The impact of 10 large hacker attacks on network security

Source: Internet
Author: User
Tags anonymous


Beijing Time December 14 thereafter, according to foreign media reports, the United States news site "The Daily Beast" recently selected: In the past 25 years in 10 of the most destructive hackers to invade things. Last week, a group of anonymous hackers carried out an endless network of attacks, the government and the company's network administrators have brought great fear, the network of attacks unprecedented planning, attracted thousands of amateur hackers to participate. But unlike real hackers, the software used by these "script kiddies" has invaded Visa, MasterCard and PayPal, rather than the true meaning of hacker soldiers reported in the media, They only use mouse clicks to suggest some amateur hackers who invade.



At the beginning of the computer, real hackers had been carrying out harsh and destructive attacks on the networks of governments, corporations and large organizations, many of whom had been detained and fined, while others had gone underground. And the lucky start my normal career, become the network security category professor.



The Daily Beast lists ten of the most famous hacker attacks, worm incursions and distributed denial of service (DDoS) events in the past 25 years:



1. November 1988: Robert Tapan Morris vs Global



Robert Tapan Morris (Robert Tappan Morris) became a graduate student at Cornell University (Cornell University) in 1988, developing a worm that could be made to imitate itself, and tasked them with the task of determining Internet planning. Can still backfire, worm imitation is not controlled, it not only infected thousands of computers, causing a grand loss of millions of dollars, but also to promote the United States Government aimed at computers to create an emergency response.



And because of the accident, Morris ended up being charged with a 10,000-dollar fine and 400-hour community service for "violating the Computer Fraud and Chaos Act". Morris's source code is housed in a black 3.5-inch floppy disk that was presented at the Boston Museum of Science;



2, June 1990: Kevin Bolsen against Los Angeles Kiis FM radio station.



Kevin Bolsen (Kevin Poulsen), a young telephone hacker, hacked the phone line to make himself the 102th-place caller of the Los Angeles KIIS FM radio "Friday win Porsche" section. In the ensuing months, Mr. Paulson also overheard the phone call of a Hollywood actress and later attacked military and the FBI.



The FBI ended up accusing Mr. Paulson of "series of fraud and money-laundering offences", while Mr. Paulson was sentenced to 51 months in prison, paying a fine of 56,000 dollars for damaged radio stations and a three-year stop in touch with the computer. Now Mr. Paulson is a wired magazine journalist, and he runs a blog threat level blog, which, in the June 6 of this year, first reported the U.S. Army intelligence analyst Bradley Manning is the WikiLeaks source;



3, March 1999: David Smith against Microsoft Word & Excel.



David Smith (David L. Smith) released a computer virus in 1999, using the stolen AOL account to release an infected Melissa virus Word document to the American online discussion group alt.sex. Smith's virus was e-mailed to get overloaded with emails from infected PCs, and companies like Microsoft, Intel, Lockheed Martin and Lucent Technologies closed their email networks. This incident caused a loss of up to 80 million dollars. Smith, who acquitted the virus, faced 10 years of detention and a fine of 5000 dollars, but ended up serving only 20 months; 4, August 1999: Jonathan James against the Pentagon.



Jonathan James, the most famous computer hacker in the history of 1999, invaded the military computers of the U.S. defense Jonathan James, and successfully acquired thousands of secret information and registration information and manipulated 1.7 million of billions of dollars worth of software on the International Space Station. Discovered after the invasion, NASA closed the network in time and spent a lot of money on safe promotion. and James committed suicide in 2007;



5, February 2000 Mafia Boys against Yahoo, CNN, EBay, Dell and Amazon.



In February 2000, 15-Year-old Michael Kerl (Michael calce), a mafia boy, attacked Yahoo using distributed denial of service and then attacked servers in companies such as CNN, EBay, Dell and Amazon. Later, Kyle was arrested by the Canadian police, and sentenced to 3 years of detention, but at the end of the juvenile detention of Kyle sentenced to 8 months of detention, and paid a contribution of 250 dollars;



6, February 2002: Adrian Rameau against the New York Times.



Before that, the homeless hacker, Adrian Rameau Adrian Lamo, had been renowned for having hacked into the servers of companies such as The New York Times from Kinko chains and Starbucks cafes. February 2002, Rameau invaded Grey Lady's database, but also in a list of op-ed contributors to add my name, but also in Lexis-nexis find himself. The FBI thought: Lexis-nexis found a total of 300,000 dollars lost in the New York Times, while Rameau faced 15 years of detention. At the end, Rameau was sentenced to 2 years ' probation, 6 months at home and a fine of 65,000 dollars;



7, January 2008: Anonymous versus Scientology.



In the 2008, hackers attacked Scientology's scientology.org site with distributed denial of service, with the intention of reversing brainwashing to save people from Scientology. The invasion was a medium-planning attack when safety professors derived traffic monitoring based on distributed attacks. Safety Professor also pointed out that the invasion is not one or two of the ego;



8, November 2008 unknown person against Microsoft Windows.



At the end of 2008, the Conficker worm used many of the cracks in Microsoft's operating system to infect machines, which connected many computers to a large botnet that could be manipulated by virus creators. Since it was first discovered, the Conficker worm is now infecting millions of of computers and business networks around the world, causing great impact.



9, July 2009: Not well-known against the United States and South Korea.



In the 3 days of July 2009, many South Korean dailies, large online auctioneers, banks and South Korean presidents ' websites, as well as the White House and Pentagon sites, were subjected to multiple rounds of distributed denial of service, with more than 166,000 computers affected differently. Some people have indicated that this is the wireless communication part uses the Mydoom worm virus to carry on the back door carries on the invasion, but this message ending has not been proved;



10, August 2009 Russia against the main blogger Cyxymu.



In the summer of 2009, as Russian hackers carried out a distributed Denial-of-service attack, the hundreds of millions of-user communication site experienced several hours of congestion and suspension, and the hacker claimed its intention was to keep bloggers cyxymu. Max Kelly, Facebook's security chief, has shown that this is a way to align with Cyxymu and to invade together in a variety of ways, making it impossible for others to contact him;


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.