Podcast
Questions and Answers
When did the GitHub DDoS attack of 2018 occur?
When did the GitHub DDoS attack of 2018 occur?
How long were the server services unavailable during the GitHub DDoS attack?
How long were the server services unavailable during the GitHub DDoS attack?
What method was used to direct the memcached response to the targeted server during the GitHub DDoS attack?
What method was used to direct the memcached response to the targeted server during the GitHub DDoS attack?
What was the amplification factor of memcached during the GitHub DDoS attack?
What was the amplification factor of memcached during the GitHub DDoS attack?
Signup and view all the answers
Which protocol was used for conducting the GitHub DDoS attack with memcached amplification?
Which protocol was used for conducting the GitHub DDoS attack with memcached amplification?
Signup and view all the answers
What was the total data rate sent to the target at the peak time of the GitHub DDoS attack?
What was the total data rate sent to the target at the peak time of the GitHub DDoS attack?
Signup and view all the answers
When was the first version of Petya ransomware detected?
When was the first version of Petya ransomware detected?
Signup and view all the answers
Which country suffered the most impact from the Petya cyberattack?
Which country suffered the most impact from the Petya cyberattack?
Signup and view all the answers
How did the second version of Petya propagate to compromise systems?
How did the second version of Petya propagate to compromise systems?
Signup and view all the answers
Which company suffered a revenue loss of about US$300 million due to the Petya attack?
Which company suffered a revenue loss of about US$300 million due to the Petya attack?
Signup and view all the answers
What was the estimated total damage caused by the Petya ransomware attack?
What was the estimated total damage caused by the Petya ransomware attack?
Signup and view all the answers
When did the major Petya attack surface?
When did the major Petya attack surface?
Signup and view all the answers
What was the total estimated impact of the WannaCry ransomware attack?
What was the total estimated impact of the WannaCry ransomware attack?
Signup and view all the answers
Which term is NOT a known alias for WannaCry?
Which term is NOT a known alias for WannaCry?
Signup and view all the answers
What range of money was demanded as ransom or extortion by the hackers behind WannaCry?
What range of money was demanded as ransom or extortion by the hackers behind WannaCry?
Signup and view all the answers
Which specific type of computers were the main targets of the WannaCry attack?
Which specific type of computers were the main targets of the WannaCry attack?
Signup and view all the answers
What exploit was utilized by WannaCry to propagate the code to other computers?
What exploit was utilized by WannaCry to propagate the code to other computers?
Signup and view all the answers
When was the Petya cyberattack unleashed in the computer world?
When was the Petya cyberattack unleashed in the computer world?
Signup and view all the answers
What technique did the hackers use to gather information about the users in the power grid hacking incident?
What technique did the hackers use to gather information about the users in the power grid hacking incident?
Signup and view all the answers
How did the hackers trick users in the energy sector to collect critical information?
How did the hackers trick users in the energy sector to collect critical information?
Signup and view all the answers
What is the potential impact of a hacker attack on sewerage infrastructure according to the text?
What is the potential impact of a hacker attack on sewerage infrastructure according to the text?
Signup and view all the answers
Which sector other than the power grid can hackers target with serious impacts according to the text?
Which sector other than the power grid can hackers target with serious impacts according to the text?
Signup and view all the answers
What is the purpose of using the 'waterholing' technique by hackers in the power grid hacking incident?
What is the purpose of using the 'waterholing' technique by hackers in the power grid hacking incident?
Signup and view all the answers
How did hackers gain important information about user accounts and credentials in the US grid cyberattack?
How did hackers gain important information about user accounts and credentials in the US grid cyberattack?
Signup and view all the answers
How long did the attack on the MyFitnessPal application database last?
How long did the attack on the MyFitnessPal application database last?
Signup and view all the answers
What company helped GitHub route traffic to block malicious traffic during the attack?
What company helped GitHub route traffic to block malicious traffic during the attack?
Signup and view all the answers
How many packets per second were sent to the target during the attack?
How many packets per second were sent to the target during the attack?
Signup and view all the answers
Which month did the attack on MyFitnessPal's application database take place?
Which month did the attack on MyFitnessPal's application database take place?
Signup and view all the answers
What type of company is Under Armour?
What type of company is Under Armour?
Signup and view all the answers
Which popular mobile application under Under Armour has millions of users for fitness maintenance?
Which popular mobile application under Under Armour has millions of users for fitness maintenance?
Signup and view all the answers
Study Notes
WannaCry Ransomware Attack
- Also known as WannaCryptor, WannaCrypt0r, WannaCrypt0r 2.0, Wanna Decryptor, and Wanna Decryptor 2.0
- Total impact estimated to be around $4 billion due to lost productivity, extortion, and ransom demands
- Affected between 200,000 and 300,000 computers worldwide
- Hackers would encrypt data files and demand ransom payments ranging from $300 to $600 to decrypt them
- Mainly targeted computers with Windows operating systems
- Used the EternalBlue exploit to propagate the code to other computers
Petya/Petya Cyberattack
- Unleashed on May 27, 2017, targeting major businesses, including power grids, gas stations, energy production companies, banks, airports, bus stations, and communication-based systems
- Mainly targeted Ukraine, with over 80% impact felt in the country
- Also affected Russia and Germany
- First version noticed in March 2016, which propagated through infected email attachments
- Second version, more dangerous and powerful, surfaced on May 27, 2017, using the EternalBlue exploit
- Estimated total damage: around $10 billion
- Notable companies affected: Maersk SeaLand Inc. (revenue loss: $300 million), Cadbury (Australia), JNPT Container (India), Mondelez International (USA), and DHL Logistics (Germany)
Power Grid Hacking
- Hackers used "spearphishing" and "waterholing" techniques to gain access to user accounts and credentials
- Techniques enabled hackers to collect critical information and disrupt power supply infrastructure
- Such attacks can have devastating impacts on the country, including flooding cities with sewer water, stopping utilities, and compromising infrastructure
GitHub DDoS Attack 2018
- Largest DDoS attack in history, suspected to have originated from the PRC
- Occurred on February 28, 2018, causing service outage for around 5 minutes
- Attack was conducted through memcached over UDP, amplifying the attack by 51,000 times
- Peak data rate sent to the target was around 1.35 Tbps, with 126.9 packets sent per second
- Akamai Prolexic helped GitHub mitigate the attack by routing traffic through its scrubbing centers
Under Armour Account Hacking
- MyFitnessPal, a popular mobile application, was hacked in February 2018
- Application has millions of users, hosting over 2 million different types of healthy foods with their nutrition values
- Hack took place in late February 2018, but was only discovered in late March 2018
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge about power grid hacking and cyberattacks with this quiz. Explore the techniques used by hackers to disrupt power generation systems and gain unauthorized access to user accounts and credentials.