Nowadays it seems barely a few weeks can go by without another big cybercrime or cyber security story hitting the headlines. The latest has been the discovery of the Spectre and Meltdown flaws inherent in processors going back decades; a revelation that’s rocked the cyber security world.
Of course, cyber security, cyberwarfare and cybercrime aren’t new or recent phenomena. In fact the history of computing also contains its own history of breaches and hacks. We’ve compiled a list of some of the most significant over the last 30 years. We’ll start way back in the 1980’s, in the days before mobile phones and the internet as we know it today.
The first computer worm (1988)
The first known computer worm was released in 1988 by Cornell University student Robert Tappan Morris, who claimed he had wanted to know how many computers were connected to the internet. The problem occurred when the code encountered a critical error and began replicating itself and began infecting other computers causing them to slow down as it demanded processor time in order to spread itself to other machines. The effect was one of the first denial of service attacks affecting around 6000 UNIX computers. Estimates of the damage range from $10,000 to $10 million dollars in damages.
Morris always maintained that he never intended the code to be malicious but the event nonetheless inspired what have become known today as distributed denial of service (DDoS) attacks.
Hack on the US Defence Department (1999)
Jonathon James hacked the US Defence Department in 1999 after infiltrating the a division of the US Defence department, James had installed a backdoor on a server allowing him to intercept thousands of emails across a number of government departments, some of which contained usernames and passwords. Using this information he then accessed a NASA computer and stole software that controlled the International Space Station’s internal temperature and humidity, costing the agency $41,000 in computer downtime.
James became the first juvenile to be convicted and jailed for cybercrime (he was 15 years old when the attack took place but 16 years old when sentenced). In 2007 he was implicated of hacking to steal credit card information. He denied the accusations but in 2008 took his own life.
The ILOVEYOU worm (2000)
Released in 2000, the ILOVEYOU virus was the most virulent virus ever seen at the time. Unlike the Melissa virus of the previous year, the virus sent copies of itself to every contact on the user’s Windows address book (by comparison, Melissa only contacted the first 500), helping it propagate at an alarming rate.
The worm sent an email with the subject line “ILOVEYOU” and a vbs attachment that looked like an ordinary text file. Once opened this file would activate visual basic script and overwrite various file types including JPG, CSS, DOC, MP2 and MP3 (although the latter file was only hidden). The file originated in the Philippines, which at the time had no laws against writing malware meaning the two perpetrators, Reonel Ramones and Onel de Guzman, were never convicted. The country later passed the E-Commerce law to address this.
By 2002, the ILOVEYOU worm had become the most virulent computer virus of all time.
First uncovered in 2010 by Kaspersky Labs, the STUXNET worm was said to have been in development since 2005 and was different from previous worms in that it targeted SCADA control systems which are responsible for the supervisory management of power plants and machinery. Specifically the virus attacked programmable logical controllers (PLCs) which, amongst other things, are responsible for the automation of nuclear centrifuges.
It soon became clear that the virus was a direct cyberattack on Iran’s nuclear programme, thought to have been developed by Israel in conjunction with the Americans. In total, Stuxnet was reported to have ruined close to 20 percent of Iran’s nuclear centrifuges, infecting over 200,000 computers.
Sony Hack (2014)
Another example of the use of cyberattacks being deployed by nation states, the Sony hack saw a huge tranche of confidential data from the Sony Film Studio released by a group calling itself Guardians of Peace. Amongst the files were confidential emails between employees and their families, scripts from unreleased films and details of executive salaries. The US intelligence community quickly concluded that the attack originated in North Korea, a claim vehemently denied by the regime.
One of the reasons suspicion had fallen on the North Korean regime was centred around the release of ‘The Interview’, a comedy produced by Sony and based on an attempted assassination attempt on Kim Jong-un. At the time, North Korean sponsored hackers were said to have made several threats on Sony and US cinemas screening the film.
Ashley Madison breach (2015)
The now infamous Ashley Madison hack was conducted by a group called ‘The Impact Team’. The controversy surrounding the case was as much centred on the target (a dating site for extramarital affairs) as it was the perpetrators. After several threats to release user information was ignored by the company, the hackers released more than 25 gig of information including the names and details of the website’s users.
The site’s policy of not deleting user’s information without taking payment, along with the lack of any email authentication for setting up an account, meant that the data dumps may have included individuals who had never used or even heard of the site. Many internet vigilantes went onto expose individuals, some of whom were nationals of countries like Saudi Arabia, where adultery is punishable by death.
Resources and Further Reading
The UK Government’s Department for Culture, Media and Sport produce an annual Cyber Security Breaches Survey, which gives an up to date summary of the state of cyber security in the UK and is great further reading material.
Wikipedia has one of the best chronologies of computer hacks, viruses and cyberattacks going back to 1903 and is constantly being updated.
For more information about how you can make a difference in cyber security and details of cyber security courses and qualifications, check out our FAQ on the Cyber Security Courses homepage.