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Your assignment is to pick six attacks from that list which are disruptive cyber

ID: 3881196 • Letter: Y

Question

Your assignment is to pick six attacks from that list which are disruptive cyberattacks, and for each of the six, answer the following four questions:

What company, government, organization (or group of them) was the target of the attack?

Who was the attacker? If it's not know for certain, what is suspected and why?

How did the attacker disrupt the target? (for instance, was it a DDOS attack, did they destroy files, etc.)

What was the apparent motivation of the attacker?

Remember that this list was used for the List assignment in Module 1. You may want to look there to begin to narrow down the list to disruptive cyberattacks. But don't just copy what you see there, it's not all correct.

Do not choose HBGary Federal, Target, or Stuxnet, we've already covered those.

Here is the list for you to pick:

1. AP Twitter Account Hacked

http://www.huffingtonpost.com/2013/04/23/syrian-electronic-army-ap-twitter-hack_n_3140849.html (Links to an external site.)Links to an external site.

2. Fake Facebook Account for NATO Commander

(this is mentioned on page 58 in the textbook)

http://www.telegraph.co.uk/technology/9136029/How-spies-used-Facebook-to-steal-Nato-chiefs-details.html (Links to an external site.)Links to an external site.

3. Operation Aurora (Google)

There's multiple victims in this attack. Just focus on what was done to Google.

http://www.wired.com/2010/01/google-hack-attack (Links to an external site.)Links to an external site.

4. Operation Cupcake

(this is mentioned on page 105 in the textbook)

https://www.washingtonpost.com/blogs/blogpost/post/operation-cupcake-mi6-replaces-al-qaeda-bomb-making-instructions-with-cupcake-recipes/2011/06/03/AGFUP2HH_blog.html (Links to an external site.)Links to an external site.

5. Stuxnet

(there's an entire section in the textbook, starting on page 114, about Stuxnet. You can find all you need there, though this additional source is also useful)

http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/ (Links to an external site.)Links to an external site.

6. Saudi Aramco

http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?_r=1 (Links to an external site.)Links to an external site.

7. Sands Casino

http://www.bloomberg.com/news/articles/2014-12-11/nuke-remark-stirred-hack-on-sands-casinos-that-foreshadowed-sony (Links to an external site.)Links to an external site.

8. Coca-Cola

(this link no longer works unless you are a subscriber)

http://www.bloomberg.com/news/articles/2012-11-04/coke-hacked-and-doesn-t-tell (Links to an external site.)Links to an external site.

9. TV5Monde

Be sure to notice how the attribution of who was responsible for this attack changed from the first article to the second.

First article: http://www.bbc.com/news/world-europe-32229152 (Links to an external site.)Links to an external site.

Second article: http://www.bbc.com/news/world-europe-33072034 (Links to an external site.)Links to an external site.

10. Leavenworth Hospital

http://krebsonsecurity.com/2013/04/wash-hospital-hit-by-1-03-million-cyberheist/ (Links to an external site.)Links to an external site.

11. Operation Buckshot Yankee

(this story is mentioned on page 64 in the textbook)

http://www.nytimes.com/2010/08/26/technology/26cyber.html?_r=1&ref=technology (Links to an external site.)Links to an external site.

12. HBGary Federal

(this story is covered on pages 80-81 in the textbook)

The following article is quite long, but it's part of the outside reading for Module 2 anyway, so you don't lose anything by reading it now.

http://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/ (Links to an external site.)Links to an external site.

13. Bowman Dam

http://www.cnn.com/2016/03/10/politics/iran-us-dam-cyber-attack/index.html (Links to an external site.)Links to an external site.

Here's the press release on the indictment, which is also in the outside reading in Module 1 because the main topic of the indictment is the DDOS attacks on US banks:

https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-charged (Links to an external site.)Links to an external site.

14. Estonia

(this story is mentioned starting on page 110 and again on page 122 in the textbook)

https://www.theguardian.com/world/2007/may/17/topstories3.russia (Links to an external site.)Links to an external site.

15. Target Stores

(this attack will be in the outside reading in Module 2)

https://www.washingtonpost.com/business/economy/target-says-70-million-customers-were-hit-by-dec-data-breach-more-than-first-reported/2014/01/10/0ada1026-79fe-11e3-8963-b4b654bcc9b2_story.html (Links to an external site.)Links to an external site.

16. German Parliament

http://www.bbc.com/news/technology-36284447 (Links to an external site.)Links to an external site.

17. Personal Info stolen for ISIS

http://bigstory.ap.org/article/e5d3ca728fd74166a0c67eaf33fcaf5c/guilty-plea-set-islamic-state-hack-us-military-info (Links to an external site.)Links to an external site.

18. Georgia (the country, not the state)

(this attack is mentioned on pages 111-112 and 125 in the textbook)

http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=0 (Links to an external site.)Links to an external site.

19. White House

http://www.cnn.com/2015/04/07/politics/how-russians-hacked-the-wh/index.html (Links to an external site.)Links to an external site.

20. Hacking Team

http://www.bbc.com/news/technology-33409594 (Links to an external site.)Links to an external site.

21. Bangladesh Bank

https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/ (Links to an external site.)Links to an external site.

22. US DoD – Joint Chiefs Network

http://www.cnn.com/2015/08/05/politics/joint-staff-email-hack-vulnerability/ (Links to an external site.)Links to an external site.

23. St. Louis Cardinals

http://arstechnica.com/tech-policy/2016/07/baseball-exec-gets-46-months-in-prison-after-guessing-rival-teams-password/ (Links to an external site.)Links to an external site.

24. Premera Blue Cross

http://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/ (Links to an external site.)Links to an external site.

25. Australian Sewage System

http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/ (Links to an external site.)Links to an external site.

27. Democratic National Committee

https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html (Links to an external site.)Links to an external site.?

28. Dyn DNS Service

http://arstechnica.com/security/2016/10/dos-attack-on-major-dns-provider-brings-internet-to-morning-crawl/ (Links to an external site.)Links to an external site.

and an update later in the same day

http://arstechnica.com/security/2016/10/double-dip-internet-of-things-botnet-attack-felt-across-the-internet/ (Links to an external site.)Links to an external site.


29. Hospital Ransomware

http://arstechnica.com/security/2016/03/two-more-healthcare-networks-caught-up-in-outbreak-of-hospital-ransomware/ (Links to an external site.)

Explanation / Answer

AP Twitter Account Hacked

The US government was the target of the attack.

The attacker was a group of hacker calling themselves as the Surian Electronic Army

The hacker hacked the Twitter account of the Associated Press and published a fake tweet that there is an explosion in the White House.

The main motive of the hacker was to potray that how by using phising techniques the security of the social media can be breached easily.

Fake Facebook Account for NATO Commander

The British Government was the target of the attack.

The exact attacker couldnot be pointed out but the evidence was suspecting a state sponsered individuals in China

The attacker created a fake facebook acoount and a friend request has been sent from the American Admiral James Stavridis.Like this the security was breached.

The main motive was to extract information from others as the profile was a high ranking officails.This could have been a breach of classififed information.

Operation Cupcake

The American Government was the target of the attack.

The attacker was identified as al-Qaeda

The attacker published the Bomb making ways in the Make a bomb in the Kitchen of Your Mom” from Inspire Magazine.But this was coutered by the MI6 as the replaced with the cupcakes recipe.

The main motive was to spread chaos among the people and disrupt the peace.

TV5Monde

The French Television network was the target of the attack.

The attacker was identified as the a group form the Islamic State(IS).

THe attacker published the documents like ID cards and others of Frech soldiers thos were in the anti-IS Operation.

THe main motive was to secure out information or to pass the information.And also showing how easily the security meausred can be breached.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote