Timeline: Critical infrastructure attacks increase steadily in past decade

This timeline accompanies our story After Stuxnet: The new rules of cyberwar.

1982 Siberian pipeline sabotage: The CIA places deliberate flaws in control system plans stolen by Russia. Allegedly flaws in the stolen software led to a massive pipeline explosion in June 1982.

Source: The Telegraph 1994 Salt River Project computer network hack: While accessing billing information, an employee gains access to the utility's mission-critical systems, including those that handle water and power monitoring and delivery, as well as financial and customer and personal information. Log-in and password files, computer system log files and "root" privileges were taken and/or altered.

Source: Idaho National Laboratory 2001 Port of Houston system crash: By bombarding its computer system with thousands of electronic messages, British hacker Aaron Caffrey crashes the system that helps ships navigate the harbor in the Port of Houston, one of the largest U.S. ports.

Source:BBC News 2003 The Slammer Worm: The worm infects at least 120,000 computers, causing network outages and disrupting flights, elections, ATMs, 9-1-1 emergency services and a nuclear monitoring system at the Davis-Besse Ohio Nuclear Power Plant.

Source: Computerworld 2003-2004 Titan Rain: A series of computer attacks originally launched against a variety of U.S. military computer systems in 2003 go undetected until the following year. Thought to have originated in China, the hacks didn't breach classified systems, but sensitive files were copied.

Source:Computerworld 2007 Sabotage of California's Tehama Colusa Canal Authority: A former employee of a small California canal system installs unauthorized software and damages a computer used to divert water from the Sacramento River.

Source: Computerworld 2009/2010 Operation Aurora: A persistent and sophisticated cyberspying operation attempts to siphon intellectual property from major corporations, including Google, Intel, Symantec and Adobe.

Source: Computerworld 2009 Spies breach electricity grid in U.S.: According to current and former national security officials, as reported in The Wall Street Journal, cyberspies from China, Russia and other countries penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system.

Source: The Wall Street Journal 2010

Stuxnet: The Stuxnet worm temporarily knocks out some of the centrifuges at Iran's Natanz nuclear facility, causing considerable delay to that country's uranium enrichment program. In June 2012, The New York Times reports that the U.S. and Israel developed the worm.

Source: Computerworld 2011 The Nitro Attacks: A series of targeted attacks using an off-the-shelf Trojan horse called "Poison Ivy" is directed mainly at companies involved in the research, development and manufacture of chemicals and advanced materials. After tricking targeted users into downloading Poison Ivy, the attackers issue instructions to the compromised computers, troll for higher-level passwords and eventually offload the stolen content to hacker-controlled systems.

Source: Computerworld 2011 Duqu Trojan: A remote-access Trojan (RAT) designed to steal data from computers it infects targets vendors of industrial control systems.

Source: Computerworld 2012 Shamoon malware: A destructive Trojan horse, which steals data and then wipes files, is allegedly used in an attack that disabled thousands of computers at Saudi Aramco, the national oil company of Saudi Arabia.

Source: Computerworld 2012 Flame: This highly sophisticated malware is believed to be responsible for data loss incidents at Iran's oil ministry. It was allegedly developed by the U.S. and Israeli governments to collect intelligence about Iran's computer networks that would facilitate future cyberattacks on computers used in that country's nuclear fuel enrichment program.

Source: Computerworld 2012 Cyberattacks on natural gas pipeline companies: The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), which is part of the U.S. Department of Homeland Security, issues an alert to warn of ongoing cyberattacks against the computer networks of U.S. natural gas pipeline companies. The ICS-CERT alert states that the campaign involves narrowly focused spear-phishing scams targeting employees of the pipeline companies.

Source: CSO 2012 Attacks on utilities systems: ICS-CERT issues an alert advising utilities to monitor Internet-facing control systems for activity by hackers attempting to gain remote access to control systems through brute force authentication attacks. The attackers attempted to obtain a user's log-on credentials by guessing usernames and passwords.

Source: ICS-CERT 2012 DDoS attacks on U.S. banks: The U.S. accuses Iran of staging a wave of denial-of-service attacks against U.S. financial institutions. Defense Secretary Leon Panetta warns of potential for a "cyber Pearl Harbor" against critical infrastructure and calls for new protection standards.

Source: The New York Times

Read the main story: After Stuxnet: The new rules of cyberwar

Research compiled by Mari Keefe, Computerworld editorial project manager.

Read more about Security in Computerworld's Security Topic Center.

Join the TechWorld newsletter!

Error: Please check your email address.

Tags security

Show Comments

Top Whitepapers

Featured Whitepapers