The Most Important Hacker Attacks in History

From the virus that was accidentally launched, to the malware that hit the PlayStation Network: Here are some of the most sensational hacker attacks ever detected.

WannaCry, the ransomware attack that several weeks ago has infected worldwide more than 300,000 computers, has highlighted how fragile computer security, constantly threatened by numerous viruses and malware, increasingly sophisticated and difficult to Block.

Hacker attacks have always been there since the advent of the Internet. But in recent years, also because of the use in any field of connected devices, have grown exponentially. And then there’s also another data to consider behind this incredible proliferation: the reasons. There are, in fact, a number of economic and especially political reasons underlying the majority of hacker attacks. Today, they support many experts, governments are fighting with shots not of firearms, but of cyber-violations. Having done this brief premise, let’s now try to rebuild the most sensational hacker attacks in history.

Morris Worm

One of the oldest hacker attacks, and the first to stir up clamor, was the Morris Worm, which took the name of its creator, Robert Tapas Morris, a student at Cornell University. The boy had developed the worm not to unleash a malicious computer violation, but to measure the vastness of the cyberspace. But when the virus was placed on the network, the Morris code, after having encountered an error, turned into a malware capable of infecting more than 6000 computers and causing damage that, according to some estimates, reached 100 million dollars. A dizzying figure for the time.

Google China

In 2009, the hackers targeted Google China, penetrating the servers of the Californian company. The cyber-criminals, using multiple worms, had managed to undermine the security system of Big G, stealing a series of confidential information. In particular, Google noticed that the cyber-criminals had compromised the Gmail accounts of many American, European and Chinese activists committed to defending human rights in the most populous country in the world. An attack that according to many experts had been concocted by the Beijing government.

Nasa and State Department

In 1999, Jonathan James, a 15-year-old boy, was able to infiltrate NASA computers and the U.S. State Department. The young man was able to spy on thousands of e-mails, containing many confidential documents, including passwords of military devices, by installing on the servers of the space agency and the State Department a backdoor. Through the stolen data, James will Impossesò, moreover, of a piece of code of a program of NASA.
Melissa Virus

Melissa was one of the worst viruses that ever hit Microsoft Word. The malicious code was acting by infecting the Redmond text program and then it spread sending itself as an email attachment to the first 50 contacts registered in Outlook, the email management software installed on compromised machines. Melissa was able to cause about 80 million dollars of damage.

Computer warfare between Russia and the United States

We are in 1982 and then the Internet was a tool for a few elected and used especially in the military. And already at that time the two main military powers of the world began to use computer science as a weapon to hit each other. The CIA, in fact, managed to penetrate the computer systems of a Siberian gas pipeline, installing a malicious code. The program when it was activated broke down the system that controlled the gas pumps, causing an increase in pressure and finally causing the explosion of the entire energy structure.

Credit cards and bank accounts

In the years two thousand are the data of users to finish under fire. A group of Ukrainian and Russian hackers from 2005 to 2012 acted undisturbed, stealing millions of bank information. It is estimated that the cybercriminals were able to collect 160 million of data connected to credit cards and 800,000 credentials of access to the current accounts of the victims, subsequently auctioned on the web. According to the data, it would seem that in all data stolen by hackers have yielded more than 300 million dollars.


In 2011, many experts in computer security were thrilled when they discovered that for 5 years, from 2006 to 2011, a virus had been able to spread in wildfire through a simple email attachment. The malicious code, identified by Symantec, known company specializing in cybersecurity, hit immediately after the victim opened the attachment, without leaving any trace. Once installed on the machines, ShadyRat was able to seize all the files stored on the infected computers, including those of important international institutions and organizations.


Also in 2011 there was another sensational attack, the first of its kind. Hackers were the users of the Sony video game console. The cyber criminals, in fact, pierced the PSN, the PlayStation Network, a system that allows members to play online with other players. The data of about 77 million users, including many sensitive information such as passwords and credit cards, were put at serious risk by the computer breach. As a result, Sony was forced to suspend the servers, inviting subscribers to change their access data.

Attack on Israeli computer systems

And we close with one of the most dangerous attacks, considering the target targeted: the Iranian nuclear power plants. Israel and the United States, according to what is said, launched a virus, known as Stuxnet, which struck from 2006 to 2010, before it was discovered, the nuclear structure of Natanz. The function of the malware was to increase the speed of the turbines of the plant, leading to collapse.

How to Find Out If Your Facebook Account Has Been Hacked and What to Do

Cyber criminals use social accounts for a lot of network scams. Here’s how to find out if hackers have tampered with your Facebook account

One of the biggest fears is to find your own account on a social network hacked and run by a cyber criminal. Facebook is definitely one of the most attractive platforms since each user shares on their own image and video account of their lives. So let’s see how to tell if our Facebook profile has been hacked.

There are a lot of ways a hacker can use a Facebook account. It could in a very simple way enter, copy every data and use your information to make online scams under a false identity. Needless to say, if that identity were ours, it would be a big problem. Or the cyber criminal could use our account for spam campaigns. This is also what sometimes happens to the most famous characters or with many followers. Or a hacker could use our profile to send malware-containing attachments to all of our friends. So then spread the virus and earn.

How do I know if my Facebook account has been hacked?

On Facebook There is a very simple way to understand if our account has ever been violated by a hacker. First we go to the top right arrow to open the menu, and click on Settings. At this point we will see a pop-up menu and choose the Protection item. Let’s look now under the words “devices from where you signed in.” At this point we read all the list of devices, as well as places and dates, through which we have logged on social. If we notice any suspicious names click on the “End Activity” button next to that device.

Other ways to Intuit a violation of the Facebook profile

There are some other ways to guess if one of our accounts has been hacked. First of all it is likely that a hacker has taken possession of our profile if we notice that name, date of birth, email or password have been changed, even if of a few letters or numbers. Another signal is given by the requests of friendship not sent by us but that we are reported anyway. More obvious signals are the messages not written by us but still sent and post published in our name without our real will.

What to do if Facebook has been hacked?

Once we realized that our account was hacked and we clicked on “Terminate activity” we immediately change the password. So you no longer allow the cyber criminal to access our profile. Then we report everything to Facebook. The social network, in fact, has a page created on Facebook help just to help users in these cases. To report the violation just click on the fake account and hacker attacks. This is under the heading Privacy and security rather than in that regulations and alerts. Done this Facebook will guide us step by step to restore the security of our account.

How to defend against hacker attacks

By clicking on the links that follow, instead, you can discover tips, some more technical others more affordable for everyone, regarding computer security and discover the types of attacks most common: from DDoS attacks to phishing, through botnets.

Russian Hackers in Possession of 1 Billion Password

A group of Russian hackers would hold the sensitive data of 1.2 billion accounts, attracting more than 400,000 sites around the world. Many of the affected sites are still vulnerable.

The world of computer security is in turmoil: a group of Russian hackers is officially in possession of 1.2 billion credentials of web users, including username, password and email address. The discovery is about Hold Security, a highly rated American company in the industry and known to most for discovering the hack that last year hit Adobe.

But this time the numbers are really frightening and they shudder every similar action of the past: it is as if the Russian group had tried to hit every site on the face of the earth. We estimate in fact in 420,000 the websites concerned, ranging from large company to small Internet shops.

At the moment Hold Security has not for now made known the names of the victims, a little ‘ for NDA agreements (not disclosure agreement), a bit ‘ because most sites is still vulnerable; The company will try to contact most of the portals and then publish the list at a conference to allow everyone to protect themselves and prevent further attacks. According to the Ultme News, a team of experts in charge of the New York Times examined the data of Hold Security and considered them absolutely authentic: the big blow actually was there.

The criminal organization seems to operate in a small town in central Russia, between Kazakhstan and Mongolia, consists of no more than fifteen boys around 20 years of age and operates as a small company in all and for everything; At present there are no links with the Russian government, which would also be confirmed by the fact that the objectives of criminal action were sites all over the world and not just Americans. It seems that the “packets” of credentials have not yet been used or sold to other organizations, but of course the risk exists.

Always according to Hold Security, the logic of action was very ingenious: first a large-scale infection (with unknown mode) was disseminated via botnet, which allowed hackers to assess the vulnerability of sites on large scale. In practice the bot (present in the PC of the unsuspecting victim) has verified, for each site visited by the user, the vulnerability of the same to the technique used by hackers, known as SQL Injection. If successful, the hackers would then return later to extract the contents of the database. And a little at a time, the stolen identities became 1.2 billion.