{"id":3287,"date":"2025-09-18T11:05:38","date_gmt":"2025-09-18T09:05:38","guid":{"rendered":"https:\/\/trustlab.upct.es\/?p=3287"},"modified":"2025-09-22T10:02:21","modified_gmt":"2025-09-22T08:02:21","slug":"the-biggest-cyberattacks-in-history-key-cases-and-what-we-learned","status":"publish","type":"post","link":"https:\/\/trustlab.upct.es\/en\/2025\/09\/18\/the-biggest-cyberattacks-in-history-key-cases-and-what-we-learned\/","title":{"rendered":"The Biggest Cyberattacks in History: Key Cases and What We Learned"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3287\" class=\"elementor elementor-3287 elementor-2810\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80c90ef e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"80c90ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa9849d elementor-widget elementor-widget-text-editor\" data-id=\"aa9849d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"212\" data-end=\"284\">Ranking Methodology: criteria (cost, reach, criticality, persistence)<\/h2><p data-start=\"286\" data-end=\"422\">To rank the \u201cbiggest cyberattacks in history,\u201d I applied four criteria that, combined, give a truer picture than a single damage figure:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b811e92 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"b811e92\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3222f70 elementor-widget elementor-widget-html\" data-id=\"3222f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table class=\"tl-table\" aria-describedby=\"desc-method\">\r\n  <caption>Ranking methodology for the biggest cyberattacks<\/caption>\r\n  <thead>\r\n    <tr>\r\n      <th scope=\"col\">Criterion<\/th>\r\n      <th scope=\"col\">Definition<\/th>\r\n      <th scope=\"col\">Indicators<\/th>\r\n      <th scope=\"col\">Weight<\/th>\r\n    <\/tr>\r\n  <\/thead>\r\n  <tbody id=\"desc-method\">\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Criterion\">Cost<\/th>\r\n      <td data-label=\"Definition\">Direct and indirect impact<\/td>\r\n      <td data-label=\"Indicators\">\u20ac lost, fines, litigation<\/td>\r\n      <td data-label=\"Weight\"><span class=\"tl-badge\">35%<\/span><\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Criterion\">Reach<\/th>\r\n      <td data-label=\"Definition\">Countries\/sectors affected<\/td>\r\n      <td data-label=\"Indicators\"># organizations, countries<\/td>\r\n      <td data-label=\"Weight\"><span class=\"tl-badge\">25%<\/span><\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Criterion\">Criticality<\/th>\r\n      <td data-label=\"Definition\">Infrastructure and outages<\/td>\r\n      <td data-label=\"Indicators\">Time out of service<\/td>\r\n      <td data-label=\"Weight\"><span class=\"tl-badge\">25%<\/span><\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Criterion\">Persistence<\/th>\r\n      <td data-label=\"Definition\">Stealth and complexity<\/td>\r\n      <td data-label=\"Indicators\">Days undetected, 0-days<\/td>\r\n      <td data-label=\"Weight\"><span class=\"tl-badge\">15%<\/span><\/td>\r\n    <\/tr>\r\n  <\/tbody>\r\n<\/table>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4ee8d9 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"f4ee8d9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99bfe83 elementor-widget elementor-widget-text-editor\" data-id=\"99bfe83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2892\" data-end=\"2957\">2010\u20132025 Timeline: from industrial sabotage to a global wiper<\/h2><ul data-start=\"2959\" data-end=\"3796\"><li data-start=\"2959\" data-end=\"3070\"><p data-start=\"2961\" data-end=\"3070\"><strong data-start=\"2961\" data-end=\"2975\">2007\u20132008:<\/strong> DDoS attacks on <strong data-start=\"2992\" data-end=\"3003\">Estonia<\/strong> and <strong data-start=\"3008\" data-end=\"3019\">Georgia<\/strong> open the door to \u201cdigital support\u201d in conflicts.<\/p><\/li><li data-start=\"3071\" data-end=\"3157\"><p data-start=\"3073\" data-end=\"3157\"><strong data-start=\"3073\" data-end=\"3082\">2010:<\/strong> <strong data-start=\"3083\" data-end=\"3094\">Stuxnet<\/strong> proves malware can <strong data-start=\"3114\" data-end=\"3145\">damage industrial equipment<\/strong> (ICS\/OT).<\/p><\/li><li data-start=\"3158\" data-end=\"3249\"><p data-start=\"3160\" data-end=\"3249\"><strong data-start=\"3160\" data-end=\"3174\">2013\u20132014:<\/strong> <strong data-start=\"3175\" data-end=\"3184\">Yahoo<\/strong> breaches (billions of accounts) escalate concern over <strong data-start=\"3239\" data-end=\"3246\">PII<\/strong>.<\/p><\/li><li data-start=\"3250\" data-end=\"3329\"><p data-start=\"3252\" data-end=\"3329\"><strong data-start=\"3252\" data-end=\"3261\">2014:<\/strong> <strong data-start=\"3262\" data-end=\"3279\">Sony Pictures<\/strong> brings a highly public <strong data-start=\"3303\" data-end=\"3316\">political<\/strong> dimension.<\/p><\/li><li data-start=\"3330\" data-end=\"3429\"><p data-start=\"3332\" data-end=\"3429\"><strong data-start=\"3332\" data-end=\"3346\">2015\u20132016:<\/strong> Power cuts in <strong data-start=\"3361\" data-end=\"3372\">Ukraine<\/strong> reveal operations against <strong data-start=\"3399\" data-end=\"3426\">critical infrastructure<\/strong>.<\/p><\/li><li data-start=\"3430\" data-end=\"3552\"><p data-start=\"3432\" data-end=\"3552\"><strong data-start=\"3432\" data-end=\"3441\">2017:<\/strong> The black swan year. <strong data-start=\"3463\" data-end=\"3475\">WannaCry<\/strong> (global ransomware) and <strong data-start=\"3500\" data-end=\"3512\">NotPetya<\/strong> (supply-chain wiper) reset the rules.<\/p><\/li><li data-start=\"3553\" data-end=\"3656\"><p data-start=\"3555\" data-end=\"3656\"><strong data-start=\"3555\" data-end=\"3569\">2019\u20132020:<\/strong> Large-scale <strong data-start=\"3582\" data-end=\"3598\">supply chain<\/strong> compromises (<strong data-start=\"3612\" data-end=\"3626\">SolarWinds<\/strong>) with a focus on espionage.<\/p><\/li><li data-start=\"3657\" data-end=\"3796\"><p data-start=\"3659\" data-end=\"3796\"><strong data-start=\"3659\" data-end=\"3673\">2021\u20132025:<\/strong> Cartelized ransomware, <strong data-start=\"3697\" data-end=\"3717\">double extortion<\/strong>, attacks on <strong data-start=\"3730\" data-end=\"3751\">SaaS\/IT providers<\/strong>, and campaigns mixing crime and geopolitics.<\/p><\/li><\/ul><p data-start=\"3798\" data-end=\"4007\">For me, 2017 was the turning point: <strong data-start=\"3834\" data-end=\"3846\">NotPetya<\/strong> made it painfully clear we\u2019re <strong data-start=\"3877\" data-end=\"3897\">not as resilient<\/strong> as we think, and that a single critical dependency (accounting\/tax, logistics, IT) can freeze half a country.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97d3766 elementor-widget elementor-widget-heading\" data-id=\"97d3766\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Top 10 Historic Cyberattacks (with takeaways)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc8d52b elementor-widget elementor-widget-text-editor\" data-id=\"dc8d52b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote data-start=\"195\" data-end=\"306\"><h2 data-start=\"243\" data-end=\"317\">1) NotPetya (2017) \u2014 the wiper that froze Ukraine and rippled worldwide<\/h2><p data-start=\"318\" data-end=\"703\"><strong data-start=\"318\" data-end=\"336\">What happened.<\/strong> Attackers compromised the update mechanism of <strong data-start=\"383\" data-end=\"394\">M.E.Doc<\/strong> (widely used Ukrainian tax software). The payload unpacked as a worm: <strong data-start=\"465\" data-end=\"487\">credential dumping<\/strong> with Mimikatz, lateral movement via <strong data-start=\"524\" data-end=\"554\">EternalBlue\/EternalRomance<\/strong>, then <strong data-start=\"561\" data-end=\"578\">MBR tampering<\/strong> and disk encryption patterns that made recovery infeasible. The ransom note was camouflage\u2014<strong data-start=\"670\" data-end=\"694\">no working decryptor<\/strong> existed.<\/p><p data-start=\"705\" data-end=\"994\"><strong data-start=\"705\" data-end=\"725\">Why it mattered.<\/strong> It turned a niche supplier into a <strong data-start=\"760\" data-end=\"787\">single point of failure<\/strong> for a country, then leapt globally through multinational networks. It showed how \u201cIT housekeeping\u201d issues (flat networks, legacy SMB, over-privileged service accounts) can become <strong data-start=\"967\" data-end=\"993\">national-scale outages<\/strong>.<\/p><p data-start=\"996\" data-end=\"1163\"><strong data-start=\"996\" data-end=\"1013\">TTPs to know.<\/strong> Supply-chain compromise; signed or trusted updates; LSASS access; SMB\/RPC lateral movement; scheduled tasks and PsExec; destructive MBR\/boot changes.<\/p><p data-start=\"1165\" data-end=\"1367\"><strong data-start=\"1165\" data-end=\"1185\">Detection clues.<\/strong> Unusual outbound traffic after updates; spikes in SMB sessions; LSASS handle access; sudden creation of scheduled tasks across many hosts; fake \u201cdisk repair\u201d messages before reboot.<\/p><p data-start=\"1369\" data-end=\"1411\"><strong data-start=\"1369\" data-end=\"1409\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"1412\" data-end=\"1722\"><li data-start=\"1412\" data-end=\"1497\"><p data-start=\"1414\" data-end=\"1497\">Strict <strong data-start=\"1421\" data-end=\"1445\">network segmentation<\/strong> and <strong data-start=\"1450\" data-end=\"1469\">deny-by-default<\/strong> for SMB between segments.<\/p><\/li><li data-start=\"1498\" data-end=\"1566\"><p data-start=\"1500\" data-end=\"1566\"><strong data-start=\"1500\" data-end=\"1523\">LSA Protection\/LAPS<\/strong>, tiered admin and PAWs to contain creds.<\/p><\/li><li data-start=\"1567\" data-end=\"1642\"><p data-start=\"1569\" data-end=\"1642\"><strong data-start=\"1569\" data-end=\"1590\">Immutable backups<\/strong> + frequent restore drills; golden-image rebuilds.<\/p><\/li><li data-start=\"1643\" data-end=\"1722\"><p data-start=\"1645\" data-end=\"1722\"><strong data-start=\"1645\" data-end=\"1671\">Supplier due diligence<\/strong>: signed updates, SBOM, build integrity evidence.<\/p><\/li><\/ul><blockquote data-start=\"1724\" data-end=\"1878\"><p data-start=\"1726\" data-end=\"1878\">Personal note: identifying the <code data-start=\"1757\" data-end=\"1764\">perfc<\/code> <strong data-start=\"1765\" data-end=\"1780\">kill switch<\/strong> (read-only file) proved how a tiny technical detail can buy time when everything else is on fire.<\/p><\/blockquote><hr data-start=\"1880\" data-end=\"1883\" \/><h2 data-start=\"1885\" data-end=\"1946\">2) WannaCry (2017) \u2014 planet-scale ransomware at worm speed<\/h2><p data-start=\"1947\" data-end=\"2153\"><strong data-start=\"1947\" data-end=\"1965\">What happened.<\/strong> Automated exploitation of <strong data-start=\"1992\" data-end=\"2001\">SMBv1<\/strong> (EternalBlue) delivered ransomware that self-propagated with minimal human interaction. Critical services (including healthcare) were hit within hours.<\/p><p data-start=\"2155\" data-end=\"2337\"><strong data-start=\"2155\" data-end=\"2175\">Why it mattered.<\/strong> It was the clearest demonstration that <strong data-start=\"2215\" data-end=\"2232\">patch latency<\/strong> on internet-reachable or internally widespread protocols translates directly into <strong data-start=\"2315\" data-end=\"2336\">business downtime<\/strong>.<\/p><p data-start=\"2339\" data-end=\"2478\"><strong data-start=\"2339\" data-end=\"2356\">TTPs to know.<\/strong> SMBv1 remote code execution; basic persistence; rapid encryption of common extensions; crude but effective worming logic.<\/p><p data-start=\"2480\" data-end=\"2622\"><strong data-start=\"2480\" data-end=\"2500\">Detection clues.<\/strong> Surges in port 445 traffic; anomalous scanning from a single host to many; sudden spikes in file rename\/write operations.<\/p><p data-start=\"2624\" data-end=\"2666\"><strong data-start=\"2624\" data-end=\"2664\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"2667\" data-end=\"2891\"><li data-start=\"2667\" data-end=\"2708\"><p data-start=\"2669\" data-end=\"2708\">Retiring <strong data-start=\"2678\" data-end=\"2687\">SMBv1<\/strong> and hardening SMB.<\/p><\/li><li data-start=\"2709\" data-end=\"2799\"><p data-start=\"2711\" data-end=\"2799\"><strong data-start=\"2711\" data-end=\"2735\">Accelerated patching<\/strong> for edge-exposed services; maintenance windows sized to risk.<\/p><\/li><li data-start=\"2800\" data-end=\"2891\"><p data-start=\"2802\" data-end=\"2891\">EDR rules for worm-like behavior; isolation playbooks to <strong data-start=\"2859\" data-end=\"2890\">quarantine first, ask later<\/strong>.<\/p><\/li><\/ul><hr data-start=\"2893\" data-end=\"2896\" \/><h2 data-start=\"2898\" data-end=\"2954\">3) Stuxnet (2010) \u2014 the first industrial cyber-weapon<\/h2><p data-start=\"2955\" data-end=\"3189\"><strong data-start=\"2955\" data-end=\"2973\">What happened.<\/strong> Multi-stage malware leveraged several <strong data-start=\"3012\" data-end=\"3022\">0-days<\/strong> and stolen certificates to infiltrate air-gapped environments via USB, then targeted <strong data-start=\"3108\" data-end=\"3121\">PLC logic<\/strong> to subtly alter physical processes while spoofing operator screens.<\/p><p data-start=\"3191\" data-end=\"3375\"><strong data-start=\"3191\" data-end=\"3211\">Why it mattered.<\/strong> It proved malware can cause <strong data-start=\"3240\" data-end=\"3264\">physical degradation<\/strong> without obvious alarms, and that <strong data-start=\"3298\" data-end=\"3326\">engineering workstations<\/strong> and ladder logic are part of the threat surface.<\/p><p data-start=\"3377\" data-end=\"3491\"><strong data-start=\"3377\" data-end=\"3394\">TTPs to know.<\/strong> LNK and Print Spooler 0-days (historically), code-signing abuse, PLC payloads, rootkits for ICS.<\/p><p data-start=\"3493\" data-end=\"3636\"><strong data-start=\"3493\" data-end=\"3513\">Detection clues.<\/strong> Unexpected ladder logic changes; mismatches between telemetry and HMI displays; unsigned\/odd drivers on engineering hosts.<\/p><p data-start=\"3638\" data-end=\"3680\"><strong data-start=\"3638\" data-end=\"3678\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"3681\" data-end=\"3926\"><li data-start=\"3681\" data-end=\"3754\"><p data-start=\"3683\" data-end=\"3754\"><strong data-start=\"3683\" data-end=\"3704\">IT\/OT segregation<\/strong>, jump-server patterns, unidirectional gateways.<\/p><\/li><li data-start=\"3755\" data-end=\"3842\"><p data-start=\"3757\" data-end=\"3842\">Change control specific to <strong data-start=\"3784\" data-end=\"3800\">PLC projects<\/strong>; out-of-band validation of sensor data.<\/p><\/li><li data-start=\"3843\" data-end=\"3926\"><p data-start=\"3845\" data-end=\"3926\">Application allow-listing and driver signing enforcement on engineering stations.<\/p><\/li><\/ul><hr data-start=\"3928\" data-end=\"3931\" \/><h2 data-start=\"3933\" data-end=\"3981\">4) SolarWinds (2020) \u2014 supply-chain espionage<\/h2><p data-start=\"3982\" data-end=\"4197\"><strong data-start=\"3982\" data-end=\"4000\">What happened.<\/strong> A trusted enterprise IT platform shipped <strong data-start=\"4042\" data-end=\"4064\">trojanized updates<\/strong>, granting covert access to thousands of networks. Post-compromise, operators used living-off-the-land techniques to remain stealthy.<\/p><p data-start=\"4199\" data-end=\"4373\"><strong data-start=\"4199\" data-end=\"4219\">Why it mattered.<\/strong> It showed that a <strong data-start=\"4237\" data-end=\"4269\">single vendor build pipeline<\/strong> can become a force multiplier for <strong data-start=\"4304\" data-end=\"4338\">long-term, low-noise espionage<\/strong> across public and private sectors.<\/p><p data-start=\"4375\" data-end=\"4491\"><strong data-start=\"4375\" data-end=\"4392\">TTPs to know.<\/strong> Build system tampering; signed malicious DLLs; SAML token abuse; selective C2 with very low noise.<\/p><p data-start=\"4493\" data-end=\"4645\"><strong data-start=\"4493\" data-end=\"4513\">Detection clues.<\/strong> Rare parent-child process chains on the platform\u2019s services; unusual Azure AD\/IdP token flows; beaconing with long sleep intervals.<\/p><p data-start=\"4647\" data-end=\"4689\"><strong data-start=\"4647\" data-end=\"4687\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"4690\" data-end=\"4933\"><li data-start=\"4690\" data-end=\"4768\"><p data-start=\"4692\" data-end=\"4768\"><strong data-start=\"4692\" data-end=\"4711\">Build integrity<\/strong> (isolated signers, reproducible builds, attestations).<\/p><\/li><li data-start=\"4769\" data-end=\"4837\"><p data-start=\"4771\" data-end=\"4837\"><strong data-start=\"4771\" data-end=\"4779\">SBOM<\/strong> distribution; <strong data-start=\"4794\" data-end=\"4814\">update telemetry<\/strong> and anomaly scoring.<\/p><\/li><li data-start=\"4838\" data-end=\"4933\"><p data-start=\"4840\" data-end=\"4933\"><strong data-start=\"4840\" data-end=\"4854\">Zero Trust<\/strong> on east-west traffic and identity; continuous verification of IdP assumptions.<\/p><\/li><\/ul><hr data-start=\"4935\" data-end=\"4938\" \/><h2 data-start=\"4940\" data-end=\"4992\">5) Yahoo (2013\u20132014) \u2014 the largest account breach<\/h2><p data-start=\"4993\" data-end=\"5153\"><strong data-start=\"4993\" data-end=\"5011\">What happened.<\/strong> Attackers harvested account data at unprecedented scale by chaining app weaknesses, credential weaknesses, and token\/session handling issues.<\/p><p data-start=\"5155\" data-end=\"5291\"><strong data-start=\"5155\" data-end=\"5175\">Why it mattered.<\/strong> It reset expectations about the <strong data-start=\"5208\" data-end=\"5231\">scope and longevity<\/strong> of PII breaches and their <strong data-start=\"5258\" data-end=\"5278\">valuation impact<\/strong> years later.<\/p><p data-start=\"5293\" data-end=\"5411\"><strong data-start=\"5293\" data-end=\"5310\">TTPs to know.<\/strong> Session fixation\/forgery patterns; weak hashing for legacy datasets; credential stuffing follow-ons.<\/p><p data-start=\"5413\" data-end=\"5552\"><strong data-start=\"5413\" data-end=\"5433\">Detection clues.<\/strong> Anomalous authentication patterns from shared ASNs; token reuse outside expected lifetimes; high-volume profile reads.<\/p><p data-start=\"5554\" data-end=\"5596\"><strong data-start=\"5554\" data-end=\"5594\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"5597\" data-end=\"5778\"><li data-start=\"5597\" data-end=\"5664\"><p data-start=\"5599\" data-end=\"5664\"><strong data-start=\"5599\" data-end=\"5616\">Argon2\/bcrypt<\/strong> with strong parameters; rotate legacy hashes.<\/p><\/li><li data-start=\"5665\" data-end=\"5721\"><p data-start=\"5667\" data-end=\"5721\"><strong data-start=\"5667\" data-end=\"5696\">Risk-based authentication<\/strong> and anomaly detection.<\/p><\/li><li data-start=\"5722\" data-end=\"5778\"><p data-start=\"5724\" data-end=\"5778\">Session lifecycle hygiene and key rotation by default.<\/p><\/li><\/ul><hr data-start=\"5780\" data-end=\"5783\" \/><h2 data-start=\"5785\" data-end=\"5843\">6) Equifax (2017) \u2014 known vulnerability, massive impact<\/h2><p data-start=\"5844\" data-end=\"6012\"><strong data-start=\"5844\" data-end=\"5862\">What happened.<\/strong> An internet-facing application with a <strong data-start=\"5901\" data-end=\"5933\">known critical vulnerability<\/strong> remained unpatched; attackers exfiltrated sensitive PII through the app layer.<\/p><p data-start=\"6014\" data-end=\"6149\"><strong data-start=\"6014\" data-end=\"6034\">Why it mattered.<\/strong> It showcased how <strong data-start=\"6052\" data-end=\"6076\">asset discovery gaps<\/strong> and weak patch governance can eclipse any number of downstream controls.<\/p><p data-start=\"6151\" data-end=\"6224\"><strong data-start=\"6151\" data-end=\"6168\">TTPs to know.<\/strong> Web RCE, web shells, data staging and exfil over HTTPS.<\/p><p data-start=\"6226\" data-end=\"6358\"><strong data-start=\"6226\" data-end=\"6246\">Detection clues.<\/strong> Odd user-agent strings; long-lived HTTPS sessions to little-known hosts; spikes in DB reads off business hours.<\/p><p data-start=\"6360\" data-end=\"6402\"><strong data-start=\"6360\" data-end=\"6400\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"6403\" data-end=\"6603\"><li data-start=\"6403\" data-end=\"6488\"><p data-start=\"6405\" data-end=\"6488\">Continuous <strong data-start=\"6416\" data-end=\"6435\">asset inventory<\/strong>; <strong data-start=\"6437\" data-end=\"6460\">SLA-driven patching<\/strong> by CVSS + exploitability.<\/p><\/li><li data-start=\"6489\" data-end=\"6546\"><p data-start=\"6491\" data-end=\"6546\">Runtime protection (<strong data-start=\"6511\" data-end=\"6523\">WAF\/RASP<\/strong>) tuned to the stack.<\/p><\/li><li data-start=\"6547\" data-end=\"6603\"><p data-start=\"6549\" data-end=\"6603\">Tabletop exercises focused on <strong data-start=\"6579\" data-end=\"6602\">PII breach response<\/strong>.<\/p><\/li><\/ul><hr data-start=\"6605\" data-end=\"6608\" \/><h2 data-start=\"6610\" data-end=\"6669\">7) Sony Pictures (2014) \u2014 leaks and destructive sabotage<\/h2><p data-start=\"6670\" data-end=\"6870\"><strong data-start=\"6670\" data-end=\"6688\">What happened.<\/strong> Social engineering and footholds led to domain-wide expansion, <strong data-start=\"6752\" data-end=\"6766\">data theft<\/strong>, and <strong data-start=\"6772\" data-end=\"6794\">destructive wiping<\/strong> of many endpoints\/servers, plus staged leaks to maximize reputational harm.<\/p><p data-start=\"6872\" data-end=\"7031\"><strong data-start=\"6872\" data-end=\"6892\">Why it mattered.<\/strong> It mixed <strong data-start=\"6902\" data-end=\"6917\">destruction<\/strong> with <strong data-start=\"6923\" data-end=\"6949\">information operations<\/strong>, forcing organizations to plan for <strong data-start=\"6985\" data-end=\"7011\">technical + PR + legal<\/strong> crises in parallel.<\/p><p data-start=\"7033\" data-end=\"7129\"><strong data-start=\"7033\" data-end=\"7050\">TTPs to know.<\/strong> Phishing, credential reuse, domain escalation, data staging, wiper deployment.<\/p><p data-start=\"7131\" data-end=\"7287\"><strong data-start=\"7131\" data-end=\"7151\">Detection clues.<\/strong> Sudden large SMB copies; archival utilities running on non-backup hosts; mass creation of scheduled tasks; spikes in endpoint reimages.<\/p><p data-start=\"7289\" data-end=\"7331\"><strong data-start=\"7289\" data-end=\"7329\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"7332\" data-end=\"7507\"><li data-start=\"7332\" data-end=\"7392\"><p data-start=\"7334\" data-end=\"7392\"><strong data-start=\"7334\" data-end=\"7350\">Tiered admin<\/strong> and PAWs; DLP with meaningful policies.<\/p><\/li><li data-start=\"7393\" data-end=\"7443\"><p data-start=\"7395\" data-end=\"7443\">Data segmentation and <strong data-start=\"7417\" data-end=\"7433\">need-to-know<\/strong> access.<\/p><\/li><li data-start=\"7444\" data-end=\"7507\"><p data-start=\"7446\" data-end=\"7507\">A <strong data-start=\"7448\" data-end=\"7478\">communications crisis plan<\/strong> rehearsed with legal and PR.<\/p><\/li><\/ul><hr data-start=\"7509\" data-end=\"7512\" \/><h2 data-start=\"7514\" data-end=\"7555\">8) Estonia (2007) \u2014 country-scale DDoS<\/h2><p data-start=\"7556\" data-end=\"7709\"><strong data-start=\"7556\" data-end=\"7574\">What happened.<\/strong> A wave of coordinated <strong data-start=\"7597\" data-end=\"7605\">DDoS<\/strong> knocked out government portals, banks, and media sites, overwhelming upstream capacity and local infra.<\/p><p data-start=\"7711\" data-end=\"7842\"><strong data-start=\"7711\" data-end=\"7731\">Why it mattered.<\/strong> It was an early lesson in <strong data-start=\"7758\" data-end=\"7789\">national digital resilience<\/strong> and the need for pre-arranged <strong data-start=\"7820\" data-end=\"7841\">DDoS partnerships<\/strong>.<\/p><p data-start=\"7844\" data-end=\"7958\"><strong data-start=\"7844\" data-end=\"7861\">TTPs to know.<\/strong> Botnet-driven volumetric floods; application-layer requests at scale; reflector\/amplifier abuse.<\/p><p data-start=\"7960\" data-end=\"8079\"><strong data-start=\"7960\" data-end=\"7980\">Detection clues.<\/strong> Sudden surges from diverse global IPs; SYN floods; spikes in 502\/503s; upstream congestion alerts.<\/p><p data-start=\"8081\" data-end=\"8123\"><strong data-start=\"8081\" data-end=\"8121\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"8124\" data-end=\"8291\"><li data-start=\"8124\" data-end=\"8201\"><p data-start=\"8126\" data-end=\"8201\">Contracts with <strong data-start=\"8141\" data-end=\"8162\">scrubbing centers<\/strong>; <strong data-start=\"8164\" data-end=\"8175\">anycast<\/strong> and geo load-balancing.<\/p><\/li><li data-start=\"8202\" data-end=\"8291\"><p data-start=\"8204\" data-end=\"8291\">Rate-limiting and caching strategies; crisis comms channels outside the primary domain.<\/p><\/li><\/ul><hr data-start=\"8293\" data-end=\"8296\" \/><h2 data-start=\"8298\" data-end=\"8343\">9) Georgia (2008) \u2014 hybrid-warfare prelude<\/h2><p data-start=\"8344\" data-end=\"8467\"><strong data-start=\"8344\" data-end=\"8362\">What happened.<\/strong> DDoS and defacements aligned with kinetic operations to degrade information flows and public confidence.<\/p><p data-start=\"8469\" data-end=\"8640\"><strong data-start=\"8469\" data-end=\"8489\">Why it mattered.<\/strong> It established <strong data-start=\"8505\" data-end=\"8536\">cyber as a standard theatre<\/strong> in geopolitical crises, pressuring response coordination across civil, military, and private operators.<\/p><p data-start=\"8642\" data-end=\"8743\"><strong data-start=\"8642\" data-end=\"8659\">TTPs to know.<\/strong> Website defacement chains; DDoS; opportunistic compromises of media\/government CMS.<\/p><p data-start=\"8745\" data-end=\"8843\"><strong data-start=\"8745\" data-end=\"8765\">Detection clues.<\/strong> Admin logins from atypical geos; spikes in web POSTs; DNS tampering attempts.<\/p><p data-start=\"8845\" data-end=\"8887\"><strong data-start=\"8845\" data-end=\"8885\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"8888\" data-end=\"9045\"><li data-start=\"8888\" data-end=\"8971\"><p data-start=\"8890\" data-end=\"8971\"><strong data-start=\"8890\" data-end=\"8916\">Inter-agency exercises<\/strong>; pre-approved fallback sites and broadcast channels.<\/p><\/li><li data-start=\"8972\" data-end=\"9045\"><p data-start=\"8974\" data-end=\"9045\">Managed DNS with <strong data-start=\"8991\" data-end=\"9020\">locked registrar settings<\/strong>; WAF\/CDN failover plans.<\/p><\/li><\/ul><hr data-start=\"9047\" data-end=\"9050\" \/><h2 data-start=\"9052\" data-end=\"9118\">10) Cadena SER (2019) \u2014 local but consequential newsroom outage<\/h2><p data-start=\"9119\" data-end=\"9244\"><strong data-start=\"9119\" data-end=\"9137\">What happened.<\/strong> <strong data-start=\"9138\" data-end=\"9152\">Ransomware<\/strong> disrupted editorial systems, forcing manual workflows and impacting broadcasting schedules.<\/p><p data-start=\"9246\" data-end=\"9398\"><strong data-start=\"9246\" data-end=\"9266\">Why it mattered.<\/strong> A reminder that <strong data-start=\"9283\" data-end=\"9333\">media uptime is public-interest infrastructure<\/strong> and that newsroom IT often mixes legacy stacks with modern SaaS.<\/p><p data-start=\"9400\" data-end=\"9507\"><strong data-start=\"9400\" data-end=\"9417\">TTPs to know.<\/strong> Phishing footholds; lateral movement to file servers; rapid encryption of shared volumes.<\/p><p data-start=\"9509\" data-end=\"9619\"><strong data-start=\"9509\" data-end=\"9529\">Detection clues.<\/strong> Burst of file renames; spikes in CPU\/disk on NAS; EDR flags for mass encryption patterns.<\/p><p data-start=\"9621\" data-end=\"9663\"><strong data-start=\"9621\" data-end=\"9661\">What would have changed the outcome.<\/strong><\/p><ul data-start=\"9664\" data-end=\"9873\"><li data-start=\"9664\" data-end=\"9726\"><p data-start=\"9666\" data-end=\"9726\">Hardened <strong data-start=\"9675\" data-end=\"9697\">endpoint baselines<\/strong> and <strong data-start=\"9702\" data-end=\"9723\">privilege hygiene<\/strong>.<\/p><\/li><li data-start=\"9727\" data-end=\"9796\"><p data-start=\"9729\" data-end=\"9796\">Segregated <strong data-start=\"9740\" data-end=\"9762\">broadcast-critical<\/strong> segments with restrictive ACLs.<\/p><\/li><li data-start=\"9797\" data-end=\"9873\"><p data-start=\"9799\" data-end=\"9873\">Practiced <strong data-start=\"9809\" data-end=\"9830\">manual continuity<\/strong> and image-based rapid restore for studios.<\/p><\/li><\/ul><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1696f79 elementor-widget elementor-widget-text-editor\" data-id=\"1696f79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"117\" data-end=\"183\">How Major Attacks Spread: worms, exploits, and lateral movement<\/h2><p data-start=\"185\" data-end=\"306\">Large-scale impact rarely comes from a single phish. It\u2019s the <strong data-start=\"247\" data-end=\"269\">automation + reach<\/strong> that turns a foothold into a crisis.<\/p><ul data-start=\"308\" data-end=\"1055\"><li data-start=\"308\" data-end=\"479\"><p data-start=\"310\" data-end=\"479\"><strong data-start=\"310\" data-end=\"320\">Worms:<\/strong> automate discovery and exploitation (e.g., WannaCry\/NotPetya). Once inside, they scan, replicate, and trigger encryption or wiping with minimal human input.<\/p><\/li><li data-start=\"480\" data-end=\"686\"><p data-start=\"482\" data-end=\"686\"><strong data-start=\"482\" data-end=\"498\">Credentials:<\/strong> tools like <strong data-start=\"510\" data-end=\"522\">Mimikatz<\/strong> harvest credentials from memory (LSASS) and cached secrets. Without <strong data-start=\"591\" data-end=\"609\">LSA Protection<\/strong>, <strong data-start=\"611\" data-end=\"627\">tiered admin<\/strong>, and <strong data-start=\"633\" data-end=\"641\">LAPS<\/strong>, one endpoint can unlock the whole estate.<\/p><\/li><li data-start=\"687\" data-end=\"836\"><p data-start=\"689\" data-end=\"836\"><strong data-start=\"689\" data-end=\"710\">Network exploits:<\/strong> SMB\/RDP\/VPN bugs accelerate spread across flat networks. Old protocols (SMBv1) and weak segmentation are force multipliers.<\/p><\/li><li data-start=\"837\" data-end=\"1055\"><p data-start=\"839\" data-end=\"1055\"><strong data-start=\"839\" data-end=\"858\">ATT&amp;CK tactics:<\/strong> <strong data-start=\"859\" data-end=\"879\">Lateral Movement<\/strong> (Pass-the-Hash\/Ticket, PsExec, WMI), <strong data-start=\"917\" data-end=\"941\">Privilege Escalation<\/strong>, <strong data-start=\"943\" data-end=\"962\">Defense Evasion<\/strong> (tamper AV\/EDR), and stealthy <strong data-start=\"993\" data-end=\"1014\">Command &amp; Control<\/strong> (long sleep intervals, domain fronting).<\/p><\/li><\/ul><p data-start=\"1057\" data-end=\"1248\">From experience, the bottleneck isn\u2019t \u201cdetection exists?\u201d but <strong data-start=\"1119\" data-end=\"1137\">reaction speed<\/strong>. If your EDR shouts while the network still allows free east-west movement, the attacker wins on <strong data-start=\"1235\" data-end=\"1247\">velocity<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f18bab elementor-widget elementor-widget-html\" data-id=\"1f18bab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table class=\"tl-table\" aria-label=\"Common attacker techniques and recommended defenses\">\r\n  <caption>How they spread \u2014 and how to stop them<\/caption>\r\n  <thead>\r\n    <tr>\r\n      <th scope=\"col\">Technique<\/th>\r\n      <th scope=\"col\">How it works<\/th>\r\n      <th scope=\"col\">Signals<\/th>\r\n      <th scope=\"col\">Defense<\/th>\r\n    <\/tr>\r\n  <\/thead>\r\n  <tbody>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Phishing \/ Social engineering<\/th>\r\n      <td data-label=\"How it works\">Delivers payload or harvests creds via email\/SMS<\/td>\r\n      <td data-label=\"Signals\">Unusual clicks, obfuscated attachments<\/td>\r\n      <td data-label=\"Defense\">Training, sandboxing, DMARC\/DKIM\/SPF<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Supply-chain compromise<\/th>\r\n      <td data-label=\"How it works\">Trojanized updates or tampered dependencies<\/td>\r\n      <td data-label=\"Signals\">Odd traffic post-update, hash\/signature mismatches<\/td>\r\n      <td data-label=\"Defense\">Signed updates, SBOM, build-integrity attestations<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Exploiting remote services<\/th>\r\n      <td data-label=\"How it works\">SMB\/RDP\/VPN flaws; internet-exposed edge<\/td>\r\n      <td data-label=\"Signals\">Port 445\/3389 spikes; mass auth attempts<\/td>\r\n      <td data-label=\"Defense\">Patching, disable SMBv1, MFA, segmentation<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Credential dumping<\/th>\r\n      <td data-label=\"How it works\">Reads LSASS; extracts hashes\/tickets<\/td>\r\n      <td data-label=\"Signals\">LSASS access, known IOCs<\/td>\r\n      <td data-label=\"Defense\">LSA Protection, EDR\/XDR, LAPS, tiered admin<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Lateral movement<\/th>\r\n      <td data-label=\"How it works\">PsExec\/WMI; Pass-the-Hash\/Ticket<\/td>\r\n      <td data-label=\"Signals\">Admin remote tools on unusual hosts<\/td>\r\n      <td data-label=\"Defense\">Micro-segmentation, MFA, block unneeded protocols<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Persistence<\/th>\r\n      <td data-label=\"How it works\">Tasks\/services\/registry run at boot<\/td>\r\n      <td data-label=\"Signals\">New autoruns without change tickets<\/td>\r\n      <td data-label=\"Defense\">Change control, application allow-listing<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Exfiltration<\/th>\r\n      <td data-label=\"How it works\">HTTP(S) or DNS tunneling<\/td>\r\n      <td data-label=\"Signals\">Traffic to rare domains; volume anomalies<\/td>\r\n      <td data-label=\"Defense\">DLP, proxy inspection with governance<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Wiper \/ MBR overwrite<\/th>\r\n      <td data-label=\"How it works\">Irreversible data\/boot corruption<\/td>\r\n      <td data-label=\"Signals\">Fake \u201cdisk repair\u201d banner; mass reboots<\/td>\r\n      <td data-label=\"Defense\">Immutable backups; immediate isolation<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Stealthy C2<\/th>\r\n      <td data-label=\"How it works\">Long sleeps; blends with legit traffic<\/td>\r\n      <td data-label=\"Signals\">Periodic beacons; odd JA3\/UA fingerprints<\/td>\r\n      <td data-label=\"Defense\">Threat intel, reputation blocking, EDR<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Living off the Land<\/th>\r\n      <td data-label=\"How it works\">Native tools (PowerShell, WMI) abused<\/td>\r\n      <td data-label=\"Signals\">Signed scripts in unusual contexts<\/td>\r\n      <td data-label=\"Defense\">ConstrainedLanguage, logging, allow-listing<\/td>\r\n    <\/tr>\r\n  <\/tbody>\r\n<\/table>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f9b8ea elementor-widget elementor-widget-text-editor\" data-id=\"4f9b8ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"4902\" data-end=\"4970\">Supply-chain attacks: the M.E.Doc lesson and why SMEs are targets<\/h2><p data-start=\"4972\" data-end=\"5232\"><strong data-start=\"4972\" data-end=\"4996\">Uncomfortable truth:<\/strong> your security equals that of your <strong data-start=\"5031\" data-end=\"5051\">weakest supplier<\/strong>. In my case, watching a mandatory tax app turn into a beachhead was a wake-up call. SMEs often think \u201cWhy would anyone target us?\u201d The answer: <strong data-start=\"5195\" data-end=\"5216\">you\u2019re the bridge<\/strong> to larger prey.<\/p><p data-start=\"5234\" data-end=\"5295\">What to <strong data-start=\"5242\" data-end=\"5267\">demand from suppliers<\/strong> (and write into contracts):<\/p><ul data-start=\"5296\" data-end=\"5655\"><li data-start=\"5296\" data-end=\"5392\"><p data-start=\"5298\" data-end=\"5392\">Evidence of <strong data-start=\"5310\" data-end=\"5328\">build security<\/strong> (isolated signers, protected pipelines, reproducible builds).<\/p><\/li><li data-start=\"5393\" data-end=\"5469\"><p data-start=\"5395\" data-end=\"5469\"><strong data-start=\"5395\" data-end=\"5403\">SBOM<\/strong> and vulnerability advisories; <strong data-start=\"5434\" data-end=\"5451\">patching SLAs<\/strong> by criticality.<\/p><\/li><li data-start=\"5470\" data-end=\"5582\"><p data-start=\"5472\" data-end=\"5582\"><strong data-start=\"5472\" data-end=\"5488\">Audit rights<\/strong>, security questionnaires with proof, and a <strong data-start=\"5532\" data-end=\"5542\">Plan B<\/strong> if the update channel is compromised.<\/p><\/li><li data-start=\"5583\" data-end=\"5655\"><p data-start=\"5585\" data-end=\"5655\"><strong data-start=\"5585\" data-end=\"5615\">Incident notification SLAs<\/strong> with secure channels and contact trees.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ff6002 elementor-widget elementor-widget-text-editor\" data-id=\"3ff6002\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"8242\" data-end=\"8310\">Actionable lessons: what we wish we\u2019d had <strong data-start=\"8287\" data-end=\"8297\">before<\/strong> the disaster<\/h2><ol data-start=\"8312\" data-end=\"9129\"><li data-start=\"8312\" data-end=\"8391\"><p data-start=\"8315\" data-end=\"8391\"><strong data-start=\"8315\" data-end=\"8352\">Segmentation &amp; micro-segmentation<\/strong> (default-deny SMB between segments).<\/p><\/li><li data-start=\"8392\" data-end=\"8497\"><p data-start=\"8395\" data-end=\"8497\"><strong data-start=\"8395\" data-end=\"8417\">Identity security:<\/strong> <strong data-start=\"8418\" data-end=\"8425\">MFA<\/strong> everywhere, <strong data-start=\"8438\" data-end=\"8446\">LAPS<\/strong>, <strong data-start=\"8448\" data-end=\"8464\">tiered admin<\/strong>, <strong data-start=\"8466\" data-end=\"8474\">PAWs<\/strong> for privileged work.<\/p><\/li><li data-start=\"8498\" data-end=\"8587\"><p data-start=\"8501\" data-end=\"8587\"><strong data-start=\"8501\" data-end=\"8525\">Accelerated patching<\/strong> for internet-exposed services and lateral-movement vectors.<\/p><\/li><li data-start=\"8588\" data-end=\"8664\"><p data-start=\"8591\" data-end=\"8664\"><strong data-start=\"8591\" data-end=\"8612\">Immutable backups<\/strong> + quarterly <strong data-start=\"8625\" data-end=\"8643\">restore drills<\/strong> with real RTO\/RPO.<\/p><\/li><li data-start=\"8665\" data-end=\"8740\"><p data-start=\"8668\" data-end=\"8740\"><strong data-start=\"8668\" data-end=\"8679\">EDR\/XDR<\/strong> tuned for <strong data-start=\"8690\" data-end=\"8712\">credential dumping<\/strong> and <strong data-start=\"8717\" data-end=\"8737\">lateral movement<\/strong>.<\/p><\/li><li data-start=\"8741\" data-end=\"8820\"><p data-start=\"8744\" data-end=\"8820\"><strong data-start=\"8744\" data-end=\"8773\">Application allow-listing<\/strong> on critical servers and sensitive endpoints.<\/p><\/li><li data-start=\"8821\" data-end=\"8896\"><p data-start=\"8824\" data-end=\"8896\">Centralized <strong data-start=\"8836\" data-end=\"8849\">telemetry<\/strong> (SIEM) and <strong data-start=\"8861\" data-end=\"8883\">response playbooks<\/strong> rehearsed.<\/p><\/li><li data-start=\"8897\" data-end=\"8976\"><p data-start=\"8900\" data-end=\"8976\"><strong data-start=\"8900\" data-end=\"8913\">SecDevOps<\/strong> and supply-chain hardening (signatures, SBOM, attestations).<\/p><\/li><li data-start=\"8977\" data-end=\"9051\"><p data-start=\"8980\" data-end=\"9051\"><strong data-start=\"8980\" data-end=\"8994\">Zero Trust<\/strong>: verify explicitly; assume breach; limit blast radius.<\/p><\/li><li data-start=\"9052\" data-end=\"9129\"><p data-start=\"9056\" data-end=\"9129\"><strong data-start=\"9056\" data-end=\"9078\">Culture &amp; training<\/strong>: tabletop exercises, clear roles, decision rights.<\/p><\/li><\/ol><p data-start=\"9131\" data-end=\"9236\">From experience: <strong data-start=\"9148\" data-end=\"9162\">segmenting<\/strong> and <strong data-start=\"9167\" data-end=\"9190\">practicing restores<\/strong> isn\u2019t glamorous, but it <strong data-start=\"9215\" data-end=\"9235\">saves businesses<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68fee7b elementor-widget elementor-widget-text-editor\" data-id=\"68fee7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Tables of interest<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba2965d elementor-widget elementor-widget-html\" data-id=\"ba2965d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table class=\"tl-table tl-compact\" aria-label=\"Cyberattack timeline\">\r\n  <caption>Timeline (2007\u20132025): evolution of major cyberattacks<\/caption>\r\n  <thead>\r\n    <tr>\r\n      <th scope=\"col\">Year<\/th>\r\n      <th scope=\"col\">Case<\/th>\r\n      <th scope=\"col\">Category<\/th>\r\n      <th scope=\"col\">Impact<\/th>\r\n    <\/tr>\r\n  <\/thead>\r\n  <tbody>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2007<\/th>\r\n      <td data-label=\"Case\">Estonia<\/td>\r\n      <td data-label=\"Category\">DDoS<\/td>\r\n      <td data-label=\"Impact\">Disruption of government\/financial services<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2008<\/th>\r\n      <td data-label=\"Case\">Georgia<\/td>\r\n      <td data-label=\"Category\">Hybrid warfare<\/td>\r\n      <td data-label=\"Impact\">DDoS\/defacement during hostilities<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2010<\/th>\r\n      <td data-label=\"Case\">Stuxnet<\/td>\r\n      <td data-label=\"Category\">ICS\/OT<\/td>\r\n      <td data-label=\"Impact\">Physical damage to industrial equipment<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2013\u20132014<\/th>\r\n      <td data-label=\"Case\">Yahoo<\/td>\r\n      <td data-label=\"Category\">Data breach<\/td>\r\n      <td data-label=\"Impact\">User accounts compromised at massive scale<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2014<\/th>\r\n      <td data-label=\"Case\">Sony Pictures<\/td>\r\n      <td data-label=\"Category\">Wiper + leaks<\/td>\r\n      <td data-label=\"Impact\">Large-scale leaks and device wiping<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2015\u20132016<\/th>\r\n      <td data-label=\"Case\">Ukraine power outages<\/td>\r\n      <td data-label=\"Category\">Critical infrastructure<\/td>\r\n      <td data-label=\"Impact\">Interruptions to electricity supply<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2017<\/th>\r\n      <td data-label=\"Case\">WannaCry<\/td>\r\n      <td data-label=\"Category\">Ransomware<\/td>\r\n      <td data-label=\"Impact\">Worldwide spread via SMBv1<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2017<\/th>\r\n      <td data-label=\"Case\">NotPetya<\/td>\r\n      <td data-label=\"Category\">Wiper<\/td>\r\n      <td data-label=\"Impact\">Global shutdowns and domino effects<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2020<\/th>\r\n      <td data-label=\"Case\">SolarWinds<\/td>\r\n      <td data-label=\"Category\">Supply chain<\/td>\r\n      <td data-label=\"Impact\">Persistent access across many organizations<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Year\">2021\u20132025<\/th>\r\n      <td data-label=\"Case\">Trends<\/td>\r\n      <td data-label=\"Category\">Cartelized ransomware<\/td>\r\n      <td data-label=\"Impact\">Double extortion; attacks on SaaS\/IT providers<\/td>\r\n    <\/tr>\r\n  <\/tbody>\r\n<\/table>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6c55a2 elementor-widget elementor-widget-html\" data-id=\"c6c55a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table class=\"tl-table\" aria-label=\"Ranking of the biggest cyberattacks\">\r\n  <caption>Top 10 biggest cyberattacks (with vector and key lesson)<\/caption>\r\n  <thead>\r\n    <tr>\r\n      <th scope=\"col\" class=\"tl-col-pos\">Rank<\/th>\r\n      <th scope=\"col\">Case (year)<\/th>\r\n      <th scope=\"col\">Vector<\/th>\r\n      <th scope=\"col\">Reach<\/th>\r\n      <th scope=\"col\">Type<\/th>\r\n      <th scope=\"col\">Lesson<\/th>\r\n    <\/tr>\r\n  <\/thead>\r\n  <tbody>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">1<\/th>\r\n      <td data-label=\"Case (year)\">NotPetya (2017)<\/td>\r\n      <td data-label=\"Vector\">Supply chain (M.E.Doc)<\/td>\r\n      <td data-label=\"Reach\">Global, multi-sector<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Wiper<\/span><\/td>\r\n      <td data-label=\"Lesson\">Segmentation + immutable backups<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">2<\/th>\r\n      <td data-label=\"Case (year)\">WannaCry (2017)<\/td>\r\n      <td data-label=\"Vector\">SMBv1 exploit (EternalBlue)<\/td>\r\n      <td data-label=\"Reach\">Global<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Ransomware<\/span><\/td>\r\n      <td data-label=\"Lesson\">Accelerate critical patching<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">3<\/th>\r\n      <td data-label=\"Case (year)\">Stuxnet (2010)<\/td>\r\n      <td data-label=\"Vector\">0-days \/ USB \/ ICS<\/td>\r\n      <td data-label=\"Reach\">OT\/SCADA<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Industrial sabotage<\/span><\/td>\r\n      <td data-label=\"Lesson\">Segregate IT\/OT; monitor engineering<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">4<\/th>\r\n      <td data-label=\"Case (year)\">SolarWinds (2020)<\/td>\r\n      <td data-label=\"Vector\">Compromised update<\/td>\r\n      <td data-label=\"Reach\">Many orgs, public\/private<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Espionage<\/span><\/td>\r\n      <td data-label=\"Lesson\">Signatures, SBOM, build integrity<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">5<\/th>\r\n      <td data-label=\"Case (year)\">Yahoo (2013\u20132014)<\/td>\r\n      <td data-label=\"Vector\">Credentials\/API<\/td>\r\n      <td data-label=\"Reach\">Billions of accounts<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Data breach<\/span><\/td>\r\n      <td data-label=\"Lesson\">Strong hashing & anomaly detection<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">6<\/th>\r\n      <td data-label=\"Case (year)\">Equifax (2017)<\/td>\r\n      <td data-label=\"Vector\">Unpatched web vuln (Struts)<\/td>\r\n      <td data-label=\"Reach\">Consumer PII<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Data breach<\/span><\/td>\r\n      <td data-label=\"Lesson\">Vuln mgmt & tuned WAF<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">7<\/th>\r\n      <td data-label=\"Case (year)\">Sony Pictures (2014)<\/td>\r\n      <td data-label=\"Vector\">Phishing \/ destructive actions<\/td>\r\n      <td data-label=\"Reach\">Media & entertainment<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Wiper + leaks<\/span><\/td>\r\n      <td data-label=\"Lesson\">DLP, segregation, crisis comms<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">8<\/th>\r\n      <td data-label=\"Case (year)\">Estonia (2007)<\/td>\r\n      <td data-label=\"Vector\">Coordinated DDoS<\/td>\r\n      <td data-label=\"Reach\">Country services<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">DDoS<\/span><\/td>\r\n      <td data-label=\"Lesson\">Scrubbing, anycast, redundancy<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">9<\/th>\r\n      <td data-label=\"Case (year)\">Georgia (2008)<\/td>\r\n      <td data-label=\"Vector\">DDoS \/ defacement<\/td>\r\n      <td data-label=\"Reach\">Government & media<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Hybrid warfare<\/span><\/td>\r\n      <td data-label=\"Lesson\">Inter-agency crisis readiness<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Rank\">10<\/th>\r\n      <td data-label=\"Case (year)\">Cadena SER (2019)<\/td>\r\n      <td data-label=\"Vector\">Ransomware<\/td>\r\n      <td data-label=\"Reach\">Spanish media<\/td>\r\n      <td data-label=\"Type\"><span class=\"tl-badge\">Ransomware<\/span><\/td>\r\n      <td data-label=\"Lesson\">Business continuity for newsrooms<\/td>\r\n    <\/tr>\r\n  <\/tbody>\r\n<\/table>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d08f5f5 elementor-widget elementor-widget-html\" data-id=\"d08f5f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table class=\"tl-table\" aria-label=\"Common attacker techniques and recommended defenses\">\r\n  <caption>How they spread \u2014 and how to stop them<\/caption>\r\n  <thead>\r\n    <tr>\r\n      <th scope=\"col\">Technique<\/th>\r\n      <th scope=\"col\">How it works<\/th>\r\n      <th scope=\"col\">Signals<\/th>\r\n      <th scope=\"col\">Defense<\/th>\r\n    <\/tr>\r\n  <\/thead>\r\n  <tbody>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Phishing \/ Social engineering<\/th>\r\n      <td data-label=\"How it works\">Delivers payload or harvests creds via email\/SMS<\/td>\r\n      <td data-label=\"Signals\">Unusual clicks, obfuscated attachments<\/td>\r\n      <td data-label=\"Defense\">Training, sandboxing, DMARC\/DKIM\/SPF<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Supply-chain compromise<\/th>\r\n      <td data-label=\"How it works\">Trojanized updates or tampered dependencies<\/td>\r\n      <td data-label=\"Signals\">Odd traffic post-update, hash\/signature mismatches<\/td>\r\n      <td data-label=\"Defense\">Signed updates, SBOM, build-integrity attestations<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Exploiting remote services<\/th>\r\n      <td data-label=\"How it works\">SMB\/RDP\/VPN flaws; internet-exposed edge<\/td>\r\n      <td data-label=\"Signals\">Port 445\/3389 spikes; mass auth attempts<\/td>\r\n      <td data-label=\"Defense\">Patching, disable SMBv1, MFA, segmentation<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Credential dumping<\/th>\r\n      <td data-label=\"How it works\">Reads LSASS; extracts hashes\/tickets<\/td>\r\n      <td data-label=\"Signals\">LSASS access, known IOCs<\/td>\r\n      <td data-label=\"Defense\">LSA Protection, EDR\/XDR, LAPS, tiered admin<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Lateral movement<\/th>\r\n      <td data-label=\"How it works\">PsExec\/WMI; Pass-the-Hash\/Ticket<\/td>\r\n      <td data-label=\"Signals\">Admin remote tools on unusual hosts<\/td>\r\n      <td data-label=\"Defense\">Micro-segmentation, MFA, block unneeded protocols<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Persistence<\/th>\r\n      <td data-label=\"How it works\">Tasks\/services\/registry run at boot<\/td>\r\n      <td data-label=\"Signals\">New autoruns without change tickets<\/td>\r\n      <td data-label=\"Defense\">Change control, application allow-listing<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Exfiltration<\/th>\r\n      <td data-label=\"How it works\">HTTP(S) or DNS tunneling<\/td>\r\n      <td data-label=\"Signals\">Traffic to rare domains; volume anomalies<\/td>\r\n      <td data-label=\"Defense\">DLP, proxy inspection with governance<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Wiper \/ MBR overwrite<\/th>\r\n      <td data-label=\"How it works\">Irreversible data\/boot corruption<\/td>\r\n      <td data-label=\"Signals\">Fake \u201cdisk repair\u201d banner; mass reboots<\/td>\r\n      <td data-label=\"Defense\">Immutable backups; immediate isolation<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Stealthy C2<\/th>\r\n      <td data-label=\"How it works\">Long sleeps; blends with legit traffic<\/td>\r\n      <td data-label=\"Signals\">Periodic beacons; odd JA3\/UA fingerprints<\/td>\r\n      <td data-label=\"Defense\">Threat intel, reputation blocking, EDR<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Technique\">Living off the Land<\/th>\r\n      <td data-label=\"How it works\">Native tools (PowerShell, WMI) abused<\/td>\r\n      <td data-label=\"Signals\">Signed scripts in unusual contexts<\/td>\r\n      <td data-label=\"Defense\">ConstrainedLanguage, logging, allow-listing<\/td>\r\n    <\/tr>\r\n  <\/tbody>\r\n<\/table>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e1a921 elementor-widget elementor-widget-html\" data-id=\"1e1a921\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table class=\"tl-table\" aria-label=\"Security checklist for critical suppliers\">\r\n  <caption>Supplier security checklist (software supply chain)<\/caption>\r\n  <thead>\r\n    <tr>\r\n      <th scope=\"col\">Control<\/th>\r\n      <th scope=\"col\">What to require<\/th>\r\n      <th scope=\"col\">Evidence<\/th>\r\n      <th scope=\"col\">Frequency<\/th>\r\n    <\/tr>\r\n  <\/thead>\r\n  <tbody>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">Build integrity<\/th>\r\n      <td data-label=\"What to require\">Signed releases; isolated build\/signing<\/td>\r\n      <td data-label=\"Evidence\">Hash + build report\/attestation<\/td>\r\n      <td data-label=\"Frequency\">Per release<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">SBOM<\/th>\r\n      <td data-label=\"What to require\">Component list & versions<\/td>\r\n      <td data-label=\"Evidence\">SPDX\/CycloneDX SBOM<\/td>\r\n      <td data-label=\"Frequency\">Quarterly<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">Vulnerability management<\/th>\r\n      <td data-label=\"What to require\">SLAs by criticality; EMER fixes<\/td>\r\n      <td data-label=\"Evidence\">Patch compliance report<\/td>\r\n      <td data-label=\"Frequency\">Monthly<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">Access & privileges<\/th>\r\n      <td data-label=\"What to require\">Least privilege; SSO\/MFA<\/td>\r\n      <td data-label=\"Evidence\">Access matrix & reviews<\/td>\r\n      <td data-label=\"Frequency\">Semiannual<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">Logging & telemetry<\/th>\r\n      <td data-label=\"What to require\">Update\/build logs; secure retention<\/td>\r\n      <td data-label=\"Evidence\">Signed logs; retention policy<\/td>\r\n      <td data-label=\"Frequency\">Continuous<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">Incident notification<\/th>\r\n      <td data-label=\"What to require\">Time-bound alerts; secure channel<\/td>\r\n      <td data-label=\"Evidence\">Contractual clause + runbook<\/td>\r\n      <td data-label=\"Frequency\">On incident<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">Pentest \/ audit<\/th>\r\n      <td data-label=\"What to require\">Internal & external testing<\/td>\r\n      <td data-label=\"Evidence\">Report + remediation proof<\/td>\r\n      <td data-label=\"Frequency\">Annual<\/td>\r\n    <\/tr>\r\n    <tr>\r\n      <th scope=\"row\" data-label=\"Control\">Dependency hygiene<\/th>\r\n      <td data-label=\"What to require\">SCA; CVE alerting<\/td>\r\n      <td data-label=\"Evidence\">SCA report<\/td>\r\n      <td data-label=\"Frequency\">Per build<\/td>\r\n    <\/tr>\r\n  <\/tbody>\r\n<\/table>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a66c3d2 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"a66c3d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fec2f78 elementor-widget elementor-widget-html\" data-id=\"fec2f78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- ========== FAQS (Responsive + SEO + Schema) ========== -->\r\n<style>\r\n:root{\r\n  --tl-brand:#2e4b9b;   \/* Trustlab azul *\/\r\n  --tl-accent:#62c3d4;  \/* Trustlab turquesa *\/\r\n  --tl-text:#111827;\r\n  --tl-muted:#6b7280;\r\n  --tl-bg:#ffffff;\r\n  --tl-border:#e5e7eb;\r\n}\r\n@media (prefers-color-scheme:dark){\r\n  :root{ --tl-bg:#0b1020; --tl-text:#eef2ff; --tl-muted:#a5b4fc; --tl-border:#1f2a44; }\r\n}\r\n.faq-wrap{max-width:880px;margin:1.5rem auto;padding:0 1rem;background:transparent}\r\n.faq-title{\r\n  font-size:1.6rem;line-height:1.2;font-weight:800;margin:0 0 1rem;\r\n  color:var(--tl-brand);\r\n}\r\n.tl-faq{\r\n  border:1px solid var(--tl-border); border-radius:12px; background:var(--tl-bg);\r\n  margin:.75rem 0; overflow:hidden;\r\n}\r\n.tl-faq summary{\r\n  list-style:none; cursor:pointer; padding:1rem 1.1rem; position:relative;\r\n  font-weight:700; color:var(--tl-text); outline:none;\r\n  background:linear-gradient(90deg, rgba(46,75,155,.08), rgba(98,195,212,.08));\r\n}\r\n.tl-faq summary::-webkit-details-marker{display:none}\r\n.tl-faq[open] summary{ border-bottom:1px solid var(--tl-border) }\r\n.tl-faq .ans{ padding:1rem 1.1rem; color:var(--tl-text) }\r\n.tl-faq .ans p{ margin:.4rem 0 }\r\n.tl-faq .tag{\r\n  display:inline-block; font-size:.78rem; color:#0b7180; background:rgba(98,195,212,.18);\r\n  border:1px solid rgba(98,195,212,.35); border-radius:.375rem; padding:.15rem .4rem; margin-left:.5rem;\r\n}\r\n@media (max-width:640px){\r\n  .faq-title{font-size:1.35rem}\r\n  .tl-faq summary,.tl-faq .ans{padding:.9rem}\r\n}\r\n<\/style>\r\n\r\n<section class=\"faq-wrap\" aria-label=\"Frequently Asked Questions\">\r\n  <h2 class=\"faq-title\">FAQs: Biggest Cyberattacks in History<\/h2>\r\n\r\n  <!-- FAQ 1 -->\r\n  <details class=\"tl-faq\">\r\n    <summary>Which was the most expensive cyberattack in history?<\/summary>\r\n    <div class=\"ans\">\r\n      <p>It depends on methodology (direct vs. indirect costs). <strong>NotPetya<\/strong> and <strong>WannaCry<\/strong> lead for systemic operational damage; <strong>Yahoo<\/strong> and <strong>Equifax<\/strong> stand out for the scale of data exposed and long-tail penalties.<\/p>\r\n    <\/div>\r\n  <\/details>\r\n\r\n  <!-- FAQ 2 -->\r\n  <details class=\"tl-faq\">\r\n    <summary>What\u2019s the difference between ransomware and a wiper?<\/summary>\r\n    <div class=\"ans\">\r\n      <p><strong>Ransomware<\/strong> claims decryption after payment (not always true). A <strong>wiper<\/strong> is built to irreversibly destroy data or boot records, so there is <em>no working key<\/em> (e.g., NotPetya).<\/p>\r\n    <\/div>\r\n  <\/details>\r\n\r\n  <!-- FAQ 3 -->\r\n  <details class=\"tl-faq\">\r\n    <summary>What is a software supply-chain attack? <span class=\"tag\">Examples<\/span><\/summary>\r\n    <div class=\"ans\">\r\n      <p>Adversaries compromise a vendor\u2019s software or services to reach all its customers. Examples include <strong>M.E.Doc\/NotPetya<\/strong> (trojanized updates) and <strong>SolarWinds<\/strong> (tampered build pipeline).<\/p>\r\n    <\/div>\r\n  <\/details>\r\n\r\n  <!-- FAQ 4 -->\r\n  <details class=\"tl-faq\">\r\n    <summary>How can you \u201cvaccinate\u201d during a NotPetya-style outbreak?<\/summary>\r\n    <div class=\"ans\">\r\n      <p>Every case is different, but the playbook is: <strong>isolate segments<\/strong>, block <strong>SMB\/RDP<\/strong>, deploy known IOCs, and\u2014if a documented <strong>kill switch<\/strong> exists (e.g., read-only <code>perfc<\/code> for NotPetya)\u2014apply it carefully. Priority one remains <strong>recovery readiness<\/strong> and <strong>forensics<\/strong>.<\/p>\r\n    <\/div>\r\n  <\/details>\r\n<\/section>\r\n\r\n<!-- Schema.org \u2014 FAQPage JSON-LD (SEO) -->\r\n<script type=\"application\/ld+json\">\r\n{\r\n  \"@context\":\"https:\/\/schema.org\",\r\n  \"@type\":\"FAQPage\",\r\n  \"mainEntity\":[\r\n    {\r\n      \"@type\":\"Question\",\r\n      \"name\":\"Which was the most expensive cyberattack in history?\",\r\n      \"acceptedAnswer\":{\r\n        \"@type\":\"Answer\",\r\n        \"text\":\"It depends on methodology (direct vs. indirect costs). NotPetya and WannaCry lead for systemic operational damage; Yahoo and Equifax stand out for the scale of data exposed and long-tail penalties.\"\r\n      }\r\n    },\r\n    {\r\n      \"@type\":\"Question\",\r\n      \"name\":\"What\u2019s the difference between ransomware and a wiper?\",\r\n      \"acceptedAnswer\":{\r\n        \"@type\":\"Answer\",\r\n        \"text\":\"Ransomware claims decryption after payment. A wiper is built to irreversibly destroy data or boot records, so there is no working key (e.g., NotPetya).\"\r\n      }\r\n    },\r\n    {\r\n      \"@type\":\"Question\",\r\n      \"name\":\"What is a software supply-chain attack?\",\r\n      \"acceptedAnswer\":{\r\n        \"@type\":\"Answer\",\r\n        \"text\":\"It\u2019s when adversaries compromise a vendor\u2019s software or services to reach all of its customers. Examples include M.E.Doc\/NotPetya (trojanized updates) and SolarWinds (tampered build pipeline).\"\r\n      }\r\n    },\r\n    {\r\n      \"@type\":\"Question\",\r\n      \"name\":\"How can you \u201cvaccinate\u201d during a NotPetya-style outbreak?\",\r\n      \"acceptedAnswer\":{\r\n        \"@type\":\"Answer\",\r\n        \"text\":\"Isolate segments, block SMB\/RDP, deploy known IOCs, and\u2014if a known kill switch exists, such as a read-only perfc file for NotPetya\u2014apply it with care. Recovery readiness and forensics remain top priority.\"\r\n      }\r\n    }\r\n  ]\r\n}\r\n<\/script>\r\n<!-- ========== \/FAQS ========== -->\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-521b58d e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"521b58d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05ba7b9 elementor-widget elementor-widget-text-editor\" data-id=\"05ba7b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"5806\" data-end=\"5819\">Conclusion<\/h2><p data-start=\"5821\" data-end=\"6151\">The \u201cbiggest cyberattacks\u201d aren\u2019t just headlines\u2014they\u2019re <strong data-start=\"5878\" data-end=\"5899\">operating manuals<\/strong>. The common thread is simple: <strong data-start=\"5930\" data-end=\"6015\">supply-chain exposure + lateral movement + slow patching + weak recovery practice<\/strong>. If you only start with two things today, make them <strong data-start=\"6068\" data-end=\"6084\">segmentation<\/strong> and <strong data-start=\"6089\" data-end=\"6107\">restore drills<\/strong>. Everything else builds on that foundation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ranking Methodology: criteria (cost, reach, criticality, persistence) To rank the \u201cbiggest cyberattacks in history,\u201d I applied four criteria that, combined, give a truer picture than a single damage figure: Ranking methodology for the biggest cyberattacks Criterion Definition Indicators Weight Cost Direct and indirect impact \u20ac lost, fines, litigation 35% Reach Countries\/sectors affected # organizations, countries [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-3287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/comments?post=3287"}],"version-history":[{"count":3,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3287\/revisions"}],"predecessor-version":[{"id":3292,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3287\/revisions\/3292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media\/3286"}],"wp:attachment":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media?parent=3287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/categories?post=3287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/tags?post=3287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}